Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
Typedeb
Namespacedebian
Namewordpress
Version6.1.9+dfsg1-0+deb12u1
Qualifiers
distro trixie
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version6.2.1+dfsg1-1
Latest_non_vulnerable_version6.9.4+dfsg1-1
Affected_by_vulnerabilities
0
url VCID-gyaq-8pvh-p7gg
vulnerability_id VCID-gyaq-8pvh-p7gg
summary WordPress through 4.8.2 uses a weak MD5-based password hashing algorithm, which makes it easier for attackers to determine cleartext values by leveraging access to the hash values. NOTE: the approach to changing this may not be fully compatible with certain use cases, such as migration of a WordPress site from a web host that uses a recent PHP version to a different web host that uses PHP 5.2. These use cases are plausible (but very unlikely) based on statistics showing widespread deployment of WordPress with obsolete PHP versions.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6707
reference_id
reference_type
scores
0
value 0.00182
scoring_system epss
scoring_elements 0.39807
published_at 2026-04-21T12:55:00Z
1
value 0.00182
scoring_system epss
scoring_elements 0.39887
published_at 2026-04-18T12:55:00Z
2
value 0.00182
scoring_system epss
scoring_elements 0.39744
published_at 2026-04-01T12:55:00Z
3
value 0.00182
scoring_system epss
scoring_elements 0.39893
published_at 2026-04-02T12:55:00Z
4
value 0.00182
scoring_system epss
scoring_elements 0.39921
published_at 2026-04-11T12:55:00Z
5
value 0.00182
scoring_system epss
scoring_elements 0.39843
published_at 2026-04-07T12:55:00Z
6
value 0.00182
scoring_system epss
scoring_elements 0.39899
published_at 2026-04-08T12:55:00Z
7
value 0.00182
scoring_system epss
scoring_elements 0.39912
published_at 2026-04-09T12:55:00Z
8
value 0.00182
scoring_system epss
scoring_elements 0.39886
published_at 2026-04-12T12:55:00Z
9
value 0.00182
scoring_system epss
scoring_elements 0.39867
published_at 2026-04-13T12:55:00Z
10
value 0.00182
scoring_system epss
scoring_elements 0.39917
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6707
1
reference_url https://core.trac.wordpress.org/ticket/21022
reference_id
reference_type
scores
url https://core.trac.wordpress.org/ticket/21022
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6707
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=880868
reference_id 880868
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=880868
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-6707
reference_id CVE-2012-6707
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-6707
fixed_packages
0
url pkg:deb/debian/wordpress@6.8.1%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.1%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.1%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2012-6707
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gyaq-8pvh-p7gg
1
url VCID-jghn-eujf-zbdn
vulnerability_id VCID-jghn-eujf-zbdn
summary WordPress Core is vulnerable to Sensitive Information Exposure in versions up to, and including, 6.4.3 via the redirect_guess_404_permalink function. This can allow unauthenticated attackers to expose the slug of a custom post whose 'publicly_queryable' post status has been set to 'false'.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5692
reference_id
reference_type
scores
0
value 0.00855
scoring_system epss
scoring_elements 0.74935
published_at 2026-04-04T12:55:00Z
1
value 0.00855
scoring_system epss
scoring_elements 0.74907
published_at 2026-04-02T12:55:00Z
2
value 0.00855
scoring_system epss
scoring_elements 0.7499
published_at 2026-04-18T12:55:00Z
3
value 0.00855
scoring_system epss
scoring_elements 0.74983
published_at 2026-04-16T12:55:00Z
4
value 0.00855
scoring_system epss
scoring_elements 0.74946
published_at 2026-04-13T12:55:00Z
5
value 0.00855
scoring_system epss
scoring_elements 0.74956
published_at 2026-04-12T12:55:00Z
6
value 0.00855
scoring_system epss
scoring_elements 0.74977
published_at 2026-04-11T12:55:00Z
7
value 0.00855
scoring_system epss
scoring_elements 0.74954
published_at 2026-04-09T12:55:00Z
8
value 0.00855
scoring_system epss
scoring_elements 0.74942
published_at 2026-04-08T12:55:00Z
9
value 0.00855
scoring_system epss
scoring_elements 0.74908
published_at 2026-04-07T12:55:00Z
10
value 0.01055
scoring_system epss
scoring_elements 0.77617
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5692
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5692
2
reference_url https://core.trac.wordpress.org/changeset/57645
reference_id 57645
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-05T13:58:59Z/
url https://core.trac.wordpress.org/changeset/57645
3
reference_url https://www.wordfence.com/threat-intel/vulnerabilities/id/6e6f993b-ce09-4050-84a1-cbe9953f36b1?source=cve
reference_id 6e6f993b-ce09-4050-84a1-cbe9953f36b1?source=cve
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-05T13:58:59Z/
url https://www.wordfence.com/threat-intel/vulnerabilities/id/6e6f993b-ce09-4050-84a1-cbe9953f36b1?source=cve
4
reference_url https://github.com/WordPress/wordpress-develop/blob/6.3/src/wp-includes/canonical.php#L763
reference_id canonical.php#L763
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-05T13:58:59Z/
url https://github.com/WordPress/wordpress-develop/blob/6.3/src/wp-includes/canonical.php#L763
5
reference_url https://developer.wordpress.org/reference/functions/is_post_publicly_viewable/
reference_id is_post_publicly_viewable
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-05T13:58:59Z/
url https://developer.wordpress.org/reference/functions/is_post_publicly_viewable/
6
reference_url https://developer.wordpress.org/reference/functions/is_post_type_viewable/
reference_id is_post_type_viewable
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-05T13:58:59Z/
url https://developer.wordpress.org/reference/functions/is_post_type_viewable/
fixed_packages
0
url pkg:deb/debian/wordpress@6.5%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.5%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.5%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2023-5692
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jghn-eujf-zbdn
Fixing_vulnerabilities
0
url VCID-12nz-jt4k-afdm
vulnerability_id VCID-12nz-jt4k-afdm
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4029
reference_id
reference_type
scores
0
value 0.01427
scoring_system epss
scoring_elements 0.80574
published_at 2026-04-01T12:55:00Z
1
value 0.01427
scoring_system epss
scoring_elements 0.80581
published_at 2026-04-02T12:55:00Z
2
value 0.01427
scoring_system epss
scoring_elements 0.80603
published_at 2026-04-04T12:55:00Z
3
value 0.01427
scoring_system epss
scoring_elements 0.80596
published_at 2026-04-07T12:55:00Z
4
value 0.01427
scoring_system epss
scoring_elements 0.80624
published_at 2026-04-08T12:55:00Z
5
value 0.01427
scoring_system epss
scoring_elements 0.80633
published_at 2026-04-09T12:55:00Z
6
value 0.01427
scoring_system epss
scoring_elements 0.8065
published_at 2026-04-11T12:55:00Z
7
value 0.01427
scoring_system epss
scoring_elements 0.80637
published_at 2026-04-12T12:55:00Z
8
value 0.01427
scoring_system epss
scoring_elements 0.80628
published_at 2026-04-13T12:55:00Z
9
value 0.01427
scoring_system epss
scoring_elements 0.80657
published_at 2026-04-16T12:55:00Z
10
value 0.01427
scoring_system epss
scoring_elements 0.80659
published_at 2026-04-18T12:55:00Z
11
value 0.01427
scoring_system epss
scoring_elements 0.80661
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4029
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4029
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6634
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6635
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7168
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7169
fixed_packages
0
url pkg:deb/debian/wordpress@4.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.5%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2016-4029
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-12nz-jt4k-afdm
1
url VCID-14w4-eqhq-zuhu
vulnerability_id VCID-14w4-eqhq-zuhu
summary A flaw exists in Wordpress related to the 'wp-admin/press-this.php 'script improperly checking user permissions when publishing posts. This may allow a user with 'Contributor-level' privileges to post as if they had 'publish_posts' permission.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1762
reference_id
reference_type
scores
0
value 0.00415
scoring_system epss
scoring_elements 0.61517
published_at 2026-04-01T12:55:00Z
1
value 0.00415
scoring_system epss
scoring_elements 0.61591
published_at 2026-04-02T12:55:00Z
2
value 0.00415
scoring_system epss
scoring_elements 0.6162
published_at 2026-04-04T12:55:00Z
3
value 0.00415
scoring_system epss
scoring_elements 0.61592
published_at 2026-04-07T12:55:00Z
4
value 0.00415
scoring_system epss
scoring_elements 0.6164
published_at 2026-04-08T12:55:00Z
5
value 0.00415
scoring_system epss
scoring_elements 0.61654
published_at 2026-04-09T12:55:00Z
6
value 0.00415
scoring_system epss
scoring_elements 0.61676
published_at 2026-04-21T12:55:00Z
7
value 0.00415
scoring_system epss
scoring_elements 0.61665
published_at 2026-04-12T12:55:00Z
8
value 0.00415
scoring_system epss
scoring_elements 0.61645
published_at 2026-04-13T12:55:00Z
9
value 0.00415
scoring_system epss
scoring_elements 0.61686
published_at 2026-04-16T12:55:00Z
10
value 0.00415
scoring_system epss
scoring_elements 0.61691
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1762
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1762
fixed_packages
0
url pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.2.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2011-1762
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-14w4-eqhq-zuhu
2
url VCID-198e-9yps-nqfz
vulnerability_id VCID-198e-9yps-nqfz
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5491
reference_id
reference_type
scores
0
value 0.01622
scoring_system epss
scoring_elements 0.81874
published_at 2026-04-21T12:55:00Z
1
value 0.01622
scoring_system epss
scoring_elements 0.8177
published_at 2026-04-01T12:55:00Z
2
value 0.01622
scoring_system epss
scoring_elements 0.8178
published_at 2026-04-02T12:55:00Z
3
value 0.01622
scoring_system epss
scoring_elements 0.81803
published_at 2026-04-04T12:55:00Z
4
value 0.01622
scoring_system epss
scoring_elements 0.81801
published_at 2026-04-07T12:55:00Z
5
value 0.01622
scoring_system epss
scoring_elements 0.81827
published_at 2026-04-08T12:55:00Z
6
value 0.01622
scoring_system epss
scoring_elements 0.81834
published_at 2026-04-09T12:55:00Z
7
value 0.01622
scoring_system epss
scoring_elements 0.81853
published_at 2026-04-11T12:55:00Z
8
value 0.01622
scoring_system epss
scoring_elements 0.81841
published_at 2026-04-12T12:55:00Z
9
value 0.01622
scoring_system epss
scoring_elements 0.81835
published_at 2026-04-13T12:55:00Z
10
value 0.01622
scoring_system epss
scoring_elements 0.81872
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5491
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5488
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5489
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5490
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5491
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5492
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5493
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5612
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851310
reference_id 851310
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851310
11
reference_url https://security.archlinux.org/ASA-201701-22
reference_id ASA-201701-22
reference_type
scores
url https://security.archlinux.org/ASA-201701-22
12
reference_url https://security.archlinux.org/AVG-142
reference_id AVG-142
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-142
fixed_packages
0
url pkg:deb/debian/wordpress@4.7.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.7.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.7.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-5491
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-198e-9yps-nqfz
3
url VCID-1axp-38yu-wua1
vulnerability_id VCID-1axp-38yu-wua1
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5489
reference_id
reference_type
scores
0
value 0.00512
scoring_system epss
scoring_elements 0.665
published_at 2026-04-21T12:55:00Z
1
value 0.00512
scoring_system epss
scoring_elements 0.66388
published_at 2026-04-01T12:55:00Z
2
value 0.00512
scoring_system epss
scoring_elements 0.66427
published_at 2026-04-02T12:55:00Z
3
value 0.00512
scoring_system epss
scoring_elements 0.66454
published_at 2026-04-04T12:55:00Z
4
value 0.00512
scoring_system epss
scoring_elements 0.66424
published_at 2026-04-07T12:55:00Z
5
value 0.00512
scoring_system epss
scoring_elements 0.66473
published_at 2026-04-08T12:55:00Z
6
value 0.00512
scoring_system epss
scoring_elements 0.66486
published_at 2026-04-09T12:55:00Z
7
value 0.00512
scoring_system epss
scoring_elements 0.66506
published_at 2026-04-11T12:55:00Z
8
value 0.00512
scoring_system epss
scoring_elements 0.66494
published_at 2026-04-12T12:55:00Z
9
value 0.00512
scoring_system epss
scoring_elements 0.66462
published_at 2026-04-13T12:55:00Z
10
value 0.00512
scoring_system epss
scoring_elements 0.66497
published_at 2026-04-16T12:55:00Z
11
value 0.00512
scoring_system epss
scoring_elements 0.66515
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5489
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5488
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5489
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5490
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5491
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5492
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5493
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5612
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851310
reference_id 851310
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851310
11
reference_url https://security.archlinux.org/ASA-201701-22
reference_id ASA-201701-22
reference_type
scores
url https://security.archlinux.org/ASA-201701-22
12
reference_url https://security.archlinux.org/AVG-142
reference_id AVG-142
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-142
fixed_packages
0
url pkg:deb/debian/wordpress@4.7.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.7.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.7.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-5489
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1axp-38yu-wua1
4
url VCID-1by8-54pr-ubcw
vulnerability_id VCID-1by8-54pr-ubcw
summary In affected versions of WordPress, users with low privileges (like contributors and authors) can use the embed block in a certain way to inject unfiltered HTML in the block editor. When affected posts are viewed by a higher privileged user, this could lead to script execution in the editor/wp-admin. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.22, 4.4.23, 4.3.24, 4.2.28, 4.1.31, 4.0.31, 3.9.32, 3.8.34, 3.7.34).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-4046
reference_id
reference_type
scores
0
value 0.06854
scoring_system epss
scoring_elements 0.91313
published_at 2026-04-01T12:55:00Z
1
value 0.06854
scoring_system epss
scoring_elements 0.91317
published_at 2026-04-02T12:55:00Z
2
value 0.06854
scoring_system epss
scoring_elements 0.91328
published_at 2026-04-04T12:55:00Z
3
value 0.06854
scoring_system epss
scoring_elements 0.91335
published_at 2026-04-07T12:55:00Z
4
value 0.06854
scoring_system epss
scoring_elements 0.91348
published_at 2026-04-08T12:55:00Z
5
value 0.06854
scoring_system epss
scoring_elements 0.91354
published_at 2026-04-09T12:55:00Z
6
value 0.06854
scoring_system epss
scoring_elements 0.91361
published_at 2026-04-11T12:55:00Z
7
value 0.06854
scoring_system epss
scoring_elements 0.91364
published_at 2026-04-12T12:55:00Z
8
value 0.06854
scoring_system epss
scoring_elements 0.91363
published_at 2026-04-13T12:55:00Z
9
value 0.06854
scoring_system epss
scoring_elements 0.91389
published_at 2026-04-21T12:55:00Z
10
value 0.06854
scoring_system epss
scoring_elements 0.91387
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-4046
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4046
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962685
reference_id 962685
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962685
fixed_packages
0
url pkg:deb/debian/wordpress@5.4.2%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.4.2%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.4.2%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2020-4046
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1by8-54pr-ubcw
5
url VCID-1cad-s6nn-j7aw
vulnerability_id VCID-1cad-s6nn-j7aw
summary embedded prototype.js JavaScript hijacking
references
0
reference_url http://dev.rubyonrails.org/ticket/7910
reference_id
reference_type
scores
url http://dev.rubyonrails.org/ticket/7910
1
reference_url http://prototypejs.org/2007/4/24/release-candidate-3
reference_id
reference_type
scores
url http://prototypejs.org/2007/4/24/release-candidate-3
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2383.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2383.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2383
reference_id
reference_type
scores
0
value 0.00262
scoring_system epss
scoring_elements 0.49583
published_at 2026-04-18T12:55:00Z
1
value 0.00262
scoring_system epss
scoring_elements 0.49489
published_at 2026-04-01T12:55:00Z
2
value 0.00262
scoring_system epss
scoring_elements 0.49518
published_at 2026-04-02T12:55:00Z
3
value 0.00262
scoring_system epss
scoring_elements 0.49546
published_at 2026-04-04T12:55:00Z
4
value 0.00262
scoring_system epss
scoring_elements 0.49498
published_at 2026-04-07T12:55:00Z
5
value 0.00262
scoring_system epss
scoring_elements 0.49553
published_at 2026-04-21T12:55:00Z
6
value 0.00262
scoring_system epss
scoring_elements 0.49548
published_at 2026-04-09T12:55:00Z
7
value 0.00262
scoring_system epss
scoring_elements 0.49565
published_at 2026-04-11T12:55:00Z
8
value 0.00262
scoring_system epss
scoring_elements 0.49537
published_at 2026-04-12T12:55:00Z
9
value 0.00262
scoring_system epss
scoring_elements 0.49539
published_at 2026-04-13T12:55:00Z
10
value 0.00262
scoring_system epss
scoring_elements 0.49585
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2383
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2383
5
reference_url http://secunia.com/advisories/37677
reference_id
reference_type
scores
url http://secunia.com/advisories/37677
6
reference_url http://www.debian.org/security/2009/dsa-1952
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1952
7
reference_url http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf
reference_id
reference_type
scores
url http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=539592
reference_id 539592
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=539592
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555220
reference_id 555220
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555220
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555221
reference_id 555221
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555221
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555250
reference_id 555250
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555250
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555255
reference_id 555255
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555255
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=558977
reference_id 558977
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=558977
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:prototypejs:prototype_framework:1.5.1_rc3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:prototypejs:prototype_framework:1.5.1_rc3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:prototypejs:prototype_framework:1.5.1_rc3:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2383
reference_id CVE-2007-2383
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2007-2383
fixed_packages
0
url pkg:deb/debian/wordpress@0?distro=trixie
purl pkg:deb/debian/wordpress@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@0%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-2383
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1cad-s6nn-j7aw
6
url VCID-1cp7-76kz-47ed
vulnerability_id VCID-1cp7-76kz-47ed
summary Cross-site scripting (XSS) vulnerability in functions.php in the default theme in WordPress 2.2 allows remote authenticated administrators to inject arbitrary web script or HTML via the PATH_INFO (REQUEST_URI) to wp-admin/themes.php, a different vulnerability than CVE-2007-1622. NOTE: this might not cross privilege boundaries in some configurations, since the Administrator role has the unfiltered_html capability.
references
0
reference_url http://blogsecurity.net/wordpress/news/news-100607-1/
reference_id
reference_type
scores
url http://blogsecurity.net/wordpress/news/news-100607-1/
1
reference_url http://codex.wordpress.org/Roles_and_Capabilities
reference_id
reference_type
scores
url http://codex.wordpress.org/Roles_and_Capabilities
2
reference_url http://mybeni.rootzilla.de/mybeNi/2007/wordpress_zeroday_vulnerability_roundhouse_kick_and_why_i_nearly_wrote_the_first_blog_worm/
reference_id
reference_type
scores
url http://mybeni.rootzilla.de/mybeNi/2007/wordpress_zeroday_vulnerability_roundhouse_kick_and_why_i_nearly_wrote_the_first_blog_worm/
3
reference_url http://osvdb.org/37293
reference_id
reference_type
scores
url http://osvdb.org/37293
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3238
reference_id
reference_type
scores
0
value 0.01473
scoring_system epss
scoring_elements 0.8098
published_at 2026-04-21T12:55:00Z
1
value 0.01473
scoring_system epss
scoring_elements 0.80882
published_at 2026-04-01T12:55:00Z
2
value 0.01473
scoring_system epss
scoring_elements 0.80891
published_at 2026-04-02T12:55:00Z
3
value 0.01473
scoring_system epss
scoring_elements 0.80914
published_at 2026-04-04T12:55:00Z
4
value 0.01473
scoring_system epss
scoring_elements 0.80911
published_at 2026-04-07T12:55:00Z
5
value 0.01473
scoring_system epss
scoring_elements 0.80939
published_at 2026-04-08T12:55:00Z
6
value 0.01473
scoring_system epss
scoring_elements 0.80948
published_at 2026-04-09T12:55:00Z
7
value 0.01473
scoring_system epss
scoring_elements 0.80964
published_at 2026-04-11T12:55:00Z
8
value 0.01473
scoring_system epss
scoring_elements 0.8095
published_at 2026-04-12T12:55:00Z
9
value 0.01473
scoring_system epss
scoring_elements 0.80942
published_at 2026-04-13T12:55:00Z
10
value 0.01473
scoring_system epss
scoring_elements 0.80978
published_at 2026-04-16T12:55:00Z
11
value 0.01473
scoring_system epss
scoring_elements 0.80979
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3238
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3238
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3238
6
reference_url http://secunia.com/advisories/25541/
reference_id
reference_type
scores
url http://secunia.com/advisories/25541/
7
reference_url http://secunia.com/advisories/29014
reference_id
reference_type
scores
url http://secunia.com/advisories/29014
8
reference_url http://securityreason.com/securityalert/2807
reference_id
reference_type
scores
url http://securityreason.com/securityalert/2807
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/34785
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/34785
10
reference_url http://www.debian.org/security/2008/dsa-1502
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1502
11
reference_url http://www.securityfocus.com/archive/1/470837/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/470837/100/0/threaded
12
reference_url http://www.securityfocus.com/bid/25161
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/25161
13
reference_url http://www.xssnews.com/
reference_id
reference_type
scores
url http://www.xssnews.com/
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3238
reference_id CVE-2007-3238
reference_type
scores
0
value 6.0
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-3238
fixed_packages
0
url pkg:deb/debian/wordpress@2.2.2-1?distro=trixie
purl pkg:deb/debian/wordpress@2.2.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.2.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-3238
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1cp7-76kz-47ed
7
url VCID-1hu7-2yjp-m7b8
vulnerability_id VCID-1hu7-2yjp-m7b8
summary Unspecified vulnerability in WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 has unknown impact and attack vectors related to "Various security hardening."
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3125
reference_id
reference_type
scores
0
value 0.01125
scoring_system epss
scoring_elements 0.78219
published_at 2026-04-01T12:55:00Z
1
value 0.01125
scoring_system epss
scoring_elements 0.78227
published_at 2026-04-02T12:55:00Z
2
value 0.01125
scoring_system epss
scoring_elements 0.78259
published_at 2026-04-04T12:55:00Z
3
value 0.01125
scoring_system epss
scoring_elements 0.7824
published_at 2026-04-07T12:55:00Z
4
value 0.01125
scoring_system epss
scoring_elements 0.78267
published_at 2026-04-08T12:55:00Z
5
value 0.01125
scoring_system epss
scoring_elements 0.78273
published_at 2026-04-09T12:55:00Z
6
value 0.01125
scoring_system epss
scoring_elements 0.78298
published_at 2026-04-11T12:55:00Z
7
value 0.01125
scoring_system epss
scoring_elements 0.78281
published_at 2026-04-12T12:55:00Z
8
value 0.01125
scoring_system epss
scoring_elements 0.78276
published_at 2026-04-13T12:55:00Z
9
value 0.01125
scoring_system epss
scoring_elements 0.78307
published_at 2026-04-16T12:55:00Z
10
value 0.01125
scoring_system epss
scoring_elements 0.78304
published_at 2026-04-18T12:55:00Z
11
value 0.01125
scoring_system epss
scoring_elements 0.783
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3125
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3125
fixed_packages
0
url pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.2.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2011-3125
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1hu7-2yjp-m7b8
8
url VCID-1j31-f88g-kfe7
vulnerability_id VCID-1j31-f88g-kfe7
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-29450
reference_id
reference_type
scores
0
value 0.0208
scoring_system epss
scoring_elements 0.84014
published_at 2026-04-21T12:55:00Z
1
value 0.0208
scoring_system epss
scoring_elements 0.83917
published_at 2026-04-01T12:55:00Z
2
value 0.0208
scoring_system epss
scoring_elements 0.83932
published_at 2026-04-02T12:55:00Z
3
value 0.0208
scoring_system epss
scoring_elements 0.83948
published_at 2026-04-04T12:55:00Z
4
value 0.0208
scoring_system epss
scoring_elements 0.83951
published_at 2026-04-07T12:55:00Z
5
value 0.0208
scoring_system epss
scoring_elements 0.83974
published_at 2026-04-08T12:55:00Z
6
value 0.0208
scoring_system epss
scoring_elements 0.83981
published_at 2026-04-09T12:55:00Z
7
value 0.0208
scoring_system epss
scoring_elements 0.83997
published_at 2026-04-11T12:55:00Z
8
value 0.0208
scoring_system epss
scoring_elements 0.83991
published_at 2026-04-12T12:55:00Z
9
value 0.0208
scoring_system epss
scoring_elements 0.83986
published_at 2026-04-13T12:55:00Z
10
value 0.0208
scoring_system epss
scoring_elements 0.8401
published_at 2026-04-16T12:55:00Z
11
value 0.0208
scoring_system epss
scoring_elements 0.84012
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-29450
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29447
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29450
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987065
reference_id 987065
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987065
4
reference_url https://security.archlinux.org/AVG-1831
reference_id AVG-1831
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1831
fixed_packages
0
url pkg:deb/debian/wordpress@5.7.1%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.1%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.1%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2021-29450
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1j31-f88g-kfe7
9
url VCID-1tvf-ywk8-5yh5
vulnerability_id VCID-1tvf-ywk8-5yh5
summary wp-admin/user-edit.php in WordPress before 2.0.5 allows remote authenticated users to read the metadata of an arbitrary user via a modified user_id parameter.
