{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","type":"ebuild","namespace":"dev-lang","name":"v8","version":"15.0.874.102","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"15.0.874.121","latest_non_vulnerable_version":"33.0.1750.146","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40672?format=json","vulnerability_id":"VCID-1ffs-bhwb-w3he","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3888","reference_id":"","reference_type":"","scores":[{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84011","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84025","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84042","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84045","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84068","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84074","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84092","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84085","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.8408","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84103","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84105","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84107","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84131","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84138","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84143","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84163","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84188","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84204","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84203","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84221","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84254","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3888"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-3888"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1ffs-bhwb-w3he"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40621?format=json","vulnerability_id":"VCID-1khm-ys43-wyh9","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3875","reference_id":"","reference_type":"","scores":[{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56029","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56138","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56158","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56189","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56194","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56204","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.5618","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56164","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56198","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.562","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56169","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56095","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56116","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56092","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56045","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56094","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56155","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56105","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56129","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56188","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3875"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-3875"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1khm-ys43-wyh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40632?format=json","vulnerability_id":"VCID-2kq2-244u-mya6","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3880","reference_id":"","reference_type":"","scores":[{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41733","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41799","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41828","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41757","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41807","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41817","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.4184","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41843","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41745","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41672","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41673","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41593","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41453","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41522","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41539","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41449","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41474","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41549","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3880"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-3880"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2kq2-244u-mya6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40454?format=json","vulnerability_id":"VCID-312w-3yww-mkgc","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2840","reference_id":"","reference_type":"","scores":[{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67841","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67865","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67884","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67864","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67915","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67928","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67952","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67939","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67903","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.6794","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67954","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67935","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.6798","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67989","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67994","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.67969","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.68011","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.68053","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.6802","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.68046","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00548","scoring_system":"epss","scoring_elements":"0.68103","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2840"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2840"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-312w-3yww-mkgc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40508?format=json","vulnerability_id":"VCID-32rr-b87s-d3fj","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2846","reference_id":"","reference_type":"","scores":[{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84011","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84025","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84042","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84045","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84068","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84074","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84092","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84085","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.8408","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84103","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84105","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84107","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84131","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84138","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84143","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84163","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84188","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84204","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84203","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84221","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84254","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2846"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2846"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-32rr-b87s-d3fj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40365?format=json","vulnerability_id":"VCID-3q2g-dxas-5qhk","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2349","reference_id":"","reference_type":"","scores":[{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74496","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.745","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74526","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74501","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74533","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74548","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.7457","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.7455","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74542","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.7458","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74587","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74579","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74615","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.7462","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74622","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74624","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74653","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74679","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74646","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74666","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74721","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2349"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2349"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3q2g-dxas-5qhk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40329?format=json","vulnerability_id":"VCID-3rxb-6pcj-mfg8","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2345","reference_id":"","reference_type":"","scores":[{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74496","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.745","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74526","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74501","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74533","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74548","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.7457","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.7455","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74542","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.7458","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74587","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74579","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74615","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.7462","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74622","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74624","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74653","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74679","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74646","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74666","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74721","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2345"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2345"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3rxb-6pcj-mfg8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40608?format=json","vulnerability_id":"VCID-3ssv-vt2f-ufez","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3234","reference_id":"","reference_type":"","scores":[{"value":"0.02823","scoring_system":"epss","scoring_elements":"0.86099","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02823","scoring_system":"epss","scoring_elements":"0.86109","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02823","scoring_system":"epss","scoring_elements":"0.86125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02823","scoring_system":"epss","scoring_elements":"0.86124","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02823","scoring_system":"epss","scoring_elements":"0.86144","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02823","scoring_system":"epss","scoring_elements":"0.86155","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02823","scoring_system":"epss","scoring_elements":"0.86169","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02823","scoring_system":"epss","scoring_elements":"0.86167","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02823","scoring_system":"epss","scoring_elements":"0.86163","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02823","scoring_system":"epss","scoring_elements":"0.8618","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02823","scoring_system":"epss