Lookup for vulnerable packages by Package URL.

Purlpkg:alpm/archlinux/wordpress@4.7.3-1
Typealpm
Namespacearchlinux
Namewordpress
Version4.7.3-1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version5.0.1-1
Latest_non_vulnerable_version5.8.1-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-e1ss-azne-d7ha
vulnerability_id VCID-e1ss-azne-d7ha
summary In WordPress before 4.7.3, there is cross-site request forgery (CSRF) in Press This (wp-admin/includes/class-wp-press-this.php), leading to excessive use of server resources. The CSRF can trigger an outbound HTTP request for a large file that is then parsed by Press This.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6819
reference_id
reference_type
scores
0
value 0.13419
scoring_system epss
scoring_elements 0.94215
published_at 2026-04-21T12:55:00Z
1
value 0.13419
scoring_system epss
scoring_elements 0.94153
published_at 2026-04-01T12:55:00Z
2
value 0.13419
scoring_system epss
scoring_elements 0.94163
published_at 2026-04-02T12:55:00Z
3
value 0.13419
scoring_system epss
scoring_elements 0.94174
published_at 2026-04-04T12:55:00Z
4
value 0.13419
scoring_system epss
scoring_elements 0.94176
published_at 2026-04-07T12:55:00Z
5
value 0.13419
scoring_system epss
scoring_elements 0.94186
published_at 2026-04-08T12:55:00Z
6
value 0.13419
scoring_system epss
scoring_elements 0.9419
published_at 2026-04-09T12:55:00Z
7
value 0.13419
scoring_system epss
scoring_elements 0.94195
published_at 2026-04-13T12:55:00Z
8
value 0.13419
scoring_system epss
scoring_elements 0.9421
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6819
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6819
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857026
reference_id 857026
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857026
3
reference_url https://security.archlinux.org/ASA-201703-14
reference_id ASA-201703-14
reference_type
scores
url https://security.archlinux.org/ASA-201703-14
4
reference_url https://security.archlinux.org/AVG-202
reference_id AVG-202
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-202
fixed_packages
0
url pkg:alpm/archlinux/wordpress@4.7.3-1
purl pkg:alpm/archlinux/wordpress@4.7.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/wordpress@4.7.3-1
aliases CVE-2017-6819
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e1ss-azne-d7ha
1
url VCID-jf98-kean-p3b3
vulnerability_id VCID-jf98-kean-p3b3
summary In WordPress before 4.7.3 (wp-admin/js/tags-box.js), there is cross-site scripting (XSS) via taxonomy term names.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6818
reference_id
reference_type
scores
0
value 0.09282
scoring_system epss
scoring_elements 0.92753
published_at 2026-04-21T12:55:00Z
1
value 0.09282
scoring_system epss
scoring_elements 0.92706
published_at 2026-04-01T12:55:00Z
2
value 0.09282
scoring_system epss
scoring_elements 0.92713
published_at 2026-04-02T12:55:00Z
3
value 0.09282
scoring_system epss
scoring_elements 0.92719
published_at 2026-04-04T12:55:00Z
4
value 0.09282
scoring_system epss
scoring_elements 0.92717
published_at 2026-04-07T12:55:00Z
5
value 0.09282
scoring_system epss
scoring_elements 0.92727
published_at 2026-04-08T12:55:00Z
6
value 0.09282
scoring_system epss
scoring_elements 0.92732
published_at 2026-04-09T12:55:00Z
7
value 0.09282
scoring_system epss
scoring_elements 0.92738
published_at 2026-04-11T12:55:00Z
8
value 0.09282
scoring_system epss
scoring_elements 0.92736
published_at 2026-04-13T12:55:00Z
9
value 0.09282
scoring_system epss
scoring_elements 0.92748
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6818
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6818
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857026
reference_id 857026
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857026
3
reference_url https://security.archlinux.org/ASA-201703-14
reference_id ASA-201703-14
reference_type
scores
url https://security.archlinux.org/ASA-201703-14
4
reference_url https://security.archlinux.org/AVG-202
reference_id AVG-202
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-202
fixed_packages
0
url pkg:alpm/archlinux/wordpress@4.7.3-1
purl pkg:alpm/archlinux/wordpress@4.7.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/wordpress@4.7.3-1
aliases CVE-2017-6818
