Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/943022?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/943022?format=api", "purl": "pkg:deb/debian/wordpress@5.4.1%2Bdfsg1-1?distro=trixie", "type": "deb", "namespace": "debian", "name": "wordpress", "version": "5.4.1+dfsg1-1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "5.4.2+dfsg1-1", "latest_non_vulnerable_version": "6.9.4+dfsg1-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79750?format=api", "vulnerability_id": "VCID-1tw6-axgs-f3hy", "summary": "security update", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11027", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.42551", "scoring_system": "epss", "scoring_elements": "0.97437", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.42551", "scoring_system": "epss", "scoring_elements": "0.97444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.42551", "scoring_system": "epss", "scoring_elements": "0.97449", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.42551", "scoring_system": "epss", "scoring_elements": "0.9745", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.42551", "scoring_system": "epss", "scoring_elements": "0.97456", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.42551", "scoring_system": "epss", "scoring_elements": "0.97458", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.42551", "scoring_system": "epss", "scoring_elements": "0.97461", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.42551", "scoring_system": "epss", "scoring_elements": "0.97462", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.42551", "scoring_system": "epss", "scoring_elements": "0.97463", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.42551", "scoring_system": "epss", "scoring_elements": "0.97472", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.42551", "scoring_system": "epss", "scoring_elements": "0.97475", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.42551", "scoring_system": "epss", "scoring_elements": "0.97473", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11027" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11025", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11025" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11026", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11026" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11027", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11027" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11028", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11028" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11029" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959391", "reference_id": "959391", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959391" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/51531.py", "reference_id": "CVE-2020-11027", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/51531.py" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943022?format=api", "purl": "pkg:deb/debian/wordpress@5.4.1%2Bdfsg1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.4.1%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942927?format=api", "purl": "pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-gyaq-8pvh-p7gg" }, { "vulnerability": "VCID-jghn-eujf-zbdn" }, { "vulnerability": "VCID-yqam-kpce-dfg7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942925?format=api", "purl": "pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-gyaq-8pvh-p7gg" }, { "vulnerability": "VCID-jghn-eujf-zbdn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942929?format=api", "purl": "pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942928?format=api", "purl": "pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2020-11027" ], "risk_score": 0.8, "exploitability": "2.0", "weighted_severity": "0.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1tw6-axgs-f3hy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94329?format=api", "vulnerability_id": "VCID-2jgs-b7r7-zygv", "summary": "In affected versions of WordPress, a special payload can be crafted that can lead to scripts getting executed within the search block of the block editor. This requires an authenticated user with the ability to add content. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11030", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01037", "scoring_system": "epss", "scoring_elements": "0.77343", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01037", "scoring_system": "epss", "scoring_elements": "0.7735", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01037", "scoring_system": "epss", "scoring_elements": "0.77377", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01037", "scoring_system": "epss", "scoring_elements": "0.77357", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01037", "scoring_system": "epss", "scoring_elements": "0.77387", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01037", "scoring_system": "epss", "scoring_elements": "0.77397", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01037", "scoring_system": "epss", "scoring_elements": "0.77423", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01037", "scoring_system": "epss", "scoring_elements": "0.77403", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01037", "scoring_system": "epss", "scoring_elements": "0.77399", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01037", "scoring_system": "epss", "scoring_elements": "0.77439", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01037", "scoring_system": "epss", "scoring_elements": "0.77438", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01037", "scoring_system": "epss", "scoring_elements": "0.7743", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01037", "scoring_system": "epss", "scoring_elements": "0.77464", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01037", "scoring_system": "epss", "scoring_elements": "0.77471", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11030" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11030", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11030" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959391", "reference_id": "959391", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959391" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943022?format=api", "purl": "pkg:deb/debian/wordpress@5.4.1%2Bdfsg1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.4.1%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942927?format=api", "purl": "pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-gyaq-8pvh-p7gg" }, { "vulnerability": "VCID-jghn-eujf-zbdn" }, { "vulnerability": "VCID-yqam-kpce-dfg7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942925?format=api", "purl": "pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-gyaq-8pvh-p7gg" }, { "vulnerability": "VCID-jghn-eujf-zbdn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942929?format=api", "purl": "pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942928?format=api", "purl": "pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2020-11030" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2jgs-b7r7-zygv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79748?format=api", "vulnerability_id": "VCID-pyzc-scrd-bufa", "summary": "security update", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11025", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80576", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80583", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80605", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80598", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80625", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80635", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80651", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80638", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.8063", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80659", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80661", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80663", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80687", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80691", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11025" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11025", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11025" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11026", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11026" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11027", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11027" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11028", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11028" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11029" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959391", "reference_id": "959391", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959391" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943022?format=api", "purl": "pkg:deb/debian/wordpress@5.4.1%2Bdfsg1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.4.1%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942927?format=api", "purl": "pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-gyaq-8pvh-p7gg" }, { "vulnerability": "VCID-jghn-eujf-zbdn" }, { "vulnerability": "VCID-yqam-kpce-dfg7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942925?format=api", "purl": "pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-gyaq-8pvh-p7gg" }, { "vulnerability": "VCID-jghn-eujf-zbdn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942929?format=api", "purl": "pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942928?format=api", "purl": "pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2020-11025" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pyzc-scrd-bufa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79752?format=api", "vulnerability_id": "VCID-v5s7-vwe3-5bak", "summary": "security update", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11029", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0265", "scoring_system": "epss", "scoring_elements": "0.85684", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0265", "scoring_system": "epss", "scoring_elements": "0.85697", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0265", "scoring_system": "epss", "scoring_elements": "0.85715", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0265", "scoring_system": "epss", "scoring_elements": "0.85721", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0265", "scoring_system": "epss", "scoring_elements": "0.8574", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0265", "scoring_system": "epss", "scoring_elements": "0.85751", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0265", "scoring_system": "epss", "scoring_elements": "0.85766", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0265", "scoring_system": "epss", "scoring_elements": "0.85763", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0265", "scoring_system": "epss", "scoring_elements": "0.85759", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0265", "scoring_system": "epss", "scoring_elements": "0.85777", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0265", "scoring_system": "epss", "scoring_elements": "0.85782", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0265", "scoring_system": "epss", "scoring_elements": "0.85775", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0265", "scoring_system": "epss", "scoring_elements": "0.85799", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0265", "scoring_system": "epss", "scoring_elements": "0.85809", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11029" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11025", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11025" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11026", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11026" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11027", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11027" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11028", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11028" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11029" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959391", "reference_id": "959391", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959391" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943022?format=api", "purl": "pkg:deb/debian/wordpress@5.4.1%2Bdfsg1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.4.1%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942927?format=api", "purl": "pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-gyaq-8pvh-p7gg" }, { "vulnerability": "VCID-jghn-eujf-zbdn" }, { "vulnerability": "VCID-yqam-kpce-dfg7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942925?format=api", "purl": "pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-gyaq-8pvh-p7gg" }, { "vulnerability": "VCID-jghn-eujf-zbdn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942929?format=api", "purl": "pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942928?format=api", "purl": "pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2020-11029" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v5s7-vwe3-5bak" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79749?format=api", "vulnerability_id": "VCID-w8w1-e5zu-ffgx", "summary": "security update", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11026", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0441", "scoring_system": "epss", "scoring_elements": "0.88962", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0441", "scoring_system": "epss", "scoring_elements": "0.8897", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0441", "scoring_system": "epss", "scoring_elements": "0.88986", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0441", "scoring_system": "epss", "scoring_elements": "0.88989", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0441", "scoring_system": "epss", "scoring_elements": "0.89007", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0441", "scoring_system": "epss", "scoring_elements": "0.89012", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0441", "scoring_system": "epss", "scoring_elements": "0.89024", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0441", "scoring_system": "epss", "scoring_elements": "0.89019", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0441", "scoring_system": "epss", "scoring_elements": "0.89017", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0441", "scoring_system": "epss", "scoring_elements": "0.8903", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0441", "scoring_system": "epss", "scoring_elements": "0.89029", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0441", "scoring_system": "epss", "scoring_elements": "0.89042", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0441", "scoring_system": "epss", "scoring_elements": "0.8905", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11026" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11025", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11025" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11026", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11026" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11027", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11027" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11028", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11028" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11029" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959391", "reference_id": "959391", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959391" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943022?format=api", "purl": "pkg:deb/debian/wordpress@5.4.1%2Bdfsg1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.4.1%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942927?format=api", "purl": "pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-gyaq-8pvh-p7gg" }, { "vulnerability": "VCID-jghn-eujf-zbdn" }, { "vulnerability": "VCID-yqam-kpce-dfg7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942925?format=api", "purl": "pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-gyaq-8pvh-p7gg" }, { "vulnerability": "VCID-jghn-eujf-zbdn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942929?format=api", "purl": "pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942928?format=api", "purl": "pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2020-11026" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w8w1-e5zu-ffgx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79751?format=api", "vulnerability_id": "VCID-wenb-bpws-mkar", "summary": "security update", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11028", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76293", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76296", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76327", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76306", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76339", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76352", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76379", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76357", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76392", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76399", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76383", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76417", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00949", "scoring_system": "epss", "scoring_elements": "0.76424", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11028" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11025", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11025" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11026", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11026" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11027", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11027" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11028", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11028" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11029" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959391", "reference_id": "959391", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959391" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943022?format=api", "purl": "pkg:deb/debian/wordpress@5.4.1%2Bdfsg1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.4.1%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942927?format=api", "purl": "pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-gyaq-8pvh-p7gg" }, { "vulnerability": "VCID-jghn-eujf-zbdn" }, { "vulnerability": "VCID-yqam-kpce-dfg7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942925?format=api", "purl": "pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-gyaq-8pvh-p7gg" }, { "vulnerability": "VCID-jghn-eujf-zbdn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942929?format=api", "purl": "pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942928?format=api", "purl": "pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2020-11028" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wenb-bpws-mkar" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.4.1%252Bdfsg1-1%3Fdistro=trixie" }