references
0
reference_url http://bugs.gentoo.org/show_bug.cgi?id=153303
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T16:01:20Z/
url http://bugs.gentoo.org/show_bug.cgi?id=153303
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-6016
reference_id
reference_type
scores
0
value 0.00749
scoring_system epss
scoring_elements 0.73073
published_at 2026-04-02T12:55:00Z
1
value 0.00749
scoring_system epss
scoring_elements 0.7316
published_at 2026-04-21T12:55:00Z
2
value 0.00749
scoring_system epss
scoring_elements 0.73063
published_at 2026-04-01T12:55:00Z
3
value 0.00749
scoring_system epss
scoring_elements 0.73117
published_at 2026-04-09T12:55:00Z
4
value 0.00749
scoring_system epss
scoring_elements 0.73142
published_at 2026-04-11T12:55:00Z
5
value 0.00749
scoring_system epss
scoring_elements 0.73122
published_at 2026-04-12T12:55:00Z
6
value 0.00749
scoring_system epss
scoring_elements 0.73115
published_at 2026-04-13T12:55:00Z
7
value 0.00749
scoring_system epss
scoring_elements 0.73158
published_at 2026-04-16T12:55:00Z
8
value 0.00749
scoring_system epss
scoring_elements 0.73168
published_at 2026-04-18T12:55:00Z
9
value 0.00749
scoring_system epss
scoring_elements 0.73093
published_at 2026-04-04T12:55:00Z
10
value 0.00749
scoring_system epss
scoring_elements 0.73067
published_at 2026-04-07T12:55:00Z
11
value 0.00749
scoring_system epss
scoring_elements 0.73104
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-6016
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6016
3
reference_url http://trac.wordpress.org/ticket/3142
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T16:01:20Z/
url http://trac.wordpress.org/ticket/3142
4
reference_url http://www.gentoo.org/security/en/glsa/glsa-200611-10.xml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T16:01:20Z/
url http://www.gentoo.org/security/en/glsa/glsa-200611-10.xml
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-6016
reference_id CVE-2006-6016
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2006-6016
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.5-0.1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.5-0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.5-0.1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2006-6016
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1tvf-ywk8-5yh5
10
url VCID-1tw6-axgs-f3hy
vulnerability_id VCID-1tw6-axgs-f3hy
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-11027
reference_id
reference_type
scores
0
value 0.42551
scoring_system epss
scoring_elements 0.97437
published_at 2026-04-01T12:55:00Z
1
value 0.42551
scoring_system epss
scoring_elements 0.97444
published_at 2026-04-02T12:55:00Z
2
value 0.42551
scoring_system epss
scoring_elements 0.97449
published_at 2026-04-04T12:55:00Z
3
value 0.42551
scoring_system epss
scoring_elements 0.9745
published_at 2026-04-07T12:55:00Z
4
value 0.42551
scoring_system epss
scoring_elements 0.97456
published_at 2026-04-08T12:55:00Z
5
value 0.42551
scoring_system epss
scoring_elements 0.97458
published_at 2026-04-09T12:55:00Z
6
value 0.42551
scoring_system epss
scoring_elements 0.97461
published_at 2026-04-11T12:55:00Z
7
value 0.42551
scoring_system epss
scoring_elements 0.97462
published_at 2026-04-12T12:55:00Z
8
value 0.42551
scoring_system epss
scoring_elements 0.97463
published_at 2026-04-13T12:55:00Z
9
value 0.42551
scoring_system epss
scoring_elements 0.97472
published_at 2026-04-16T12:55:00Z
10
value 0.42551
scoring_system epss
scoring_elements 0.97475
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-11027
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11025
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11026
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11027
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11027
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11028
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11029
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959391
reference_id 959391
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959391
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/51531.py
reference_id CVE-2020-11027
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/51531.py
fixed_packages
0
url pkg:deb/debian/wordpress@5.4.1%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.4.1%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.4.1%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2020-11027
risk_score 0.8
exploitability 2.0
weighted_severity 0.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1tw6-axgs-f3hy
11
url VCID-1z8j-st48-qkgn
vulnerability_id VCID-1z8j-st48-qkgn
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14718
reference_id
reference_type
scores
0
value 0.02645
scoring_system epss
scoring_elements 0.85749
published_at 2026-04-21T12:55:00Z
1
value 0.02645
scoring_system epss
scoring_elements 0.85756
published_at 2026-04-18T12:55:00Z
2
value 0.02645
scoring_system epss
scoring_elements 0.85658
published_at 2026-04-01T12:55:00Z
3
value 0.02645
scoring_system epss
scoring_elements 0.85671
published_at 2026-04-02T12:55:00Z
4
value 0.02645
scoring_system epss
scoring_elements 0.85688
published_at 2026-04-04T12:55:00Z
5
value 0.02645
scoring_system epss
scoring_elements 0.85695
published_at 2026-04-07T12:55:00Z
6
value 0.02645
scoring_system epss
scoring_elements 0.85714
published_at 2026-04-08T12:55:00Z
7
value 0.02645
scoring_system epss
scoring_elements 0.85725
published_at 2026-04-09T12:55:00Z
8
value 0.02645
scoring_system epss
scoring_elements 0.85741
published_at 2026-04-11T12:55:00Z
9
value 0.02645
scoring_system epss
scoring_elements 0.85737
published_at 2026-04-12T12:55:00Z
10
value 0.02645
scoring_system epss
scoring_elements 0.85733
published_at 2026-04-13T12:55:00Z
11
value 0.02645
scoring_system epss
scoring_elements 0.85751
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14718
1
reference_url https://core.trac.wordpress.org/changeset/41393
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/41393
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14718
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14720
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14721
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14722
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14723
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14726
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14726
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14990
11
reference_url https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
12
reference_url https://www.debian.org/security/2017/dsa-3997
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3997
13
reference_url http://www.securityfocus.com/bid/100912
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100912
14
reference_url http://www.securitytracker.com/id/1039553
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039553
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876274
reference_id 876274
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876274
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-14718
reference_id CVE-2017-14718
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-14718
fixed_packages
0
url pkg:deb/debian/wordpress@4.8.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.8.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.8.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-14718
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1z8j-st48-qkgn
12
url VCID-251h-7yfd-sbdy
vulnerability_id VCID-251h-7yfd-sbdy
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5835
reference_id
reference_type
scores
0
value 0.01938
scoring_system epss
scoring_elements 0.83449
published_at 2026-04-21T12:55:00Z
1
value 0.01938
scoring_system epss
scoring_elements 0.8345
published_at 2026-04-18T12:55:00Z
2
value 0.01938
scoring_system epss
scoring_elements 0.83344
published_at 2026-04-01T12:55:00Z
3
value 0.01938
scoring_system epss
scoring_elements 0.83359
published_at 2026-04-02T12:55:00Z
4
value 0.01938
scoring_system epss
scoring_elements 0.83374
published_at 2026-04-04T12:55:00Z
5
value 0.01938
scoring_system epss
scoring_elements 0.83373
published_at 2026-04-07T12:55:00Z
6
value 0.01938
scoring_system epss
scoring_elements 0.83398
published_at 2026-04-08T12:55:00Z
7
value 0.01938
scoring_system epss
scoring_elements 0.83407
published_at 2026-04-09T12:55:00Z
8
value 0.01938
scoring_system epss
scoring_elements 0.83423
published_at 2026-04-11T12:55:00Z
9
value 0.01938
scoring_system epss
scoring_elements 0.83417
published_at 2026-04-12T12:55:00Z
10
value 0.01938
scoring_system epss
scoring_elements 0.83412
published_at 2026-04-13T12:55:00Z
11
value 0.01938
scoring_system epss
scoring_elements 0.83448
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5835
1
reference_url https://codex.wordpress.org/Version_4.5.3
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.5.3
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8834
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5832
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5832
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5834
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5835
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5837
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5838
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5838
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5839
9
reference_url https://github.com/WordPress/WordPress/commit/a2904cc3092c391ac7027bc87f7806953d1a25a1
reference_id
reference_type
scores
url https://github.com/WordPress/WordPress/commit/a2904cc3092c391ac7027bc87f7806953d1a25a1
10
reference_url https://wordpress.org/news/2016/06/wordpress-4-5-3/
reference_id
reference_type
scores
url https://wordpress.org/news/2016/06/wordpress-4-5-3/
11
reference_url https://wpvulndb.com/vulnerabilities/8519
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8519
12
reference_url http://www.debian.org/security/2016/dsa-3639
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3639
13
reference_url http://www.securityfocus.com/bid/91366
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91366
14
reference_url http://www.securitytracker.com/id/1036163
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036163
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5835
reference_id CVE-2016-5835
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-5835
fixed_packages
0
url pkg:deb/debian/wordpress@4.5.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.5.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.5.3%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2016-5835
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-251h-7yfd-sbdy
13
url VCID-27hh-rxke-cfan
vulnerability_id VCID-27hh-rxke-cfan
summary wp-admin/plugins.php in WordPress before 3.3.2 allows remote authenticated site administrators to bypass intended access restrictions and deactivate network-wide plugins via unspecified vectors.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2402
reference_id
reference_type
scores
0
value 0.00932
scoring_system epss
scoring_elements 0.76065
published_at 2026-04-01T12:55:00Z
1
value 0.00932
scoring_system epss
scoring_elements 0.76068
published_at 2026-04-02T12:55:00Z
2
value 0.00932
scoring_system epss
scoring_elements 0.76101
published_at 2026-04-04T12:55:00Z
3
value 0.00932
scoring_system epss
scoring_elements 0.7608
published_at 2026-04-07T12:55:00Z
4
value 0.00932
scoring_system epss
scoring_elements 0.76113
published_at 2026-04-08T12:55:00Z
5
value 0.00932
scoring_system epss
scoring_elements 0.76127
published_at 2026-04-12T12:55:00Z
6
value 0.00932
scoring_system epss
scoring_elements 0.76151
published_at 2026-04-11T12:55:00Z
7
value 0.00932
scoring_system epss
scoring_elements 0.76125
published_at 2026-04-13T12:55:00Z
8
value 0.00932
scoring_system epss
scoring_elements 0.76165
published_at 2026-04-16T12:55:00Z
9
value 0.00932
scoring_system epss
scoring_elements 0.76169
published_at 2026-04-18T12:55:00Z
10
value 0.00932
scoring_system epss
scoring_elements 0.76152
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2402
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2402
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670124
reference_id 670124
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670124
fixed_packages
0
url pkg:deb/debian/wordpress@3.3.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.3.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.3.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2012-2402
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-27hh-rxke-cfan
14
url VCID-2amm-jjpz-xyhf
vulnerability_id VCID-2amm-jjpz-xyhf
summary wordpress: multiple XSS issues in invite action
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1304.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1304.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1304
reference_id
reference_type
scores
0
value 0.0308
scoring_system epss
scoring_elements 0.86706
published_at 2026-04-01T12:55:00Z
1
value 0.0308
scoring_system epss
scoring_elements 0.86717
published_at 2026-04-02T12:55:00Z
2
value 0.0308
scoring_system epss
scoring_elements 0.86736
published_at 2026-04-04T12:55:00Z
3
value 0.0308
scoring_system epss
scoring_elements 0.86735
published_at 2026-04-07T12:55:00Z
4
value 0.0308
scoring_system epss
scoring_elements 0.86754
published_at 2026-04-08T12:55:00Z
5
value 0.0308
scoring_system epss
scoring_elements 0.86763
published_at 2026-04-09T12:55:00Z
6
value 0.0308
scoring_system epss
scoring_elements 0.86776
published_at 2026-04-11T12:55:00Z
7
value 0.0308
scoring_system epss
scoring_elements 0.86773
published_at 2026-04-12T12:55:00Z
8
value 0.0308
scoring_system epss
scoring_elements 0.86768
published_at 2026-04-13T12:55:00Z
9
value 0.0308
scoring_system epss
scoring_elements 0.86783
published_at 2026-04-16T12:55:00Z
10
value 0.0308
scoring_system epss
scoring_elements 0.86788
published_at 2026-04-18T12:55:00Z
11
value 0.0308
scoring_system epss
scoring_elements 0.86785
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1304
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=437754
reference_id 437754
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=437754
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/31356.txt
reference_id CVE-2008-1304;OSVDB-43402
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/31356.txt
4
reference_url https://www.securityfocus.com/bid/28139/info
reference_id CVE-2008-1304;OSVDB-43402
reference_type exploit
scores
url https://www.securityfocus.com/bid/28139/info
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/31357.txt
reference_id CVE-2008-1304;OSVDB-43403
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/31357.txt
fixed_packages
0
url pkg:deb/debian/wordpress@0?distro=trixie
purl pkg:deb/debian/wordpress@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@0%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2008-1304
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2amm-jjpz-xyhf
15
url VCID-2b99-baqh-3ker
vulnerability_id VCID-2b99-baqh-3ker
summary Cross-site request forgery (CSRF) vulnerability in the customizer in WordPress before 3.4.1 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3384
reference_id
reference_type
scores
0
value 0.00179
scoring_system epss
scoring_elements 0.39362
published_at 2026-04-01T12:55:00Z
1
value 0.00179
scoring_system epss
scoring_elements 0.39523
published_at 2026-04-02T12:55:00Z
2
value 0.00179
scoring_system epss
scoring_elements 0.39546
published_at 2026-04-04T12:55:00Z
3
value 0.00179
scoring_system epss
scoring_elements 0.39461
published_at 2026-04-07T12:55:00Z
4
value 0.00179
scoring_system epss
scoring_elements 0.39516
published_at 2026-04-08T12:55:00Z
5
value 0.00179
scoring_system epss
scoring_elements 0.39532
published_at 2026-04-09T12:55:00Z
6
value 0.00179
scoring_system epss
scoring_elements 0.39543
published_at 2026-04-11T12:55:00Z
7
value 0.00179
scoring_system epss
scoring_elements 0.39505
published_at 2026-04-12T12:55:00Z
8
value 0.00179
scoring_system epss
scoring_elements 0.39488
published_at 2026-04-13T12:55:00Z
9
value 0.00179
scoring_system epss
scoring_elements 0.39539
published_at 2026-04-16T12:55:00Z
10
value 0.00179
scoring_system epss
scoring_elements 0.3951
published_at 2026-04-18T12:55:00Z
11
value 0.00179
scoring_system epss
scoring_elements 0.39426
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3384
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3384
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680721
reference_id 680721
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680721
fixed_packages
0
url pkg:deb/debian/wordpress@3.4.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.4.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.4.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2012-3384
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2b99-baqh-3ker
16
url VCID-2gqt-ngbw-xyby
vulnerability_id VCID-2gqt-ngbw-xyby
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21664
reference_id
reference_type
scores
0
value 0.03738
scoring_system epss
scoring_elements 0.87961
published_at 2026-04-02T12:55:00Z
1
value 0.03738
scoring_system epss
scoring_elements 0.87975
published_at 2026-04-04T12:55:00Z
2
value 0.03738
scoring_system epss
scoring_elements 0.87979
published_at 2026-04-07T12:55:00Z
3
value 0.03738
scoring_system epss
scoring_elements 0.87999
published_at 2026-04-08T12:55:00Z
4
value 0.03738
scoring_system epss
scoring_elements 0.88006
published_at 2026-04-09T12:55:00Z
5
value 0.03738
scoring_system epss
scoring_elements 0.88017
published_at 2026-04-11T12:55:00Z
6
value 0.03738
scoring_system epss
scoring_elements 0.88009
published_at 2026-04-12T12:55:00Z
7
value 0.03738
scoring_system epss
scoring_elements 0.8801
published_at 2026-04-13T12:55:00Z
8
value 0.03738
scoring_system epss
scoring_elements 0.88024
published_at 2026-04-16T12:55:00Z
9
value 0.03738
scoring_system epss
scoring_elements 0.88022
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21664
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21661
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21662
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21663
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21664
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1003243
reference_id 1003243
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1003243
6
reference_url https://github.com/WordPress/wordpress-develop/commit/c09ccfbc547d75b392dbccc1ef0b4442ccd3c957
reference_id c09ccfbc547d75b392dbccc1ef0b4442ccd3c957
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:12:29Z/
url https://github.com/WordPress/wordpress-develop/commit/c09ccfbc547d75b392dbccc1ef0b4442ccd3c957
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4UNEC63UU5GEU47IIR4RMTZAHNEOJG/
reference_id CV4UNEC63UU5GEU47IIR4RMTZAHNEOJG
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:12:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4UNEC63UU5GEU47IIR4RMTZAHNEOJG/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DM6XPH3JN6V4NF4WBOJTOXZIVE6VKKE3/
reference_id DM6XPH3JN6V4NF4WBOJTOXZIVE6VKKE3
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:12:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DM6XPH3JN6V4NF4WBOJTOXZIVE6VKKE3/
9
reference_url https://www.debian.org/security/2022/dsa-5039
reference_id dsa-5039
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:12:29Z/
url https://www.debian.org/security/2022/dsa-5039
10
reference_url https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-jp3p-gw8h-6x86
reference_id GHSA-jp3p-gw8h-6x86
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:12:29Z/
url https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-jp3p-gw8h-6x86
11
reference_url https://lists.debian.org/debian-lts-announce/2022/01/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:12:29Z/
url https://lists.debian.org/debian-lts-announce/2022/01/msg00019.html
12
reference_url https://wordpress.org/news/2022/01/wordpress-5-8-3-security-release/
reference_id wordpress-5-8-3-security-release
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:12:29Z/
url https://wordpress.org/news/2022/01/wordpress-5-8-3-security-release/
fixed_packages
0
url pkg:deb/debian/wordpress@5.7.5%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.5%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.5%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@5.8.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.8.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.8.3%252Bdfsg1-1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2022-21664
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2gqt-ngbw-xyby
17
url VCID-2h1g-qy4e-rkhb
vulnerability_id VCID-2h1g-qy4e-rkhb
summary Unspecified vulnerability in WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 has unknown impact and attack vectors related to "Media security."
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3122
reference_id
reference_type
scores
0
value 0.01235
scoring_system epss
scoring_elements 0.79151
published_at 2026-04-01T12:55:00Z
1
value 0.01235
scoring_system epss
scoring_elements 0.79157
published_at 2026-04-02T12:55:00Z
2
value 0.01235
scoring_system epss
scoring_elements 0.79182
published_at 2026-04-04T12:55:00Z
3
value 0.01235
scoring_system epss
scoring_elements 0.79168
published_at 2026-04-07T12:55:00Z
4
value 0.01235
scoring_system epss
scoring_elements 0.79193
published_at 2026-04-08T12:55:00Z
5
value 0.01235
scoring_system epss
scoring_elements 0.79201
published_at 2026-04-09T12:55:00Z
6
value 0.01235
scoring_system epss
scoring_elements 0.79225
published_at 2026-04-18T12:55:00Z
7
value 0.01235
scoring_system epss
scoring_elements 0.7921
published_at 2026-04-12T12:55:00Z
8
value 0.01235
scoring_system epss
scoring_elements 0.79202
published_at 2026-04-13T12:55:00Z
9
value 0.01235
scoring_system epss
scoring_elements 0.79228
published_at 2026-04-16T12:55:00Z
10
value 0.01235
scoring_system epss
scoring_elements 0.79226
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3122
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3122
fixed_packages
0
url pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.2.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2011-3122
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2h1g-qy4e-rkhb
18
url VCID-2hh2-akug-byew
vulnerability_id VCID-2hh2-akug-byew
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0493.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0493.html
1
reference_url http://core.trac.wordpress.org/changeset/30431
reference_id
reference_type
scores
url http://core.trac.wordpress.org/changeset/30431
2
reference_url http://openwall.com/lists/oss-security/2014/11/25/12
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2014/11/25/12
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9039
reference_id
reference_type
scores
0
value 0.01681
scoring_system epss
scoring_elements 0.82217
published_at 2026-04-21T12:55:00Z
1
value 0.01681
scoring_system epss
scoring_elements 0.8211
published_at 2026-04-01T12:55:00Z
2
value 0.01681
scoring_system epss
scoring_elements 0.82122
published_at 2026-04-02T12:55:00Z
3
value 0.01681
scoring_system epss
scoring_elements 0.82144
published_at 2026-04-04T12:55:00Z
4
value 0.01681
scoring_system epss
scoring_elements 0.8214
published_at 2026-04-07T12:55:00Z
5
value 0.01681
scoring_system epss
scoring_elements 0.82166
published_at 2026-04-08T12:55:00Z
6
value 0.01681
scoring_system epss
scoring_elements 0.82174
published_at 2026-04-09T12:55:00Z
7
value 0.01681
scoring_system epss
scoring_elements 0.82192
published_at 2026-04-11T12:55:00Z
8
value 0.01681
scoring_system epss
scoring_elements 0.82184
published_at 2026-04-12T12:55:00Z
9
value 0.01681
scoring_system epss
scoring_elements 0.82178
published_at 2026-04-13T12:55:00Z
10
value 0.01681
scoring_system epss
scoring_elements 0.82216
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9039
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039
12
reference_url https://wordpress.org/news/2014/11/wordpress-4-0-1/
reference_id
reference_type
scores
url https://wordpress.org/news/2014/11/wordpress-4-0-1/
13
reference_url http://www.debian.org/security/2014/dsa-3085
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3085
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:233
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:233
15
reference_url http://www.securitytracker.com/id/1031243
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031243
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425
reference_id 770425
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9039
reference_id CVE-2014-9039
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-9039
fixed_packages
0
url pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.0.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2014-9039
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2hh2-akug-byew
19
url VCID-2jgs-b7r7-zygv
vulnerability_id VCID-2jgs-b7r7-zygv
summary In affected versions of WordPress, a special payload can be crafted that can lead to scripts getting executed within the search block of the block editor. This requires an authenticated user with the ability to add content. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-11030
reference_id
reference_type
scores
0
value 0.01037
scoring_system epss
scoring_elements 0.77343
published_at 2026-04-01T12:55:00Z
1
value 0.01037
scoring_system epss
scoring_elements 0.7735
published_at 2026-04-02T12:55:00Z
2
value 0.01037
scoring_system epss
scoring_elements 0.77377
published_at 2026-04-04T12:55:00Z
3
value 0.01037
scoring_system epss
scoring_elements 0.77357
published_at 2026-04-07T12:55:00Z
4
value 0.01037
scoring_system epss
scoring_elements 0.77387
published_at 2026-04-08T12:55:00Z
5
value 0.01037
scoring_system epss
scoring_elements 0.77397
published_at 2026-04-09T12:55:00Z
6
value 0.01037
scoring_system epss
scoring_elements 0.77423
published_at 2026-04-11T12:55:00Z
7
value 0.01037
scoring_system epss
scoring_elements 0.77403
published_at 2026-04-12T12:55:00Z
8
value 0.01037
scoring_system epss
scoring_elements 0.77399
published_at 2026-04-13T12:55:00Z
9
value 0.01037
scoring_system epss
scoring_elements 0.77439
published_at 2026-04-16T12:55:00Z
10
value 0.01037
scoring_system epss
scoring_elements 0.77438
published_at 2026-04-18T12:55:00Z
11
value 0.01037
scoring_system epss
scoring_elements 0.7743
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-11030
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11030
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959391
reference_id 959391
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959391
fixed_packages
0
url pkg:deb/debian/wordpress@5.4.1%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.4.1%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.4.1%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2020-11030
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2jgs-b7r7-zygv
20
url VCID-2jta-dshu-e7hb
vulnerability_id VCID-2jta-dshu-e7hb
summary WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. In affected versions the widgets editor introduced in WordPress 5.8 beta 1 has improper handling of HTML input in the Custom HTML feature. This leads to stored XSS in the custom HTML widget. This has been patched in WordPress 5.8. It was only present during the testing/beta phase of WordPress 5.8.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39202
reference_id
reference_type
scores
0
value 0.00817
scoring_system epss
scoring_elements 0.74301
published_at 2026-04-01T12:55:00Z
1
value 0.00817
scoring_system epss
scoring_elements 0.74304
published_at 2026-04-02T12:55:00Z
2
value 0.00817
scoring_system epss
scoring_elements 0.74332
published_at 2026-04-04T12:55:00Z
3
value 0.00817
scoring_system epss
scoring_elements 0.74305
published_at 2026-04-07T12:55:00Z
4
value 0.00817
scoring_system epss
scoring_elements 0.74338
published_at 2026-04-08T12:55:00Z
5
value 0.00817
scoring_system epss
scoring_elements 0.74353
published_at 2026-04-09T12:55:00Z
6
value 0.00817
scoring_system epss
scoring_elements 0.74374
published_at 2026-04-11T12:55:00Z
7
value 0.00817
scoring_system epss
scoring_elements 0.74354
published_at 2026-04-12T12:55:00Z
8
value 0.00817
scoring_system epss
scoring_elements 0.74346
published_at 2026-04-13T12:55:00Z
9
value 0.00817
scoring_system epss
scoring_elements 0.74383
published_at 2026-04-16T12:55:00Z
10
value 0.00817
scoring_system epss
scoring_elements 0.74391
published_at 2026-04-18T12:55:00Z
11
value 0.00817
scoring_system epss
scoring_elements 0.74384
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39202
fixed_packages
0
url pkg:deb/debian/wordpress@0?distro=trixie
purl pkg:deb/debian/wordpress@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@0%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2021-39202
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2jta-dshu-e7hb
21
url VCID-2qnz-21s3-tbgm
vulnerability_id VCID-2qnz-21s3-tbgm
summary
Wordpress contains several cross-site scripting, cross-site request forgery
    and information leak vulnerabilities.
references
0
reference_url http://downloads.securityfocus.com/vulnerabilities/exploits/22534.html
reference_id
reference_type
scores
url http://downloads.securityfocus.com/vulnerabilities/exploits/22534.html
1
reference_url http://osvdb.org/33766
reference_id
reference_type
scores
url http://osvdb.org/33766
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1049
reference_id
reference_type
scores
0
value 0.06232
scoring_system epss
scoring_elements 0.90914
published_at 2026-04-21T12:55:00Z
1
value 0.06232
scoring_system epss
scoring_elements 0.90839
published_at 2026-04-01T12:55:00Z
2
value 0.06232
scoring_system epss
scoring_elements 0.90844
published_at 2026-04-02T12:55:00Z
3
value 0.06232
scoring_system epss
scoring_elements 0.90855
published_at 2026-04-04T12:55:00Z
4
value 0.06232
scoring_system epss
scoring_elements 0.90865
published_at 2026-04-07T12:55:00Z
5
value 0.06232
scoring_system epss
scoring_elements 0.90877
published_at 2026-04-08T12:55:00Z
6
value 0.06232
scoring_system epss
scoring_elements 0.90884
published_at 2026-04-09T12:55:00Z
7
value 0.06232
scoring_system epss
scoring_elements 0.90893
published_at 2026-04-12T12:55:00Z
8
value 0.06232
scoring_system epss
scoring_elements 0.90891
published_at 2026-04-13T12:55:00Z
9
value 0.06232
scoring_system epss
scoring_elements 0.90916
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1049
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1049
4
reference_url http://secunia.com/advisories/24306
reference_id
reference_type
scores
url http://secunia.com/advisories/24306
5
reference_url http://secunia.com/advisories/24566
reference_id
reference_type
scores
url http://secunia.com/advisories/24566
6
reference_url http://trac.wordpress.org/changeset/4876
reference_id
reference_type
scores
url http://trac.wordpress.org/changeset/4876
7
reference_url http://trac.wordpress.org/changeset/4877
reference_id
reference_type
scores
url http://trac.wordpress.org/changeset/4877
8
reference_url http://trac.wordpress.org/ticket/3781
reference_id
reference_type
scores
url http://trac.wordpress.org/ticket/3781
9
reference_url http://www.gentoo.org/security/en/glsa/glsa-200703-23.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200703-23.xml
10
reference_url http://www.securityfocus.com/bid/22534
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/22534
11
reference_url http://www.vupen.com/english/advisories/2007/0741
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0741
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2.1:beta_2:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.6.2.1:beta_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2.1:beta_2:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2:beta_2:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.6.2:beta_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2:beta_2:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1049
reference_id CVE-2007-1049
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2007-1049
35
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/29598.txt
reference_id CVE-2007-1049;OSVDB-33766
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/29598.txt
36
reference_url https://www.securityfocus.com/bid/22534/info
reference_id CVE-2007-1049;OSVDB-33766
reference_type exploit
scores
url https://www.securityfocus.com/bid/22534/info
37
reference_url https://security.gentoo.org/glsa/200703-23
reference_id GLSA-200703-23
reference_type
scores
url https://security.gentoo.org/glsa/200703-23
fixed_packages
0
url pkg:deb/debian/wordpress@2.1.1-1?distro=trixie
purl pkg:deb/debian/wordpress@2.1.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.1.1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-1049
risk_score 7.8
exploitability 2.0
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2qnz-21s3-tbgm
22
url VCID-2rqp-572a-ufcr
vulnerability_id VCID-2rqp-572a-ufcr
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3440
reference_id
reference_type
scores
0
value 0.10809
scoring_system epss
scoring_elements 0.93325
published_at 2026-04-01T12:55:00Z
1
value 0.10809
scoring_system epss
scoring_elements 0.93334
published_at 2026-04-02T12:55:00Z
2
value 0.10809
scoring_system epss
scoring_elements 0.9334
published_at 2026-04-07T12:55:00Z
3
value 0.10809
scoring_system epss
scoring_elements 0.93348
published_at 2026-04-08T12:55:00Z
4
value 0.10809
scoring_system epss
scoring_elements 0.93353
published_at 2026-04-09T12:55:00Z
5
value 0.10809
scoring_system epss
scoring_elements 0.93357
published_at 2026-04-11T12:55:00Z
6
value 0.10809
scoring_system epss
scoring_elements 0.93355
published_at 2026-04-12T12:55:00Z
7
value 0.10809
scoring_system epss
scoring_elements 0.93356
published_at 2026-04-13T12:55:00Z
8
value 0.10809
scoring_system epss
scoring_elements 0.93374
published_at 2026-04-16T12:55:00Z
9
value 0.14391
scoring_system epss
scoring_elements 0.94441
published_at 2026-04-18T12:55:00Z
10
value 0.14391
scoring_system epss
scoring_elements 0.94444
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3440
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3438
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3439
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3439
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3440
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783554
reference_id 783554
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783554
5
reference_url http://klikki.fi/adv/wordpress2.html
reference_id OSVDB-121320;CVE-2015-3440
reference_type exploit
scores
url http://klikki.fi/adv/wordpress2.html
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/36844.txt
reference_id OSVDB-121320;CVE-2015-3440
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/36844.txt
fixed_packages
0
url pkg:deb/debian/wordpress@4.2.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.2.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.2.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2015-3440
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2rqp-572a-ufcr
23
url VCID-2s1y-35gq-vyh5
vulnerability_id VCID-2s1y-35gq-vyh5
summary several
references
0
reference_url http://codex.wordpress.org/Version_3.5.2
reference_id
reference_type
scores
url http://codex.wordpress.org/Version_3.5.2
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2200
reference_id
reference_type
scores
0
value 0.01395
scoring_system epss
scoring_elements 0.80424
published_at 2026-04-21T12:55:00Z
1
value 0.01395
scoring_system epss
scoring_elements 0.80339
published_at 2026-04-01T12:55:00Z
2
value 0.01395
scoring_system epss
scoring_elements 0.80346
published_at 2026-04-02T12:55:00Z
3
value 0.01395
scoring_system epss
scoring_elements 0.80366
published_at 2026-04-04T12:55:00Z
4
value 0.01395
scoring_system epss
scoring_elements 0.80355
published_at 2026-04-07T12:55:00Z
5
value 0.01395
scoring_system epss
scoring_elements 0.80384
published_at 2026-04-08T12:55:00Z
6
value 0.01395
scoring_system epss
scoring_elements 0.80394
published_at 2026-04-09T12:55:00Z
7
value 0.01395
scoring_system epss
scoring_elements 0.80412
published_at 2026-04-11T12:55:00Z
8
value 0.01395
scoring_system epss
scoring_elements 0.80397
published_at 2026-04-12T12:55:00Z
9
value 0.01395
scoring_system epss
scoring_elements 0.8039
published_at 2026-04-13T12:55:00Z
10
value 0.01395
scoring_system epss
scoring_elements 0.80419
published_at 2026-04-16T12:55:00Z
11
value 0.01395
scoring_system epss
scoring_elements 0.80421
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2200
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=976784
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=976784
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2173
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2173
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2199
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2200
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2201
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2202
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2203
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2204
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2205
11
reference_url http://wordpress.org/news/2013/06/wordpress-3-5-2/
reference_id
reference_type
scores
url http://wordpress.org/news/2013/06/wordpress-3-5-2/
12
reference_url http://www.debian.org/security/2013/dsa-2718
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2718
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=713947
reference_id 713947
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=713947
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2200
reference_id CVE-2013-2200
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-2200
fixed_packages
0
url pkg:deb/debian/wordpress@3.5.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.5.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.5.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2013-2200
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2s1y-35gq-vyh5
24
url VCID-2y62-terv-2qfc
vulnerability_id VCID-2y62-terv-2qfc
summary
Multiple vulnerabilities have been found in Nagios, the worst of
    which could lead to privilege escalation.
references
0
reference_url http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000074.html
reference_id
reference_type
scores
url http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000074.html
1
reference_url http://jvn.jp/en/jp/JVN20502807/index.html
reference_id
reference_type
scores
url http://jvn.jp/en/jp/JVN20502807/index.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4796.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4796.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4796
reference_id
reference_type
scores
0
value 0.0109
scoring_system epss
scoring_elements 0.77963
published_at 2026-04-21T12:55:00Z
1
value 0.0109
scoring_system epss
scoring_elements 0.7797
published_at 2026-04-18T12:55:00Z
2
value 0.0109
scoring_system epss
scoring_elements 0.77878
published_at 2026-04-01T12:55:00Z
3
value 0.0109
scoring_system epss
scoring_elements 0.77885
published_at 2026-04-02T12:55:00Z
4
value 0.0109
scoring_system epss
scoring_elements 0.77913
published_at 2026-04-04T12:55:00Z
5
value 0.0109
scoring_system epss
scoring_elements 0.77895
published_at 2026-04-07T12:55:00Z
6
value 0.0109
scoring_system epss
scoring_elements 0.77922
published_at 2026-04-08T12:55:00Z
7
value 0.0109
scoring_system epss
scoring_elements 0.77926
published_at 2026-04-09T12:55:00Z
8
value 0.0109
scoring_system epss
scoring_elements 0.77952
published_at 2026-04-11T12:55:00Z
9
value 0.0109
scoring_system epss
scoring_elements 0.77936
published_at 2026-04-12T12:55:00Z
10
value 0.0109
scoring_system epss
scoring_elements 0.77935
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4796
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4796
5
reference_url http://secunia.com/advisories/32361
reference_id
reference_type
scores
url http://secunia.com/advisories/32361
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/46068
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/46068
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url http://sourceforge.net/forum/forum.php?forum_id=879959
reference_id
reference_type
scores
url http://sourceforge.net/forum/forum.php?forum_id=879959
9
reference_url https://www.nagios.org/projects/nagios-core/history/4x/
reference_id
reference_type
scores
url https://www.nagios.org/projects/nagios-core/history/4x/
10
reference_url http://www.debian.org/security/2008/dsa-1691
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1691
11
reference_url http://www.debian.org/security/2009/dsa-1871
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1871
12
reference_url http://www.openwall.com/lists/oss-security/2008/11/01/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/11/01/1
13
reference_url http://www.securityfocus.com/archive/1/496068/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/496068/100/0/threaded
14
reference_url http://www.securityfocus.com/bid/31887
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31887
15
reference_url http://www.vupen.com/english/advisories/2008/2901
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2901
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=469320
reference_id 469320
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=469320
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504168
reference_id 504168
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504168
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504234
reference_id 504234
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504234
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:snoopy_project:snoopy:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:snoopy_project:snoopy:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:snoopy_project:snoopy:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4796
reference_id CVE-2008-4796
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-4796
25
reference_url https://security.gentoo.org/glsa/201702-26
reference_id GLSA-201702-26
reference_type
scores
url https://security.gentoo.org/glsa/201702-26
26
reference_url https://usn.ubuntu.com/791-1/
reference_id USN-791-1
reference_type
scores
url https://usn.ubuntu.com/791-1/
fixed_packages
0
url pkg:deb/debian/wordpress@2.5.1-9?distro=trixie
purl pkg:deb/debian/wordpress@2.5.1-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.5.1-9%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2008-4796
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2y62-terv-2qfc
25
url VCID-3131-uvkj-vbb5
vulnerability_id VCID-3131-uvkj-vbb5
summary wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script's pathname to active_plugins.