","scoring_elements":"0.86186","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02823","scoring_system":"epss","scoring_elements":"0.86177","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02823","scoring_system":"epss","scoring_elements":"0.86198","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02823","scoring_system":"epss","scoring_elements":"0.86208","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02823","scoring_system":"epss","scoring_elements":"0.86227","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02823","scoring_system":"epss","scoring_elements":"0.86248","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02823","scoring_system":"epss","scoring_elements":"0.86268","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02823","scoring_system":"epss","scoring_elements":"0.86264","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02823","scoring_system":"epss","scoring_elements":"0.86278","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02823","scoring_system":"epss","scoring_elements":"0.86315","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3234"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-3234"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3ssv-vt2f-ufez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40586?format=json","vulnerability_id":"VCID-444z-c5pk-dfd7","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2855","reference_id":"","reference_type":"","scores":[{"value":"0.01647","scoring_system":"epss","scoring_elements":"0.81914","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01647","scoring_system":"epss","scoring_elements":"0.81925","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01647","scoring_system":"epss","scoring_elements":"0.81949","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01647","scoring_system":"epss","scoring_elements":"0.81945","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01647","scoring_system":"epss","scoring_elements":"0.81972","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01647","scoring_system":"epss","scoring_elements":"0.81979","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01647","scoring_system":"epss","scoring_elements":"0.81999","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01647","scoring_system":"epss","scoring_elements":"0.81987","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01647","scoring_system":"epss","scoring_elements":"0.81982","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01647","scoring_system":"epss","scoring_elements":"0.82017","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01647","scoring_system":"epss","scoring_elements":"0.82018","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01647","scoring_system":"epss","scoring_elements":"0.8202","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01647","scoring_system":"epss","scoring_elements":"0.82042","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01647","scoring_system":"epss","scoring_elements":"0.82054","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01647","scoring_system":"epss","scoring_elements":"0.82058","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01647","scoring_system":"epss","scoring_elements":"0.82076","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01647","scoring_system":"epss","scoring_elements":"0.82097","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01647","scoring_system":"epss","scoring_elements":"0.82122","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01647","scoring_system":"epss","scoring_elements":"0.82119","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01647","scoring_system":"epss","scoring_elements":"0.82135","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01647","scoring_system":"epss","scoring_elements":"0.82177","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2855"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2855"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-444z-c5pk-dfd7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40342?format=json","vulnerability_id":"VCID-4bhj-xrb4-qyc2","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2347","reference_id":"","reference_type":"","scores":[{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74496","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.745","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74526","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74501","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74533","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74548","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.7457","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.7455","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74542","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.7458","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74587","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74579","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74615","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.7462","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74622","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74624","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74653","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74679","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74646","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74666","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74721","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2347"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2347"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4bhj-xrb4-qyc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40475?format=json","vulnerability_id":"VCID-4ek9-1r78-43ax","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2843","reference_id":"","reference_type":"","scores":[{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75422","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75425","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75457","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75437","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.7548","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75489","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75509","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75487","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75477","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75519","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75524","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75513","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75546","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.7555","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75554","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75565","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75594","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75618","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75599","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75616","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75673","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2843"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2843"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4ek9-1r78-43ax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40678?format=json","vulnerability_id":"VCID-4w1d-xm5d-17hk","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3889","reference_id":"","reference_type":"","scores":[{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72321","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72328","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72346","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72323","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72361","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72373","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72396","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.7238","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72368","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72409","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72418","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72407","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72449","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72458","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72454","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72447","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72476","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72502","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72464","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72491","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00716","scoring_system":"epss","scoring_elements":"0.72547","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3889"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-3889"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4w1d-xm5d-17hk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40581?format=json","vulnerability_id":"VCID-5beg-53wk-e7h8","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2854","reference_id":"","reference_type":"","scores":[{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.82889","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.82905","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.82918","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.82915","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.8294","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.82947","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.82963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.82957","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.82954","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.82992","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.82995","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.83017","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.83025","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.83031","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.83054","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.83074","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.83094","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.8311","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0184","scoring_system":"epss","scoring_elements":"0.83145","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2854"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2854"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5beg-53wk-e7h8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40604?format=json","vulnerability_id":"VCID-5edg-95es-jqbm","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2862","reference_id":"","reference_type":"","scores":[{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45478","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45554","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45576","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45523","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45578","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45579","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.456","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.4557","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45577","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45624","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45621","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45571","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45484","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45492","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45431","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45327","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45392","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.4541","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45354","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45378","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45453","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2862"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2862"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5edg-95es-jqbm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40634?format=json","vulnerability_id":"VCID-5gu3-3k49-dqhc","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3882","reference_id":"","reference_type":"","scores":[{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72239","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72245","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72265","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72241","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.7228","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72292","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72314","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72297","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72284","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72327","