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jf98-kean-p3b3
2
url VCID-qpsj-hsmm-6qa8
vulnerability_id VCID-qpsj-hsmm-6qa8
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6816
reference_id
reference_type
scores
0
value 0.02621
scoring_system epss
scoring_elements 0.8569
published_at 2026-04-18T12:55:00Z
1
value 0.02621
scoring_system epss
scoring_elements 0.85587
published_at 2026-04-01T12:55:00Z
2
value 0.02621
scoring_system epss
scoring_elements 0.856
published_at 2026-04-02T12:55:00Z
3
value 0.02621
scoring_system epss
scoring_elements 0.85618
published_at 2026-04-04T12:55:00Z
4
value 0.02621
scoring_system epss
scoring_elements 0.85624
published_at 2026-04-07T12:55:00Z
5
value 0.02621
scoring_system epss
scoring_elements 0.85644
published_at 2026-04-08T12:55:00Z
6
value 0.02621
scoring_system epss
scoring_elements 0.85655
published_at 2026-04-09T12:55:00Z
7
value 0.02621
scoring_system epss
scoring_elements 0.8567
published_at 2026-04-11T12:55:00Z
8
value 0.02621
scoring_system epss
scoring_elements 0.85666
published_at 2026-04-12T12:55:00Z
9
value 0.02621
scoring_system epss
scoring_elements 0.85662
published_at 2026-04-13T12:55:00Z
10
value 0.02621
scoring_system epss
scoring_elements 0.85685
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6816
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6814
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6815
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6816
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6817
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857026
reference_id 857026
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857026
6
reference_url https://security.archlinux.org/ASA-201703-14
reference_id ASA-201703-14
reference_type
scores
url https://security.archlinux.org/ASA-201703-14
7
reference_url https://security.archlinux.org/AVG-202
reference_id AVG-202
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-202
fixed_packages
0
url pkg:alpm/archlinux/wordpress@4.7.3-1
purl pkg:alpm/archlinux/wordpress@4.7.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/wordpress@4.7.3-1
aliases CVE-2017-6816
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qpsj-hsmm-6qa8
3
url VCID-srjh-2qnk-e7c6
vulnerability_id VCID-srjh-2qnk-e7c6
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6817
reference_id
reference_type
scores
0
value 0.06131
scoring_system epss
scoring_elements 0.90825
published_at 2026-04-21T12:55:00Z
1
value 0.06131
scoring_system epss
scoring_elements 0.90757
published_at 2026-04-01T12:55:00Z
2
value 0.06131
scoring_system epss
scoring_elements 0.90763
published_at 2026-04-02T12:55:00Z
3
value 0.06131
scoring_system epss
scoring_elements 0.90774
published_at 2026-04-04T12:55:00Z
4
value 0.06131
scoring_system epss
scoring_elements 0.90784
published_at 2026-04-07T12:55:00Z
5
value 0.06131
scoring_system epss
scoring_elements 0.90795
published_at 2026-04-08T12:55:00Z
6
value 0.06131
scoring_system epss
scoring_elements 0.90802
published_at 2026-04-09T12:55:00Z
7
value 0.06131
scoring_system epss
scoring_elements 0.9081
published_at 2026-04-12T12:55:00Z
8
value 0.06131
scoring_system epss
scoring_elements 0.90808
published_at 2026-04-13T12:55:00Z
9
value 0.06131
scoring_system epss
scoring_elements 0.90828
published_at 2026-04-16T12:55:00Z
10
value 0.06131
scoring_system epss
scoring_elements 0.90826
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6817
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6814
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6815
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6816
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6817
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857026
reference_id 857026
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857026
6
reference_url https://security.archlinux.org/ASA-201703-14
reference_id ASA-201703-14
reference_type
scores
url https://security.archlinux.org/ASA-201703-14
7
reference_url https://security.archlinux.org/AVG-202
reference_id AVG-202
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-202
fixed_packages
0
url pkg:alpm/archlinux/wordpress@4.7.3-1
purl pkg:alpm/archlinux/wordpress@4.7.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/wordpress@4.7.3-1
aliases CVE-2017-6817
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-srjh-2qnk-e7c6