references
0
reference_url http://mu.wordpress.org/forums/topic.php?id=7534&page&replies=1
reference_id
reference_type
scores
url http://mu.wordpress.org/forums/topic.php?id=7534&page&replies=1
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5695
reference_id
reference_type
scores
0
value 0.16371
scoring_system epss
scoring_elements 0.94877
published_at 2026-04-21T12:55:00Z
1
value 0.16371
scoring_system epss
scoring_elements 0.94826
published_at 2026-04-01T12:55:00Z
2
value 0.16371
scoring_system epss
scoring_elements 0.94835
published_at 2026-04-02T12:55:00Z
3
value 0.16371
scoring_system epss
scoring_elements 0.94838
published_at 2026-04-04T12:55:00Z
4
value 0.16371
scoring_system epss
scoring_elements 0.94841
published_at 2026-04-07T12:55:00Z
5
value 0.16371
scoring_system epss
scoring_elements 0.9485
published_at 2026-04-08T12:55:00Z
6
value 0.16371
scoring_system epss
scoring_elements 0.94854
published_at 2026-04-09T12:55:00Z
7
value 0.16371
scoring_system epss
scoring_elements 0.94858
published_at 2026-04-11T12:55:00Z
8
value 0.16371
scoring_system epss
scoring_elements 0.94861
published_at 2026-04-12T12:55:00Z
9
value 0.16371
scoring_system epss
scoring_elements 0.94863
published_at 2026-04-13T12:55:00Z
10
value 0.16371
scoring_system epss
scoring_elements 0.9487
published_at 2026-04-16T12:55:00Z
11
value 0.16371
scoring_system epss
scoring_elements 0.94874
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5695
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5695
3
reference_url http://secunia.com/advisories/28789
reference_id
reference_type
scores
url http://secunia.com/advisories/28789
4
reference_url http://securityreason.com/securityalert/4798
reference_id
reference_type
scores
url http://securityreason.com/securityalert/4798
5
reference_url https://www.exploit-db.com/exploits/5066
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/5066
6
reference_url http://www.buayacorp.com/files/wordpress/wp-blog-option-overwrite.txt
reference_id
reference_type
scores
url http://www.buayacorp.com/files/wordpress/wp-blog-option-overwrite.txt
7
reference_url http://www.securityfocus.com/bid/27633
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/27633
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510786
reference_id 510786
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510786
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5695
reference_id CVE-2008-5695
reference_type
scores
0
value 8.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-5695
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/5066.php
reference_id OSVDB-41134;CVE-2008-5695
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/5066.php
13
reference_url http://www.buayacorp.com/files/wordpress/wordpress-mu-options-overwrite.html
reference_id OSVDB-41134;CVE-2008-5695
reference_type exploit
scores
url http://www.buayacorp.com/files/wordpress/wordpress-mu-options-overwrite.html
fixed_packages
0
url pkg:deb/debian/wordpress@2.3.2?distro=trixie
purl pkg:deb/debian/wordpress@2.3.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.3.2%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2008-5695
risk_score 10.0
exploitability 2.0
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3131-uvkj-vbb5
26
url VCID-3171-8hu9-4uev
vulnerability_id VCID-3171-8hu9-4uev
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17675
reference_id
reference_type
scores
0
value 0.00923
scoring_system epss
scoring_elements 0.76014
published_at 2026-04-21T12:55:00Z
1
value 0.00923
scoring_system epss
scoring_elements 0.76029
published_at 2026-04-18T12:55:00Z
2
value 0.00923
scoring_system epss
scoring_elements 0.7593
published_at 2026-04-01T12:55:00Z
3
value 0.00923
scoring_system epss
scoring_elements 0.75933
published_at 2026-04-02T12:55:00Z
4
value 0.00923
scoring_system epss
scoring_elements 0.75966
published_at 2026-04-04T12:55:00Z
5
value 0.00923
scoring_system epss
scoring_elements 0.75944
published_at 2026-04-07T12:55:00Z
6
value 0.00923
scoring_system epss
scoring_elements 0.75978
published_at 2026-04-08T12:55:00Z
7
value 0.00923
scoring_system epss
scoring_elements 0.75992
published_at 2026-04-09T12:55:00Z
8
value 0.00923
scoring_system epss
scoring_elements 0.76017
published_at 2026-04-11T12:55:00Z
9
value 0.00923
scoring_system epss
scoring_elements 0.75994
published_at 2026-04-12T12:55:00Z
10
value 0.00923
scoring_system epss
scoring_elements 0.75987
published_at 2026-04-13T12:55:00Z
11
value 0.00923
scoring_system epss
scoring_elements 0.76027
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17675
1
reference_url https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html
reference_id
reference_type
scores
url https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html
2
reference_url https://core.trac.wordpress.org/changeset/46477
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/46477
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
21
reference_url https://github.com/WordPress/WordPress/commit/b183fd1cca0b44a92f0264823dd9f22d2fd8b8d0
reference_id
reference_type
scores
url https://github.com/WordPress/WordPress/commit/b183fd1cca0b44a92f0264823dd9f22d2fd8b8d0
22
reference_url https://lists.debian.org/debian-lts-announce/2019/11/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/11/msg00000.html
23
reference_url https://seclists.org/bugtraq/2020/Jan/8
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2020/Jan/8
24
reference_url https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/
25
reference_url https://wpvulndb.com/vulnerabilities/9913
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/9913
26
reference_url https://www.debian.org/security/2020/dsa-4599
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4599
27
reference_url https://www.debian.org/security/2020/dsa-4677
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4677
28
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942459
reference_id 942459
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942459
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-17675
reference_id CVE-2019-17675
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-17675
fixed_packages
0
url pkg:deb/debian/wordpress@5.2.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.2.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.2.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2019-17675
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3171-8hu9-4uev
27
url VCID-32qc-zmsg-gfa4
vulnerability_id VCID-32qc-zmsg-gfa4
summary security update
references
0
reference_url http://openwall.com/lists/oss-security/2015/08/04/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2015/08/04/7
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5730
reference_id
reference_type
scores
0
value 0.09542
scoring_system epss
scoring_elements 0.92866
published_at 2026-04-21T12:55:00Z
1
value 0.09542
scoring_system epss
scoring_elements 0.92823
published_at 2026-04-01T12:55:00Z
2
value 0.09542
scoring_system epss
scoring_elements 0.92831
published_at 2026-04-02T12:55:00Z
3
value 0.09542
scoring_system epss
scoring_elements 0.92834
published_at 2026-04-04T12:55:00Z
4
value 0.09542
scoring_system epss
scoring_elements 0.92832
published_at 2026-04-07T12:55:00Z
5
value 0.09542
scoring_system epss
scoring_elements 0.92841
published_at 2026-04-08T12:55:00Z
6
value 0.09542
scoring_system epss
scoring_elements 0.92845
published_at 2026-04-09T12:55:00Z
7
value 0.09542
scoring_system epss
scoring_elements 0.9285
published_at 2026-04-13T12:55:00Z
8
value 0.09542
scoring_system epss
scoring_elements 0.9286
published_at 2026-04-16T12:55:00Z
9
value 0.09542
scoring_system epss
scoring_elements 0.92861
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5730
2
reference_url https://codex.wordpress.org/Version_4.2.4
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.2.4
3
reference_url https://core.trac.wordpress.org/changeset/33535
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/33535
4
reference_url https://core.trac.wordpress.org/changeset/33536
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/33536
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2213
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5622
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5730
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5731
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5732
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5734
11
reference_url https://wordpress.org/news/2015/08/wordpress-4-2-4-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2015/08/wordpress-4-2-4-security-and-maintenance-release/
12
reference_url https://wpvulndb.com/vulnerabilities/8130
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8130
13
reference_url http://www.debian.org/security/2015/dsa-3332
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3332
14
reference_url http://www.securityfocus.com/bid/76160
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/76160
15
reference_url http://www.securitytracker.com/id/1033178
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033178
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794560
reference_id 794560
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794560
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5730
reference_id CVE-2015-5730
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-5730
fixed_packages
0
url pkg:deb/debian/wordpress@4.2.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.2.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.2.4%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2015-5730
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-32qc-zmsg-gfa4
28
url VCID-3572-tc84-pyhv
vulnerability_id VCID-3572-tc84-pyhv
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2745
reference_id
reference_type
scores
0
value 0.77479
scoring_system epss
scoring_elements 0.98989
published_at 2026-04-21T12:55:00Z
1
value 0.77479
scoring_system epss
scoring_elements 0.98988
published_at 2026-04-18T12:55:00Z
2
value 0.77479
scoring_system epss
scoring_elements 0.98987
published_at 2026-04-16T12:55:00Z
3
value 0.79453
scoring_system epss
scoring_elements 0.99074
published_at 2026-04-02T12:55:00Z
4
value 0.79453
scoring_system epss
scoring_elements 0.99078
published_at 2026-04-04T12:55:00Z
5
value 0.79453
scoring_system epss
scoring_elements 0.9908
published_at 2026-04-07T12:55:00Z
6
value 0.79453
scoring_system epss
scoring_elements 0.99081
published_at 2026-04-11T12:55:00Z
7
value 0.79453
scoring_system epss
scoring_elements 0.99082
published_at 2026-04-13T12:55:00Z
8
value 0.79453
scoring_system epss
scoring_elements 0.99083
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2745
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39999
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5561
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31210
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31210
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036296
reference_id 1036296
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036296
6
reference_url https://core.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=55765%40%2F&new=55765%40%2F&sfp_email=&sfph_mail=
reference_id changeset?sfp_email=&sfph_mail=&reponame=&old=55765%40%2F&new=55765%40%2F&sfp_email=&sfph_mail=
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T16:22:24Z/
url https://core.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=55765%40%2F&new=55765%40%2F&sfp_email=&sfph_mail=
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/52274.py
reference_id CVE-2023-2745
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/52274.py
8
reference_url https://www.wordfence.com/threat-intel/vulnerabilities/id/edcf46b6-368e-49c0-b2c3-99bf6e2d358f?source=cve
reference_id edcf46b6-368e-49c0-b2c3-99bf6e2d358f?source=cve
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T16:22:24Z/
url https://www.wordfence.com/threat-intel/vulnerabilities/id/edcf46b6-368e-49c0-b2c3-99bf6e2d358f?source=cve
9
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00024.html
reference_id msg00024.html
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T16:22:24Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00024.html
10
reference_url https://wordpress.org/news/2023/05/wordpress-6-2-1-maintenance-security-release/
reference_id wordpress-6-2-1-maintenance-security-release
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T16:22:24Z/
url https://wordpress.org/news/2023/05/wordpress-6-2-1-maintenance-security-release/
11
reference_url https://www.wordfence.com/blog/2023/05/wordpress-core-6-2-1-security-maintenance-release-what-you-need-to-know/
reference_id wordpress-core-6-2-1-security-maintenance-release-what-you-need-to-know
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T16:22:24Z/
url https://www.wordfence.com/blog/2023/05/wordpress-core-6-2-1-security-maintenance-release-what-you-need-to-know/
12
reference_url http://packetstormsecurity.com/files/172426/WordPress-Core-6.2-XSS-CSRF-Directory-Traversal.html
reference_id WordPress-Core-6.2-XSS-CSRF-Directory-Traversal.html
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T16:22:24Z/
url http://packetstormsecurity.com/files/172426/WordPress-Core-6.2-XSS-CSRF-Directory-Traversal.html
fixed_packages
0
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@6.1.6%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.6%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.6%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.2.1%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.2.1%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.2.1%252Bdfsg1-1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2023-2745
risk_score 9.8
exploitability 2.0
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3572-tc84-pyhv
29
url VCID-3cqk-swz6-dqez
vulnerability_id VCID-3cqk-swz6-dqez
summary WordPress 1.5.1.2 and earlier allows remote attackers to obtain sensitive information via (1) a direct request to menu-header.php or a "1" value in the feed parameter to (2) wp-atom.php, (3) wp-rss.php, or (4) wp-rss2.php, which reveal the path in an error message. NOTE: vector [1] was later reported to also affect WordPress 2.0.1.
references
0
reference_url http://marc.info/?l=bugtraq&m=112006967221438&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=112006967221438&w=2
1
reference_url http://NeoSecurityTeam.net/advisories/Advisory-17.txt
reference_id
reference_type
scores
url http://NeoSecurityTeam.net/advisories/Advisory-17.txt
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-2110
reference_id
reference_type
scores
0
value 0.01227
scoring_system epss
scoring_elements 0.79162
published_at 2026-04-21T12:55:00Z
1
value 0.01227
scoring_system epss
scoring_elements 0.79088
published_at 2026-04-01T12:55:00Z
2
value 0.01227
scoring_system epss
scoring_elements 0.79095
published_at 2026-04-02T12:55:00Z
3
value 0.01227
scoring_system epss
scoring_elements 0.79121
published_at 2026-04-04T12:55:00Z
4
value 0.01227
scoring_system epss
scoring_elements 0.79107
published_at 2026-04-07T12:55:00Z
5
value 0.01227
scoring_system epss
scoring_elements 0.79131
published_at 2026-04-08T12:55:00Z
6
value 0.01227
scoring_system epss
scoring_elements 0.79139
published_at 2026-04-13T12:55:00Z
7
value 0.01227
scoring_system epss
scoring_elements 0.79164
published_at 2026-04-11T12:55:00Z
8
value 0.01227
scoring_system epss
scoring_elements 0.79149
published_at 2026-04-12T12:55:00Z
9
value 0.01227
scoring_system epss
scoring_elements 0.79166
published_at 2026-04-16T12:55:00Z
10
value 0.01227
scoring_system epss
scoring_elements 0.79163
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-2110
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2110
4
reference_url http://secunia.com/advisories/15831
reference_id
reference_type
scores
url http://secunia.com/advisories/15831
5
reference_url http://www.gulftech.org/?node=research&article_id=00085-06282005
reference_id
reference_type
scores
url http://www.gulftech.org/?node=research&article_id=00085-06282005
6
reference_url http://www.securityfocus.com/archive/1/426304/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/426304/100/0/threaded
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=316402
reference_id 316402
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=316402
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-2110
reference_id CVE-2005-2110
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2005-2110
fixed_packages
0
url pkg:deb/debian/wordpress@1.5.1.3-1?distro=trixie
purl pkg:deb/debian/wordpress@1.5.1.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@1.5.1.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2005-2110
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3cqk-swz6-dqez
30
url VCID-3e65-zd17-rqhy
vulnerability_id VCID-3e65-zd17-rqhy
summary Multiple SQL injection vulnerabilities in Wordpress before 2.2.3 and Wordpress multi-user (MU) before 1.2.5a allow remote attackers to execute arbitrary SQL commands via the post_type parameter to the pingback.extensions.getPingbacks method in the XMLRPC interface, and other unspecified parameters related to "early database escaping" and missing validation of "query string like parameters."
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4894
reference_id
reference_type
scores
0
value 0.0388
scoring_system epss
scoring_elements 0.88186
published_at 2026-04-01T12:55:00Z
1
value 0.0388
scoring_system epss
scoring_elements 0.88194
published_at 2026-04-02T12:55:00Z
2
value 0.0388
scoring_system epss
scoring_elements 0.8821
published_at 2026-04-04T12:55:00Z
3
value 0.0388
scoring_system epss
scoring_elements 0.88215
published_at 2026-04-07T12:55:00Z
4
value 0.0388
scoring_system epss
scoring_elements 0.88235
published_at 2026-04-08T12:55:00Z
5
value 0.0388
scoring_system epss
scoring_elements 0.88241
published_at 2026-04-09T12:55:00Z
6
value 0.0388
scoring_system epss
scoring_elements 0.88252
published_at 2026-04-11T12:55:00Z
7
value 0.0388
scoring_system epss
scoring_elements 0.88245
published_at 2026-04-13T12:55:00Z
8
value 0.0388
scoring_system epss
scoring_elements 0.88259
published_at 2026-04-16T12:55:00Z
9
value 0.0388
scoring_system epss
scoring_elements 0.88257
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4894
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4894
fixed_packages
0
url pkg:deb/debian/wordpress@2.2.3-1?distro=trixie
purl pkg:deb/debian/wordpress@2.2.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.2.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-4894
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3e65-zd17-rqhy
31
url VCID-3f5q-3k4x-aue9
vulnerability_id VCID-3f5q-3k4x-aue9
summary The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in the REST API in WordPress 4.7.x before 4.7.2 does not require an integer identifier, which allows remote attackers to modify arbitrary pages via a request for wp-json/wp/v2/posts followed by a numeric value and a non-numeric value, as demonstrated by the wp-json/wp/v2/posts/123?id=123helloworld URI.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1001000
reference_id
reference_type
scores
0
value 0.78934
scoring_system epss
scoring_elements 0.99058
published_at 2026-04-21T12:55:00Z
1
value 0.78934
scoring_system epss
scoring_elements 0.99057
published_at 2026-04-18T12:55:00Z
2
value 0.78934
scoring_system epss
scoring_elements 0.99045
published_at 2026-04-01T12:55:00Z
3
value 0.78934
scoring_system epss
scoring_elements 0.99046
published_at 2026-04-02T12:55:00Z
4
value 0.78934
scoring_system epss
scoring_elements 0.9905
published_at 2026-04-04T12:55:00Z
5
value 0.78934
scoring_system epss
scoring_elements 0.99052
published_at 2026-04-07T12:55:00Z
6
value 0.78934
scoring_system epss
scoring_elements 0.99054
published_at 2026-04-08T12:55:00Z
7
value 0.78934
scoring_system epss
scoring_elements 0.99055
published_at 2026-04-11T12:55:00Z
8
value 0.78934
scoring_system epss
scoring_elements 0.99056
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1001000
1
reference_url https://blogs.akamai.com/2017/02/wordpress-web-api-vulnerability.html
reference_id
reference_type
scores
url https://blogs.akamai.com/2017/02/wordpress-web-api-vulnerability.html
2
reference_url https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html
reference_id
reference_type
scores
url https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html
3
reference_url https://codex.wordpress.org/Version_4.7.2
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.7.2
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1001000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1001000
5
reference_url https://gist.github.com/leonjza/2244eb15510a0687ed93160c623762ab
reference_id
reference_type
scores
url https://gist.github.com/leonjza/2244eb15510a0687ed93160c623762ab
6
reference_url https://github.com/WordPress/WordPress/commit/e357195ce303017d517aff944644a7a1232926f7
reference_id
reference_type
scores
url https://github.com/WordPress/WordPress/commit/e357195ce303017d517aff944644a7a1232926f7
7
reference_url https://make.wordpress.org/core/2017/02/01/disclosure-of-additional-security-fix-in-wordpress-4-7-2/
reference_id
reference_type
scores
url https://make.wordpress.org/core/2017/02/01/disclosure-of-additional-security-fix-in-wordpress-4-7-2/
8
reference_url https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/
9
reference_url http://www.openwall.com/lists/oss-security/2017/02/10/16
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/02/10/16
10
reference_url http://www.securitytracker.com/id/1037731
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1037731
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1001000
reference_id CVE-2017-1001000
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-1001000
fixed_packages
0
url pkg:deb/debian/wordpress@4.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.7.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-1001000
risk_score 10.0
exploitability 2.0
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3f5q-3k4x-aue9
32
url VCID-3m3b-wxjf-qfg4
vulnerability_id VCID-3m3b-wxjf-qfg4
summary Cross-site scripting (XSS) vulnerability in wp-admin/wp-blogs.php in Wordpress MU (WPMU) before 2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) s and (2) ip_address parameters.
references
0
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2008-September/064748.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2008-September/064748.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4671
reference_id
reference_type
scores
0
value 0.00813
scoring_system epss
scoring_elements 0.74295
published_at 2026-04-21T12:55:00Z
1
value 0.00813
scoring_system epss
scoring_elements 0.74209
published_at 2026-04-01T12:55:00Z
2
value 0.00813
scoring_system epss
scoring_elements 0.74214
published_at 2026-04-07T12:55:00Z
3
value 0.00813
scoring_system epss
scoring_elements 0.74241
published_at 2026-04-04T12:55:00Z
4
value 0.00813
scoring_system epss
scoring_elements 0.74246
published_at 2026-04-08T12:55:00Z
5
value 0.00813
scoring_system epss
scoring_elements 0.74261
published_at 2026-04-09T12:55:00Z
6
value 0.00813
scoring_system epss
scoring_elements 0.74283
published_at 2026-04-11T12:55:00Z
7
value 0.00813
scoring_system epss
scoring_elements 0.74263
published_at 2026-04-12T12:55:00Z
8
value 0.00813
scoring_system epss
scoring_elements 0.74256
published_at 2026-04-13T12:55:00Z
9
value 0.00813
scoring_system epss
scoring_elements 0.74294
published_at 2026-04-16T12:55:00Z
10
value 0.00813
scoring_system epss
scoring_elements 0.74303
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4671
2
reference_url http://secunia.com/advisories/32060
reference_id
reference_type
scores
url http://secunia.com/advisories/32060
3
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/45512
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/45512
4
reference_url http://www.securityfocus.com/bid/31482
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31482
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress_mu:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress_mu:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress_mu:1.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress_mu:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress_mu:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress_mu:1.2.2:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress_mu:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress_mu:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress_mu:1.2.3:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress_mu:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress_mu:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress_mu:1.3:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress_mu:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress_mu:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress_mu:1.3.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4671
reference_id CVE-2008-4671
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-4671
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/32444.txt
reference_id CVE-2008-4671;OSVDB-48635
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/32444.txt
13
reference_url https://www.securityfocus.com/bid/31482/info
reference_id CVE-2008-4671;OSVDB-48635
reference_type exploit
scores
url https://www.securityfocus.com/bid/31482/info
fixed_packages
0
url pkg:deb/debian/wordpress@0?distro=trixie
purl pkg:deb/debian/wordpress@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@0%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2008-4671
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3m3b-wxjf-qfg4
33
url VCID-3veg-k8v2-tyhr
vulnerability_id VCID-3veg-k8v2-tyhr
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17671
reference_id
reference_type
scores
0
value 0.66708
scoring_system epss
scoring_elements 0.98546
published_at 2026-04-18T12:55:00Z
1
value 0.66708
scoring_system epss
scoring_elements 0.98547
published_at 2026-04-21T12:55:00Z
2
value 0.66708
scoring_system epss
scoring_elements 0.98529
published_at 2026-04-01T12:55:00Z
3
value 0.66708
scoring_system epss
scoring_elements 0.98531
published_at 2026-04-02T12:55:00Z
4
value 0.66708
scoring_system epss
scoring_elements 0.98534
published_at 2026-04-04T12:55:00Z
5
value 0.66708
scoring_system epss
scoring_elements 0.98535
published_at 2026-04-07T12:55:00Z
6
value 0.66708
scoring_system epss
scoring_elements 0.98538
published_at 2026-04-08T12:55:00Z
7
value 0.66708
scoring_system epss
scoring_elements 0.9854
published_at 2026-04-09T12:55:00Z
8
value 0.66708
scoring_system epss
scoring_elements 0.98541
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17671
1
reference_url https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html
reference_id
reference_type
scores
url https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html
2
reference_url https://core.trac.wordpress.org/changeset/46474
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/46474
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
21
reference_url https://github.com/WordPress/WordPress/commit/f82ed753cf00329a5e41f2cb6dc521085136f308
reference_id
reference_type
scores
url https://github.com/WordPress/WordPress/commit/f82ed753cf00329a5e41f2cb6dc521085136f308
22
reference_url https://lists.debian.org/debian-lts-announce/2019/11/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/11/msg00000.html
23
reference_url https://seclists.org/bugtraq/2020/Jan/8
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2020/Jan/8
24
reference_url https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/
25
reference_url https://wpvulndb.com/vulnerabilities/9909
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/9909
26
reference_url https://www.debian.org/security/2020/dsa-4599
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4599
27
reference_url https://www.debian.org/security/2020/dsa-4677
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4677
28
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942459
reference_id 942459
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942459
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
33
reference_url https://0day.work/proof-of-concept-for-wordpress-5-2-3-viewing-unauthenticated-posts/
reference_id CVE-2019-17671
reference_type exploit
scores
url https://0day.work/proof-of-concept-for-wordpress-5-2-3-viewing-unauthenticated-posts/
34
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/47690.md
reference_id CVE-2019-17671
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/47690.md
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-17671
reference_id CVE-2019-17671
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-17671
fixed_packages
0
url pkg:deb/debian/wordpress@5.2.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.2.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.2.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2019-17671
risk_score 9.6
exploitability 2.0
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3veg-k8v2-tyhr
34
url VCID-46dk-a282-8bf9
vulnerability_id VCID-46dk-a282-8bf9
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5612
reference_id
reference_type
scores
0
value 0.01526
scoring_system epss
scoring_elements 0.81224
published_at 2026-04-01T12:55:00Z
1
value 0.01526
scoring_system epss
scoring_elements 0.81232
published_at 2026-04-02T12:55:00Z
2
value 0.01526
scoring_system epss
scoring_elements 0.81256
published_at 2026-04-04T12:55:00Z
3
value 0.01526
scoring_system epss
scoring_elements 0.81254
published_at 2026-04-07T12:55:00Z
4
value 0.01526
scoring_system epss
scoring_elements 0.81282
published_at 2026-04-08T12:55:00Z
5
value 0.01526
scoring_system epss
scoring_elements 0.81287
published_at 2026-04-13T12:55:00Z
6
value 0.01526
scoring_system epss
scoring_elements 0.81308
published_at 2026-04-11T12:55:00Z
7
value 0.01526
scoring_system epss
scoring_elements 0.81295
published_at 2026-04-12T12:55:00Z
8
value 0.01526
scoring_system epss
scoring_elements 0.81324
published_at 2026-04-16T12:55:00Z
9
value 0.01526
scoring_system epss
scoring_elements 0.81326
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5612
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5488
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5489
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5490
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5491
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5492
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5493
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5612
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=852767
reference_id 852767
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=852767
fixed_packages
0
url pkg:deb/debian/wordpress@4.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.7.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-5612
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-46dk-a282-8bf9
35
url VCID-47fm-x1rg-vbct
vulnerability_id VCID-47fm-x1rg-vbct
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31210
reference_id
reference_type
scores
0
value 0.00916
scoring_system epss
scoring_elements 0.75932
published_at 2026-04-21T12:55:00Z
1
value 0.00916
scoring_system epss
scoring_elements 0.75944
published_at 2026-04-16T12:55:00Z
2
value 0.00916
scoring_system epss
scoring_elements 0.75946
published_at 2026-04-18T12:55:00Z
3
value 0.00916
scoring_system epss
scoring_elements 0.75851
published_at 2026-04-02T12:55:00Z
4
value 0.00916
scoring_system epss
scoring_elements 0.75883
published_at 2026-04-04T12:55:00Z
5
value 0.00916
scoring_system epss
scoring_elements 0.75862
published_at 2026-04-07T12:55:00Z
6
value 0.00916
scoring_system epss
scoring_elements 0.75895
published_at 2026-04-08T12:55:00Z
7
value 0.00916
scoring_system epss
scoring_elements 0.75908
published_at 2026-04-09T12:55:00Z
8
value 0.00916
scoring_system epss
scoring_elements 0.75931
published_at 2026-04-11T12:55:00Z
9
value 0.00916
scoring_system epss
scoring_elements 0.75912
published_at 2026-04-12T12:55:00Z
10
value 0.00916
scoring_system epss
scoring_elements 0.75905
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31210
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39999
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5561
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31210
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31210
5
reference_url https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-x79f-xrjv-jx5r
reference_id GHSA-x79f-xrjv-jx5r
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-05T13:59:35Z/
url https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-x79f-xrjv-jx5r
fixed_packages
0
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@6.1.6%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.6%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.6%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.4.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.4.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.4.3%252Bdfsg1-1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2024-31210
risk_score 3.5
exploitability 0.5
weighted_severity 6.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-47fm-x1rg-vbct
36
url VCID-47he-853j-8qdn
vulnerability_id VCID-47he-853j-8qdn
summary WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. In affected versions output data of the function wp_die() can be leaked under certain conditions, which can include data like nonces. It can then be used to perform actions on your behalf. This has been patched in WordPress 5.8.1, along with any older affected versions via minor releases. It's strongly recommended that you keep auto-updates enabled to receive the fix.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39200
reference_id
reference_type
scores
0
value 0.01767
scoring_system epss
scoring_elements 0.82672
published_at 2026-04-21T12:55:00Z
1
value 0.01767
scoring_system epss
scoring_elements 0.82563
published_at 2026-04-01T12:55:00Z
2
value 0.01767
scoring_system epss
scoring_elements 0.82578
published_at 2026-04-02T12:55:00Z
3
value 0.01767
scoring_system epss
scoring_elements 0.82593
published_at 2026-04-04T12:55:00Z
4
value 0.01767
scoring_system epss
scoring_elements 0.82589
published_at 2026-04-07T12:55:00Z
5
value 0.01767
scoring_system epss
scoring_elements 0.82615
published_at 2026-04-08T12:55:00Z
6
value 0.01767
scoring_system epss
scoring_elements 0.82623
published_at 2026-04-09T12:55:00Z
7
value 0.01767
scoring_system epss
scoring_elements 0.82641
published_at 2026-04-11T12:55:00Z
8
value 0.01767
scoring_system epss
scoring_elements 0.82635
published_at 2026-04-12T12:55:00Z
9
value 0.01767
scoring_system epss
scoring_elements 0.82631
published_at 2026-04-13T12:55:00Z
10
value 0.01767
scoring_system epss
scoring_elements 0.82669
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39200
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39200
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=994060
reference_id 994060
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=994060
3
reference_url https://security.archlinux.org/AVG-2373
reference_id AVG-2373
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2373
fixed_packages
0
url pkg:deb/debian/wordpress@5.7.3%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.3%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.3%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@5.8.1%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.8.1%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.8.1%252Bdfsg1-1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2021-39200
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-47he-853j-8qdn
37
url VCID-4cs6-n1vc-13cd
vulnerability_id VCID-4cs6-n1vc-13cd
summary wordpress: multiple vulnerabilities
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2336.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2336.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2336
reference_id
reference_type
scores
0
value 0.02303
scoring_system epss
scoring_elements 0.84671
published_at 2026-04-01T12:55:00Z
1
value 0.02303
scoring_system epss
scoring_elements 0.84686
published_at 2026-04-02T12:55:00Z
2
value 0.02303
scoring_system epss
scoring_elements 0.84706
published_at 2026-04-04T12:55:00Z
3
value 0.02303
scoring_system epss
scoring_elements 0.84708
published_at 2026-04-07T12:55:00Z
4
value 0.02303
scoring_system epss
scoring_elements 0.8473
published_at 2026-04-08T12:55:00Z
5
value 0.02303
scoring_system epss
scoring_elements 0.84737
published_at 2026-04-09T12:55:00Z
6
value 0.02303
scoring_system epss
scoring_elements 0.84755
published_at 2026-04-11T12:55:00Z
7
value 0.02303
scoring_system epss
scoring_elements 0.84751
published_at 2026-04-12T12:55:00Z
8
value 0.02303
scoring_system epss
scoring_elements 0.84745
published_at 2026-04-13T12:55:00Z
9
value 0.02303
scoring_system epss
scoring_elements 0.84766
published_at 2026-04-21T12:55:00Z
10
value 0.02303
scoring_system epss
scoring_elements 0.84768
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2336
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2336
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2336
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=510745
reference_id 510745
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=510745
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=536724
reference_id 536724
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=536724
fixed_packages
0
url pkg:deb/debian/wordpress@2.8.3-1?distro=trixie
purl pkg:deb/debian/wordpress@2.8.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.8.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2009-2336
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4cs6-n1vc-13cd
38
url VCID-4eng-dut7-nqhw
vulnerability_id VCID-4eng-dut7-nqhw
summary WordPress 2.0.6, and 2.1Alpha 3 (SVN:4662), does not properly verify that the m parameter value has the string data type, which allows remote attackers to obtain sensitive information via an invalid m[] parameter, as demonstrated by obtaining the path, and obtaining certain SQL information such as the table prefix.