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72336","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72324","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72367","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72376","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72373","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72364","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72393","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.7242","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72383","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.7241","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72468","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3882"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-3882"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5gu3-3k49-dqhc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40567?format=json","vulnerability_id":"VCID-5n12-cp2e-dqf6","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2851","reference_id":"","reference_type":"","scores":[{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75422","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75425","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75457","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75437","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.7548","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75489","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75509","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75487","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75477","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75519","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75524","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75513","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75546","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.7555","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75554","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75565","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75594","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75618","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75599","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75616","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75673","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2851"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2851"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5n12-cp2e-dqf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40352?format=json","vulnerability_id":"VCID-6hru-2pb2-huha","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2348","reference_id":"","reference_type":"","scores":[{"value":"0.02905","scoring_system":"epss","scoring_elements":"0.86296","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02905","scoring_system":"epss","scoring_elements":"0.86307","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02905","scoring_system":"epss","scoring_elements":"0.86325","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02905","scoring_system":"epss","scoring_elements":"0.86326","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02905","scoring_system":"epss","scoring_elements":"0.86344","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02905","scoring_system":"epss","scoring_elements":"0.86353","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02905","scoring_system":"epss","scoring_elements":"0.86368","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02905","scoring_system":"epss","scoring_elements":"0.86366","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02905","scoring_system":"epss","scoring_elements":"0.86361","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02905","scoring_system":"epss","scoring_elements":"0.86377","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02905","scoring_system":"epss","scoring_elements":"0.86382","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02905","scoring_system":"epss","scoring_elements":"0.86375","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02905","scoring_system":"epss","scoring_elements":"0.86395","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02905","scoring_system":"epss","scoring_elements":"0.86405","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02905","scoring_system":"epss","scoring_elements":"0.86401","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02905","scoring_system":"epss","scoring_elements":"0.86421","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02905","scoring_system":"epss","scoring_elements":"0.86441","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02905","scoring_system":"epss","scoring_elements":"0.8646","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02905","scoring_system":"epss","scoring_elements":"0.86457","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02905","scoring_system":"epss","scoring_elements":"0.8647","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02905","scoring_system":"epss","scoring_elements":"0.86506","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2348"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2348"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6hru-2pb2-huha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40410?format=json","vulnerability_id":"VCID-733g-xc99-6bf8","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2835","reference_id":"","reference_type":"","scores":[{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28191","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28262","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28305","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28096","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28161","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28204","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28212","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28169","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28111","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28124","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28106","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28061","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.2798","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27868","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27792","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27621","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27683","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27705","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27624","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.2764","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27717","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2835"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2835"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-733g-xc99-6bf8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40680?format=json","vulnerability_id":"VCID-82gd-1v8d-jufc","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3891","reference_id":"","reference_type":"","scores":[{"value":"0.00784","scoring_system":"epss","scoring_elements":"0.73701","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00784","scoring_system":"epss","scoring_elements":"0.73711","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00784","scoring_system":"epss","scoring_elements":"0.73735","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00784","scoring_system":"epss","scoring_elements":"0.73706","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00784","scoring_system":"epss","scoring_elements":"0.73742","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00784","scoring_system":"epss","scoring_elements":"0.73755","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00784","scoring_system":"epss","scoring_elements":"0.73777","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00784","scoring_system":"epss","scoring_elements":"0.73759","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00784","scoring_system":"epss","scoring_elements":"0.7375","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00784","scoring_system":"epss","scoring_elements":"0.73792","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00784","scoring_system":"epss","scoring_elements":"0.738","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00784","scoring_system":"epss","scoring_elements":"0.7379","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00784","scoring_system":"epss","scoring_elements":"0.73824","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00784","scoring_system":"epss","scoring_elements":"0.73833","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00784","scoring_system":"epss","scoring_elements":"0.73827","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00784","scoring_system":"epss","scoring_elements":"0.73853","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00784","scoring_system":"epss","scoring_elements":"0.73877","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00784","scoring_system":"epss","scoring_elements":"0.7384","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00784","scoring_system":"epss","scoring_elements":"0.73864","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00784","scoring_system":"epss","scoring_elements":"0.7392","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3891"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-3891"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-82gd-1v8d-jufc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40679?format=json","vulnerability_id":"VCID-8fbr-7k26-6yh7","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3890","reference_id":"","reference_type":"","scores":[{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72239","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72245","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72265","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72241","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.7228","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72292","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72314","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72297","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72284","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72327","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72336","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72324","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72367","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72376","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72373","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72364","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72393","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.7242","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72383","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.7241","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72468","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3890"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-3890"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8fbr-7k26-6yh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40645?format=json","vulnerability_id":"VCID-9tcn-uar4-v7ea","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3885","reference_id":"","reference_type":"","scores":[{"value":"0.02414","scoring_system":"epss","scoring_elements":"0.85034","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02414","scoring_system":"epss","scoring_elements":"0.85047","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02414","scoring_system":"epss","scoring_elements":"0.85064","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02414","scoring_system":"epss","scoring_elements":"0.85068","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02414","scoring_system":"epss","scoring_elements":"0.85091","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02414","scoring_system":"epss","scoring_elements":"0.85098","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02414","scoring_system":"epss","scoring_elements":"0.85113","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02414","scoring_system":"epss","scoring_elements":"0.85111","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02414","scoring_system":"epss","scoring_elements":"0.85108","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02414","scoring_system":"epss","scoring_elements":"0.85129","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02414","scoring_system":"epss","scoring_elements":"0.85132","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02414","scoring_system":"epss","scoring_elements":"0.85152","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02414","scoring_system":"epss","scoring_elements":"0.85161","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02414","scoring_system":"epss","scoring_elements":"0.85158","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02414","scoring_system":"epss","scoring_elements":"0.85172","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02414","scoring_system":"