Lookup for vulnerable packages by Package URL.

GET /api/packages/943024?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/943024?format=api",
    "purl": "pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "wordpress",
    "version": "5.5.3+dfsg1-1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "5.7.1+dfsg1-1",
    "latest_non_vulnerable_version": "6.9.4+dfsg1-1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90918?format=api",
            "vulnerability_id": "VCID-92fa-nrxb-e3gj",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28032",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.25814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96275",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.25814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96221",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.25814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96229",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.25814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96236",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.25814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9624",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.25814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96249",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.25814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96252",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.25814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96256",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.25814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96257",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.25814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96266",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.25814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96271",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.25814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96272",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.25814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96273",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28032"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562",
                    "reference_id": "973562",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202011-3",
                    "reference_id": "ASA-202011-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202011-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1257",
                    "reference_id": "AVG-1257",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1257"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943024?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.5.3%252Bdfsg1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942927?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        },
                        {
                            "vulnerability": "VCID-yqam-kpce-dfg7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942925?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942929?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942928?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-28032"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-92fa-nrxb-e3gj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34628?format=api",
            "vulnerability_id": "VCID-fra3-hye6-kqh7",
            "summary": "Insecure Deserialization of untrusted data in rmccue/requests\n### Impact\nUnserialization of untrusted data.\n\n### Patches\nThe issue has been patched and users of `Requests` 1.6.0, 1.6.1 and 1.7.0 should update to version 1.8.0.\n\n### References\nPublications about the vulnerability:\n* https://dannewitz.ninja/posts/php-unserialize-object-injection-yet-another-stars-rating-wordpress\n* https://github.com/ambionics/phpggc/issues/52\n* https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security/\n* https://i.blackhat.com/us-18/Thu-August-9/us-18-Thomas-Its-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It.pdf\n* https://cdn2.hubspot.net/hubfs/3853213/us-18-Thomas-It%27s-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-....pdf\n* https://2018.zeronights.ru/wp-content/uploads/materials/9%20ZN2018%20WV%20-%20PHP%20unserialize.pdf\n* https://medium.com/@knownsec404team/extend-the-attack-surface-of-php-deserialization-vulnerability-via-phar-d6455c6a1066#3c0f\n\nOriginally fixed in WordPress 5.5.2:\n* https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3\n* https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/\n\nRelated Security Advisories:\n* https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-28032\n* https://nvd.nist.gov/vuln/detail/CVE-2020-28032\n\nNotification to the Requests repo including a fix in:\n* https://github.com/rmccue/Requests/pull/421 and\n* https://github.com/rmccue/Requests/pull/422\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [Request](https://github.com/WordPress/Requests/)",
            "references": [
                {
                    "reference_url": "https://2018.zeronights.ru/wp-content/uploads/materials/9%20ZN2018%20WV%20-%20PHP%20unserialize.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://2018.zeronights.ru/wp-content/uploads/materials/9%20ZN2018%20WV%20-%20PHP%20unserialize.pdf"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29476",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84539",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84512",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8451",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84489",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84493",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.845",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84481",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84418",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84548",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84475",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84454",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84452",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84433",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29476"
                },
                {
                    "reference_url": "https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security"
                },
                {
                    "reference_url": "https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security/"
                },
                {
                    "reference_url": "https://cdn2.hubspot.net/hubfs/3853213/us-18-Thomas-It%27s-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-....pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://cdn2.hubspot.net/hubfs/3853213/us-18-Thomas-It%27s-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-....pdf"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29476",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29476"
                },
                {
                    "reference_url": "https://dannewitz.ninja/posts/php-unserialize-object-injection-yet-another-stars-rating-wordpress",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://dannewitz.ninja/posts/php-unserialize-object-injection-yet-another-stars-rating-wordpress"
                },
                {
                    "reference_url": "https://github.com/ambionics/phpggc/issues/52",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ambionics/phpggc/issues/52"
                },
                {
                    "reference_url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/rmccue/requests/CVE-2021-29476.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/rmccue/requests/CVE-2021-29476.yaml"
                },
                {
                    "reference_url": "https://github.com/rmccue/Requests/pull/421",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rmccue/Requests/pull/421"
                },
                {
                    "reference_url": "https://github.com/WordPress/Requests/security/advisories/GHSA-52qp-jpq7-6c54",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/WordPress/Requests/security/advisories/GHSA-52qp-jpq7-6c54"
                },
                {
                    "reference_url": "https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3"
                },
                {
                    "reference_url": "https://i.blackhat.com/us-18/Thu-August-9/us-18-Thomas-Its-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://i.blackhat.com/us-18/Thu-August-9/us-18-Thomas-Its-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It.pdf"
                },
                {
                    "reference_url": "https://medium.com/@knownsec404team/extend-the-attack-surface-of-php-deserialization-vulnerability-via-phar-d6455c6a1066#3c0f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://medium.com/@knownsec404team/extend-the-attack-surface-of-php-deserialization-vulnerability-via-phar-d6455c6a1066#3c0f"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29476",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29476"
                },
                {
                    "reference_url": "https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release"
                },
                {
                    "reference_url": "https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-52qp-jpq7-6c54",
                    "reference_id": "GHSA-52qp-jpq7-6c54",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-52qp-jpq7-6c54"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943024?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.5.3%252Bdfsg1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942927?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        },
                        {
                            "vulnerability": "VCID-yqam-kpce-dfg7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942925?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942929?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942928?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-29476",
                "GHSA-52qp-jpq7-6c54"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fra3-hye6-kqh7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90922?format=api",
            "vulnerability_id": "VCID-gy54-apzn-7kef",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88683",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88701",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88657",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88666",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88682",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90776",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90773",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90772",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90783",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.06074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90784",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.06074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90752",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90761",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9076",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90757",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28036"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562",
                    "reference_id": "973562",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202011-3",
                    "reference_id": "ASA-202011-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202011-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1257",
                    "reference_id": "AVG-1257",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1257"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943024?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.5.3%252Bdfsg1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942927?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        },
                        {
                            "vulnerability": "VCID-yqam-kpce-dfg7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942925?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942929?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942928?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-28036"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gy54-apzn-7kef"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90926?format=api",
            "vulnerability_id": "VCID-h97y-a92u-2fay",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5386",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53772",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53792",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53818",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53844",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53842",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5389",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53873",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53857",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53895",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.539",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53881",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53848",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28040"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562",
                    "reference_id": "973562",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202011-3",
                    "reference_id": "ASA-202011-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202011-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1257",
                    "reference_id": "AVG-1257",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1257"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943024?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.5.3%252Bdfsg1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942927?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        },
                        {
                            "vulnerability": "VCID-yqam-kpce-dfg7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942925?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942929?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942928?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-28040"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h97y-a92u-2fay"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90921?format=api",