4
url VCID-tf2u-dse2-mufb
vulnerability_id VCID-tf2u-dse2-mufb
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6814
reference_id
reference_type
scores
0
value 0.02424
scoring_system epss
scoring_elements 0.8516
published_at 2026-04-21T12:55:00Z
1
value 0.02424
scoring_system epss
scoring_elements 0.85068
published_at 2026-04-01T12:55:00Z
2
value 0.02424
scoring_system epss
scoring_elements 0.85081
published_at 2026-04-02T12:55:00Z
3
value 0.02424
scoring_system epss
scoring_elements 0.85099
published_at 2026-04-04T12:55:00Z
4
value 0.02424
scoring_system epss
scoring_elements 0.85103
published_at 2026-04-07T12:55:00Z
5
value 0.02424
scoring_system epss
scoring_elements 0.85124
published_at 2026-04-08T12:55:00Z
6
value 0.02424
scoring_system epss
scoring_elements 0.85131
published_at 2026-04-09T12:55:00Z
7
value 0.02424
scoring_system epss
scoring_elements 0.85146
published_at 2026-04-11T12:55:00Z
8
value 0.02424
scoring_system epss
scoring_elements 0.85143
published_at 2026-04-12T12:55:00Z
9
value 0.02424
scoring_system epss
scoring_elements 0.8514
published_at 2026-04-13T12:55:00Z
10
value 0.02424
scoring_system epss
scoring_elements 0.85161
published_at 2026-04-16T12:55:00Z
11
value 0.02424
scoring_system epss
scoring_elements 0.85162
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6814
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6814
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6815
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6816
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6817
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857026
reference_id 857026
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857026
6
reference_url https://security.archlinux.org/ASA-201703-14
reference_id ASA-201703-14
reference_type
scores
url https://security.archlinux.org/ASA-201703-14
7
reference_url https://security.archlinux.org/AVG-202
reference_id AVG-202
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-202
fixed_packages
0
url pkg:alpm/archlinux/wordpress@4.7.3-1
purl pkg:alpm/archlinux/wordpress@4.7.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/wordpress@4.7.3-1
aliases CVE-2017-6814
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tf2u-dse2-mufb
5
url VCID-vywc-p4tw-8yd2
vulnerability_id VCID-vywc-p4tw-8yd2
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6815
reference_id
reference_type
scores
0
value 0.06385
scoring_system epss
scoring_elements 0.91042
published_at 2026-04-18T12:55:00Z
1
value 0.06385
scoring_system epss
scoring_elements 0.90968
published_at 2026-04-01T12:55:00Z
2
value 0.06385
scoring_system epss
scoring_elements 0.90973
published_at 2026-04-02T12:55:00Z
3
value 0.06385
scoring_system epss
scoring_elements 0.90983
published_at 2026-04-04T12:55:00Z
4
value 0.06385
scoring_system epss
scoring_elements 0.90993
published_at 2026-04-07T12:55:00Z
5
value 0.06385
scoring_system epss
scoring_elements 0.91005
published_at 2026-04-08T12:55:00Z
6
value 0.06385
scoring_system epss
scoring_elements 0.91011
published_at 2026-04-09T12:55:00Z
7
value 0.06385
scoring_system epss
scoring_elements 0.91019
published_at 2026-04-13T12:55:00Z
8
value 0.06385
scoring_system epss
scoring_elements 0.91044
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6815
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6814
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6815
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6816
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6817
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857026
reference_id 857026
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857026
6
reference_url https://security.archlinux.org/ASA-201703-14
reference_id ASA-201703-14
reference_type
scores
url https://security.archlinux.org/ASA-201703-14
7
reference_url https://security.archlinux.org/AVG-202
reference_id AVG-202
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-202
fixed_packages
0
url pkg:alpm/archlinux/wordpress@4.7.3-1
purl pkg:alpm/archlinux/wordpress@4.7.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/wordpress@4.7.3-1
aliases CVE-2017-6815
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vywc-p4tw-8yd2
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/wordpress@4.7.3-1