epss","scoring_elements":"0.85197","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02414","scoring_system":"epss","scoring_elements":"0.85217","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02414","scoring_system":"epss","scoring_elements":"0.85212","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02414","scoring_system":"epss","scoring_elements":"0.85226","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02414","scoring_system":"epss","scoring_elements":"0.85262","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3885"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-3885"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9tcn-uar4-v7ea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40627?format=json","vulnerability_id":"VCID-9ten-y68d-fues","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3877","reference_id":"","reference_type":"","scores":[{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54685","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54755","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54778","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54748","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54798","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54795","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54807","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.5479","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54769","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54809","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54791","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54765","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54784","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54762","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54708","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.5475","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54805","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54766","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54793","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54858","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3877"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-3877"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9ten-y68d-fues"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40444?format=json","vulnerability_id":"VCID-azq1-eec6-d7au","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2839","reference_id":"","reference_type":"","scores":[{"value":"0.0222","scoring_system":"epss","scoring_elements":"0.8442","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0222","scoring_system":"epss","scoring_elements":"0.84435","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0222","scoring_system":"epss","scoring_elements":"0.84454","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0222","scoring_system":"epss","scoring_elements":"0.84456","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0222","scoring_system":"epss","scoring_elements":"0.84477","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0222","scoring_system":"epss","scoring_elements":"0.84483","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0222","scoring_system":"epss","scoring_elements":"0.84501","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0222","scoring_system":"epss","scoring_elements":"0.84496","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0222","scoring_system":"epss","scoring_elements":"0.84491","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0222","scoring_system":"epss","scoring_elements":"0.84512","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0222","scoring_system":"epss","scoring_elements":"0.84514","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0222","scoring_system":"epss","scoring_elements":"0.84541","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0222","scoring_system":"epss","scoring_elements":"0.8455","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0222","scoring_system":"epss","scoring_elements":"0.84553","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0222","scoring_system":"epss","scoring_elements":"0.8457","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0222","scoring_system":"epss","scoring_elements":"0.84596","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0222","scoring_system":"epss","scoring_elements":"0.84612","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0222","scoring_system":"epss","scoring_elements":"0.84609","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0222","scoring_system":"epss","scoring_elements":"0.84625","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0222","scoring_system":"epss","scoring_elements":"0.84657","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2839"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2839"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-azq1-eec6-d7au"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40590?format=json","vulnerability_id":"VCID-bfxb-vgb7-byh8","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2858","reference_id":"","reference_type":"","scores":[{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75422","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75425","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75457","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75437","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.7548","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75489","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75509","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75487","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75477","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75519","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75524","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75513","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75546","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.7555","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75554","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75565","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75594","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75618","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75599","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75616","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75673","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2858"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2858"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bfxb-vgb7-byh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40555?format=json","vulnerability_id":"VCID-btpm-pjhk-kqgp","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2850","reference_id":"","reference_type":"","scores":[{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75422","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75425","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75457","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75437","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.7548","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75489","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75509","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75487","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75477","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75519","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75524","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75513","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75546","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.7555","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75554","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75565","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75594","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75618","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75599","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75616","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75673","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2850"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2850"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-btpm-pjhk-kqgp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40495?format=json","vulnerability_id":"VCID-bwza-emkk-k3dk","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2845","reference_id":"","reference_type":"","scores":[{"value":"0.0053","scoring_system":"epss","scoring_elements":"0.67158","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0053","scoring_system":"epss","scoring_elements":"0.67195","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0053","scoring_system":"epss","scoring_elements":"0.67219","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0053","scoring_system":"epss","scoring_elements":"0.67246","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0053","scoring_system":"epss","scoring_elements":"0.6726","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0053","scoring_system":"epss","scoring_elements":"0.6728","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0053","scoring_system":"epss","scoring_elements":"0.67266","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0053","scoring_system":"epss","scoring_elements":"0.67231","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0053","scoring_system":"epss","scoring_elements":"0.67278","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0053","scoring_system":"epss","scoring_elements":"0.67258","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0053","scoring_system":"epss","scoring_elements":"0.67289","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0053","scoring_system":"epss","scoring_elements":"0.6729","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0053","scoring_system":"epss","scoring_elements":"0.67263","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0053","scoring_system":"epss","scoring_elements":"0.67304","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0053","scoring_system":"epss","scoring_elements":"0.67341","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0053","scoring_system":"epss","scoring_elements":"0.67314","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0053","scoring_system":"epss","scoring_elements":"0.67339","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0053","scoring_system":"epss","scoring_elements":"0.674","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2845"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2845"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bwza-emkk-k3dk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40606?format=json","vulnerability_id":"VCID-c2ys-mvkk-pbc3","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2874","reference_id":"","reference_type":"","scores":[{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.2869","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28773","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28821","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28627","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28693","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28732","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28736","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28644","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28664","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28639","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28591","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28476","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28364","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28288","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28128","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28186","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28209","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28127","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28146","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.2822","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2874"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2874"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c2ys-mvkk-pbc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40465?format=json","vulnerability_id":"VCID-gbqf-s7mu-dkhb","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2841","reference_id":"","reference_type":"","scores":[{"value":"0.12762","scoring_system":"epss","scoring_elements":"0.93967","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12762","scoring_system":"epss","scoring_elements":"0.93976","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12762","scoring_system":"epss","scoring_elements":"0.93986","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12762","scoring_system":"epss","scoring_elements":"0.93989","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12762","scoring_system":"epss","scoring_elements":"0.93997","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12762","scoring_system":"epss","scoring_elements":"0.94001","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12762","scoring_system":"epss","scoring_elements":"0.94005","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12762","scoring_system":"epss","scoring_elements":"0.9402","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12762","scoring_system":"epss","scoring_elements":"0.94025","published_at":"2026-04-18T12:55:00Z"},{"value":"0.12762","scoring_system":"epss","scoring_elements":"0.94026","published_at":"2026-04-21T12:55:00Z"},{"value":"0.12762","scoring_system":"epss","scoring_elements":"0.94028","published_at":"2026-04-24T12:55:00Z"},{"value":"0.12762","scoring_system":"epss","scoring_elements":"0.94027","published_at":"2026-04-29T12:55:00Z"},{"value":"0.12762","scoring_system":"epss","scoring_elements":"0.94035","published_at":"2026-05-05T12:55:00Z"},{"value":"0.12762","scoring_system":"epss","scoring_elements":"0.94048","published_at":"2026-05-07T12:55:00Z"},{"value":"0.12762","scoring_system":"epss","scoring_elements":"0.94057","published_at":"2026-05-09T12:55:00Z"},{"value":"0.12762","scoring_system":"epss","scoring_elements":"0.94061","published_at":"2026-05-11T12:55:00Z"},{"value":"0.12762","scoring_system":"epss","scoring_elements":"0.94065","published_at":"2026-05-12T12:55:00Z"},{"value":"0.12762","scoring_system":"epss","scoring_elements":"0.94078","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2841"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/17929.txt","reference_id":"CVE-2011-2841;OSVDB-75541","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/17929.txt"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2841"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gbqf-s7mu-dkhb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40576?format=json","vulnerability_id":"VCID-h8q5-phar-fqb8","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2853","reference_id":"","reference_type":"","scores":[{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75422","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75425","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75457","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75437","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.7548","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75489","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75509","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75487","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75477","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75519","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75524","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75513","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75546","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.7555","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75554","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75565","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75594","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75618","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75599","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75616","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75673","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2853"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2853"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h8q5-phar-fqb8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40485?format=json","vulnerability_id":"VCID-j292-81we-6qcb","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2844","reference_id":"","reference_type":"","scores":[{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75422","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75425","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75457","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75437","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.7548","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75489","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75509","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75487","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75477","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75519","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75524","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75513","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75546","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.7555","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75554","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75565","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75594","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75618","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75599","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75616","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75673","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2844"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2844"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j292-81we-6qcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40399?format=json","vulnerability_id":"VCID-js7v-8a5j-h7ba","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2834.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2834.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2834","reference_id":"","reference_type":"","scores":[{"value":"0.029","scoring_system":"epss","scoring_elements":"0.86288","published_at":"2026-04-01T12:55:00Z"},{"value":"0.029","scoring_system":"epss","scoring_elements":"0.86298","published_at":"2026-04-02T12:55:00Z"},{"value":"0.029","scoring_system":"epss","scoring_elements":"0.86316","published_at":"2026-04-04T12:55:00Z"},{"value":"0.029","scoring_system":"epss","scoring_elements":"0.86317","published_at":"2026-04-07T12:55:00Z"},{"value":"0.029","scoring_system":"epss","scoring_elements":"0.86335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.029","scoring_system":"epss","scoring_elements":"0.86345","published_at":"2026-04-09T12:55:00Z"},{"value":"0.029","scoring_system":"epss","scoring_elements":"0.86359","published_at":"2026-04-11T12:55:00Z"},{"value":"0.029","scoring_system":"epss","scoring_elements":"0.86357","published_at":"2026-04-12T12:55:00Z"},{"value":"0.029","scoring_system":"epss","scoring_elements":"0.86352","published_at":"2026-04-13T12:55:00Z"},{"value":"0.029","scoring_system":"epss","scoring_elements":"0.86368","published_at":"2026-04-16T12:55:00Z"},{"value":"0.029","scoring_system":"epss","scoring_elements":"0.86373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.029","scoring_system":"epss","scoring_elements":"0.86366","published_at":"2026-04-21T12:55:00Z"},{"value":"0.029","scoring_system":"epss","scoring_elements":"0.86387","published_at":"2026-04-24T12:55:00Z"},{"value":"0.029","scoring_system":"epss","scoring_elements":"0.86396","published_at":"2026-04-26T12:55:00Z"},{"value":"0.029","scoring_system":"epss","scoring_elements":"0.86393","published_at":"2026-04-29T12:55:00Z"},{"value":"0.029","scoring_system":"epss","scoring_elements":"0.86413","published_at":"2026-05-05T12:55:00Z"},{"value":"0.029","scoring_system":"epss","scoring_elements":"0.86432","published_at":"2026-05-07T12:55:00Z"},{"value":"0.029","scoring_system":"epss","scoring_elements":"0.86452","published_at":"2026-05-09T12:55:00Z"},{"value":"0.029","scoring_system":"epss","scoring_elements":"0.86448","published_at":"2026-05-11T12:55:00Z"},{"value":"0.029","scoring_system":"epss","scoring_elements":"0.86461","published_at":"2026-05-12T12:55:00Z"},{"value":"0.029","scoring_system":"epss","scoring_elements":"0.86498","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2834"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2834","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2834"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=643648","reference_id":"643648","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=643648"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=735751","reference_id":"735751","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=735751"},{"reference_url":"https://security.gentoo.org/glsa/201110-26","reference_id":"GLSA-201110-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201110-26"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1749","reference_id":"RHSA-2011:1749","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1749"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0016","reference_id":"RHSA-2012:0016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0017","reference_id":"RHSA-2012:0017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0217","reference_id":"RHSA-2013:0217","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0217"},{"reference_url":"https://usn.ubuntu.com/1334-1/","reference_id":"USN-1334-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1334-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2834"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-js7v-8a5j-h7ba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40336?format=json","vulnerability_id":"VCID-k5s4-9hmm-6fhf","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2346","reference_id":"","reference_type":"","scores":[{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74496","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.745","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74526","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74501","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74533","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74548","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.7457","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.7455","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74542","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.7458","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74587","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74579","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74615","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.7462","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74622","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74624","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74653","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74679","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74646","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74666","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74721","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2346"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2346"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k5s4-9hmm-6fhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40587?format=json","vulnerability_id":"VCID-ktru-622v-tkey","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2856","reference_id":"","reference_type":"","scores":[{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36423","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36596","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36628","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36465","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36517","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36536","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36543","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36508","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36485","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36529","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36512","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36456","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36227","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36197","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3611","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.35993","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3606","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36087","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.35997","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36019","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36089","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2856"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2856"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ktru-622v-tkey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40572?format=json","vulnerability_id":"VCID-nka5-xetx-8fcm","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2852","reference_id":"","reference_type":"","scores":[{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74496","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.745","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74526","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74501","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74533","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74548","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.7457","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.7455","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74542","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.7458","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74587","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74579","