references
0
reference_url http://osvdb.org/33458
reference_id
reference_type
scores
url http://osvdb.org/33458
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0262
reference_id
reference_type
scores
0
value 0.00964
scoring_system epss
scoring_elements 0.76578
published_at 2026-04-21T12:55:00Z
1
value 0.00964
scoring_system epss
scoring_elements 0.76486
published_at 2026-04-01T12:55:00Z
2
value 0.00964
scoring_system epss
scoring_elements 0.7649
published_at 2026-04-02T12:55:00Z
3
value 0.00964
scoring_system epss
scoring_elements 0.76519
published_at 2026-04-04T12:55:00Z
4
value 0.00964
scoring_system epss
scoring_elements 0.76501
published_at 2026-04-07T12:55:00Z
5
value 0.00964
scoring_system epss
scoring_elements 0.76534
published_at 2026-04-08T12:55:00Z
6
value 0.00964
scoring_system epss
scoring_elements 0.76545
published_at 2026-04-13T12:55:00Z
7
value 0.00964
scoring_system epss
scoring_elements 0.76571
published_at 2026-04-11T12:55:00Z
8
value 0.00964
scoring_system epss
scoring_elements 0.76551
published_at 2026-04-12T12:55:00Z
9
value 0.00964
scoring_system epss
scoring_elements 0.76586
published_at 2026-04-16T12:55:00Z
10
value 0.00964
scoring_system epss
scoring_elements 0.7659
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0262
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0262
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0262
3
reference_url http://www.securityfocus.com/archive/1/456731/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/456731/100/0/threaded
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407289
reference_id 407289
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=407289
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:alpha_3:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1:alpha_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:alpha_3:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0262
reference_id CVE-2007-0262
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2007-0262
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.8-1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.8-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-0262
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4eng-dut7-nqhw
39
url VCID-4f6a-j9gu-k7f8
vulnerability_id VCID-4f6a-j9gu-k7f8
summary Unspecified vulnerability in akismet.php in Matt Mullenweg Akismet before 2.0.2, a WordPress plugin, has unknown impact and attack vectors.
references
0
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2007-May/062980.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2007-May/062980.html
1
reference_url http://michaeldaw.org/alerts/alert-140507/
reference_id
reference_type
scores
url http://michaeldaw.org/alerts/alert-140507/
2
reference_url http://michaeldaw.org/alerts/alerts-140507-1/
reference_id
reference_type
scores
url http://michaeldaw.org/alerts/alerts-140507-1/
3
reference_url http://osvdb.org/37290
reference_id
reference_type
scores
url http://osvdb.org/37290
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2714
reference_id
reference_type
scores
0
value 0.14939
scoring_system epss
scoring_elements 0.94574
published_at 2026-04-21T12:55:00Z
1
value 0.14939
scoring_system epss
scoring_elements 0.94516
published_at 2026-04-01T12:55:00Z
2
value 0.14939
scoring_system epss
scoring_elements 0.94523
published_at 2026-04-02T12:55:00Z
3
value 0.14939
scoring_system epss
scoring_elements 0.94531
published_at 2026-04-04T12:55:00Z
4
value 0.14939
scoring_system epss
scoring_elements 0.94533
published_at 2026-04-07T12:55:00Z
5
value 0.14939
scoring_system epss
scoring_elements 0.94543
published_at 2026-04-08T12:55:00Z
6
value 0.14939
scoring_system epss
scoring_elements 0.94548
published_at 2026-04-09T12:55:00Z
7
value 0.14939
scoring_system epss
scoring_elements 0.9455
published_at 2026-04-11T12:55:00Z
8
value 0.14939
scoring_system epss
scoring_elements 0.94553
published_at 2026-04-12T12:55:00Z
9
value 0.14939
scoring_system epss
scoring_elements 0.94552
published_at 2026-04-13T12:55:00Z
10
value 0.14939
scoring_system epss
scoring_elements 0.94565
published_at 2026-04-16T12:55:00Z
11
value 0.14939
scoring_system epss
scoring_elements 0.9457
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2714
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2714
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/34338
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/34338
7
reference_url http://www.securityfocus.com/bid/23965
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23965
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:matt_mullenweg:akismet:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:matt_mullenweg:akismet:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:matt_mullenweg:akismet:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2714
reference_id CVE-2007-2714
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-2714
10
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/30036.html
reference_id CVE-2007-2714;OSVDB-37290
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/30036.html
11
reference_url https://www.securityfocus.com/bid/23965/info
reference_id CVE-2007-2714;OSVDB-37290
reference_type exploit
scores
url https://www.securityfocus.com/bid/23965/info
fixed_packages
0
url pkg:deb/debian/wordpress@2.2-1?distro=trixie
purl pkg:deb/debian/wordpress@2.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-2714
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4f6a-j9gu-k7f8
40
url VCID-4g2n-5v12-yuff
vulnerability_id VCID-4g2n-5v12-yuff
summary Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Automattic WordPress allows Stored XSS.This issue affects WordPress: from 6.5 through 6.5.4, from 6.4 through 6.4.4, from 6.3 through 6.3.4, from 6.2 through 6.2.5, from 6.1 through 6.1.6, from 6.0 through 6.0.8, from 5.9 through 5.9.9.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31111
reference_id
reference_type
scores
0
value 0.00433
scoring_system epss
scoring_elements 0.62759
published_at 2026-04-21T12:55:00Z
1
value 0.00433
scoring_system epss
scoring_elements 0.62763
published_at 2026-04-11T12:55:00Z
2
value 0.00433
scoring_system epss
scoring_elements 0.62753
published_at 2026-04-12T12:55:00Z
3
value 0.00433
scoring_system epss
scoring_elements 0.6277
published_at 2026-04-16T12:55:00Z
4
value 0.00433
scoring_system epss
scoring_elements 0.62778
published_at 2026-04-18T12:55:00Z
5
value 0.00433
scoring_system epss
scoring_elements 0.62681
published_at 2026-04-02T12:55:00Z
6
value 0.00433
scoring_system epss
scoring_elements 0.62714
published_at 2026-04-04T12:55:00Z
7
value 0.00433
scoring_system epss
scoring_elements 0.62677
published_at 2026-04-07T12:55:00Z
8
value 0.00433
scoring_system epss
scoring_elements 0.62729
published_at 2026-04-13T12:55:00Z
9
value 0.00433
scoring_system epss
scoring_elements 0.62746
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31111
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31111
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074486
reference_id 1074486
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074486
3
reference_url https://wordpress.org/news/2024/06/wordpress-6-5-5/
reference_id wordpress-6-5-5
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T13:49:17Z/
url https://wordpress.org/news/2024/06/wordpress-6-5-5/
4
reference_url https://patchstack.com/database/vulnerability/wordpress/wordpress-wordpress-core-core-6-5-5-cross-site-scripting-xss-via-template-part-vulnerability?_s_id=cve
reference_id wordpress-wordpress-core-core-6-5-5-cross-site-scripting-xss-via-template-part-vulnerability?_s_id=cve
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-25T13:49:17Z/
url https://patchstack.com/database/vulnerability/wordpress/wordpress-wordpress-core-core-6-5-5-cross-site-scripting-xss-via-template-part-vulnerability?_s_id=cve
fixed_packages
0
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.14%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.14%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.14%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.5.5%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.5.5%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.5.5%252Bdfsg1-1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2024-31111
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4g2n-5v12-yuff
41
url VCID-4gpe-jspv-n7c7
vulnerability_id VCID-4gpe-jspv-n7c7
summary Directory traversal vulnerability in wp-db-backup.php in WordPress 2.0.3 and earlier allows remote attackers to read arbitrary files, delete arbitrary files, and cause a denial of service via a .. (dot dot) in the backup parameter in a wp-db-backup.php action to wp-admin/edit.php. NOTE: this might be the same as CVE-2006-5705.1.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0194
reference_id
reference_type
scores
0
value 0.00586
scoring_system epss
scoring_elements 0.69013
published_at 2026-04-01T12:55:00Z
1
value 0.00586
scoring_system epss
scoring_elements 0.6903
published_at 2026-04-02T12:55:00Z
2
value 0.00586
scoring_system epss
scoring_elements 0.69051
published_at 2026-04-04T12:55:00Z
3
value 0.00586
scoring_system epss
scoring_elements 0.69031
published_at 2026-04-07T12:55:00Z
4
value 0.00586
scoring_system epss
scoring_elements 0.69081
published_at 2026-04-08T12:55:00Z
5
value 0.00586
scoring_system epss
scoring_elements 0.69101
published_at 2026-04-09T12:55:00Z
6
value 0.00586
scoring_system epss
scoring_elements 0.69124
published_at 2026-04-11T12:55:00Z
7
value 0.00586
scoring_system epss
scoring_elements 0.69109
published_at 2026-04-12T12:55:00Z
8
value 0.00586
scoring_system epss
scoring_elements 0.69079
published_at 2026-04-13T12:55:00Z
9
value 0.00586
scoring_system epss
scoring_elements 0.69119
published_at 2026-04-16T12:55:00Z
10
value 0.00586
scoring_system epss
scoring_elements 0.69128
published_at 2026-04-18T12:55:00Z
11
value 0.00586
scoring_system epss
scoring_elements 0.69108
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0194
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0194
fixed_packages
0
url pkg:deb/debian/wordpress@2.1.0-1?distro=trixie
purl pkg:deb/debian/wordpress@2.1.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.1.0-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2008-0194
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4gpe-jspv-n7c7
42
url VCID-4h3z-2ypq-tyf1
vulnerability_id VCID-4h3z-2ypq-tyf1
summary Directory traversal vulnerability in tiny_mce_gzip.php in TinyMCE Compressor PHP before 1.06 allows remote attackers to read or include arbitrary files via a trailing null byte (%00) in the (1) theme, (2) language, (3) plugins, or (4) lang parameter.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-4600
reference_id
reference_type
scores
0
value 0.17865
scoring_system epss
scoring_elements 0.95153
published_at 2026-04-21T12:55:00Z
1
value 0.17865
scoring_system epss
scoring_elements 0.95105
published_at 2026-04-01T12:55:00Z
2
value 0.17865
scoring_system epss
scoring_elements 0.95116
published_at 2026-04-02T12:55:00Z
3
value 0.17865
scoring_system epss
scoring_elements 0.95117
published_at 2026-04-04T12:55:00Z
4
value 0.17865
scoring_system epss
scoring_elements 0.95119
published_at 2026-04-07T12:55:00Z
5
value 0.17865
scoring_system epss
scoring_elements 0.95126
published_at 2026-04-08T12:55:00Z
6
value 0.17865
scoring_system epss
scoring_elements 0.9513
published_at 2026-04-09T12:55:00Z
7
value 0.17865
scoring_system epss
scoring_elements 0.95136
published_at 2026-04-11T12:55:00Z
8
value 0.17865
scoring_system epss
scoring_elements 0.95138
published_at 2026-04-12T12:55:00Z
9
value 0.17865
scoring_system epss
scoring_elements 0.95141
published_at 2026-04-13T12:55:00Z
10
value 0.17865
scoring_system epss
scoring_elements 0.95149
published_at 2026-04-16T12:55:00Z
11
value 0.17865
scoring_system epss
scoring_elements 0.95152
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-4600
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4600
2
reference_url http://secunia.com/advisories/18262
reference_id
reference_type
scores
url http://secunia.com/advisories/18262
3
reference_url http://securityreason.com/securityalert/306
reference_id
reference_type
scores
url http://securityreason.com/securityalert/306
4
reference_url http://securitytracker.com/id?1015424
reference_id
reference_type
scores
url http://securitytracker.com/id?1015424
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/36736
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/36736
6
reference_url https://www.exploit-db.com/exploits/4441
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/4441
7
reference_url http://tinymce.moxiecode.com/punbb/viewtopic.php?id=2233
reference_id
reference_type
scores
url http://tinymce.moxiecode.com/punbb/viewtopic.php?id=2233
8
reference_url http://tinymce.moxiecode.com/punbb/viewtopic.php?id=2244
reference_id
reference_type
scores
url http://tinymce.moxiecode.com/punbb/viewtopic.php?id=2244
9
reference_url http://www.hardened-php.net/advisory_262005.111.html
reference_id
reference_type
scores
url http://www.hardened-php.net/advisory_262005.111.html
10
reference_url http://www.osvdb.org/22116
reference_id
reference_type
scores
url http://www.osvdb.org/22116
11
reference_url http://www.securityfocus.com/archive/1/420543/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/420543/100/0/threaded
12
reference_url http://www.securityfocus.com/bid/16083
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/16083
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moxiecode:tinymce_compressor_php:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moxiecode:tinymce_compressor_php:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moxiecode:tinymce_compressor_php:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-4600
reference_id CVE-2005-4600
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2005-4600
15
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/4441.txt
reference_id OSVDB-44920;CVE-2007-5055;OSVDB-44919;CVE-2007-5054;CVE-2007-5053;OSVDB-39586;OSVDB-39585;OSVDB-39584;OSVDB-39583;CVE-2005-4600;OSVDB-39582;OSVDB-22116
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/4441.txt
fixed_packages
0
url pkg:deb/debian/wordpress@2.5.1-3?distro=trixie
purl pkg:deb/debian/wordpress@2.5.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.5.1-3%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2005-4600
risk_score 10.0
exploitability 2.0
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4h3z-2ypq-tyf1
43
url VCID-4h9a-f492-cqgx
vulnerability_id VCID-4h9a-f492-cqgx
summary wp-admin/plugins.php in WordPress before 3.4.2, when the multisite feature is enabled, does not check for network-administrator privileges before performing a network-wide activation of an installed plugin, which might allow remote authenticated users to make unintended plugin changes by leveraging the Administrator role.
references
0
reference_url http://codex.wordpress.org/Version_3.4.2
reference_id
reference_type
scores
url http://codex.wordpress.org/Version_3.4.2
1
reference_url http://core.trac.wordpress.org/changeset?old_path=%2Ftags%2F3.4.1&old=21780&new_path=%2Ftags%2F3.4.2&new=21780#file42
reference_id
reference_type
scores
url http://core.trac.wordpress.org/changeset?old_path=%2Ftags%2F3.4.1&old=21780&new_path=%2Ftags%2F3.4.2&new=21780#file42
2
reference_url http://openwall.com/lists/oss-security/2012/09/13/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2012/09/13/4
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4422
reference_id
reference_type
scores
0
value 0.0024
scoring_system epss
scoring_elements 0.47319
published_at 2026-04-21T12:55:00Z
1
value 0.0024
scoring_system epss
scoring_elements 0.47256
published_at 2026-04-01T12:55:00Z
2
value 0.0024
scoring_system epss
scoring_elements 0.47293
published_at 2026-04-02T12:55:00Z
3
value 0.0024
scoring_system epss
scoring_elements 0.47312
published_at 2026-04-04T12:55:00Z
4
value 0.0024
scoring_system epss
scoring_elements 0.4726
published_at 2026-04-07T12:55:00Z
5
value 0.0024
scoring_system epss
scoring_elements 0.47314
published_at 2026-04-08T12:55:00Z
6
value 0.0024
scoring_system epss
scoring_elements 0.47311
published_at 2026-04-09T12:55:00Z
7
value 0.0024
scoring_system epss
scoring_elements 0.47336
published_at 2026-04-11T12:55:00Z
8
value 0.0024
scoring_system epss
scoring_elements 0.4731
published_at 2026-04-12T12:55:00Z
9
value 0.0024
scoring_system epss
scoring_elements 0.47317
published_at 2026-04-13T12:55:00Z
10
value 0.0024
scoring_system epss
scoring_elements 0.47375
published_at 2026-04-16T12:55:00Z
11
value 0.0024
scoring_system epss
scoring_elements 0.47369
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4422
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4422
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4422
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.2:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2:beta1:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4422
reference_id CVE-2012-4422
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-4422
fixed_packages
0
url pkg:deb/debian/wordpress@3.4.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.4.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.4.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2012-4422
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4h9a-f492-cqgx
44
url VCID-4p1q-h56b-1qhj
vulnerability_id VCID-4p1q-h56b-1qhj
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3438
reference_id
reference_type
scores
0
value 0.01607
scoring_system epss
scoring_elements 0.81677
published_at 2026-04-01T12:55:00Z
1
value 0.01607
scoring_system epss
scoring_elements 0.81688
published_at 2026-04-02T12:55:00Z
2
value 0.01607
scoring_system epss
scoring_elements 0.8171
published_at 2026-04-04T12:55:00Z
3
value 0.01607
scoring_system epss
scoring_elements 0.81707
published_at 2026-04-07T12:55:00Z
4
value 0.01607
scoring_system epss
scoring_elements 0.81734
published_at 2026-04-08T12:55:00Z
5
value 0.01607
scoring_system epss
scoring_elements 0.81739
published_at 2026-04-13T12:55:00Z
6
value 0.01607
scoring_system epss
scoring_elements 0.81758
published_at 2026-04-11T12:55:00Z
7
value 0.01607
scoring_system epss
scoring_elements 0.81745
published_at 2026-04-12T12:55:00Z
8
value 0.01607
scoring_system epss
scoring_elements 0.81777
published_at 2026-04-16T12:55:00Z
9
value 0.01607
scoring_system epss
scoring_elements 0.81778
published_at 2026-04-18T12:55:00Z
10
value 0.01607
scoring_system epss
scoring_elements 0.81781
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3438
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3438
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3439
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3439
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3440
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783347
reference_id 783347
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783347
fixed_packages
0
url pkg:deb/debian/wordpress@4.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2015-3438
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4p1q-h56b-1qhj
45
url VCID-4sv3-qgzg-eyhn
vulnerability_id VCID-4sv3-qgzg-eyhn
summary SQL injection vulnerability in xmlrpc (xmlrpc.php) in WordPress 2.1.2, and probably earlier, allows remote authenticated users to execute arbitrary SQL commands via a string parameter value in an XML RPC mt.setPostCategories method call, related to the post_id variable.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1897
reference_id
reference_type
scores
0
value 0.02585
scoring_system epss
scoring_elements 0.85602
published_at 2026-04-21T12:55:00Z
1
value 0.02585
scoring_system epss
scoring_elements 0.85506
published_at 2026-04-01T12:55:00Z
2
value 0.02585
scoring_system epss
scoring_elements 0.85518
published_at 2026-04-02T12:55:00Z
3
value 0.02585
scoring_system epss
scoring_elements 0.85535
published_at 2026-04-04T12:55:00Z
4
value 0.02585
scoring_system epss
scoring_elements 0.8554
published_at 2026-04-07T12:55:00Z
5
value 0.02585
scoring_system epss
scoring_elements 0.8556
published_at 2026-04-08T12:55:00Z
6
value 0.02585
scoring_system epss
scoring_elements 0.8557
published_at 2026-04-09T12:55:00Z
7
value 0.02585
scoring_system epss
scoring_elements 0.85585
published_at 2026-04-11T12:55:00Z
8
value 0.02585
scoring_system epss
scoring_elements 0.85582
published_at 2026-04-12T12:55:00Z
9
value 0.02585
scoring_system epss
scoring_elements 0.85577
published_at 2026-04-13T12:55:00Z
10
value 0.02585
scoring_system epss
scoring_elements 0.856
published_at 2026-04-16T12:55:00Z
11
value 0.02585
scoring_system epss
scoring_elements 0.85605
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1897
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1897
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1897
2
reference_url http://secunia.com/advisories/24751
reference_id
reference_type
scores
url http://secunia.com/advisories/24751
3
reference_url http://secunia.com/advisories/25108
reference_id
reference_type
scores
url http://secunia.com/advisories/25108
4
reference_url https://www.exploit-db.com/exploits/3656
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/3656
5
reference_url http://trac.wordpress.org/ticket/4091
reference_id
reference_type
scores
url http://trac.wordpress.org/ticket/4091
6
reference_url http://www.debian.org/security/2007/dsa-1285
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1285
7
reference_url http://www.notsosecure.com/folder2/2007/04/03/wordpress-212-xmlrpc-security-issues/
reference_id
reference_type
scores
url http://www.notsosecure.com/folder2/2007/04/03/wordpress-212-xmlrpc-security-issues/
8
reference_url http://www.securityfocus.com/bid/23294
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23294
9
reference_url http://www.vupen.com/english/advisories/2007/1245
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1245
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1897
reference_id CVE-2007-1897
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-1897
14
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/3656.pl
reference_id OSVDB-34351;CVE-2007-1897
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/3656.pl
fixed_packages
0
url pkg:deb/debian/wordpress@2.1.3-1?distro=trixie
purl pkg:deb/debian/wordpress@2.1.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.1.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-1897
risk_score 10.0
exploitability 2.0
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4sv3-qgzg-eyhn
46
url VCID-4ty5-fp9a-8qhg
vulnerability_id VCID-4ty5-fp9a-8qhg
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16781
reference_id
reference_type
scores
0
value 0.03486
scoring_system epss
scoring_elements 0.87522
published_at 2026-04-01T12:55:00Z
1
value 0.03486
scoring_system epss
scoring_elements 0.87533
published_at 2026-04-02T12:55:00Z
2
value 0.03486
scoring_system epss
scoring_elements 0.87546
published_at 2026-04-04T12:55:00Z
3
value 0.03486
scoring_system epss
scoring_elements 0.87548
published_at 2026-04-07T12:55:00Z
4
value 0.03486
scoring_system epss
scoring_elements 0.87567
published_at 2026-04-08T12:55:00Z
5
value 0.03486
scoring_system epss
scoring_elements 0.87574
published_at 2026-04-09T12:55:00Z
6
value 0.03486
scoring_system epss
scoring_elements 0.87585
published_at 2026-04-11T12:55:00Z
7
value 0.03486
scoring_system epss
scoring_elements 0.87581
published_at 2026-04-12T12:55:00Z
8
value 0.03486
scoring_system epss
scoring_elements 0.87577
published_at 2026-04-13T12:55:00Z
9
value 0.03486
scoring_system epss
scoring_elements 0.87592
published_at 2026-04-16T12:55:00Z
10
value 0.03486
scoring_system epss
scoring_elements 0.87593
published_at 2026-04-18T12:55:00Z
11
value 0.03486
scoring_system epss
scoring_elements 0.87591
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16781
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946905
reference_id 946905
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946905
fixed_packages
0
url pkg:deb/debian/wordpress@5.3.2%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.3.2%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.3.2%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2019-16781
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ty5-fp9a-8qhg
47
url VCID-532z-9qbb-dyfw
vulnerability_id VCID-532z-9qbb-dyfw
summary Insertion of Sensitive Information Into Sent Data vulnerability in WordPress allows Retrieve Embedded Sensitive Data. The WordPress Core security team is aware of the issue and is already working on a fix. This is a low-severity vulnerability. Contributor-level privileges required in order to exploit it. This issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-58246
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.11038
published_at 2026-04-02T12:55:00Z
1
value 0.00037
scoring_system epss
scoring_elements 0.11054
published_at 2026-04-11T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.11022
published_at 2026-04-12T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.11
published_at 2026-04-13T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.10856
published_at 2026-04-16T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.10869
published_at 2026-04-18T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.11099
published_at 2026-04-04T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.1092
published_at 2026-04-07T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.10997
published_at 2026-04-08T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.1105
published_at 2026-04-09T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.1197
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-58246
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58246
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58246
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117047
reference_id 1117047
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117047
3
reference_url https://wordpress.org/news/2025/09/wordpress-6-8-3-release/
reference_id wordpress-6-8-3-release
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T18:30:39Z/
url https://wordpress.org/news/2025/09/wordpress-6-8-3-release/
4
reference_url https://patchstack.com/database/wordpress/wordpress/wordpress/vulnerability/wordpress-wordpress-wordpress-6-8-2-sensitive-data-exposure-vulnerability?_s_id=cve
reference_id wordpress-wordpress-wordpress-6-8-2-sensitive-data-exposure-vulnerability?_s_id=cve
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T18:30:39Z/
url https://patchstack.com/database/wordpress/wordpress/wordpress/vulnerability/wordpress-wordpress-wordpress-6-8-2-sensitive-data-exposure-vulnerability?_s_id=cve
fixed_packages
0
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.14%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.14%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.14%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-1%3Fdistro=trixie
5
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2025-58246
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-532z-9qbb-dyfw
48
url VCID-5698-c229-bqc9
vulnerability_id VCID-5698-c229-bqc9
summary WordPress before 5.2.4 has a Server Side Request Forgery (SSRF) vulnerability because Windows paths are mishandled during certain validation of relative URLs.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17670
reference_id
reference_type
scores
0
value 0.0554
scoring_system epss
scoring_elements 0.90278
published_at 2026-04-21T12:55:00Z
1
value 0.0554
scoring_system epss
scoring_elements 0.90282
published_at 2026-04-18T12:55:00Z
2
value 0.0554
scoring_system epss
scoring_elements 0.90221
published_at 2026-04-01T12:55:00Z
3
value 0.0554
scoring_system epss
scoring_elements 0.90223
published_at 2026-04-02T12:55:00Z
4
value 0.0554
scoring_system epss
scoring_elements 0.90236
published_at 2026-04-04T12:55:00Z
5
value 0.0554
scoring_system epss
scoring_elements 0.90241
published_at 2026-04-07T12:55:00Z
6
value 0.0554
scoring_system epss
scoring_elements 0.90256
published_at 2026-04-08T12:55:00Z
7
value 0.0554
scoring_system epss
scoring_elements 0.90263
published_at 2026-04-09T12:55:00Z
8
value 0.0554
scoring_system epss
scoring_elements 0.90271
published_at 2026-04-11T12:55:00Z
9
value 0.0554
scoring_system epss
scoring_elements 0.9027
published_at 2026-04-12T12:55:00Z
10
value 0.0554
scoring_system epss
scoring_elements 0.90265
published_at 2026-04-13T12:55:00Z
11
value 0.0554
scoring_system epss
scoring_elements 0.90281
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17670
1
reference_url https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html
reference_id
reference_type
scores
url https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html
2
reference_url https://core.trac.wordpress.org/changeset/46472
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/46472
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17670
4
reference_url https://github.com/WordPress/WordPress/commit/9db44754b9e4044690a6c32fd74b9d5fe26b07b2
reference_id
reference_type
scores
url https://github.com/WordPress/WordPress/commit/9db44754b9e4044690a6c32fd74b9d5fe26b07b2
5
reference_url https://lists.debian.org/debian-lts-announce/2019/11/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/11/msg00000.html
6
reference_url https://lists.debian.org/debian-lts-announce/2020/09/msg00011.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/09/msg00011.html
7
reference_url https://lists.debian.org/debian-lts-announce/2022/10/msg00010.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2022/10/msg00010.html
8
reference_url https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/
9
reference_url https://wpvulndb.com/vulnerabilities/9912
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/9912
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942459
reference_id 942459
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942459
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-17670
reference_id CVE-2019-17670
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-17670
fixed_packages
0
url pkg:deb/debian/wordpress@5.2.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.2.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.2.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2019-17670
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5698-c229-bqc9
49
url VCID-56a2-3fcw-bkfg
vulnerability_id VCID-56a2-3fcw-bkfg
summary
A flaw in WordPress allows registered WordPress users to elevate
    privileges.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-3389
reference_id
reference_type
scores
0
value 0.01196
scoring_system epss
scoring_elements 0.78832
published_at 2026-04-01T12:55:00Z
1
value 0.01196
scoring_system epss
scoring_elements 0.78838
published_at 2026-04-02T12:55:00Z
2
value 0.01196
scoring_system epss
scoring_elements 0.78867
published_at 2026-04-04T12:55:00Z
3
value 0.01196
scoring_system epss
scoring_elements 0.7885
published_at 2026-04-07T12:55:00Z
4
value 0.01196
scoring_system epss
scoring_elements 0.78875
published_at 2026-04-08T12:55:00Z
5
value 0.01196
scoring_system epss
scoring_elements 0.78882
published_at 2026-04-09T12:55:00Z
6
value 0.01196
scoring_system epss
scoring_elements 0.78905
published_at 2026-04-11T12:55:00Z
7
value 0.01196
scoring_system epss
scoring_elements 0.78889
published_at 2026-04-12T12:55:00Z
8
value 0.01196
scoring_system epss
scoring_elements 0.7888
published_at 2026-04-13T12:55:00Z
9
value 0.01196
scoring_system epss
scoring_elements 0.78909
published_at 2026-04-16T12:55:00Z
10
value 0.01196
scoring_system epss
scoring_elements 0.78906
published_at 2026-04-18T12:55:00Z
11
value 0.01196
scoring_system epss
scoring_elements 0.78903
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-3389
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3389
2
reference_url https://security.gentoo.org/glsa/200608-19
reference_id GLSA-200608-19
reference_type
scores
url https://security.gentoo.org/glsa/200608-19
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.4-1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.4-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2006-3389
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-56a2-3fcw-bkfg
50
url VCID-5brn-syjs-d3dp
vulnerability_id VCID-5brn-syjs-d3dp
summary
Moodle vulnerable to Cross-site Scripting
Cross-site scripting (XSS) vulnerability in the fix_non_standard_entities function in the KSES HTML text cleaning library (weblib.php), as used in Moodle 1.8.x before 1.8.12 and 1.9.x before 1.9.8, allows remote attackers to inject arbitrary web script or HTML via crafted HTML entities.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
reference_id
reference_type
scores
0
value 1.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U
1
value LOW
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
1
reference_url http://moodle.org/security
reference_id
reference_type
scores
0
value 1.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U
1
value LOW
scoring_system generic_textual
scoring_elements
url http://moodle.org/security
2
reference_url http://moodle.org/security/
reference_id
reference_type
scores
url http://moodle.org/security/
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1619.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1619.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1619
reference_id
reference_type
scores
0
value 0.00254
scoring_system epss
scoring_elements 0.4884
published_at 2026-04-18T12:55:00Z
1
value 0.00254
scoring_system epss
scoring_elements 0.48791
published_at 2026-04-04T12:55:00Z
2
value 0.00254
scoring_system epss
scoring_elements 0.48745
published_at 2026-04-07T12:55:00Z
3
value 0.00254
scoring_system epss
scoring_elements 0.48799
published_at 2026-04-21T12:55:00Z
4
value 0.00254
scoring_system epss
scoring_elements 0.48796
published_at 2026-04-09T12:55:00Z
5
value 0.00254
scoring_system epss
scoring_elements 0.48814
published_at 2026-04-11T12:55:00Z
6
value 0.00254
scoring_system epss
scoring_elements 0.48788
published_at 2026-04-12T12:55:00Z
7
value 0.00254
scoring_system epss
scoring_elements 0.48795
published_at 2026-04-13T12:55:00Z
8
value 0.00254
scoring_system epss
scoring_elements 0.48844
published_at 2026-04-16T12:55:00Z
9
value 0.00254
scoring_system epss
scoring_elements 0.48726
published_at 2026-04-01T12:55:00Z
10
value 0.00254
scoring_system epss
scoring_elements 0.48765
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1619
5
reference_url https://github.com/moodle/moodle
reference_id
reference_type
scores
0
value 1.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/moodle/moodle
6
reference_url http://www.vupen.com/english/advisories/2010/1107
reference_id
reference_type
scores
0
value 1.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U
1
value LOW
scoring_system generic_textual
scoring_elements
url http://www.vupen.com/english/advisories/2010/1107
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=578811
reference_id 578811
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=578811
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.10:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.8.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.11:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.2:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.3:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.5:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.6:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.7:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.8:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.8.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.9:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.5:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.6:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.9.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.7:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1619
reference_id CVE-2010-1619
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 1.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U
2
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2010-1619
27
reference_url https://github.com/advisories/GHSA-hhxf-w8hj-43w6
reference_id GHSA-hhxf-w8hj-43w6
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-hhxf-w8hj-43w6
fixed_packages
0
url pkg:deb/debian/wordpress@0?distro=trixie
purl pkg:deb/debian/wordpress@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@0%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2010-1619, GHSA-hhxf-w8hj-43w6
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5brn-syjs-d3dp
51
url VCID-5d4e-5ngu-mfgy
vulnerability_id VCID-5d4e-5ngu-mfgy
summary
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The KSES text cleaning filter in lib/weblib.php in Moodle before 1.8.13 and 1.9.x before 1.9.9 does not properly handle vbscript URIs, which allows remote authenticated users to conduct cross-site scripting (XSS) attacks via HTML input.
