Lookup for vulnerable packages by Package URL.

GET /api/packages/942978?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/942978?format=api",
    "purl": "pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "wordpress",
    "version": "3.2.1+dfsg-1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "3.3.1+dfsg-1",
    "latest_non_vulnerable_version": "6.9.4+dfsg1-1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92153?format=api",
            "vulnerability_id": "VCID-14w4-eqhq-zuhu",
            "summary": "A flaw exists in Wordpress related to the 'wp-admin/press-this.php 'script improperly checking user permissions when publishing posts. This may allow a user with 'Contributor-level' privileges to post as if they had 'publish_posts' permission.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1762",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61517",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61591",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6162",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61592",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6164",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61654",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61676",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61665",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61645",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61686",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61691",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1762"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1762",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1762"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942978?format=api",
                    "purl": "pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.2.1%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942927?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        },
                        {
                            "vulnerability": "VCID-yqam-kpce-dfg7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942925?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942929?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942928?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-1762"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-14w4-eqhq-zuhu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92189?format=api",
            "vulnerability_id": "VCID-1hu7-2yjp-m7b8",
            "summary": "Unspecified vulnerability in WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 has unknown impact and attack vectors related to \"Various security hardening.\"",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3125",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78219",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78227",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78259",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7824",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78267",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78273",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78298",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78281",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78276",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78307",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78304",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.783",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3125"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3125",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3125"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942978?format=api",
                    "purl": "pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.2.1%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942927?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        },
                        {
                            "vulnerability": "VCID-yqam-kpce-dfg7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942925?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942929?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942928?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-3125"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1hu7-2yjp-m7b8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92188?format=api",
            "vulnerability_id": "VCID-2h1g-qy4e-rkhb",
            "summary": "Unspecified vulnerability in WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 has unknown impact and attack vectors related to \"Media security.\"",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3122",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79151",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79157",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79182",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79168",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79193",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79201",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79225",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7921",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79202",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79228",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01235",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79226",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3122"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3122",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3122"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942978?format=api",
                    "purl": "pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.2.1%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942927?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        },
                        {
                            "vulnerability": "VCID-yqam-kpce-dfg7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942925?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942929?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942928?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-3122"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2h1g-qy4e-rkhb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92191?format=api",
            "vulnerability_id": "VCID-7hh4-ex15-9uh9",
            "summary": "WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 does not prevent rendering for (1) admin or (2) login pages inside a frame in a third-party HTML document, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web site.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3127",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49677",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49708",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49736",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49688",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49743",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49737",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49755",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49727",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49728",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49775",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49748",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3127"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3127",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3127"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942978?format=api",
                    "purl": "pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.2.1%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942927?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        },
                        {
                            "vulnerability": "VCID-yqam-kpce-dfg7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942925?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942929?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942928?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-3127"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7hh4-ex15-9uh9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92190?format=api",
            "vulnerability_id": "VCID-9t3e-tq9t-7qay",
            "summary": "WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 allows remote attackers to determine usernames of non-authors via canonical redirects.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3126",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00969",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7656",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00969",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76565",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00969",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76594",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00969",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76575",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00969",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76607",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00969",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76618",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00969",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76645",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00969",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76624",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00969",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76615",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00969",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76656",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00969",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7666",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00969",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76648",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3126"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3126",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3126"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942978?format=api",
                    "purl": "pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.2.1%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942927?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        },
                        {
                            "vulnerability": "VCID-yqam-kpce-dfg7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942925?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942929?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942928?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-3126"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9t3e-tq9t-7qay"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92192?format=api",
            "vulnerability_id": "VCID-9zbn-b1sp-buan",
            "summary": "WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 treats unattached attachments as published, which might allow remote attackers to obtain sensitive data via vectors related to wp-includes/post.php.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78034",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78042",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78072",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78054",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7808",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78085",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78111",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78094",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78091",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78126",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78125",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78118",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3128"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942978?format=api",