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74615","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.7462","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74622","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74624","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74653","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74679","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74646","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74666","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74721","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2852"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2852"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nka5-xetx-8fcm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40633?format=json","vulnerability_id":"VCID-p2ja-unrj-y7az","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3881","reference_id":"","reference_type":"","scores":[{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.6598","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66022","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66051","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66018","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66067","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.6608","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66099","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66086","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66056","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66092","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66106","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66093","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66114","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66125","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66123","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66101","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66146","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66189","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66161","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66183","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.6624","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3881"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-3881"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p2ja-unrj-y7az"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40376?format=json","vulnerability_id":"VCID-p8qp-z8nw-fkfz","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2350","reference_id":"","reference_type":"","scores":[{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74496","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.745","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74526","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74501","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74533","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74548","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.7457","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.7455","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74542","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.7458","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74587","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74579","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74615","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.7462","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74622","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74624","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74653","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74679","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74646","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74666","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74721","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2350"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2350"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p8qp-z8nw-fkfz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40542?format=json","vulnerability_id":"VCID-pedc-ays3-k3ce","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2849","reference_id":"","reference_type":"","scores":[{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73433","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73442","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73464","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73436","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73473","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73487","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73511","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73491","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73484","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73526","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73535","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73528","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73561","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73572","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73571","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73563","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73588","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73611","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73595","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73652","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2849"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2849"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pedc-ays3-k3ce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40626?format=json","vulnerability_id":"VCID-ph7z-1n85-wbdz","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3876","reference_id":"","reference_type":"","scores":[{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41733","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41799","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41828","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41757","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41807","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41817","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.4184","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41843","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41745","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41672","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41673","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41593","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41453","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41522","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41539","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41449","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41474","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41549","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3876"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-3876"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ph7z-1n85-wbdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40591?format=json","vulnerability_id":"VCID-qfvy-n688-4uh4","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2859","reference_id":"","reference_type":"","scores":[{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35253","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35454","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35478","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35362","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35408","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35433","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.3544","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35398","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35374","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35413","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35401","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35348","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35112","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35091","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35002","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.34881","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.34953","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.3499","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.34892","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.34919","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.34989","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2859"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2859"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qfvy-n688-4uh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40422?format=json","vulnerability_id":"VCID-qjf4-cd5e-ebej","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2837","reference_id":"","reference_type":"","scores":[{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45478","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45554","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45576","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45523","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45578","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45579","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.456","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.4557","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45577","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45624","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45621","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45571","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45484","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45492","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45431","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45327","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45392","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.4541","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45354","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45378","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45453","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2837"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2837"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qjf4-cd5e-ebej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40520?format=json","vulnerability_id":"VCID-rkjv-cgzu-q3fy","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2847","reference_id":"","reference_type":"","scores":[{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85148","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85159","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85177","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85178","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.852","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85209","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85223","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.8522","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85217","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85237","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85238","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85261","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.8527","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85268","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85283","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.8531","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85328","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85322","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85336","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85374","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2847"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2847"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rkjv-cgzu-q3fy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40663?format=json","vulnerability_id":"VCID-t1jn-gp1x-63c3","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3887","reference_id":"","reference_type":"","scores":[{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66519","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66558","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66583","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66555","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66603","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66617","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66635","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66622","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.6659","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66626","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66641","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66625","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.6665","