references
0
reference_url http://cvs.moodle.org/moodle/lib/weblib.php?r1=1.812.2.114&r2=1.812.2.115
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://cvs.moodle.org/moodle/lib/weblib.php?r1=1.812.2.114&r2=1.812.2.115
1
reference_url http://cvs.moodle.org/moodle/lib/weblib.php?r1=1.970.2.171&r2=1.970.2.172
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://cvs.moodle.org/moodle/lib/weblib.php?r1=1.970.2.171&r2=1.970.2.172
2
reference_url http://docs.moodle.org/en/Moodle_1.8.13_release_notes
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://docs.moodle.org/en/Moodle_1.8.13_release_notes
3
reference_url http://docs.moodle.org/en/Moodle_1.9.9_release_notes
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://docs.moodle.org/en/Moodle_1.9.9_release_notes
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html
5
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html
6
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
8
reference_url http://moodle.org/mod/forum/discuss.php?d=152368
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://moodle.org/mod/forum/discuss.php?d=152368
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2230
reference_id
reference_type
scores
0
value 0.00396
scoring_system epss
scoring_elements 0.60408
published_at 2026-04-02T12:55:00Z
1
value 0.00396
scoring_system epss
scoring_elements 0.60494
published_at 2026-04-21T12:55:00Z
2
value 0.00396
scoring_system epss
scoring_elements 0.60505
published_at 2026-04-18T12:55:00Z
3
value 0.00396
scoring_system epss
scoring_elements 0.60496
published_at 2026-04-16T12:55:00Z
4
value 0.00396
scoring_system epss
scoring_elements 0.60455
published_at 2026-04-13T12:55:00Z
5
value 0.00396
scoring_system epss
scoring_elements 0.60403
published_at 2026-04-07T12:55:00Z
6
value 0.00396
scoring_system epss
scoring_elements 0.60435
published_at 2026-04-04T12:55:00Z
7
value 0.00396
scoring_system epss
scoring_elements 0.60475
published_at 2026-04-12T12:55:00Z
8
value 0.00396
scoring_system epss
scoring_elements 0.60488
published_at 2026-04-11T12:55:00Z
9
value 0.00396
scoring_system epss
scoring_elements 0.60468
published_at 2026-04-09T12:55:00Z
10
value 0.00396
scoring_system epss
scoring_elements 0.60452
published_at 2026-04-08T12:55:00Z
11
value 0.00396
scoring_system epss
scoring_elements 0.60332
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2230
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=605809
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=605809
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2230
12
reference_url http://secunia.com/advisories/40248
reference_id
reference_type
scores
url http://secunia.com/advisories/40248
13
reference_url http://secunia.com/advisories/40352
reference_id
reference_type
scores
url http://secunia.com/advisories/40352
14
reference_url https://github.com/moodle/moodle
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/moodle/moodle
15
reference_url https://github.com/moodle/moodle/commit/704c5dfed4f4531b6d74d19cfad573984e74885e
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/moodle/moodle/commit/704c5dfed4f4531b6d74d19cfad573984e74885e
16
reference_url https://web.archive.org/web/20100621005117/http://secunia.com/advisories/40248
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20100621005117/http://secunia.com/advisories/40248
17
reference_url https://web.archive.org/web/20100711044720/http://secunia.com/advisories/40352
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20100711044720/http://secunia.com/advisories/40352
18
reference_url http://tracker.moodle.org/browse/MDL-22042
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://tracker.moodle.org/browse/MDL-22042
19
reference_url http://www.openwall.com/lists/oss-security/2010/06/21/2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2010/06/21/2
20
reference_url http://www.vupen.com/english/advisories/2010/1530
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.vupen.com/english/advisories/2010/1530
21
reference_url http://www.vupen.com/english/advisories/2010/1571
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.vupen.com/english/advisories/2010/1571
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.1.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.2.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.2.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.3.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.3.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.3.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.3.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.3.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.4.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.4.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.4.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.4.4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.4.5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.5.0:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.5.0:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.5.0:beta:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.5.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.5.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.5.3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.6.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.6.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.6.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.6.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.6.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.6.5:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.6.6:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.6.7:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.6.8:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.7.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.7.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.7.3:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.7.4:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.7.5:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.7.6:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.10:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.8.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.11:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.2:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.3:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.4:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.5:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.6:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.7:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.8:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.8.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.9:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.1:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.2:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.3:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.4:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.5:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.6:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.9.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.7:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.9.8:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2230
reference_id CVE-2010-2230
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2010-2230
76
reference_url https://github.com/advisories/GHSA-3gm8-32vv-q8mp
reference_id GHSA-3gm8-32vv-q8mp
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3gm8-32vv-q8mp
fixed_packages
0
url pkg:deb/debian/wordpress@3.0.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.0.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.0.4%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2010-2230, GHSA-3gm8-32vv-q8mp
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5d4e-5ngu-mfgy
52
url VCID-5pv4-ff9z-r3hp
vulnerability_id VCID-5pv4-ff9z-r3hp
summary
WordPress is vulnerable to SQL injection, information disclosure, and
    cross-site scripting attacks.
references
0
reference_url http://marc.info/?l=full-disclosure&m=116722128631087&w=2
reference_id
reference_type
scores
url http://marc.info/?l=full-disclosure&m=116722128631087&w=2
1
reference_url http://michaeldaw.org/
reference_id
reference_type
scores
url http://michaeldaw.org/
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-6808
reference_id
reference_type
scores
0
value 0.03483
scoring_system epss
scoring_elements 0.87587
published_at 2026-04-21T12:55:00Z
1
value 0.03483
scoring_system epss
scoring_elements 0.87519
published_at 2026-04-01T12:55:00Z
2
value 0.03483
scoring_system epss
scoring_elements 0.87529
published_at 2026-04-02T12:55:00Z
3
value 0.03483
scoring_system epss
scoring_elements 0.87542
published_at 2026-04-04T12:55:00Z
4
value 0.03483
scoring_system epss
scoring_elements 0.87544
published_at 2026-04-07T12:55:00Z
5
value 0.03483
scoring_system epss
scoring_elements 0.87563
published_at 2026-04-08T12:55:00Z
6
value 0.03483
scoring_system epss
scoring_elements 0.8757
published_at 2026-04-09T12:55:00Z
7
value 0.03483
scoring_system epss
scoring_elements 0.87581
published_at 2026-04-11T12:55:00Z
8
value 0.03483
scoring_system epss
scoring_elements 0.87577
published_at 2026-04-12T12:55:00Z
9
value 0.03483
scoring_system epss
scoring_elements 0.87574
published_at 2026-04-13T12:55:00Z
10
value 0.03483
scoring_system epss
scoring_elements 0.87588
published_at 2026-04-16T12:55:00Z
11
value 0.03483
scoring_system epss
scoring_elements 0.87589
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-6808
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6808
4
reference_url http://secunia.com/advisories/23587
reference_id
reference_type
scores
url http://secunia.com/advisories/23587
5
reference_url http://secunia.com/advisories/23741
reference_id
reference_type
scores
url http://secunia.com/advisories/23741
6
reference_url http://security.gentoo.org/glsa/glsa-200701-10.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200701-10.xml
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/31133
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/31133
8
reference_url http://trac.wordpress.org/changeset/4665
reference_id
reference_type
scores
url http://trac.wordpress.org/changeset/4665
9
reference_url http://www.securityfocus.com/bid/21782
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/21782
10
reference_url http://www.vupen.com/english/advisories/2006/5191
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/5191
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=405299
reference_id 405299
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=405299
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2.1:beta_2:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.6.2.1:beta_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2.1:beta_2:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2:beta_2:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.6.2:beta_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2:beta_2:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-6808
reference_id CVE-2006-6808
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2006-6808
31
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/29356.txt
reference_id CVE-2006-6808;OSVDB-31578
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/29356.txt
32
reference_url https://www.securityfocus.com/bid/21782/info
reference_id CVE-2006-6808;OSVDB-31578
reference_type exploit
scores
url https://www.securityfocus.com/bid/21782/info
33
reference_url https://security.gentoo.org/glsa/200701-10
reference_id GLSA-200701-10
reference_type
scores
url https://security.gentoo.org/glsa/200701-10
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.6-1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.6-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2006-6808
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5pv4-ff9z-r3hp
53
url VCID-5q3r-v8z7-x3f8
vulnerability_id VCID-5q3r-v8z7-x3f8
summary The XML-RPC remote publishing interface in xmlrpc.php in WordPress before 3.0.3 does not properly check capabilities, which allows remote authenticated users to bypass intended access restrictions, and publish, edit, or delete posts, by leveraging the Author or Contributor role.
references
0
reference_url http://codex.wordpress.org/Version_3.0.3
reference_id
reference_type
scores
url http://codex.wordpress.org/Version_3.0.3
1
reference_url http://core.trac.wordpress.org/changeset/16803
reference_id
reference_type
scores
url http://core.trac.wordpress.org/changeset/16803
2
reference_url http://openwall.com/lists/oss-security/2012/09/14/10
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2012/09/14/10
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-5106
reference_id
reference_type
scores
0
value 0.00302
scoring_system epss
scoring_elements 0.53565
published_at 2026-04-21T12:55:00Z
1
value 0.00302
scoring_system epss
scoring_elements 0.53464
published_at 2026-04-01T12:55:00Z
2
value 0.00302
scoring_system epss
scoring_elements 0.53488
published_at 2026-04-02T12:55:00Z
3
value 0.00302
scoring_system epss
scoring_elements 0.53513
published_at 2026-04-04T12:55:00Z
4
value 0.00302
scoring_system epss
scoring_elements 0.53481
published_at 2026-04-07T12:55:00Z
5
value 0.00302
scoring_system epss
scoring_elements 0.53531
published_at 2026-04-08T12:55:00Z
6
value 0.00302
scoring_system epss
scoring_elements 0.53527
published_at 2026-04-09T12:55:00Z
7
value 0.00302
scoring_system epss
scoring_elements 0.53576
published_at 2026-04-11T12:55:00Z
8
value 0.00302
scoring_system epss
scoring_elements 0.53559
published_at 2026-04-12T12:55:00Z
9
value 0.00302
scoring_system epss
scoring_elements 0.53541
published_at 2026-04-13T12:55:00Z
10
value 0.00302
scoring_system epss
scoring_elements 0.53577
published_at 2026-04-16T12:55:00Z
11
value 0.00302
scoring_system epss
scoring_elements 0.53583
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-5106
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5106
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5106
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-5106
reference_id CVE-2010-5106
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-5106
fixed_packages
0
url pkg:deb/debian/wordpress@3.0.3-1?distro=trixie
purl pkg:deb/debian/wordpress@3.0.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.0.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2010-5106
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5q3r-v8z7-x3f8
54
url VCID-5v95-fhhm-33an
vulnerability_id VCID-5v95-fhhm-33an
summary WordPress 2.9 before 2.9.2 allows remote authenticated users to read trash posts from other authors via a direct request with a modified p parameter.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0682
reference_id
reference_type
scores
0
value 0.25421
scoring_system epss
scoring_elements 0.96177
published_at 2026-04-01T12:55:00Z
1
value 0.25421
scoring_system epss
scoring_elements 0.96185
published_at 2026-04-02T12:55:00Z
2
value 0.25421
scoring_system epss
scoring_elements 0.96193
published_at 2026-04-04T12:55:00Z
3
value 0.25421
scoring_system epss
scoring_elements 0.96196
published_at 2026-04-07T12:55:00Z
4
value 0.25421
scoring_system epss
scoring_elements 0.96206
published_at 2026-04-08T12:55:00Z
5
value 0.25421
scoring_system epss
scoring_elements 0.96209
published_at 2026-04-09T12:55:00Z
6
value 0.25421
scoring_system epss
scoring_elements 0.96213
published_at 2026-04-12T12:55:00Z
7
value 0.25421
scoring_system epss
scoring_elements 0.96215
published_at 2026-04-13T12:55:00Z
8
value 0.25421
scoring_system epss
scoring_elements 0.96223
published_at 2026-04-16T12:55:00Z
9
value 0.25421
scoring_system epss
scoring_elements 0.96227
published_at 2026-04-18T12:55:00Z
10
value 0.25421
scoring_system epss
scoring_elements 0.96228
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0682
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0682
2
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/11441.txt
reference_id CVE-2010-0682;OSVDB-62330
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/11441.txt
fixed_packages
0
url pkg:deb/debian/wordpress@2.9.2-1?distro=trixie
purl pkg:deb/debian/wordpress@2.9.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.9.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2010-0682
risk_score 0.4
exploitability 2.0
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5v95-fhhm-33an
55
url VCID-624m-hj1c-r3hq
vulnerability_id VCID-624m-hj1c-r3hq
summary Multiple cross-site scripting (XSS) vulnerabilities in WordPress 2.0.9 and earlier allow remote attackers to inject arbitrary web script or HTML via the popuptitle parameter to (1) wp-admin/post.php or (2) wp-admin/page-new.php.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0192
reference_id
reference_type
scores
0
value 0.02348
scoring_system epss
scoring_elements 0.84818
published_at 2026-04-01T12:55:00Z
1
value 0.02348
scoring_system epss
scoring_elements 0.84833
published_at 2026-04-02T12:55:00Z
2
value 0.02348
scoring_system epss
scoring_elements 0.84851
published_at 2026-04-04T12:55:00Z
3
value 0.02348
scoring_system epss
scoring_elements 0.84853
published_at 2026-04-07T12:55:00Z
4
value 0.02348
scoring_system epss
scoring_elements 0.84876
published_at 2026-04-08T12:55:00Z
5
value 0.02348
scoring_system epss
scoring_elements 0.84883
published_at 2026-04-09T12:55:00Z
6
value 0.02348
scoring_system epss
scoring_elements 0.84901
published_at 2026-04-11T12:55:00Z
7
value 0.02348
scoring_system epss
scoring_elements 0.849
published_at 2026-04-12T12:55:00Z
8
value 0.02348
scoring_system epss
scoring_elements 0.84894
published_at 2026-04-13T12:55:00Z
9
value 0.02348
scoring_system epss
scoring_elements 0.84915
published_at 2026-04-16T12:55:00Z
10
value 0.02348
scoring_system epss
scoring_elements 0.84916
published_at 2026-04-18T12:55:00Z
11
value 0.02348
scoring_system epss
scoring_elements 0.84914
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0192
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0192
2
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/30977.txt
reference_id CVE-2008-0192;OSVDB-40224
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/30977.txt
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/30978.txt
reference_id CVE-2008-0192;OSVDB-40225
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/30978.txt
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.10-1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.10-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2008-0192
risk_score null
exploitability 2.0
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-624m-hj1c-r3hq
56
url VCID-67jm-6jkk-1yaw
vulnerability_id VCID-67jm-6jkk-1yaw
summary Wordpress 1.5 and earlier allows remote attackers to obtain sensitive information via a direct request to files in (1) wp-content/themes/, (2) wp-includes/, or (3) wp-admin/, which reveal the path in an error message.
references
0
reference_url http://marc.info/?l=bugtraq&m=111661517716733&w=2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-16T18:41:43Z/
url http://marc.info/?l=bugtraq&m=111661517716733&w=2
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-1688
reference_id
reference_type
scores
0
value 0.00622
scoring_system epss
scoring_elements 0.70043
published_at 2026-04-02T12:55:00Z
1
value 0.00622
scoring_system epss
scoring_elements 0.70127
published_at 2026-04-21T12:55:00Z
2
value 0.00622
scoring_system epss
scoring_elements 0.70031
published_at 2026-04-01T12:55:00Z
3
value 0.00622
scoring_system epss
scoring_elements 0.70138
published_at 2026-04-16T12:55:00Z
4
value 0.00622
scoring_system epss
scoring_elements 0.70147
published_at 2026-04-18T12:55:00Z
5
value 0.00622
scoring_system epss
scoring_elements 0.70058
published_at 2026-04-04T12:55:00Z
6
value 0.00622
scoring_system epss
scoring_elements 0.70035
published_at 2026-04-07T12:55:00Z
7
value 0.00622
scoring_system epss
scoring_elements 0.70083
published_at 2026-04-08T12:55:00Z
8
value 0.00622
scoring_system epss
scoring_elements 0.70099
published_at 2026-04-09T12:55:00Z
9
value 0.00622
scoring_system epss
scoring_elements 0.70122
published_at 2026-04-11T12:55:00Z
10
value 0.00622
scoring_system epss
scoring_elements 0.70108
published_at 2026-04-12T12:55:00Z
11
value 0.00622
scoring_system epss
scoring_elements 0.70095
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-1688
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1688
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-1688
reference_id CVE-2005-1688
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2005-1688
fixed_packages
0
url pkg:deb/debian/wordpress@1.5.1-1?distro=trixie
purl pkg:deb/debian/wordpress@1.5.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@1.5.1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2005-1688
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-67jm-6jkk-1yaw
57
url VCID-6baf-6r3v-gub4
vulnerability_id VCID-6baf-6r3v-gub4
summary
Wordpress contains several cross-site scripting, cross-site request forgery
    and information leak vulnerabilities.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1409
reference_id
reference_type
scores
0
value 0.00582
scoring_system epss
scoring_elements 0.68883
published_at 2026-04-01T12:55:00Z
1
value 0.00582
scoring_system epss
scoring_elements 0.689
published_at 2026-04-02T12:55:00Z
2
value 0.00605
scoring_system epss
scoring_elements 0.69551
published_at 2026-04-07T12:55:00Z
3
value 0.00605
scoring_system epss
scoring_elements 0.69602
published_at 2026-04-08T12:55:00Z
4
value 0.00605
scoring_system epss
scoring_elements 0.69618
published_at 2026-04-09T12:55:00Z
5
value 0.00605
scoring_system epss
scoring_elements 0.69641
published_at 2026-04-21T12:55:00Z
6
value 0.00605
scoring_system epss
scoring_elements 0.69626
published_at 2026-04-12T12:55:00Z
7
value 0.00605
scoring_system epss
scoring_elements 0.69612
published_at 2026-04-13T12:55:00Z
8
value 0.00605
scoring_system epss
scoring_elements 0.69651
published_at 2026-04-16T12:55:00Z
9
value 0.00605
scoring_system epss
scoring_elements 0.6966
published_at 2026-04-18T12:55:00Z
10
value 0.00605
scoring_system epss
scoring_elements 0.69572
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1409
1
reference_url http://secunia.com/advisories/24566
reference_id
reference_type
scores
url http://secunia.com/advisories/24566
2
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/32881
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/32881
3
reference_url http://www.gentoo.org/security/en/glsa/glsa-200703-23.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200703-23.xml
4
reference_url http://www.securityfocus.com/archive/1/462230/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/462230/100/0/threaded
5
reference_url http://www.securityfocus.com/archive/1/462249/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/462249/100/0/threaded
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1409
reference_id CVE-2007-1409
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2007-1409
17
reference_url https://security.gentoo.org/glsa/200703-23
reference_id GLSA-200703-23
reference_type
scores
url https://security.gentoo.org/glsa/200703-23
fixed_packages
0
url pkg:deb/debian/wordpress@0?distro=trixie
purl pkg:deb/debian/wordpress@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@0%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-1409
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6baf-6r3v-gub4
58
url VCID-6cda-2819-puhp
vulnerability_id VCID-6cda-2819-puhp
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7168
reference_id
reference_type
scores
0
value 0.008
scoring_system epss
scoring_elements 0.74107
published_at 2026-04-18T12:55:00Z
1
value 0.008
scoring_system epss
scoring_elements 0.7401
published_at 2026-04-01T12:55:00Z
2
value 0.008
scoring_system epss
scoring_elements 0.74016
published_at 2026-04-02T12:55:00Z
3
value 0.008
scoring_system epss
scoring_elements 0.74043
published_at 2026-04-04T12:55:00Z
4
value 0.008
scoring_system epss
scoring_elements 0.74014
published_at 2026-04-07T12:55:00Z
5
value 0.008
scoring_system epss
scoring_elements 0.74047
published_at 2026-04-08T12:55:00Z
6
value 0.008
scoring_system epss
scoring_elements 0.74062
published_at 2026-04-09T12:55:00Z
7
value 0.008
scoring_system epss
scoring_elements 0.74084
published_at 2026-04-11T12:55:00Z
8
value 0.008
scoring_system epss
scoring_elements 0.74066
published_at 2026-04-12T12:55:00Z
9
value 0.008
scoring_system epss
scoring_elements 0.74059
published_at 2026-04-13T12:55:00Z
10
value 0.008
scoring_system epss
scoring_elements 0.74098
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7168
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4029
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6634
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6635
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7168
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7169
6
reference_url https://security.archlinux.org/ASA-201609-32
reference_id ASA-201609-32
reference_type
scores
url https://security.archlinux.org/ASA-201609-32
7
reference_url https://security.archlinux.org/AVG-39
reference_id AVG-39
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-39
fixed_packages
0
url pkg:deb/debian/wordpress@4.6.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.6.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.6.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2016-7168
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6cda-2819-puhp
59
url VCID-6d1g-aj3f-3kav
vulnerability_id VCID-6d1g-aj3f-3kav
summary Multiple cross-site scripting (XSS) vulnerabilities in the request_filesystem_credentials function in wp-admin/includes/file.php in WordPress before 3.0.2 allow remote servers to inject arbitrary web script or HTML by providing a crafted error message for a (1) FTP or (2) SSH connection attempt.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-5294
reference_id
reference_type
scores
0
value 0.00713
scoring_system epss
scoring_elements 0.72269
published_at 2026-04-01T12:55:00Z
1
value 0.00713
scoring_system epss
scoring_elements 0.72275
published_at 2026-04-02T12:55:00Z
2
value 0.00713
scoring_system epss
scoring_elements 0.72294
published_at 2026-04-04T12:55:00Z
3
value 0.00713
scoring_system epss
scoring_elements 0.7227
published_at 2026-04-07T12:55:00Z
4
value 0.00713
scoring_system epss
scoring_elements 0.72309
published_at 2026-04-08T12:55:00Z
5
value 0.00713
scoring_system epss
scoring_elements 0.72321
published_at 2026-04-09T12:55:00Z
6
value 0.00713
scoring_system epss
scoring_elements 0.72344
published_at 2026-04-11T12:55:00Z
7
value 0.00713
scoring_system epss
scoring_elements 0.72327
published_at 2026-04-12T12:55:00Z
8
value 0.00713
scoring_system epss
scoring_elements 0.72313
published_at 2026-04-13T12:55:00Z
9
value 0.00713
scoring_system epss
scoring_elements 0.72355
published_at 2026-04-16T12:55:00Z
10
value 0.00713
scoring_system epss
scoring_elements 0.72365
published_at 2026-04-18T12:55:00Z
11
value 0.00713
scoring_system epss
scoring_elements 0.72352
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-5294
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5294
fixed_packages
0
url pkg:deb/debian/wordpress@3.0.2-1?distro=trixie
purl pkg:deb/debian/wordpress@3.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.0.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2010-5294
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6d1g-aj3f-3kav
60
url VCID-6ejh-nyh8-gqar
vulnerability_id VCID-6ejh-nyh8-gqar
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10100
reference_id
reference_type
scores
0
value 0.06599
scoring_system epss
scoring_elements 0.91119
published_at 2026-04-01T12:55:00Z
1
value 0.06599
scoring_system epss
scoring_elements 0.91124
published_at 2026-04-02T12:55:00Z
2
value 0.06599
scoring_system epss
scoring_elements 0.91132
published_at 2026-04-04T12:55:00Z
3
value 0.06599
scoring_system epss
scoring_elements 0.9114
published_at 2026-04-07T12:55:00Z
4
value 0.06599
scoring_system epss
scoring_elements 0.91153
published_at 2026-04-08T12:55:00Z
5
value 0.06599
scoring_system epss
scoring_elements 0.91159
published_at 2026-04-09T12:55:00Z
6
value 0.06599
scoring_system epss
scoring_elements 0.91167
published_at 2026-04-11T12:55:00Z
7
value 0.06599
scoring_system epss
scoring_elements 0.91169
published_at 2026-04-13T12:55:00Z
8
value 0.06599
scoring_system epss
scoring_elements 0.91193
published_at 2026-04-18T12:55:00Z
9
value 0.06599
scoring_system epss
scoring_elements 0.91196
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10100
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10100
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10102
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=895034
reference_id 895034
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=895034
fixed_packages
0
url pkg:deb/debian/wordpress@4.9.5%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@4.9.5%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.9.5%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2018-10100
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6ejh-nyh8-gqar
61
url VCID-6j54-w242-hfce
vulnerability_id VCID-6j54-w242-hfce
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43504
reference_id
reference_type
scores
0
value 0.02857
scoring_system epss
scoring_elements 0.86256
published_at 2026-04-21T12:55:00Z
1
value 0.02857
scoring_system epss
scoring_elements 0.86247
published_at 2026-04-11T12:55:00Z
2
value 0.02857
scoring_system epss
scoring_elements 0.86245
published_at 2026-04-12T12:55:00Z
3
value 0.02857
scoring_system epss
scoring_elements 0.86241
published_at 2026-04-13T12:55:00Z
4
value 0.02857
scoring_system epss
scoring_elements 0.86258
published_at 2026-04-16T12:55:00Z
5
value 0.02857
scoring_system epss
scoring_elements 0.86263
published_at 2026-04-18T12:55:00Z
6
value 0.02857
scoring_system epss
scoring_elements 0.86189
published_at 2026-04-02T12:55:00Z
7
value 0.02857
scoring_system epss
scoring_elements 0.86202
published_at 2026-04-04T12:55:00Z
8
value 0.02857
scoring_system epss
scoring_elements 0.86203
published_at 2026-04-07T12:55:00Z
9
value 0.02857
scoring_system epss
scoring_elements 0.86222
published_at 2026-04-08T12:55:00Z
10
value 0.02857
scoring_system epss
scoring_elements 0.86233
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43504
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43497
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43500
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43504
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022575
reference_id 1022575
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022575
5
reference_url https://wordpress.org/download/
reference_id download
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:04:12Z/
url https://wordpress.org/download/
6
reference_url https://jvn.jp/en/jp/JVN09409909/index.html
reference_id index.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:04:12Z/
url https://jvn.jp/en/jp/JVN09409909/index.html
7
reference_url https://wordpress.org/news/2022/10/wordpress-6-0-3-security-release/
reference_id wordpress-6-0-3-security-release
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:04:12Z/
url https://wordpress.org/news/2022/10/wordpress-6-0-3-security-release/
fixed_packages
0
url pkg:deb/debian/wordpress@5.7.8%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.8%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.8%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.0.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.0.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.0.3%252Bdfsg1-1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2022-43504
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6j54-w242-hfce
62
url VCID-6jxp-68cd-37db
vulnerability_id VCID-6jxp-68cd-37db
summary Cross-site scripting (XSS) vulnerability in swfupload.swf in SWFupload 2.2.0.1 and earlier, as used in WordPress before 3.5.2, TinyMCE Image Manager 1.1 and earlier, and other products allows remote attackers to inject arbitrary web script or HTML via the buttonText parameter, a different vulnerability than CVE-2012-3414.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2399
reference_id
reference_type
scores
0
value 0.03082
scoring_system epss
scoring_elements 0.86711
published_at 2026-04-01T12:55:00Z
1
value 0.03082
scoring_system epss
scoring_elements 0.86722
published_at 2026-04-02T12:55:00Z
2
value 0.0427
scoring_system epss
scoring_elements 0.88801
published_at 2026-04-04T12:55:00Z
3
value 0.0427
scoring_system epss
scoring_elements 0.88804
published_at 2026-04-07T12:55:00Z
4
value 0.0427
scoring_system epss
scoring_elements 0.88821
published_at 2026-04-08T12:55:00Z
5
value 0.0427
scoring_system epss
scoring_elements 0.88826
published_at 2026-04-09T12:55:00Z
6
value 0.0427
scoring_system epss
scoring_elements 0.88838
published_at 2026-04-11T12:55:00Z
7
value 0.0427
scoring_system epss
scoring_elements 0.88834
published_at 2026-04-13T12:55:00Z
8
value 0.0427
scoring_system epss
scoring_elements 0.88847
published_at 2026-04-16T12:55:00Z
9
value 0.0427
scoring_system epss
scoring_elements 0.88845
published_at 2026-04-18T12:55:00Z
10
value 0.0427
scoring_system epss
scoring_elements 0.88842
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2399
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2399
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670124
reference_id 670124
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670124
fixed_packages
0
url pkg:deb/debian/wordpress@3.3.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.3.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.3.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2012-2399
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6jxp-68cd-37db
63
url VCID-6mkb-a89m-zfgs
vulnerability_id VCID-6mkb-a89m-zfgs
summary several
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4339
reference_id
reference_type
scores
0
value 0.00882
scoring_system epss
scoring_elements 0.7534
published_at 2026-04-01T12:55:00Z
1
value 0.00882
scoring_system epss
scoring_elements 0.75343
published_at 2026-04-02T12:55:00Z
2
value 0.00882
scoring_system epss
scoring_elements 0.75375
published_at 2026-04-04T12:55:00Z
3
value 0.00882
scoring_system epss
scoring_elements 0.75354
published_at 2026-04-07T12:55:00Z
4
value 0.00882
scoring_system epss
scoring_elements 0.75397
published_at 2026-04-08T12:55:00Z
5
value 0.00882
scoring_system epss
scoring_elements 0.75407
published_at 2026-04-09T12:55:00Z
6
value 0.00882
scoring_system epss
scoring_elements 0.75427
published_at 2026-04-11T12:55:00Z
7
value 0.00882
scoring_system epss
scoring_elements 0.75405
published_at 2026-04-12T12:55:00Z
8
value 0.00882
scoring_system epss
scoring_elements 0.75394
published_at 2026-04-13T12:55:00Z
9
value 0.00882
scoring_system epss
scoring_elements 0.75435
published_at 2026-04-16T12:55:00Z
10
value 0.00882
scoring_system epss
scoring_elements 0.75441
published_at 2026-04-18T12:55:00Z
11
value 0.00882
scoring_system epss
scoring_elements 0.7543
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4339
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4338
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4339
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4339
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5739
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722537
reference_id 722537
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722537
fixed_packages
0
url pkg:deb/debian/wordpress@3.6.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.6.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.6.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2013-4339
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6mkb-a89m-zfgs
64
url VCID-6npq-by6g-cqg8
vulnerability_id VCID-6npq-by6g-cqg8
summary WordPress before 2.2.2 allows remote attackers to redirect visitors to other websites and potentially obtain sensitive information via (1) the _wp_http_referer parameter to wp-pass.php, related to the wp_get_referer function in wp-includes/functions.php; and possibly other vectors related to (2) wp-includes/pluggable.php and (3) the wp_nonce_ays function in wp-includes/functions.php.