            "vulnerability_id": "VCID-n7ne-unru-7fhn",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28035",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91181",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.06561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91092",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91098",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91106",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91114",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91127",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91133",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91141",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91142",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91166",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9117",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06561",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91183",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28035"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562",
                    "reference_id": "973562",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202011-3",
                    "reference_id": "ASA-202011-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202011-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1257",
                    "reference_id": "AVG-1257",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1257"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943024?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.5.3%252Bdfsg1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942927?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        },
                        {
                            "vulnerability": "VCID-yqam-kpce-dfg7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942925?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942929?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942928?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-28035"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n7ne-unru-7fhn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90919?format=api",
            "vulnerability_id": "VCID-ngkc-cwzj-nbdk",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28033",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79467",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79348",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79355",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79377",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79363",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7939",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79399",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79422",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79406",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79395",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79427",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79425",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79428",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79461",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28033"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562",
                    "reference_id": "973562",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202011-3",
                    "reference_id": "ASA-202011-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202011-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1257",
                    "reference_id": "AVG-1257",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1257"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943024?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.5.3%252Bdfsg1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942927?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        },
                        {
                            "vulnerability": "VCID-yqam-kpce-dfg7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942925?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942929?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942928?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-28033"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ngkc-cwzj-nbdk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90920?format=api",
            "vulnerability_id": "VCID-pkjb-8649-fqd2",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28034",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02678",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85882",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02678",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85761",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02678",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85774",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02678",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85792",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02678",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85797",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02678",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85816",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02678",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85827",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02678",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85841",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02678",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85838",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02678",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85834",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02678",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85853",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02678",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85857",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02678",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85851",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02678",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85874",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28034"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562",
                    "reference_id": "973562",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202011-3",
                    "reference_id": "ASA-202011-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202011-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1257",
                    "reference_id": "AVG-1257",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1257"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943024?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.5.3%252Bdfsg1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942927?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        },
                        {
                            "vulnerability": "VCID-yqam-kpce-dfg7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942925?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942929?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942928?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-28034"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pkjb-8649-fqd2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90925?format=api",
            "vulnerability_id": "VCID-psca-f78j-hbc2",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28039",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90717",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.05996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90642",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90646",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90657",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90665",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90676",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90682",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9069",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90691",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90687",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90706",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.05996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90703",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90701",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90716",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28039"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562",
                    "reference_id": "973562",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202011-3",
                    "reference_id": "ASA-202011-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202011-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1257",
                    "reference_id": "AVG-1257",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1257"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943024?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.5.3%252Bdfsg1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942927?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        },
                        {
                            "vulnerability": "VCID-yqam-kpce-dfg7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942925?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942929?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942928?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-28039"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-psca-f78j-hbc2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90924?format=api",
            "vulnerability_id": "VCID-tffx-7mmd-gkcf",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.16023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94797",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.16023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94745",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.16023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94754",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.16023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94758",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.16023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94759",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.16023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94768",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.16023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94773",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.16023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94776",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.16023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9478",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.16023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94781",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.16023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94789",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.16023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94792",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.16023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94794",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.16023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94795",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562",
                    "reference_id": "973562",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202011-3",
                    "reference_id": "ASA-202011-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202011-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1257",
                    "reference_id": "AVG-1257",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1257"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943024?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.5.3%252Bdfsg1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942927?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        },
                        {
                            "vulnerability": "VCID-yqam-kpce-dfg7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942925?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942929?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942928?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-28038"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tffx-7mmd-gkcf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90923?format=api",
            "vulnerability_id": "VCID-zmhc-4gku-13ga",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28037",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.1273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94021",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.1273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93961",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.1273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9397",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.1273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93979",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.1273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93982",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.1273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93991",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.1273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93994",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.1273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93999",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.1273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93998",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.1273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94014",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.1273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94019",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.1273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9402",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28037"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562",
                    "reference_id": "973562",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202011-3",
                    "reference_id": "ASA-202011-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202011-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1257",
                    "reference_id": "AVG-1257",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1257"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943024?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.5.3%252Bdfsg1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942927?format=api",
                    "purl": "pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        },
                        {
                            "vulnerability": "VCID-yqam-kpce-dfg7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942925?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-gyaq-8pvh-p7gg"
                        },
                        {
                            "vulnerability": "VCID-jghn-eujf-zbdn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942929?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942928?format=api",
                    "purl": "pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-28037"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zmhc-4gku-13ga"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.5.3%252Bdfsg1-1%3Fdistro=trixie"
}