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66664","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66638","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66682","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66725","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66698","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66718","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66783","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3887"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-3887"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t1jn-gp1x-63c3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40615?format=json","vulnerability_id":"VCID-t71p-v4zd-8yhp","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3873","reference_id":"","reference_type":"","scores":[{"value":"0.01632","scoring_system":"epss","scoring_elements":"0.81836","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01632","scoring_system":"epss","scoring_elements":"0.81847","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01632","scoring_system":"epss","scoring_elements":"0.81869","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01632","scoring_system":"epss","scoring_elements":"0.81865","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01632","scoring_system":"epss","scoring_elements":"0.81892","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01632","scoring_system":"epss","scoring_elements":"0.81898","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01632","scoring_system":"epss","scoring_elements":"0.81918","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01632","scoring_system":"epss","scoring_elements":"0.81906","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01632","scoring_system":"epss","scoring_elements":"0.81901","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01632","scoring_system":"epss","scoring_elements":"0.81937","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01632","scoring_system":"epss","scoring_elements":"0.81938","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01632","scoring_system":"epss","scoring_elements":"0.81961","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01632","scoring_system":"epss","scoring_elements":"0.81972","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01632","scoring_system":"epss","scoring_elements":"0.81977","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01632","scoring_system":"epss","scoring_elements":"0.81997","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01632","scoring_system":"epss","scoring_elements":"0.82017","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01632","scoring_system":"epss","scoring_elements":"0.82043","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01632","scoring_system":"epss","scoring_elements":"0.8204","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01632","scoring_system":"epss","scoring_elements":"0.82056","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01632","scoring_system":"epss","scoring_elements":"0.82097","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3873"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-3873"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t71p-v4zd-8yhp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40603?format=json","vulnerability_id":"VCID-v7fa-vtne-x3c6","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2861","reference_id":"","reference_type":"","scores":[{"value":"0.02904","scoring_system":"epss","scoring_elements":"0.86295","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02904","scoring_system":"epss","scoring_elements":"0.86306","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02904","scoring_system":"epss","scoring_elements":"0.86324","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02904","scoring_system":"epss","scoring_elements":"0.86325","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02904","scoring_system":"epss","scoring_elements":"0.86342","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02904","scoring_system":"epss","scoring_elements":"0.86352","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02904","scoring_system":"epss","scoring_elements":"0.86367","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02904","scoring_system":"epss","scoring_elements":"0.86365","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02904","scoring_system":"epss","scoring_elements":"0.86359","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02904","scoring_system":"epss","scoring_elements":"0.86376","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02904","scoring_system":"epss","scoring_elements":"0.8638","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02904","scoring_system":"epss","scoring_elements":"0.86374","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02904","scoring_system":"epss","scoring_elements":"0.86394","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02904","scoring_system":"epss","scoring_elements":"0.86403","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02904","scoring_system":"epss","scoring_elements":"0.86399","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02904","scoring_system":"epss","scoring_elements":"0.8642","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02904","scoring_system":"epss","scoring_elements":"0.86439","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02904","scoring_system":"epss","scoring_elements":"0.86458","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02904","scoring_system":"epss","scoring_elements":"0.86455","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02904","scoring_system":"epss","scoring_elements":"0.86468","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02904","scoring_system":"epss","scoring_elements":"0.86505","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2861"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2861"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v7fa-vtne-x3c6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40605?format=json","vulnerability_id":"VCID-v8mf-f7ru-yqf4","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2864","reference_id":"","reference_type":"","scores":[{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75422","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75425","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75457","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75437","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.7548","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75489","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75509","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75487","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75477","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75519","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75524","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75513","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75546","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.7555","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75554","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75565","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75594","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75618","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75599","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75616","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75673","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2864"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2864"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v8mf-f7ru-yqf4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40529?format=json","vulnerability_id":"VCID-w2za-rebm-vfa7","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2848","reference_id":"","reference_type":"","scores":[{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59568","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59641","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59666","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59636","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59687","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59701","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.5972","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59704","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59685","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59718","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59725","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59709","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59678","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59698","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59683","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59646","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59694","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59752","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.5971","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59737","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59806","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2848"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2848"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w2za-rebm-vfa7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40387?format=json","vulnerability_id":"VCID-w8y6-1q15-37gu","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2351","reference_id":"","reference_type":"","scores":[{"value":"0.02007","scoring_system":"epss","scoring_elements":"0.83622","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02007","scoring_system":"epss","scoring_elements":"0.83635","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02007","scoring_system":"epss","scoring_elements":"0.83649","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02007","scoring_system":"epss","scoring_elements":"0.83651","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02007","scoring_system":"epss","scoring_elements":"0.83675","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02007","scoring_system":"epss","scoring_elements":"0.83682","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02007","scoring_system":"epss","scoring_elements":"0.83699","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02007","scoring_system":"epss","scoring_elements":"0.83692","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02007","scoring_system":"epss","scoring_elements":"0.83687","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02007","scoring_system":"epss","scoring_elements":"0.83723","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02007","scoring_system":"epss","scoring_elements":"0.83748","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02007","scoring_system":"epss","scoring_elements":"0.83756","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02007","scoring_system":"epss","scoring_elements":"0.83763","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02007","scoring_system":"epss","scoring_elements":"0.83785","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02007","scoring_system":"epss","scoring_elements":"0.83806","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02007","scoring_system":"epss","scoring_elements":"0.83823","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02007","scoring_system":"epss","scoring_elements":"0.83839","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02007","scoring_system":"epss","scoring_elements":"0.83873","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2351"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2351"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w8y6-1q15-37gu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40651?format=json","vulnerability_id":"VCID-wgw4-b8tx-nqhr","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3886","reference_id":"","reference_type":"","scores":[{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.7571","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75712","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75743","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75722","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75757","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75768","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75792","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75773","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75767","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75805","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75808","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75794","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75833","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75843","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75855","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75862","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75892","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75916","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75901","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75967","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