references
0
reference_url http://osvdb.org/40802
reference_id
reference_type
scores
url http://osvdb.org/40802
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3639
reference_id
reference_type
scores
0
value 0.01146
scoring_system epss
scoring_elements 0.7848
published_at 2026-04-21T12:55:00Z
1
value 0.01146
scoring_system epss
scoring_elements 0.78406
published_at 2026-04-01T12:55:00Z
2
value 0.01146
scoring_system epss
scoring_elements 0.78413
published_at 2026-04-02T12:55:00Z
3
value 0.01146
scoring_system epss
scoring_elements 0.78444
published_at 2026-04-04T12:55:00Z
4
value 0.01146
scoring_system epss
scoring_elements 0.78427
published_at 2026-04-07T12:55:00Z
5
value 0.01146
scoring_system epss
scoring_elements 0.78453
published_at 2026-04-08T12:55:00Z
6
value 0.01146
scoring_system epss
scoring_elements 0.78458
published_at 2026-04-09T12:55:00Z
7
value 0.01146
scoring_system epss
scoring_elements 0.78483
published_at 2026-04-11T12:55:00Z
8
value 0.01146
scoring_system epss
scoring_elements 0.78465
published_at 2026-04-12T12:55:00Z
9
value 0.01146
scoring_system epss
scoring_elements 0.78457
published_at 2026-04-13T12:55:00Z
10
value 0.01146
scoring_system epss
scoring_elements 0.78485
published_at 2026-04-16T12:55:00Z
11
value 0.01146
scoring_system epss
scoring_elements 0.78484
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3639
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3639
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3639
3
reference_url http://secunia.com/advisories/30013
reference_id
reference_type
scores
url http://secunia.com/advisories/30013
4
reference_url http://securityreason.com/securityalert/2869
reference_id
reference_type
scores
url http://securityreason.com/securityalert/2869
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/35272
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/35272
6
reference_url http://www.debian.org/security/2008/dsa-1564
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1564
7
reference_url http://www.securityfocus.com/archive/1/472885/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/472885/100/0/threaded
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3639
reference_id CVE-2007-3639
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2007-3639
fixed_packages
0
url pkg:deb/debian/wordpress@2.2.2-1?distro=trixie
purl pkg:deb/debian/wordpress@2.2.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.2.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-3639
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6npq-by6g-cqg8
65
url VCID-6rsq-xshv-bucw
vulnerability_id VCID-6rsq-xshv-bucw
summary Wordpress contains SQL injection and XSS vulnerabilities.
references
0
reference_url http://bugs.gentoo.org/show_bug.cgi?id=88926
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=88926
1
reference_url http://marc.info/?l=bugtraq&m=111661517716733&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=111661517716733&w=2
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-1687
reference_id
reference_type
scores
0
value 0.00837
scoring_system epss
scoring_elements 0.74694
published_at 2026-04-18T12:55:00Z
1
value 0.00837
scoring_system epss
scoring_elements 0.74604
published_at 2026-04-01T12:55:00Z
2
value 0.00837
scoring_system epss
scoring_elements 0.74608
published_at 2026-04-02T12:55:00Z
3
value 0.00837
scoring_system epss
scoring_elements 0.74635
published_at 2026-04-04T12:55:00Z
4
value 0.00837
scoring_system epss
scoring_elements 0.74609
published_at 2026-04-07T12:55:00Z
5
value 0.00837
scoring_system epss
scoring_elements 0.7464
published_at 2026-04-08T12:55:00Z
6
value 0.00837
scoring_system epss
scoring_elements 0.74654
published_at 2026-04-09T12:55:00Z
7
value 0.00837
scoring_system epss
scoring_elements 0.74677
published_at 2026-04-11T12:55:00Z
8
value 0.00837
scoring_system epss
scoring_elements 0.74657
published_at 2026-04-12T12:55:00Z
9
value 0.00837
scoring_system epss
scoring_elements 0.74649
published_at 2026-04-13T12:55:00Z
10
value 0.00837
scoring_system epss
scoring_elements 0.74686
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-1687
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1687
4
reference_url http://security.gentoo.org/glsa/glsa-200506-04.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200506-04.xml
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-1687
reference_id CVE-2005-1687
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-1687
7
reference_url https://security.gentoo.org/glsa/200506-04
reference_id GLSA-200506-04
reference_type
scores
url https://security.gentoo.org/glsa/200506-04
fixed_packages
0
url pkg:deb/debian/wordpress@1.5.1-1?distro=trixie
purl pkg:deb/debian/wordpress@1.5.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@1.5.1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2005-1687
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6rsq-xshv-bucw
66
url VCID-6tqn-qmx9-f3dc
vulnerability_id VCID-6tqn-qmx9-f3dc
summary wordpress delayed attack via cookies
references
0
reference_url http://bugs.debian.org/504771
reference_id
reference_type
scores
url http://bugs.debian.org/504771
1
reference_url http://openwall.com/lists/oss-security/2008/11/14/1
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2008/11/14/1
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5113.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5113.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5113
reference_id
reference_type
scores
0
value 0.00298
scoring_system epss
scoring_elements 0.53185
published_at 2026-04-21T12:55:00Z
1
value 0.00298
scoring_system epss
scoring_elements 0.53081
published_at 2026-04-01T12:55:00Z
2
value 0.00298
scoring_system epss
scoring_elements 0.53101
published_at 2026-04-02T12:55:00Z
3
value 0.00298
scoring_system epss
scoring_elements 0.53124
published_at 2026-04-04T12:55:00Z
4
value 0.00298
scoring_system epss
scoring_elements 0.53093
published_at 2026-04-07T12:55:00Z
5
value 0.00298
scoring_system epss
scoring_elements 0.53144
published_at 2026-04-08T12:55:00Z
6
value 0.00298
scoring_system epss
scoring_elements 0.53137
published_at 2026-04-09T12:55:00Z
7
value 0.00298
scoring_system epss
scoring_elements 0.53187
published_at 2026-04-11T12:55:00Z
8
value 0.00298
scoring_system epss
scoring_elements 0.53172
published_at 2026-04-12T12:55:00Z
9
value 0.00298
scoring_system epss
scoring_elements 0.53156
published_at 2026-04-13T12:55:00Z
10
value 0.00298
scoring_system epss
scoring_elements 0.53195
published_at 2026-04-16T12:55:00Z
11
value 0.00298
scoring_system epss
scoring_elements 0.53203
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5113
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5113
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5113
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/46698
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/46698
6
reference_url http://www.debian.org/security/2009/dsa-1871
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1871
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=471989
reference_id 471989
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=471989
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504771
reference_id 504771
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504771
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5113
reference_id CVE-2008-5113
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-5113
fixed_packages
0
url pkg:deb/debian/wordpress@2.5.1-10?distro=trixie
purl pkg:deb/debian/wordpress@2.5.1-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.5.1-10%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2008-5113
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6tqn-qmx9-f3dc
67
url VCID-6vg6-xewr-ryfv
vulnerability_id VCID-6vg6-xewr-ryfv
summary Direct code injection vulnerability in WordPress 1.5.1.3 and earlier allows remote attackers to execute arbitrary PHP code via the cache_lastpostdate[server] cookie.
references
0
reference_url http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0234.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0234.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-2612
reference_id
reference_type
scores
0
value 0.73416
scoring_system epss
scoring_elements 0.98806
published_at 2026-04-21T12:55:00Z
1
value 0.73416
scoring_system epss
scoring_elements 0.98787
published_at 2026-04-01T12:55:00Z
2
value 0.73416
scoring_system epss
scoring_elements 0.98788
published_at 2026-04-02T12:55:00Z
3
value 0.73416
scoring_system epss
scoring_elements 0.98791
published_at 2026-04-04T12:55:00Z
4
value 0.73416
scoring_system epss
scoring_elements 0.98794
published_at 2026-04-09T12:55:00Z
5
value 0.73416
scoring_system epss
scoring_elements 0.98795
published_at 2026-04-08T12:55:00Z
6
value 0.73416
scoring_system epss
scoring_elements 0.98797
published_at 2026-04-11T12:55:00Z
7
value 0.73416
scoring_system epss
scoring_elements 0.98798
published_at 2026-04-12T12:55:00Z
8
value 0.73416
scoring_system epss
scoring_elements 0.98799
published_at 2026-04-13T12:55:00Z
9
value 0.73416
scoring_system epss
scoring_elements 0.98803
published_at 2026-04-16T12:55:00Z
10
value 0.73416
scoring_system epss
scoring_elements 0.98804
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-2612
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2612
3
reference_url http://secunia.com/advisories/16386
reference_id
reference_type
scores
url http://secunia.com/advisories/16386
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=323040
reference_id 323040
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=323040
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-2612
reference_id CVE-2005-2612
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-2612
14
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/16895.rb
reference_id CVE-2005-2612;OSVDB-18672
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/16895.rb
fixed_packages
0
url pkg:deb/debian/wordpress@1.5.2-1?distro=trixie
purl pkg:deb/debian/wordpress@1.5.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@1.5.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2005-2612
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6vg6-xewr-ryfv
68
url VCID-6xna-bhaz-bbcm
vulnerability_id VCID-6xna-bhaz-bbcm
summary WordPress 2.0.2 through 2.0.5 allows remote attackers to obtain sensitive information via a direct request for (1) 404.php, (2) akismet.php, (3) archive.php, (4) archives.php, (5) attachment.php, (6) blogger.php, (7) comments.php, (8) comments-popup.php, (9) dotclear.php, (10) footer.php, (11) functions.php, (12) header.php, (13) hello.php, (14) wp-content/themes/default/index.php, (15) links.php, (16) livejournal.php, (17) mt.php, (18) page.php, (19) rss.php, (20) searchform.php, (21) search.php, (22) sidebar.php, (23) single.php, (24) textpattern.php, (25) upgrade-functions.php, (26) upgrade-schema.php, or (27) wp-db-backup.php, which reveal the path in various error messages. NOTE: another researcher has disputed the details of this report, stating that version 2.0.5 does not exist. NOTE: the admin-footer.php, admin-functions.php, default-filters.php, edit-form-advanced.php, edit-link-form.php, edit-page-form.php, kses.php, locale.php, rss-functions.php, template-loader.php, and wp-db.php vectors are already covered by CVE-2006-0986. The edit-form-comment.php, vars.php, and wp-settings.php vectors are already covered by CVE-2005-4463. The menu-header.php vector is already covered by CVE-2005-2110.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4743
reference_id
reference_type
scores
0
value 0.00856
scoring_system epss
scoring_elements 0.74925
published_at 2026-04-01T12:55:00Z
1
value 0.00856
scoring_system epss
scoring_elements 0.74928
published_at 2026-04-02T12:55:00Z
2
value 0.00856
scoring_system epss
scoring_elements 0.74957
published_at 2026-04-04T12:55:00Z
3
value 0.00856
scoring_system epss
scoring_elements 0.74931
published_at 2026-04-07T12:55:00Z
4
value 0.00856
scoring_system epss
scoring_elements 0.74965
published_at 2026-04-08T12:55:00Z
5
value 0.00856
scoring_system epss
scoring_elements 0.74977
published_at 2026-04-09T12:55:00Z
6
value 0.00856
scoring_system epss
scoring_elements 0.74999
published_at 2026-04-11T12:55:00Z
7
value 0.00856
scoring_system epss
scoring_elements 0.74978
published_at 2026-04-12T12:55:00Z
8
value 0.00856
scoring_system epss
scoring_elements 0.74968
published_at 2026-04-13T12:55:00Z
9
value 0.00856
scoring_system epss
scoring_elements 0.75005
published_at 2026-04-16T12:55:00Z
10
value 0.00856
scoring_system epss
scoring_elements 0.75012
published_at 2026-04-18T12:55:00Z
11
value 0.00856
scoring_system epss
scoring_elements 0.75002
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4743
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4743
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.5-0.1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.5-0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.5-0.1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2006-4743
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6xna-bhaz-bbcm
69
url VCID-722f-e2hf-xyc9
vulnerability_id VCID-722f-e2hf-xyc9
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5561
reference_id
reference_type
scores
0
value 0.53022
scoring_system epss
scoring_elements 0.97941
published_at 2026-04-02T12:55:00Z
1
value 0.53022
scoring_system epss
scoring_elements 0.97943
published_at 2026-04-04T12:55:00Z
2
value 0.53022
scoring_system epss
scoring_elements 0.97946
published_at 2026-04-07T12:55:00Z
3
value 0.53022
scoring_system epss
scoring_elements 0.97951
published_at 2026-04-08T12:55:00Z
4
value 0.53022
scoring_system epss
scoring_elements 0.97953
published_at 2026-04-09T12:55:00Z
5
value 0.53022
scoring_system epss
scoring_elements 0.97956
published_at 2026-04-11T12:55:00Z
6
value 0.53022
scoring_system epss
scoring_elements 0.97958
published_at 2026-04-12T12:55:00Z
7
value 0.53022
scoring_system epss
scoring_elements 0.97959
published_at 2026-04-13T12:55:00Z
8
value 0.53022
scoring_system epss
scoring_elements 0.97965
published_at 2026-04-21T12:55:00Z
9
value 0.53022
scoring_system epss
scoring_elements 0.97966
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5561
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39999
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5561
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31210
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31210
fixed_packages
0
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@6.1.6%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.6%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.6%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.3.2%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.3.2%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.3.2%252Bdfsg1-1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2023-5561
risk_score 0.2
exploitability 0.5
weighted_severity 0.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-722f-e2hf-xyc9
70
url VCID-7643-6738-v3g9
vulnerability_id VCID-7643-6738-v3g9
summary Cross-site scripting (XSS) vulnerability in wp-admin/edit-post-rows.php in WordPress 2.3 allows remote attackers to inject arbitrary web script or HTML via the posts_columns array parameter.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5710
reference_id
reference_type
scores
0
value 0.03339
scoring_system epss
scoring_elements 0.87245
published_at 2026-04-01T12:55:00Z
1
value 0.03339
scoring_system epss
scoring_elements 0.87255
published_at 2026-04-02T12:55:00Z
2
value 0.03339
scoring_system epss
scoring_elements 0.87271
published_at 2026-04-04T12:55:00Z
3
value 0.03339
scoring_system epss
scoring_elements 0.87268
published_at 2026-04-07T12:55:00Z
4
value 0.03339
scoring_system epss
scoring_elements 0.87288
published_at 2026-04-08T12:55:00Z
5
value 0.03339
scoring_system epss
scoring_elements 0.87296
published_at 2026-04-09T12:55:00Z
6
value 0.03339
scoring_system epss
scoring_elements 0.87309
published_at 2026-04-11T12:55:00Z
7
value 0.03339
scoring_system epss
scoring_elements 0.87303
published_at 2026-04-12T12:55:00Z
8
value 0.03339
scoring_system epss
scoring_elements 0.87299
published_at 2026-04-13T12:55:00Z
9
value 0.03339
scoring_system epss
scoring_elements 0.87313
published_at 2026-04-16T12:55:00Z
10
value 0.03339
scoring_system epss
scoring_elements 0.87318
published_at 2026-04-18T12:55:00Z
11
value 0.03339
scoring_system epss
scoring_elements 0.87312
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5710
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5710
2
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/30715.txt
reference_id CVE-2007-5710;OSVDB-38279
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/30715.txt
3
reference_url https://www.securityfocus.com/bid/26228/info
reference_id CVE-2007-5710;OSVDB-38279
reference_type exploit
scores
url https://www.securityfocus.com/bid/26228/info
fixed_packages
0
url pkg:deb/debian/wordpress@2.3.1-1?distro=trixie
purl pkg:deb/debian/wordpress@2.3.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.3.1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-5710
risk_score null
exploitability 2.0
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7643-6738-v3g9
71
url VCID-767p-btpd-tudb
vulnerability_id VCID-767p-btpd-tudb
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17669
reference_id
reference_type
scores
0
value 0.08377
scoring_system epss
scoring_elements 0.92321
published_at 2026-04-18T12:55:00Z
1
value 0.08377
scoring_system epss
scoring_elements 0.92322
published_at 2026-04-21T12:55:00Z
2
value 0.08377
scoring_system epss
scoring_elements 0.92274
published_at 2026-04-01T12:55:00Z
3
value 0.08377
scoring_system epss
scoring_elements 0.92281
published_at 2026-04-02T12:55:00Z
4
value 0.08377
scoring_system epss
scoring_elements 0.92287
published_at 2026-04-04T12:55:00Z
5
value 0.08377
scoring_system epss
scoring_elements 0.9229
published_at 2026-04-07T12:55:00Z
6
value 0.08377
scoring_system epss
scoring_elements 0.92301
published_at 2026-04-08T12:55:00Z
7
value 0.08377
scoring_system epss
scoring_elements 0.92305
published_at 2026-04-09T12:55:00Z
8
value 0.08377
scoring_system epss
scoring_elements 0.92311
published_at 2026-04-11T12:55:00Z
9
value 0.08377
scoring_system epss
scoring_elements 0.92312
published_at 2026-04-12T12:55:00Z
10
value 0.08377
scoring_system epss
scoring_elements 0.9231
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17669
1
reference_url https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html
reference_id
reference_type
scores
url https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html
2
reference_url https://core.trac.wordpress.org/changeset/46475
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/46475
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
21
reference_url https://github.com/WordPress/WordPress/commit/608d39faed63ea212b6c6cdf9fe2bef92e2120ea
reference_id
reference_type
scores
url https://github.com/WordPress/WordPress/commit/608d39faed63ea212b6c6cdf9fe2bef92e2120ea
22
reference_url https://lists.debian.org/debian-lts-announce/2019/11/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/11/msg00000.html
23
reference_url https://seclists.org/bugtraq/2020/Jan/8
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2020/Jan/8
24
reference_url https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/
25
reference_url https://wpvulndb.com/vulnerabilities/9912
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/9912
26
reference_url https://www.debian.org/security/2020/dsa-4599
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4599
27
reference_url https://www.debian.org/security/2020/dsa-4677
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4677
28
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942459
reference_id 942459
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942459
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-17669
reference_id CVE-2019-17669
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-17669
fixed_packages
0
url pkg:deb/debian/wordpress@5.2.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.2.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.2.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2019-17669
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-767p-btpd-tudb
72
url VCID-7dmm-cvtk-aydj
vulnerability_id VCID-7dmm-cvtk-aydj
summary wp-admin/admin-functions.php in Wordpress before 2.2.3 and Wordpress multi-user (MU) before 1.2.5a does not properly verify the unfiltered_html privilege, which allows remote attackers to conduct cross-site scripting (XSS) attacks via modified data to (1) post.php or (2) page.php with a no_filter field.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4893
reference_id
reference_type
scores
0
value 0.01545
scoring_system epss
scoring_elements 0.81327
published_at 2026-04-01T12:55:00Z
1
value 0.01545
scoring_system epss
scoring_elements 0.81337
published_at 2026-04-02T12:55:00Z
2
value 0.01545
scoring_system epss
scoring_elements 0.81359
published_at 2026-04-04T12:55:00Z
3
value 0.01545
scoring_system epss
scoring_elements 0.81357
published_at 2026-04-07T12:55:00Z
4
value 0.01545
scoring_system epss
scoring_elements 0.81386
published_at 2026-04-08T12:55:00Z
5
value 0.01545
scoring_system epss
scoring_elements 0.81391
published_at 2026-04-09T12:55:00Z
6
value 0.01545
scoring_system epss
scoring_elements 0.81413
published_at 2026-04-11T12:55:00Z
7
value 0.01545
scoring_system epss
scoring_elements 0.814
published_at 2026-04-12T12:55:00Z
8
value 0.01545
scoring_system epss
scoring_elements 0.81393
published_at 2026-04-13T12:55:00Z
9
value 0.01545
scoring_system epss
scoring_elements 0.8143
published_at 2026-04-18T12:55:00Z
10
value 0.01545
scoring_system epss
scoring_elements 0.81431
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4893
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4893
fixed_packages
0
url pkg:deb/debian/wordpress@2.2.3-1?distro=trixie
purl pkg:deb/debian/wordpress@2.2.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.2.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-4893
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7dmm-cvtk-aydj
73
url VCID-7fgf-juyy-fufk
vulnerability_id VCID-7fgf-juyy-fufk
summary Cross-site scripting (XSS) vulnerability in the CSRF protection scheme in WordPress before 2.0.6 allows remote attackers to inject arbitrary web script or HTML via a CSRF attack with an invalid token and quote characters or HTML tags in URL variable names, which are not properly handled when WordPress generates a new link to verify the request.
references
0
reference_url http://osvdb.org/33397
reference_id
reference_type
scores
url http://osvdb.org/33397
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0106
reference_id
reference_type
scores
0
value 0.02143
scoring_system epss
scoring_elements 0.84246
published_at 2026-04-21T12:55:00Z
1
value 0.02143
scoring_system epss
scoring_elements 0.84149
published_at 2026-04-01T12:55:00Z
2
value 0.02143
scoring_system epss
scoring_elements 0.84162
published_at 2026-04-02T12:55:00Z
3
value 0.02143
scoring_system epss
scoring_elements 0.8418
published_at 2026-04-04T12:55:00Z
4
value 0.02143
scoring_system epss
scoring_elements 0.84182
published_at 2026-04-07T12:55:00Z
5
value 0.02143
scoring_system epss
scoring_elements 0.84204
published_at 2026-04-08T12:55:00Z
6
value 0.02143
scoring_system epss
scoring_elements 0.8421
published_at 2026-04-09T12:55:00Z
7
value 0.02143
scoring_system epss
scoring_elements 0.84228
published_at 2026-04-11T12:55:00Z
8
value 0.02143
scoring_system epss
scoring_elements 0.84222
published_at 2026-04-12T12:55:00Z
9
value 0.02143
scoring_system epss
scoring_elements 0.84219
published_at 2026-04-13T12:55:00Z
10
value 0.02143
scoring_system epss
scoring_elements 0.8424
published_at 2026-04-16T12:55:00Z
11
value 0.02143
scoring_system epss
scoring_elements 0.84241
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0106
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0106
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0106
3
reference_url http://secunia.com/advisories/23595
reference_id
reference_type
scores
url http://secunia.com/advisories/23595
4
reference_url http://securityreason.com/securityalert/2114
reference_id
reference_type
scores
url http://securityreason.com/securityalert/2114
5
reference_url http://wordpress.org/development/2007/01/wordpress-206/
reference_id
reference_type
scores
url http://wordpress.org/development/2007/01/wordpress-206/
6
reference_url http://www.hardened-php.net/advisory_012007.140.html
reference_id
reference_type
scores
url http://www.hardened-php.net/advisory_012007.140.html
7
reference_url http://www.securityfocus.com/archive/1/456048/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/456048/100/0/threaded
8
reference_url http://www.securityfocus.com/bid/21893
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/21893
9
reference_url http://www.vupen.com/english/advisories/2007/0061
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0061
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=405691
reference_id 405691
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=405691
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0106
reference_id CVE-2007-0106
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-0106
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.6-1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.6-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-0106
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7fgf-juyy-fufk
74
url VCID-7gbk-16zv-j7f9
vulnerability_id VCID-7gbk-16zv-j7f9
summary WordPress before 4.4 makes it easier for remote attackers to predict password-recovery tokens via a brute-force approach.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-6412
reference_id
reference_type
scores
0
value 0.02444
scoring_system epss
scoring_elements 0.85112
published_at 2026-04-01T12:55:00Z
1
value 0.02444
scoring_system epss
scoring_elements 0.85125
published_at 2026-04-02T12:55:00Z
2
value 0.02444
scoring_system epss
scoring_elements 0.85142
published_at 2026-04-04T12:55:00Z
3
value 0.02444
scoring_system epss
scoring_elements 0.85145
published_at 2026-04-07T12:55:00Z
4
value 0.02444
scoring_system epss
scoring_elements 0.85167
published_at 2026-04-08T12:55:00Z
5
value 0.02444
scoring_system epss
scoring_elements 0.85175
published_at 2026-04-09T12:55:00Z
6
value 0.02444
scoring_system epss
scoring_elements 0.8519
published_at 2026-04-11T12:55:00Z
7
value 0.02444
scoring_system epss
scoring_elements 0.85187
published_at 2026-04-12T12:55:00Z
8
value 0.02444
scoring_system epss
scoring_elements 0.85184
published_at 2026-04-13T12:55:00Z
9
value 0.02444
scoring_system epss
scoring_elements 0.85205
published_at 2026-04-16T12:55:00Z
10
value 0.02444
scoring_system epss
scoring_elements 0.85207
published_at 2026-04-18T12:55:00Z
11
value 0.02444
scoring_system epss
scoring_elements 0.85206
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-6412
fixed_packages
0
url pkg:deb/debian/wordpress@0?distro=trixie
purl pkg:deb/debian/wordpress@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@0%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2014-6412
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7gbk-16zv-j7f9
75
url VCID-7hgx-yyw8-23cj
vulnerability_id VCID-7hgx-yyw8-23cj
summary The oEmbed protocol implementation in WordPress before 4.5.3 allows remote attackers to cause a denial of service via unspecified vectors.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5836
reference_id
reference_type
scores
0
value 0.07246
scoring_system epss
scoring_elements 0.91643
published_at 2026-04-21T12:55:00Z
1
value 0.07246
scoring_system epss
scoring_elements 0.91651
published_at 2026-04-16T12:55:00Z
2
value 0.07246
scoring_system epss
scoring_elements 0.91586
published_at 2026-04-01T12:55:00Z
3
value 0.07246
scoring_system epss
scoring_elements 0.91594
published_at 2026-04-02T12:55:00Z
4
value 0.07246
scoring_system epss
scoring_elements 0.916
published_at 2026-04-04T12:55:00Z
5
value 0.07246
scoring_system epss
scoring_elements 0.91608
published_at 2026-04-07T12:55:00Z
6
value 0.07246
scoring_system epss
scoring_elements 0.91621
published_at 2026-04-08T12:55:00Z
7
value 0.07246
scoring_system epss
scoring_elements 0.91627
published_at 2026-04-09T12:55:00Z
8
value 0.07246
scoring_system epss
scoring_elements 0.9163
published_at 2026-04-13T12:55:00Z
9
value 0.07246
scoring_system epss
scoring_elements 0.91633
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5836
1
reference_url https://codex.wordpress.org/Version_4.5.3
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.5.3
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5836
3
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00046.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00046.html
4
reference_url https://wordpress.org/news/2016/06/wordpress-4-5-3/
reference_id
reference_type
scores
url https://wordpress.org/news/2016/06/wordpress-4-5-3/
5
reference_url https://wpvulndb.com/vulnerabilities/8523
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8523
6
reference_url http://www.securityfocus.com/bid/91363
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91363
7
reference_url http://www.securitytracker.com/id/1036163
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036163
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5836
reference_id CVE-2016-5836
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-5836
fixed_packages
0
url pkg:deb/debian/wordpress@4.5.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.5.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.5.3%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2016-5836
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7hgx-yyw8-23cj
76
url VCID-7hh4-ex15-9uh9
vulnerability_id VCID-7hh4-ex15-9uh9
summary WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 does not prevent rendering for (1) admin or (2) login pages inside a frame in a third-party HTML document, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web site.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3127
reference_id
reference_type
scores
0
value 0.00263
scoring_system epss
scoring_elements 0.49677
published_at 2026-04-01T12:55:00Z
1
value 0.00263
scoring_system epss
scoring_elements 0.49708
published_at 2026-04-02T12:55:00Z
2
value 0.00263
scoring_system epss
scoring_elements 0.49736
published_at 2026-04-04T12:55:00Z
3
value 0.00263
scoring_system epss
scoring_elements 0.49688
published_at 2026-04-07T12:55:00Z
4
value 0.00263
scoring_system epss
scoring_elements 0.49743
published_at 2026-04-08T12:55:00Z
5
value 0.00263
scoring_system epss
scoring_elements 0.49737
published_at 2026-04-09T12:55:00Z
6
value 0.00263
scoring_system epss
scoring_elements 0.49755
published_at 2026-04-11T12:55:00Z
7
value 0.00263
scoring_system epss
scoring_elements 0.49727
published_at 2026-04-12T12:55:00Z
8
value 0.00263
scoring_system epss
scoring_elements 0.49728
published_at 2026-04-13T12:55:00Z
9
value 0.00263
scoring_system epss
scoring_elements 0.49775
published_at 2026-04-18T12:55:00Z
10
value 0.00263
scoring_system epss
scoring_elements 0.49748
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3127
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3127
fixed_packages
0
url pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.2.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2011-3127
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7hh4-ex15-9uh9
77
url VCID-7kjc-hwqu-wufc
vulnerability_id VCID-7kjc-hwqu-wufc
summary wp-login.php in WordPress allows remote attackers to redirect authenticated users to other websites and potentially obtain sensitive information via the redirect_to parameter.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1599
reference_id
reference_type
scores
0
value 0.01385
scoring_system epss
scoring_elements 0.80261
published_at 2026-04-01T12:55:00Z
1
value 0.01385
scoring_system epss
scoring_elements 0.80316
published_at 2026-04-09T12:55:00Z
2
value 0.01385
scoring_system epss
scoring_elements 0.80334
published_at 2026-04-11T12:55:00Z
3
value 0.01385
scoring_system epss
scoring_elements 0.8032
published_at 2026-04-12T12:55:00Z
4
value 0.01385
scoring_system epss
scoring_elements 0.80313
published_at 2026-04-13T12:55:00Z
5
value 0.01385
scoring_system epss
scoring_elements 0.80268
published_at 2026-04-02T12:55:00Z
6
value 0.01385
scoring_system epss
scoring_elements 0.80289
published_at 2026-04-04T12:55:00Z
7
value 0.01385
scoring_system epss
scoring_elements 0.80277
published_at 2026-04-07T12:55:00Z
8
value 0.01385
scoring_system epss
scoring_elements 0.80305
published_at 2026-04-08T12:55:00Z
9
value 0.01438
scoring_system epss
scoring_elements 0.80744
published_at 2026-04-18T12:55:00Z
10
value 0.01438
scoring_system epss
scoring_elements 0.80746
published_at 2026-04-21T12:55:00Z
11
value 0.01438
scoring_system epss
scoring_elements 0.80743
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1599
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1599
2
reference_url http://secunia.com/advisories/30960
reference_id
reference_type
scores
url http://secunia.com/advisories/30960
3
reference_url http://www.debian.org/security/2008/dsa-1601
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1601
4
reference_url http://www.metaeye.org/advisories/40
reference_id
reference_type
scores
url http://www.metaeye.org/advisories/40
5
reference_url http://www.securityfocus.com/archive/1/463291/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/463291/100/0/threaded
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437085
reference_id 437085
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437085
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1599
reference_id CVE-2007-1599
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-1599
fixed_packages
0
url pkg:deb/debian/wordpress@2.2.2-1?distro=trixie
purl pkg:deb/debian/wordpress@2.2.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.2.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-1599
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7kjc-hwqu-wufc
78
url VCID-7qy9-e4j5-6fdb
vulnerability_id VCID-7qy9-e4j5-6fdb
summary wp-trackback.php in WordPress 2.0.6 and earlier does not properly unset variables when the input data includes a numeric parameter with a value matching an alphanumeric parameter's hash value, which allows remote attackers to execute arbitrary SQL commands via the tb_id parameter. NOTE: it could be argued that this vulnerability is due to a bug in the unset PHP command (CVE-2006-3017) and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in WordPress.