                    "purl": "pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.2.1%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942927?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        },
                        {
                            "vulnerability": "VCID-yqam-kpce-dfg7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942925?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942929?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942928?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-3128"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9zbn-b1sp-buan"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92254?format=api",
            "vulnerability_id": "VCID-fdtx-uggj-ybby",
            "summary": "The make_clickable function in wp-includes/formatting.php in WordPress before 3.1.1 does not properly check URLs before passing them to the PCRE library, which allows remote attackers to cause a denial of service (crash) via a comment with a crafted URL that triggers many recursive calls.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4957",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86051",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86062",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86079",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86078",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86097",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86108",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86122",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86121",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86117",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86134",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86139",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86132",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4957"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4957",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4957"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942978?format=api",
                    "purl": "pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.2.1%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942927?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        },
                        {
                            "vulnerability": "VCID-yqam-kpce-dfg7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942925?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942929?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942928?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-4957"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fdtx-uggj-ybby"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92193?format=api",
            "vulnerability_id": "VCID-t4mw-4vck-d7ek",
            "summary": "The file upload functionality in WordPress 3.1 before 3.1.3 and 3.2 before Beta 2, when running \"on hosts with dangerous security settings,\" has unknown impact and attack vectors, possibly related to dangerous filenames.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3129",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6976",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69772",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69788",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69764",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69812",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69827",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6985",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69835",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6982",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69862",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69872",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69853",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3129"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3129",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3129"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942978?format=api",
                    "purl": "pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.2.1%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942927?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        },
                        {
                            "vulnerability": "VCID-yqam-kpce-dfg7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942925?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942929?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942928?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-3129"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t4mw-4vck-d7ek"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92263?format=api",
            "vulnerability_id": "VCID-ufsd-zp75-u3h7",
            "summary": "wp-admin/press-this.php in WordPress before 3.0.6 does not enforce the publish_posts capability requirement, which allows remote authenticated users to perform publish actions by leveraging the Contributor role.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-5270",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00506",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66162",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00506",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66203",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00506",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6623",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00506",
                            "scoring_system": "epss",
                            "scoring_elements": "0.662",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00506",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66247",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00506",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6626",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00506",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66281",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00506",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66268",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00506",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66237",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00506",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66271",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00506",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66287",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-5270"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5270",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5270"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942978?format=api",
                    "purl": "pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.2.1%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942927?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        },
                        {
                            "vulnerability": "VCID-yqam-kpce-dfg7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942925?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942929?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942928?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-5270"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ufsd-zp75-u3h7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92253?format=api",
            "vulnerability_id": "VCID-vs2q-hgzx-jkgk",
            "summary": "Cross-site scripting (XSS) vulnerability in WordPress before 3.1.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4956",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00791",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73836",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00791",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73846",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00791",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73871",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00791",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73842",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00791",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73877",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00791",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7389",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00791",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73912",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00791",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73894",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00791",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73886",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00791",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73928",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00791",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73936",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4956"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4956",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4956"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942978?format=api",
                    "purl": "pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.2.1%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942927?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        },
                        {
                            "vulnerability": "VCID-yqam-kpce-dfg7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942925?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942929?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942928?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-4956"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vs2q-hgzx-jkgk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92194?format=api",
            "vulnerability_id": "VCID-zvnm-b6n7-1kbx",
            "summary": "wp-includes/taxonomy.php in WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 has unknown impact and attack vectors related to \"Taxonomy query hardening,\" possibly involving SQL injection.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3130",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66737",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66775",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.668",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66773",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66822",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66836",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66856",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66842",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6681",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66843",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66858",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66841",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3130"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3130",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3130"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942978?format=api",
                    "purl": "pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.2.1%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942927?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        },
                        {
                            "vulnerability": "VCID-yqam-kpce-dfg7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942925?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942929?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942928?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-3130"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zvnm-b6n7-1kbx"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.2.1%252Bdfsg-1%3Fdistro=trixie"
}