3886"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-3886"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wgw4-b8tx-nqhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40635?format=json","vulnerability_id":"VCID-wpt5-ehdy-3ba2","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3883","reference_id":"","reference_type":"","scores":[{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72239","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72245","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72265","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72241","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.7228","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72292","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72314","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72297","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72284","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72327","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72336","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72324","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72367","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72376","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72373","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72364","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72393","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.7242","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72383","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.7241","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72468","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3883"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-3883"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wpt5-ehdy-3ba2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40602?format=json","vulnerability_id":"VCID-x9n1-7dnj-hkdz","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2860","reference_id":"","reference_type":"","scores":[{"value":"0.02121","scoring_system":"epss","scoring_elements":"0.84074","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02121","scoring_system":"epss","scoring_elements":"0.84087","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02121","scoring_system":"epss","scoring_elements":"0.84105","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02121","scoring_system":"epss","scoring_elements":"0.84106","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02121","scoring_system":"epss","scoring_elements":"0.84129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02121","scoring_system":"epss","scoring_elements":"0.84135","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02121","scoring_system":"epss","scoring_elements":"0.84153","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02121","scoring_system":"epss","scoring_elements":"0.84147","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02121","scoring_system":"epss","scoring_elements":"0.84143","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02121","scoring_system":"epss","scoring_elements":"0.84165","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02121","scoring_system":"epss","scoring_elements":"0.84167","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02121","scoring_system":"epss","scoring_elements":"0.84171","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02121","scoring_system":"epss","scoring_elements":"0.84196","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02121","scoring_system":"epss","scoring_elements":"0.84203","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02121","scoring_system":"epss","scoring_elements":"0.84209","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02121","scoring_system":"epss","scoring_elements":"0.84228","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02121","scoring_system":"epss","scoring_elements":"0.84254","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02121","scoring_system":"epss","scoring_elements":"0.8427","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02121","scoring_system":"epss","scoring_elements":"0.84268","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02121","scoring_system":"epss","scoring_elements":"0.84285","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02121","scoring_system":"epss","scoring_elements":"0.84317","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2860"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2860"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x9n1-7dnj-hkdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40639?format=json","vulnerability_id":"VCID-yqjx-r3gb-w3c7","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3884","reference_id":"","reference_type":"","scores":[{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73636","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73646","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.7367","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73642","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73678","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73691","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73712","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73695","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73686","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73729","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73738","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73762","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73771","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73764","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.7379","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73814","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73777","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73799","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73857","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3884"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-3884"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yqjx-r3gb-w3c7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40629?format=json","vulnerability_id":"VCID-yyv6-pdaj-97b2","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3878","reference_id":"","reference_type":"","scores":[{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66601","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66641","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66667","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.6669","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66705","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66725","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66712","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66682","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66716","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66729","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66714","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66739","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66751","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66749","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.6672","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66765","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66805","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66779","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66799","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66863","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3878"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-3878"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yyv6-pdaj-97b2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40631?format=json","vulnerability_id":"VCID-z3q2-b2bb-a3c1","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3879","reference_id":"","reference_type":"","scores":[{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41733","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41799","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41828","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41757","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41807","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41817","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.4184","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41843","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41745","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41672","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41673","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41593","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41453","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41522","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41539","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41449","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41474","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41549","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3879"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-3879"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z3q2-b2bb-a3c1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40433?format=json","vulnerability_id":"VCID-z7da-3wsf-e7bt","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2838","reference_id":"","reference_type":"","scores":[{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45478","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45554","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45576","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45523","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45578","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45579","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.456","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.4557","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45577","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45624","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45621","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45571","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45484","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45492","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45431","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45327","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45392","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.4541","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45354","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45378","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45453","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2838"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2838"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z7da-3wsf-e7bt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40589?format=json","vulnerability_id":"VCID-zqcj-682g-vfce","summary":"Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code and local root\n    privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2857","reference_id":"","reference_type":"","scores":[{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84011","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84025","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84042","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84045","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84068","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84074","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84092","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84085","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.8408","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84103","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84105","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84107","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84131","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84138","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84143","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84163","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84188","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84204","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84203","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84221","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02104","scoring_system":"epss","scoring_elements":"0.84254","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2857"},{"reference_url":"https://security.gentoo.org/glsa/201111-01","reference_id":"GLSA-201111-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75538?format=json","purl":"pkg:ebuild/dev-lang/v8@3.5.10.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@3.5.10.22"},{"url":"http://public2.vulnerablecode.io/api/packages/75539?format=json","purl":"pkg:ebuild/dev-lang/v8@15.0.874.102","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}],"aliases":["CVE-2011-2857"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zqcj-682g-vfce"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/v8@15.0.874.102"}