references
0
reference_url http://osvdb.org/36860
reference_id
reference_type
scores
url http://osvdb.org/36860
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0233
reference_id
reference_type
scores
0
value 0.11179
scoring_system epss
scoring_elements 0.93522
published_at 2026-04-21T12:55:00Z
1
value 0.11179
scoring_system epss
scoring_elements 0.93458
published_at 2026-04-01T12:55:00Z
2
value 0.11179
scoring_system epss
scoring_elements 0.93466
published_at 2026-04-02T12:55:00Z
3
value 0.11179
scoring_system epss
scoring_elements 0.93473
published_at 2026-04-04T12:55:00Z
4
value 0.11179
scoring_system epss
scoring_elements 0.93474
published_at 2026-04-07T12:55:00Z
5
value 0.11179
scoring_system epss
scoring_elements 0.93481
published_at 2026-04-08T12:55:00Z
6
value 0.11179
scoring_system epss
scoring_elements 0.93485
published_at 2026-04-09T12:55:00Z
7
value 0.11179
scoring_system epss
scoring_elements 0.9349
published_at 2026-04-13T12:55:00Z
8
value 0.11179
scoring_system epss
scoring_elements 0.9351
published_at 2026-04-16T12:55:00Z
9
value 0.11179
scoring_system epss
scoring_elements 0.93516
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0233
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0233
3
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/31385
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/31385
4
reference_url https://www.exploit-db.com/exploits/3109
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/3109
5
reference_url http://www.securityfocus.com/bid/21983
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/21983
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2.1:beta_2:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.6.2.1:beta_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2.1:beta_2:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2:beta_2:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.6.2:beta_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2:beta_2:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0233
reference_id CVE-2007-0233
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-0233
26
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/3109.php
reference_id OSVDB-36860;CVE-2007-0233
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/3109.php
fixed_packages
0
url pkg:deb/debian/wordpress@2.1.0-1?distro=trixie
purl pkg:deb/debian/wordpress@2.1.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.1.0-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-0233
risk_score 10.0
exploitability 2.0
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7qy9-e4j5-6fdb
79
url VCID-7twj-axjh-rudj
vulnerability_id VCID-7twj-axjh-rudj
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17094
reference_id
reference_type
scores
0
value 0.06615
scoring_system epss
scoring_elements 0.9121
published_at 2026-04-21T12:55:00Z
1
value 0.06615
scoring_system epss
scoring_elements 0.91207
published_at 2026-04-18T12:55:00Z
2
value 0.06615
scoring_system epss
scoring_elements 0.91132
published_at 2026-04-01T12:55:00Z
3
value 0.06615
scoring_system epss
scoring_elements 0.91138
published_at 2026-04-02T12:55:00Z
4
value 0.06615
scoring_system epss
scoring_elements 0.91146
published_at 2026-04-04T12:55:00Z
5
value 0.06615
scoring_system epss
scoring_elements 0.91154
published_at 2026-04-07T12:55:00Z
6
value 0.06615
scoring_system epss
scoring_elements 0.91167
published_at 2026-04-08T12:55:00Z
7
value 0.06615
scoring_system epss
scoring_elements 0.91173
published_at 2026-04-09T12:55:00Z
8
value 0.06615
scoring_system epss
scoring_elements 0.91181
published_at 2026-04-11T12:55:00Z
9
value 0.06615
scoring_system epss
scoring_elements 0.91183
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17094
1
reference_url https://codex.wordpress.org/Version_4.9.1
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.9.1
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16510
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17091
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17093
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17094
7
reference_url https://github.com/WordPress/WordPress/commit/f1de7e42df29395c3314bf85bff3d1f4f90541de
reference_id
reference_type
scores
url https://github.com/WordPress/WordPress/commit/f1de7e42df29395c3314bf85bff3d1f4f90541de
8
reference_url https://lists.debian.org/debian-lts-announce/2017/12/msg00019.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/12/msg00019.html
9
reference_url https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
10
reference_url https://wpvulndb.com/vulnerabilities/8967
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8967
11
reference_url https://www.debian.org/security/2018/dsa-4090
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4090
12
reference_url http://www.securityfocus.com/bid/102024
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102024
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883314
reference_id 883314
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883314
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17094
reference_id CVE-2017-17094
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
1
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-17094
fixed_packages
0
url pkg:deb/debian/wordpress@4.9.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.9.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.9.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-17094
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7twj-axjh-rudj
80
url VCID-7wx9-apzc-qqar
vulnerability_id VCID-7wx9-apzc-qqar
summary wordpress: multiple vulnerabilities
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2334.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2334.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2334
reference_id
reference_type
scores
0
value 0.12303
scoring_system epss
scoring_elements 0.93825
published_at 2026-04-01T12:55:00Z
1
value 0.12303
scoring_system epss
scoring_elements 0.93834
published_at 2026-04-02T12:55:00Z
2
value 0.12303
scoring_system epss
scoring_elements 0.93844
published_at 2026-04-04T12:55:00Z
3
value 0.12303
scoring_system epss
scoring_elements 0.93847
published_at 2026-04-07T12:55:00Z
4
value 0.12303
scoring_system epss
scoring_elements 0.93855
published_at 2026-04-08T12:55:00Z
5
value 0.12303
scoring_system epss
scoring_elements 0.93859
published_at 2026-04-09T12:55:00Z
6
value 0.12303
scoring_system epss
scoring_elements 0.93864
published_at 2026-04-13T12:55:00Z
7
value 0.12303
scoring_system epss
scoring_elements 0.93886
published_at 2026-04-16T12:55:00Z
8
value 0.12303
scoring_system epss
scoring_elements 0.93892
published_at 2026-04-18T12:55:00Z
9
value 0.12303
scoring_system epss
scoring_elements 0.93893
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2334
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2334
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2334
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=510745
reference_id 510745
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=510745
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=536724
reference_id 536724
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=536724
5
reference_url http://corelabs.coresecurity.com/index.php?action=view&type=advisory&name=WordPress_Privileges_Unchecked
reference_id CVE-2009-2334;OSVDB-55712
reference_type exploit
scores
url http://corelabs.coresecurity.com/index.php?action=view&type=advisory&name=WordPress_Privileges_Unchecked
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/9110.txt
reference_id CVE-2009-2334;OSVDB-55712
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/9110.txt
fixed_packages
0
url pkg:deb/debian/wordpress@2.8.3-1?distro=trixie
purl pkg:deb/debian/wordpress@2.8.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.8.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2009-2334
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7wx9-apzc-qqar
81
url VCID-82ky-v2zx-53h4
vulnerability_id VCID-82ky-v2zx-53h4
summary WordPress before 2.0.5 does not properly store a profile containing a string representation of a serialized object, which allows remote authenticated users to cause a denial of service (application crash) via a string that represents a (1) malformed or (2) large serialized object, because the object triggers automatic unserialization for display.
references
0
reference_url http://bugs.gentoo.org/show_bug.cgi?id=153303
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T15:56:09Z/
url http://bugs.gentoo.org/show_bug.cgi?id=153303
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-6017
reference_id
reference_type
scores
0
value 0.02824
scoring_system epss
scoring_elements 0.8611
published_at 2026-04-02T12:55:00Z
1
value 0.02824
scoring_system epss
scoring_elements 0.86179
published_at 2026-04-21T12:55:00Z
2
value 0.02824
scoring_system epss
scoring_elements 0.861
published_at 2026-04-01T12:55:00Z
3
value 0.02824
scoring_system epss
scoring_elements 0.86157
published_at 2026-04-09T12:55:00Z
4
value 0.02824
scoring_system epss
scoring_elements 0.8617
published_at 2026-04-11T12:55:00Z
5
value 0.02824
scoring_system epss
scoring_elements 0.86169
published_at 2026-04-12T12:55:00Z
6
value 0.02824
scoring_system epss
scoring_elements 0.86165
published_at 2026-04-13T12:55:00Z
7
value 0.02824
scoring_system epss
scoring_elements 0.86182
published_at 2026-04-16T12:55:00Z
8
value 0.02824
scoring_system epss
scoring_elements 0.86187
published_at 2026-04-18T12:55:00Z
9
value 0.02824
scoring_system epss
scoring_elements 0.86126
published_at 2026-04-04T12:55:00Z
10
value 0.02824
scoring_system epss
scoring_elements 0.86125
published_at 2026-04-07T12:55:00Z
11
value 0.02824
scoring_system epss
scoring_elements 0.86145
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-6017
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6017
3
reference_url http://trac.wordpress.org/ticket/2591
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T15:56:09Z/
url http://trac.wordpress.org/ticket/2591
4
reference_url http://www.gentoo.org/security/en/glsa/glsa-200611-10.xml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T15:56:09Z/
url http://www.gentoo.org/security/en/glsa/glsa-200611-10.xml
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-6017
reference_id CVE-2006-6017
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2006-6017
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.5-0.1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.5-0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.5-0.1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2006-6017
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-82ky-v2zx-53h4
82
url VCID-8hdt-8gc7-4kgg
vulnerability_id VCID-8hdt-8gc7-4kgg
summary wp-admin/media-upload.php in WordPress before 3.3.3 allows remote attackers to obtain sensitive information or bypass intended media-attachment restrictions via a post_id value.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6634
reference_id
reference_type
scores
0
value 0.00807
scoring_system epss
scoring_elements 0.7412
published_at 2026-04-01T12:55:00Z
1
value 0.00807
scoring_system epss
scoring_elements 0.74126
published_at 2026-04-02T12:55:00Z
2
value 0.00807
scoring_system epss
scoring_elements 0.74152
published_at 2026-04-04T12:55:00Z
3
value 0.00807
scoring_system epss
scoring_elements 0.74123
published_at 2026-04-07T12:55:00Z
4
value 0.00807
scoring_system epss
scoring_elements 0.74156
published_at 2026-04-08T12:55:00Z
5
value 0.00807
scoring_system epss
scoring_elements 0.74171
published_at 2026-04-09T12:55:00Z
6
value 0.00807
scoring_system epss
scoring_elements 0.74192
published_at 2026-04-11T12:55:00Z
7
value 0.00807
scoring_system epss
scoring_elements 0.74174
published_at 2026-04-12T12:55:00Z
8
value 0.00807
scoring_system epss
scoring_elements 0.74168
published_at 2026-04-13T12:55:00Z
9
value 0.00807
scoring_system epss
scoring_elements 0.74205
published_at 2026-04-16T12:55:00Z
10
value 0.00807
scoring_system epss
scoring_elements 0.74215
published_at 2026-04-18T12:55:00Z
11
value 0.00807
scoring_system epss
scoring_elements 0.74206
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6634
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6634
fixed_packages
0
url pkg:deb/debian/wordpress@3.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.4%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2012-6634
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8hdt-8gc7-4kgg
83
url VCID-8kvg-dxb5-7uhx
vulnerability_id VCID-8kvg-dxb5-7uhx
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3439
reference_id
reference_type
scores
0
value 0.03125
scoring_system epss
scoring_elements 0.8679
published_at 2026-04-01T12:55:00Z
1
value 0.03125
scoring_system epss
scoring_elements 0.86801
published_at 2026-04-02T12:55:00Z
2
value 0.03125
scoring_system epss
scoring_elements 0.8682
published_at 2026-04-04T12:55:00Z
3
value 0.03125
scoring_system epss
scoring_elements 0.86813
published_at 2026-04-07T12:55:00Z
4
value 0.03125
scoring_system epss
scoring_elements 0.86833
published_at 2026-04-08T12:55:00Z
5
value 0.03125
scoring_system epss
scoring_elements 0.86842
published_at 2026-04-09T12:55:00Z
6
value 0.03125
scoring_system epss
scoring_elements 0.86855
published_at 2026-04-11T12:55:00Z
7
value 0.03125
scoring_system epss
scoring_elements 0.86851
published_at 2026-04-12T12:55:00Z
8
value 0.03125
scoring_system epss
scoring_elements 0.86846
published_at 2026-04-13T12:55:00Z
9
value 0.03125
scoring_system epss
scoring_elements 0.86863
published_at 2026-04-16T12:55:00Z
10
value 0.03125
scoring_system epss
scoring_elements 0.86868
published_at 2026-04-18T12:55:00Z
11
value 0.03125
scoring_system epss
scoring_elements 0.86869
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3439
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3438
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3439
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3439
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3440
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783347
reference_id 783347
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783347
fixed_packages
0
url pkg:deb/debian/wordpress@4.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2015-3439
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8kvg-dxb5-7uhx
84
url VCID-8mat-2mjd-7fgm
vulnerability_id VCID-8mat-2mjd-7fgm
summary WordPress before 5.1.1 does not properly filter comment content, leading to Remote Code Execution by unauthenticated users in a default configuration. This occurs because CSRF protection is mishandled, and because Search Engine Optimization of A elements is performed incorrectly, leading to XSS. The XSS results in administrative access, which allows arbitrary changes to .php files. This is related to wp-admin/includes/ajax-actions.php and wp-includes/comment.php.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9787
reference_id
reference_type
scores
0
value 0.81017
scoring_system epss
scoring_elements 0.99157
published_at 2026-04-21T12:55:00Z
1
value 0.81017
scoring_system epss
scoring_elements 0.99155
published_at 2026-04-16T12:55:00Z
2
value 0.81017
scoring_system epss
scoring_elements 0.99146
published_at 2026-04-01T12:55:00Z
3
value 0.81017
scoring_system epss
scoring_elements 0.99147
published_at 2026-04-02T12:55:00Z
4
value 0.81017
scoring_system epss
scoring_elements 0.9915
published_at 2026-04-04T12:55:00Z
5
value 0.81017
scoring_system epss
scoring_elements 0.99153
published_at 2026-04-07T12:55:00Z
6
value 0.81017
scoring_system epss
scoring_elements 0.99154
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9787
1
reference_url https://blog.ripstech.com/2019/wordpress-csrf-to-rce/
reference_id
reference_type
scores
url https://blog.ripstech.com/2019/wordpress-csrf-to-rce/
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9787
3
reference_url https://github.com/WordPress/WordPress/commit/0292de60ec78c5a44956765189403654fe4d080b
reference_id
reference_type
scores
url https://github.com/WordPress/WordPress/commit/0292de60ec78c5a44956765189403654fe4d080b
4
reference_url https://lists.debian.org/debian-lts-announce/2019/03/msg00044.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/03/msg00044.html
5
reference_url https://wordpress.org/news/2019/03/wordpress-5-1-1-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2019/03/wordpress-5-1-1-security-and-maintenance-release/
6
reference_url https://wordpress.org/support/wordpress-version/version-5-1-1/
reference_id
reference_type
scores
url https://wordpress.org/support/wordpress-version/version-5-1-1/
7
reference_url https://wpvulndb.com/vulnerabilities/9230
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/9230
8
reference_url https://www.debian.org/security/2020/dsa-4677
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4677
9
reference_url http://www.securityfocus.com/bid/107411
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107411
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924546
reference_id 924546
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924546
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9787
reference_id CVE-2019-9787
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-9787
fixed_packages
0
url pkg:deb/debian/wordpress@5.1.1%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.1.1%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.1.1%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2019-9787
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8mat-2mjd-7fgm
85
url VCID-8ms9-r5pz-fkc3
vulnerability_id VCID-8ms9-r5pz-fkc3
summary security update
references
0
reference_url http://cgit.drupalcode.org/drupal/diff/includes/xmlrpc.inc?id=1849830
reference_id
reference_type
scores
url http://cgit.drupalcode.org/drupal/diff/includes/xmlrpc.inc?id=1849830
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5265
reference_id
reference_type
scores
0
value 0.07017
scoring_system epss
scoring_elements 0.91499
published_at 2026-04-21T12:55:00Z
1
value 0.07017
scoring_system epss
scoring_elements 0.9143
published_at 2026-04-01T12:55:00Z
2
value 0.07017
scoring_system epss
scoring_elements 0.91436
published_at 2026-04-02T12:55:00Z
3
value 0.07017
scoring_system epss
scoring_elements 0.91446
published_at 2026-04-04T12:55:00Z
4
value 0.07017
scoring_system epss
scoring_elements 0.91454
published_at 2026-04-07T12:55:00Z
5
value 0.07017
scoring_system epss
scoring_elements 0.91466
published_at 2026-04-08T12:55:00Z
6
value 0.07017
scoring_system epss
scoring_elements 0.91473
published_at 2026-04-09T12:55:00Z
7
value 0.07017
scoring_system epss
scoring_elements 0.91479
published_at 2026-04-13T12:55:00Z
8
value 0.07017
scoring_system epss
scoring_elements 0.91481
published_at 2026-04-12T12:55:00Z
9
value 0.07017
scoring_system epss
scoring_elements 0.91503
published_at 2026-04-16T12:55:00Z
10
value 0.07017
scoring_system epss
scoring_elements 0.91498
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5265
2
reference_url https://core.trac.wordpress.org/changeset/29404
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/29404
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2053
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5204
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5205
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5240
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5265
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5266
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5267
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5267
10
reference_url https://wordpress.org/news/2014/08/wordpress-3-9-2/
reference_id
reference_type
scores
url https://wordpress.org/news/2014/08/wordpress-3-9-2/
11
reference_url https://www.drupal.org/SA-CORE-2014-004
reference_id
reference_type
scores
url https://www.drupal.org/SA-CORE-2014-004
12
reference_url http://www.debian.org/security/2014/dsa-2999
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2999
13
reference_url http://www.debian.org/security/2014/dsa-3001
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3001
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757312
reference_id 757312
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757312
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:beta1:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.0:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:beta2:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.0:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:beta3:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.0:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:beta4:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:dev:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.0:dev:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:dev:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:rc1:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:rc2:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:rc3:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:rc4:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.10:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.11:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.12:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.13:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.14:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.15:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.16:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.17:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.18:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.19:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.20:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.21:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.22:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.23:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.24:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.25:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.26:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.27:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.28:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.29:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.30:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.31:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.32:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.8:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.9:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha1:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:alpha1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha1:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha2:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:alpha2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha2:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha3:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:alpha3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha3:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha4:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:alpha4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha4:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha5:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:alpha5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha5:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha6:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:alpha6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha6:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha7:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:alpha7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha7:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:beta1:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:beta2:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:beta3:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:dev:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:dev:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:dev:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:rc1:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:rc2:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:rc3:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:rc4:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.1:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.10:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.11:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.12:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.13:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.14:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.15:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.16:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.17:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.18:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.19:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.2:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.20:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.21:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.22:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.23:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.24:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.25:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.26:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.27:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.28:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.29:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.3:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.30:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.4:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.5:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.6:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.7:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.8:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.9:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.x-dev:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.x-dev:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.x-dev:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.2:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2:beta1:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.1:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.6:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.6.1:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.1:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.0:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-5265
reference_id CVE-2014-5265
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-5265
fixed_packages
0
url pkg:deb/debian/wordpress@3.9.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.9.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.9.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2014-5265
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8ms9-r5pz-fkc3
86
url VCID-8n5j-65xk-wqbp
vulnerability_id VCID-8n5j-65xk-wqbp
summary Wordpress before 2.8.3 does not check capabilities for certain actions, which allows remote attackers to make unauthorized edits or additions via a direct request to (1) edit-comments.php, (2) edit-pages.php, (3) edit.php, (4) edit-category-form.php, (5) edit-link-category-form.php, (6) edit-tag-form.php, (7) export.php, (8) import.php, or (9) link-add.php in wp-admin/.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2854
reference_id
reference_type
scores
0
value 0.01415
scoring_system epss
scoring_elements 0.80499
published_at 2026-04-01T12:55:00Z
1
value 0.01415
scoring_system epss
scoring_elements 0.80506
published_at 2026-04-02T12:55:00Z
2
value 0.01415
scoring_system epss
scoring_elements 0.80528
published_at 2026-04-04T12:55:00Z
3
value 0.01415
scoring_system epss
scoring_elements 0.80517
published_at 2026-04-07T12:55:00Z
4
value 0.01415
scoring_system epss
scoring_elements 0.80547
published_at 2026-04-08T12:55:00Z
5
value 0.01415
scoring_system epss
scoring_elements 0.80556
published_at 2026-04-09T12:55:00Z
6
value 0.01415
scoring_system epss
scoring_elements 0.80574
published_at 2026-04-11T12:55:00Z
7
value 0.01415
scoring_system epss
scoring_elements 0.80561
published_at 2026-04-12T12:55:00Z
8
value 0.01415
scoring_system epss
scoring_elements 0.80553
published_at 2026-04-13T12:55:00Z
9
value 0.01415
scoring_system epss
scoring_elements 0.80581
published_at 2026-04-16T12:55:00Z
10
value 0.01415
scoring_system epss
scoring_elements 0.80583
published_at 2026-04-18T12:55:00Z
11
value 0.01415
scoring_system epss
scoring_elements 0.80586
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2854
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2854
fixed_packages
0
url pkg:deb/debian/wordpress@2.8.3-1?distro=trixie
purl pkg:deb/debian/wordpress@2.8.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.8.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2009-2854
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8n5j-65xk-wqbp
87
url VCID-8rfd-k93s-qycc
vulnerability_id VCID-8rfd-k93s-qycc
summary Before version 4.8.2, WordPress was vulnerable to cross-site scripting in oEmbed discovery.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14724
reference_id
reference_type
scores
0
value 0.07679
scoring_system epss
scoring_elements 0.91918
published_at 2026-04-21T12:55:00Z
1
value 0.07679
scoring_system epss
scoring_elements 0.91921
published_at 2026-04-18T12:55:00Z
2
value 0.07679
scoring_system epss
scoring_elements 0.91866
published_at 2026-04-01T12:55:00Z
3
value 0.07679
scoring_system epss
scoring_elements 0.91874
published_at 2026-04-02T12:55:00Z
4
value 0.07679
scoring_system epss
scoring_elements 0.91881
published_at 2026-04-04T12:55:00Z
5
value 0.07679
scoring_system epss
scoring_elements 0.91888
published_at 2026-04-07T12:55:00Z
6
value 0.07679
scoring_system epss
scoring_elements 0.919
published_at 2026-04-08T12:55:00Z
7
value 0.07679
scoring_system epss
scoring_elements 0.91906
published_at 2026-04-09T12:55:00Z
8
value 0.07679
scoring_system epss
scoring_elements 0.91909
published_at 2026-04-12T12:55:00Z
9
value 0.07679
scoring_system epss
scoring_elements 0.91905
published_at 2026-04-13T12:55:00Z
10
value 0.07679
scoring_system epss
scoring_elements 0.91924
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14724
1
reference_url https://core.trac.wordpress.org/changeset/41448
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/41448
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14724
3
reference_url https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
4
reference_url https://wpvulndb.com/vulnerabilities/8913
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8913
5
reference_url https://www.debian.org/security/2017/dsa-3997
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3997
6
reference_url http://www.securityfocus.com/bid/100912
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100912
7
reference_url http://www.securitytracker.com/id/1039553
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039553
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876274
reference_id 876274
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876274
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-14724
reference_id CVE-2017-14724
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-14724
fixed_packages
0
url pkg:deb/debian/wordpress@4.8.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.8.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.8.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-14724
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8rfd-k93s-qycc
88
url VCID-8sa8-xkg1-ybbm
vulnerability_id VCID-8sa8-xkg1-ybbm
summary Multiple cross-site scripting (XSS) vulnerabilities in WordPress 2.2.1 allow remote authenticated administrators to inject arbitrary web script or HTML via (1) the Options Database Table in the Admin Panel, accessed through options.php; or (2) the opml_url parameter to link-import.php. NOTE: this might not cross privilege boundaries in some configurations, since the Administrator role has the unfiltered_html capability.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4153
reference_id
reference_type
scores
0
value 0.00507
scoring_system epss
scoring_elements 0.66172
published_at 2026-04-01T12:55:00Z
1
value 0.00507
scoring_system epss
scoring_elements 0.66212
published_at 2026-04-02T12:55:00Z
2
value 0.00507
scoring_system epss
scoring_elements 0.66239
published_at 2026-04-04T12:55:00Z
3
value 0.00507
scoring_system epss
scoring_elements 0.66209
published_at 2026-04-07T12:55:00Z
4
value 0.00507
scoring_system epss
scoring_elements 0.66257
published_at 2026-04-08T12:55:00Z
5
value 0.00507
scoring_system epss
scoring_elements 0.6627
published_at 2026-04-09T12:55:00Z
6
value 0.00507
scoring_system epss
scoring_elements 0.6629
published_at 2026-04-11T12:55:00Z
7
value 0.00507
scoring_system epss
scoring_elements 0.66277
published_at 2026-04-12T12:55:00Z
8
value 0.00507
scoring_system epss
scoring_elements 0.66246
published_at 2026-04-13T12:55:00Z
9
value 0.00507
scoring_system epss
scoring_elements 0.6628
published_at 2026-04-21T12:55:00Z
10
value 0.00507
scoring_system epss
scoring_elements 0.66296
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4153
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4153
fixed_packages
0
url pkg:deb/debian/wordpress@2.2.2-1?distro=trixie
purl pkg:deb/debian/wordpress@2.2.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.2.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-4153
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8sa8-xkg1-ybbm
89
url VCID-9166-twpv-u3a9
vulnerability_id VCID-9166-twpv-u3a9
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20150
reference_id
reference_type
scores
0
value 0.07368
scoring_system epss
scoring_elements 0.91679
published_at 2026-04-01T12:55:00Z
1
value 0.07368
scoring_system epss
scoring_elements 0.91687
published_at 2026-04-02T12:55:00Z
2
value 0.07368
scoring_system epss
scoring_elements 0.91693
published_at 2026-04-04T12:55:00Z
3
value 0.07368
scoring_system epss
scoring_elements 0.91702
published_at 2026-04-07T12:55:00Z
4
value 0.07368
scoring_system epss
scoring_elements 0.91714
published_at 2026-04-08T12:55:00Z
5
value 0.07368
scoring_system epss
scoring_elements 0.91721
published_at 2026-04-09T12:55:00Z
6
value 0.07368
scoring_system epss
scoring_elements 0.91724
published_at 2026-04-11T12:55:00Z
7
value 0.07368
scoring_system epss
scoring_elements 0.91726
published_at 2026-04-12T12:55:00Z
8
value 0.07368
scoring_system epss
scoring_elements 0.91722
published_at 2026-04-13T12:55:00Z
9
value 0.07368
scoring_system epss
scoring_elements 0.91743
published_at 2026-04-16T12:55:00Z
10
value 0.07368
scoring_system epss
scoring_elements 0.91735
published_at 2026-04-18T12:55:00Z
11
value 0.07368
scoring_system epss
scoring_elements 0.91737
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20150
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20148
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20149
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20150
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20151
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20152
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20153
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8942
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916403
reference_id 916403
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916403
fixed_packages
0
url pkg:deb/debian/wordpress@5.0.1%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.0.1%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.0.1%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2018-20150
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9166-twpv-u3a9
90
url VCID-91ay-j618-akgj
vulnerability_id VCID-91ay-j618-akgj
summary SQL injection vulnerability in xmlrpc.php in WordPress 2.2 allows remote authenticated users to execute arbitrary SQL commands via a parameter value in an XML RPC wp.suggestCategories methodCall, a different vector than CVE-2007-1897.
references
0
reference_url http://osvdb.org/36321
reference_id
reference_type
scores
url http://osvdb.org/36321
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3140
reference_id
reference_type
scores
0
value 0.02571
scoring_system epss
scoring_elements 0.85571
published_at 2026-04-21T12:55:00Z
1
value 0.02571
scoring_system epss
scoring_elements 0.85475
published_at 2026-04-01T12:55:00Z
2
value 0.02571
scoring_system epss
scoring_elements 0.85487
published_at 2026-04-02T12:55:00Z
3
value 0.02571
scoring_system epss
scoring_elements 0.85504
published_at 2026-04-04T12:55:00Z
4
value 0.02571
scoring_system epss
scoring_elements 0.85508
published_at 2026-04-07T12:55:00Z
5
value 0.02571
scoring_system epss
scoring_elements 0.85528
published_at 2026-04-08T12:55:00Z
6
value 0.02571
scoring_system epss
scoring_elements 0.85537
published_at 2026-04-09T12:55:00Z
7
value 0.02571
scoring_system epss
scoring_elements 0.85552
published_at 2026-04-11T12:55:00Z
8
value 0.02571
scoring_system epss
scoring_elements 0.8555
published_at 2026-04-12T12:55:00Z
9
value 0.02571
scoring_system epss
scoring_elements 0.85546
published_at 2026-04-13T12:55:00Z
10
value 0.02571
scoring_system epss
scoring_elements 0.8557
published_at 2026-04-16T12:55:00Z
11
value 0.02571
scoring_system epss
scoring_elements 0.85575
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3140
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3140
3
reference_url http://secunia.com/advisories/25552
reference_id
reference_type
scores
url http://secunia.com/advisories/25552
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/34746
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/34746
5
reference_url https://www.exploit-db.com/exploits/4039
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/4039
6
reference_url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.021.html
reference_id
reference_type
scores
url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.021.html
7
reference_url http://www.securityfocus.com/bid/24344
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24344
8
reference_url http://www.vupen.com/english/advisories/2007/2099
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2099
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=428073
reference_id 428073
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=428073
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3140
reference_id CVE-2007-3140
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-3140
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/4039.txt
reference_id OSVDB-36321;CVE-2007-3140
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/4039.txt
fixed_packages
0
url pkg:deb/debian/wordpress@2.2.1-1?distro=trixie
purl pkg:deb/debian/wordpress@2.2.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.2.1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-3140
risk_score 10.0
exploitability 2.0
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-91ay-j618-akgj
91
url VCID-92fa-nrxb-e3gj
vulnerability_id VCID-92fa-nrxb-e3gj
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28032
reference_id
reference_type
scores
0
value 0.25814
scoring_system epss
scoring_elements 0.96272
published_at 2026-04-21T12:55:00Z
1
value 0.25814
scoring_system epss
scoring_elements 0.96221
published_at 2026-04-01T12:55:00Z
2
value 0.25814
scoring_system epss
scoring_elements 0.96229
published_at 2026-04-02T12:55:00Z
3
value 0.25814
scoring_system epss
scoring_elements 0.96236
published_at 2026-04-04T12:55:00Z
4
value 0.25814
scoring_system epss
scoring_elements 0.9624
published_at 2026-04-07T12:55:00Z
5
value 0.25814
scoring_system epss
scoring_elements 0.96249
published_at 2026-04-08T12:55:00Z
6
value 0.25814
scoring_system epss
scoring_elements 0.96252
published_at 2026-04-09T12:55:00Z
7
value 0.25814
scoring_system epss
scoring_elements 0.96256
published_at 2026-04-12T12:55:00Z
8
value 0.25814
scoring_system epss
scoring_elements 0.96257
published_at 2026-04-13T12:55:00Z
9
value 0.25814
scoring_system epss
scoring_elements 0.96266
published_at 2026-04-16T12:55:00Z
10
value 0.25814
scoring_system epss
scoring_elements 0.96271
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28032
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562
reference_id 973562
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562
11
reference_url https://security.archlinux.org/ASA-202011-3
reference_id ASA-202011-3
reference_type
scores
url https://security.archlinux.org/ASA-202011-3
12
reference_url https://security.archlinux.org/AVG-1257
reference_id AVG-1257
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1257
fixed_packages
0
url pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.5.3%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2020-28032
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-92fa-nrxb-e3gj
92
url VCID-95zd-g97m-ekh3
vulnerability_id VCID-95zd-g97m-ekh3
summary
getID3 is vulnerable to XML External Entity (XXE)
getID3() before 1.9.9, as used in ownCloud Server before 5.0.15 and 6.0.x before 6.0.2, allows remote attackers to read arbitrary files, cause a denial of service, or possibly have other impact via an XML External Entity (XXE) attack.
references
0
reference_url http://getid3.sourceforge.net/source/changelog.txt
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://getid3.sourceforge.net/source/changelog.txt
1
reference_url http://owncloud.org/about/security/advisories/oC-SA-2014-006
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://owncloud.org/about/security/advisories/oC-SA-2014-006
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2053
reference_id
reference_type
scores
0
value 0.0197
scoring_system epss
scoring_elements 0.83546
published_at 2026-04-11T12:55:00Z
1
value 0.0197
scoring_system epss
scoring_elements 0.83531
published_at 2026-04-09T12:55:00Z
2
value 0.0197
scoring_system epss
scoring_elements 0.83521
published_at 2026-04-08T12:55:00Z
3
value 0.0197
scoring_system epss
scoring_elements 0.83497
published_at 2026-04-07T12:55:00Z
4
value 0.0197
scoring_system epss
scoring_elements 0.8347
published_at 2026-04-01T12:55:00Z
5
value 0.0197
scoring_system epss
scoring_elements 0.83483
published_at 2026-04-02T12:55:00Z
6
value 0.0197
scoring_system epss
scoring_elements 0.8354
published_at 2026-04-12T12:55:00Z
7
value 0.03481
scoring_system epss
scoring_elements 0.87584
published_at 2026-04-21T12:55:00Z
8
value 0.03481
scoring_system epss
scoring_elements 0.87571
published_at 2026-04-13T12:55:00Z
9
value 0.03481
scoring_system epss
scoring_elements 0.87585
published_at 2026-04-16T12:55:00Z
10
value 0.03481
scoring_system epss
scoring_elements 0.87586
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2053
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5204
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5205
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5240
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5265
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5266
9
reference_url http://secunia.com/advisories/58002
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://secunia.com/advisories/58002
10
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/james-heinrich/getid3/CVE-2014-2053.yaml
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/james-heinrich/getid3/CVE-2014-2053.yaml
11
reference_url https://github.com/JamesHeinrich/getID3
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/JamesHeinrich/getID3
12
reference_url https://github.com/JamesHeinrich/getID3/commit/afbdaa044a9a0a9dff2f800bd670e231b3ec99b2
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/JamesHeinrich/getID3/commit/afbdaa044a9a0a9dff2f800bd670e231b3ec99b2
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2053
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-2053
14
reference_url https://wordpress.org/news/2014/08/wordpress-3-9-2
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://wordpress.org/news/2014/08/wordpress-3-9-2
15
reference_url http://www.debian.org/security/2014/dsa-3001
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2014/dsa-3001
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757312
reference_id 757312
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757312
17
reference_url https://github.com/advisories/GHSA-5v43-55m5-qr8f
reference_id GHSA-5v43-55m5-qr8f
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5v43-55m5-qr8f
fixed_packages
0
url pkg:deb/debian/wordpress@3.9.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.9.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.9.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2014-2053, GHSA-5v43-55m5-qr8f
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-95zd-g97m-ekh3
93
url VCID-96pa-cg28-cbgy
vulnerability_id VCID-96pa-cg28-cbgy
summary Cross-site scripting (XSS) vulnerability in WordPress before 2.6, SVN development versions only, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3233
reference_id
reference_type
scores
0
value 0.0047
scoring_system epss
scoring_elements 0.64611
published_at 2026-04-21T12:55:00Z
1
value 0.0047
scoring_system epss
scoring_elements 0.64498
published_at 2026-04-01T12:55:00Z
2
value 0.0047
scoring_system epss
scoring_elements 0.64551
published_at 2026-04-02T12:55:00Z
3
value 0.0047
scoring_system epss
scoring_elements 0.6458
published_at 2026-04-04T12:55:00Z
4
value 0.0047
scoring_system epss
scoring_elements 0.64538
published_at 2026-04-07T12:55:00Z
5
value 0.0047
scoring_system epss
scoring_elements 0.64586
published_at 2026-04-08T12:55:00Z
6
value 0.0047
scoring_system epss
scoring_elements 0.64602
published_at 2026-04-09T12:55:00Z
7
value 0.0047
scoring_system epss
scoring_elements 0.6462
published_at 2026-04-11T12:55:00Z
8
value 0.0047
scoring_system epss
scoring_elements 0.64607
published_at 2026-04-12T12:55:00Z
9
value 0.0047
scoring_system epss
scoring_elements 0.64579
published_at 2026-04-13T12:55:00Z
10
value 0.0047
scoring_system epss
scoring_elements 0.64614
published_at 2026-04-16T12:55:00Z
11
value 0.0047
scoring_system epss
scoring_elements 0.64626
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3233
1
reference_url http://trac.wordpress.org/ticket/7220
reference_id
reference_type
scores
url http://trac.wordpress.org/ticket/7220
2
reference_url http://www.openwall.com/lists/oss-security/2008/07/15/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/07/15/5
3
reference_url http://www.openwall.com/lists/oss-security/2008/07/16/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/07/16/5
4
reference_url http://www.openwall.com/lists/oss-security/2008/07/16/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/07/16/6
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.6.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.711:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.711:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.711:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5-strayhorn:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5-strayhorn:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5-strayhorn:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.6:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.10_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10_rc1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10_rc2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.10_rc2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10_rc2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.3_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3_rc1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3_rc2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.3_rc2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3_rc2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2_revision5002:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2_revision5002:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2_revision5002:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2_revision5003:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2_revision5003:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2_revision5003:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3233
reference_id CVE-2008-3233
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-3233
60
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/32053.txt
reference_id CVE-2008-3233;OSVDB-47938
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/32053.txt
61
reference_url https://www.securityfocus.com/bid/30238/info
reference_id CVE-2008-3233;OSVDB-47938
reference_type exploit
scores
url https://www.securityfocus.com/bid/30238/info
fixed_packages
0
url pkg:deb/debian/wordpress@0?distro=trixie
purl pkg:deb/debian/wordpress@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@0%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2008-3233
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-96pa-cg28-cbgy
94
url VCID-98e3-ffna-jfbs
vulnerability_id VCID-98e3-ffna-jfbs
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17674
reference_id
reference_type
scores
0
value 0.02484
scoring_system epss
scoring_elements 0.85316
published_at 2026-04-21T12:55:00Z
1
value 0.02484
scoring_system epss
scoring_elements 0.85319
published_at 2026-04-18T12:55:00Z
2
value 0.02484
scoring_system epss
scoring_elements 0.85226
published_at 2026-04-01T12:55:00Z
3
value 0.02484
scoring_system epss
scoring_elements 0.85238
published_at 2026-04-02T12:55:00Z
4
value 0.02484
scoring_system epss
scoring_elements 0.85257
published_at 2026-04-04T12:55:00Z
5
value 0.02484
scoring_system epss
scoring_elements 0.85259
published_at 2026-04-07T12:55:00Z
6
value 0.02484
scoring_system epss
scoring_elements 0.85281
published_at 2026-04-08T12:55:00Z
7
value 0.02484
scoring_system epss
scoring_elements 0.85289
published_at 2026-04-09T12:55:00Z
8
value 0.02484
scoring_system epss
scoring_elements 0.85303
published_at 2026-04-11T12:55:00Z
9
value 0.02484
scoring_system epss
scoring_elements 0.85302
published_at 2026-04-12T12:55:00Z
10
value 0.02484
scoring_system epss
scoring_elements 0.85298
published_at 2026-04-13T12:55:00Z
11
value 0.02484
scoring_system epss
scoring_elements 0.85318
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17674
1
reference_url https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html
reference_id
reference_type
scores
url https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
20
reference_url https://seclists.org/bugtraq/2020/Jan/8
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2020/Jan/8
21
reference_url https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/
22
reference_url https://wpvulndb.com/vulnerabilities/9908
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/9908
23
reference_url https://www.debian.org/security/2020/dsa-4599
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4599
24
reference_url https://www.debian.org/security/2020/dsa-4677
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4677
25
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942459
reference_id 942459
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942459
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-17674
reference_id CVE-2019-17674
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
1
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-17674
fixed_packages
0
url pkg:deb/debian/wordpress@5.2.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.2.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.2.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2019-17674
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-98e3-ffna-jfbs
95
url VCID-9dcr-4f3a-myfs
vulnerability_id VCID-9dcr-4f3a-myfs
summary wp-includes/capabilities.php in WordPress before 3.0.2, when a Multisite configuration is used, does not require the Super Admin role for the delete_users capability, which allows remote authenticated administrators to bypass intended access restrictions via a delete action.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-5296
reference_id
reference_type
scores
0
value 0.00404
scoring_system epss
scoring_elements 0.6082
published_at 2026-04-01T12:55:00Z
1
value 0.00404
scoring_system epss
scoring_elements 0.60892
published_at 2026-04-02T12:55:00Z
2
value 0.00404
scoring_system epss
scoring_elements 0.60921
published_at 2026-04-04T12:55:00Z
3
value 0.00404
scoring_system epss
scoring_elements 0.60886
published_at 2026-04-07T12:55:00Z
4
value 0.00404
scoring_system epss
scoring_elements 0.60935
published_at 2026-04-08T12:55:00Z
5
value 0.00404
scoring_system epss
scoring_elements 0.60951
published_at 2026-04-09T12:55:00Z
6
value 0.00404
scoring_system epss
scoring_elements 0.60972
published_at 2026-04-21T12:55:00Z
7
value 0.00404
scoring_system epss
scoring_elements 0.60958
published_at 2026-04-12T12:55:00Z
8
value 0.00404
scoring_system epss
scoring_elements 0.6094
published_at 2026-04-13T12:55:00Z
9
value 0.00404
scoring_system epss
scoring_elements 0.60982
published_at 2026-04-16T12:55:00Z
10
value 0.00404
scoring_system epss
scoring_elements 0.60987
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-5296
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5296
fixed_packages
0
url pkg:deb/debian/wordpress@3.0.2-1?distro=trixie
purl pkg:deb/debian/wordpress@3.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.0.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2010-5296
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9dcr-4f3a-myfs
96
url VCID-9t3e-tq9t-7qay
vulnerability_id VCID-9t3e-tq9t-7qay
summary WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 allows remote attackers to determine usernames of non-authors via canonical redirects.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3126
reference_id
reference_type
scores
0
value 0.00969
scoring_system epss
scoring_elements 0.7656
published_at 2026-04-01T12:55:00Z
1
value 0.00969
scoring_system epss
scoring_elements 0.76565
published_at 2026-04-02T12:55:00Z
2
value 0.00969
scoring_system epss
scoring_elements 0.76594
published_at 2026-04-04T12:55:00Z
3
value 0.00969
scoring_system epss
scoring_elements 0.76575
published_at 2026-04-07T12:55:00Z
4
value 0.00969
scoring_system epss
scoring_elements 0.76607
published_at 2026-04-08T12:55:00Z
5
value 0.00969
scoring_system epss
scoring_elements 0.76618
published_at 2026-04-09T12:55:00Z
6
value 0.00969
scoring_system epss
scoring_elements 0.76645
published_at 2026-04-11T12:55:00Z
7
value 0.00969
scoring_system epss
scoring_elements 0.76624
published_at 2026-04-12T12:55:00Z
8
value 0.00969
scoring_system epss
scoring_elements 0.76615
published_at 2026-04-13T12:55:00Z
9
value 0.00969
scoring_system epss
scoring_elements 0.76656
published_at 2026-04-16T12:55:00Z
10
value 0.00969
scoring_system epss
scoring_elements 0.7666
published_at 2026-04-18T12:55:00Z
11
value 0.00969
scoring_system epss
scoring_elements 0.76648
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3126
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3126
fixed_packages
0
url pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.2.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2011-3126
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9t3e-tq9t-7qay
97
url VCID-9zbn-b1sp-buan
vulnerability_id VCID-9zbn-b1sp-buan
summary WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 treats unattached attachments as published, which might allow remote attackers to obtain sensitive data via vectors related to wp-includes/post.php.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3128
reference_id
reference_type
scores
0
value 0.01105
scoring_system epss
scoring_elements 0.78034
published_at 2026-04-01T12:55:00Z
1
value 0.01105
scoring_system epss
scoring_elements 0.78042
published_at 2026-04-02T12:55:00Z
2
value 0.01105
scoring_system epss
scoring_elements 0.78072
published_at 2026-04-04T12:55:00Z
3
value 0.01105
scoring_system epss
scoring_elements 0.78054
published_at 2026-04-07T12:55:00Z
4
value 0.01105
scoring_system epss
scoring_elements 0.7808
published_at 2026-04-08T12:55:00Z
5
value 0.01105
scoring_system epss
scoring_elements 0.78085
published_at 2026-04-09T12:55:00Z
6
value 0.01105
scoring_system epss
scoring_elements 0.78111
published_at 2026-04-11T12:55:00Z
7
value 0.01105
scoring_system epss
scoring_elements 0.78094
published_at 2026-04-12T12:55:00Z
8
value 0.01105
scoring_system epss
scoring_elements 0.78091
published_at 2026-04-13T12:55:00Z
9
value 0.01105
scoring_system epss
scoring_elements 0.78126
published_at 2026-04-16T12:55:00Z
10
value 0.01105
scoring_system epss
scoring_elements 0.78125
published_at 2026-04-18T12:55:00Z
11
value 0.01105
scoring_system epss
scoring_elements 0.78118
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3128
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3128
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3128
fixed_packages
0
url pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.2.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2011-3128
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9zbn-b1sp-buan
98
url VCID-aesj-sy6k-57de
vulnerability_id VCID-aesj-sy6k-57de
summary Cross-site scripting (XSS) vulnerability in the column_title function in wp-admin/includes/class-wp-media-list-table.php in WordPress before 4.5.3 allows remote attackers to inject arbitrary web script or HTML via a crafted attachment name, a different vulnerability than CVE-2016-5834.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5833
reference_id
reference_type
scores
0
value 0.01221
scoring_system epss
scoring_elements 0.79093
published_at 2026-04-18T12:55:00Z
1
value 0.01221
scoring_system epss
scoring_elements 0.79096
published_at 2026-04-16T12:55:00Z
2
value 0.01221
scoring_system epss
scoring_elements 0.79019
published_at 2026-04-01T12:55:00Z
3
value 0.01221
scoring_system epss
scoring_elements 0.79025
published_at 2026-04-02T12:55:00Z
4
value 0.01221
scoring_system epss
scoring_elements 0.79051
published_at 2026-04-04T12:55:00Z
5
value 0.01221
scoring_system epss
scoring_elements 0.79036
published_at 2026-04-07T12:55:00Z
6
value 0.01221
scoring_system epss
scoring_elements 0.7906
published_at 2026-04-08T12:55:00Z
7
value 0.01221
scoring_system epss
scoring_elements 0.79068
published_at 2026-04-13T12:55:00Z
8
value 0.01221
scoring_system epss
scoring_elements 0.79092
published_at 2026-04-21T12:55:00Z
9
value 0.01221
scoring_system epss
scoring_elements 0.79078
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5833
1
reference_url https://codex.wordpress.org/Version_4.5.3
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.5.3
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5833
3
reference_url https://github.com/WordPress/WordPress/commit/4372cdf45d0f49c74bbd4d60db7281de83e32648
reference_id
reference_type
scores
url https://github.com/WordPress/WordPress/commit/4372cdf45d0f49c74bbd4d60db7281de83e32648
4
reference_url https://wordpress.org/news/2016/06/wordpress-4-5-3/
reference_id
reference_type
scores
url https://wordpress.org/news/2016/06/wordpress-4-5-3/
5
reference_url https://wpvulndb.com/vulnerabilities/8518
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8518
6
reference_url http://www.securityfocus.com/bid/91368
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91368
7
reference_url http://www.securitytracker.com/id/1036163
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036163
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5833
reference_id CVE-2016-5833
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-5833
fixed_packages
0
url pkg:deb/debian/wordpress@4.5.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.5.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.5.3%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2016-5833
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aesj-sy6k-57de
99
url VCID-agpu-husf-6be4
vulnerability_id VCID-agpu-husf-6be4
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16217
reference_id
reference_type
scores
0
value 0.02575
scoring_system epss
scoring_elements 0.85576
published_at 2026-04-21T12:55:00Z
1
value 0.02575
scoring_system epss
scoring_elements 0.8558
published_at 2026-04-18T12:55:00Z
2
value 0.02575
scoring_system epss
scoring_elements 0.85481
published_at 2026-04-01T12:55:00Z
3
value 0.02575
scoring_system epss
scoring_elements 0.85494
published_at 2026-04-02T12:55:00Z
4
value 0.02575
scoring_system epss
scoring_elements 0.8551
published_at 2026-04-04T12:55:00Z
5
value 0.02575
scoring_system epss
scoring_elements 0.85514
published_at 2026-04-07T12:55:00Z
6
value 0.02575
scoring_system epss
scoring_elements 0.85534
published_at 2026-04-08T12:55:00Z
7
value 0.02575
scoring_system epss
scoring_elements 0.85543
published_at 2026-04-09T12:55:00Z
8
value 0.02575
scoring_system epss
scoring_elements 0.85557
published_at 2026-04-11T12:55:00Z
9
value 0.02575
scoring_system epss
scoring_elements 0.85555
published_at 2026-04-12T12:55:00Z
10
value 0.02575
scoring_system epss
scoring_elements 0.85551
published_at 2026-04-13T12:55:00Z
11
value 0.02575
scoring_system epss
scoring_elements 0.85574
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16217
1
reference_url https://core.trac.wordpress.org/changeset/45936
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/45936
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
20
reference_url https://lists.debian.org/debian-lts-announce/2019/10/msg00023.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/10/msg00023.html
21
reference_url https://seclists.org/bugtraq/2020/Jan/8
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2020/Jan/8
22
reference_url https://wordpress.org/news/2019/09/wordpress-5-2-3-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2019/09/wordpress-5-2-3-security-and-maintenance-release/
23
reference_url https://www.debian.org/security/2020/dsa-4599
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4599
24
reference_url https://www.debian.org/security/2020/dsa-4677
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4677
25
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939543
reference_id 939543
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939543
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-16217
reference_id CVE-2019-16217
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-16217
fixed_packages
0
url pkg:deb/debian/wordpress@5.2.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.2.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.2.3%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2019-16217
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-agpu-husf-6be4
100
url VCID-ajbz-j6qz-vua9
vulnerability_id VCID-ajbz-j6qz-vua9
summary Wordpress before 2.8.3 allows remote attackers to gain privileges via a direct request to (1) admin-footer.php, (2) edit-category-form.php, (3) edit-form-advanced.php, (4) edit-form-comment.php, (5) edit-link-category-form.php, (6) edit-link-form.php, (7) edit-page-form.php, and (8) edit-tag-form.php in wp-admin/.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2853
reference_id
reference_type
scores
0
value 0.01198
scoring_system epss
scoring_elements 0.78843
published_at 2026-04-01T12:55:00Z
1
value 0.01198
scoring_system epss
scoring_elements 0.7885
published_at 2026-04-02T12:55:00Z
2
value 0.01198
scoring_system epss
scoring_elements 0.78878
published_at 2026-04-04T12:55:00Z
3
value 0.01198
scoring_system epss
scoring_elements 0.78861
published_at 2026-04-07T12:55:00Z
4
value 0.01198
scoring_system epss
scoring_elements 0.78886
published_at 2026-04-08T12:55:00Z
5
value 0.01198
scoring_system epss
scoring_elements 0.78892
published_at 2026-04-09T12:55:00Z
6
value 0.01198
scoring_system epss
scoring_elements 0.78916
published_at 2026-04-18T12:55:00Z
7
value 0.01198
scoring_system epss
scoring_elements 0.789
published_at 2026-04-12T12:55:00Z
8
value 0.01198
scoring_system epss
scoring_elements 0.7889
published_at 2026-04-13T12:55:00Z
9
value 0.01198
scoring_system epss
scoring_elements 0.78919
published_at 2026-04-16T12:55:00Z
10
value 0.01198
scoring_system epss
scoring_elements 0.78914
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2853
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2853
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2853
fixed_packages
0
url pkg:deb/debian/wordpress@2.8.3-1?distro=trixie
purl pkg:deb/debian/wordpress@2.8.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.8.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2009-2853
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ajbz-j6qz-vua9
101
url VCID-ajrt-bhrw-k7an
vulnerability_id VCID-ajrt-bhrw-k7an
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16220
reference_id
reference_type
scores
0
value 0.00821
scoring_system epss
scoring_elements 0.74432
published_at 2026-04-21T12:55:00Z
1
value 0.00821
scoring_system epss
scoring_elements 0.74442
published_at 2026-04-18T12:55:00Z
2
value 0.00821
scoring_system epss
scoring_elements 0.7435
published_at 2026-04-01T12:55:00Z
3
value 0.00821
scoring_system epss
scoring_elements 0.74354
published_at 2026-04-02T12:55:00Z
4
value 0.00821
scoring_system epss
scoring_elements 0.74381
published_at 2026-04-04T12:55:00Z
5
value 0.00821
scoring_system epss
scoring_elements 0.74355
published_at 2026-04-07T12:55:00Z
6
value 0.00821
scoring_system epss
scoring_elements 0.74388
published_at 2026-04-08T12:55:00Z
7
value 0.00821
scoring_system epss
scoring_elements 0.74403
published_at 2026-04-09T12:55:00Z
8
value 0.00821
scoring_system epss
scoring_elements 0.74424
published_at 2026-04-11T12:55:00Z
9
value 0.00821
scoring_system epss
scoring_elements 0.74404
published_at 2026-04-12T12:55:00Z
10
value 0.00821
scoring_system epss
scoring_elements 0.74396
published_at 2026-04-13T12:55:00Z
11
value 0.00821
scoring_system epss
scoring_elements 0.74433
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16220
1
reference_url https://core.trac.wordpress.org/changeset/45971
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/45971
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
20
reference_url https://github.com/WordPress/WordPress/commit/c86ee39ff4c1a79b93c967eb88522f5c09614a28
reference_id
reference_type
scores
url https://github.com/WordPress/WordPress/commit/c86ee39ff4c1a79b93c967eb88522f5c09614a28
21
reference_url https://lists.debian.org/debian-lts-announce/2019/10/msg00023.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/10/msg00023.html
22
reference_url https://medium.com/@theodorejackson.us/rediscovering-an-old-vulnerability-cve-2019-16220-d25cc441752f
reference_id
reference_type
scores
url https://medium.com/@theodorejackson.us/rediscovering-an-old-vulnerability-cve-2019-16220-d25cc441752f
23
reference_url https://seclists.org/bugtraq/2020/Jan/8
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2020/Jan/8
24
reference_url https://wordpress.org/news/2019/09/wordpress-5-2-3-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2019/09/wordpress-5-2-3-security-and-maintenance-release/
25
reference_url https://wpvulndb.com/vulnerabilities/9863
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/9863
26
reference_url https://www.debian.org/security/2020/dsa-4599
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4599
27
reference_url https://www.debian.org/security/2020/dsa-4677
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4677
28
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939543
reference_id 939543
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939543
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-16220
reference_id CVE-2019-16220
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
1
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-16220
fixed_packages
0
url pkg:deb/debian/wordpress@5.2.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.2.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.2.3%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2019-16220
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ajrt-bhrw-k7an
102
url VCID-aqrt-q5ck-p3gz
vulnerability_id VCID-aqrt-q5ck-p3gz
summary Multiple directory traversal vulnerabilities in WordPress 2.0.11 and earlier allow remote attackers to read arbitrary files via a .. (dot dot) in (1) the page parameter to certain PHP scripts under wp-admin/ or (2) the import parameter to wp-admin/admin.php, as demonstrated by discovering the full path via a request for the \..\..\wp-config pathname; and allow remote attackers to modify arbitrary files via a .. (dot dot) in the file parameter to wp-admin/templates.php.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0196
reference_id
reference_type
scores
0
value 0.00246
scoring_system epss
scoring_elements 0.47806
published_at 2026-04-01T12:55:00Z
1
value 0.00246
scoring_system epss
scoring_elements 0.47844
published_at 2026-04-02T12:55:00Z
2
value 0.00246
scoring_system epss
scoring_elements 0.47866
published_at 2026-04-04T12:55:00Z
3
value 0.00246
scoring_system epss
scoring_elements 0.47815
published_at 2026-04-07T12:55:00Z
4
value 0.00246
scoring_system epss
scoring_elements 0.47867
published_at 2026-04-08T12:55:00Z
5
value 0.00246
scoring_system epss
scoring_elements 0.47863
published_at 2026-04-09T12:55:00Z
6
value 0.00246
scoring_system epss
scoring_elements 0.47887
published_at 2026-04-11T12:55:00Z
7
value 0.00246
scoring_system epss
scoring_elements 0.47864
published_at 2026-04-12T12:55:00Z
8
value 0.00246
scoring_system epss
scoring_elements 0.47874
published_at 2026-04-13T12:55:00Z
9
value 0.00246
scoring_system epss
scoring_elements 0.47927
published_at 2026-04-16T12:55:00Z
10
value 0.00246
scoring_system epss
scoring_elements 0.47922
published_at 2026-04-18T12:55:00Z
11
value 0.00246
scoring_system epss
scoring_elements 0.47875
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0196
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0196
fixed_packages
0
url pkg:deb/debian/wordpress@2.3.3-1?distro=trixie
purl pkg:deb/debian/wordpress@2.3.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.3.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2008-0196
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aqrt-q5ck-p3gz
103
url VCID-ar2m-eryr-hba4
vulnerability_id VCID-ar2m-eryr-hba4
summary WordPress before 1.5.2 allows remote attackers to obtain sensitive information via a direct request to (1) wp-includes/vars.php, (2) wp-content/plugins/hello.php, (3) wp-admin/upgrade-functions.php, (4) wp-admin/edit-form.php, (5) wp-settings.php, and (6) wp-admin/edit-form-comment.php, which leaks the path in an error message related to undefined functions or failed includes. NOTE: the wp-admin/menu-header.php vector is already covered by CVE-2005-2110. NOTE: the vars.php, edit-form.php, wp-settings.php, and edit-form-comment.php vectors were also reported to affect WordPress 2.0.1.
references
0
reference_url http://echo.or.id/adv/adv24-theday-2005.txt
reference_id
reference_type
scores
url http://echo.or.id/adv/adv24-theday-2005.txt
1
reference_url http://NeoSecurityTeam.net/advisories/Advisory-17.txt
reference_id
reference_type
scores
url http://NeoSecurityTeam.net/advisories/Advisory-17.txt
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-4463
reference_id
reference_type
scores
0
value 0.01582
scoring_system epss
scoring_elements 0.81622
published_at 2026-04-21T12:55:00Z
1
value 0.01582
scoring_system epss
scoring_elements 0.81514
published_at 2026-04-01T12:55:00Z
2
value 0.01582
scoring_system epss
scoring_elements 0.81526
published_at 2026-04-02T12:55:00Z
3
value 0.01582
scoring_system epss
scoring_elements 0.81547
published_at 2026-04-04T12:55:00Z
4
value 0.01582
scoring_system epss
scoring_elements 0.81546
published_at 2026-04-07T12:55:00Z
5
value 0.01582
scoring_system epss
scoring_elements 0.81574
published_at 2026-04-08T12:55:00Z
6
value 0.01582
scoring_system epss
scoring_elements 0.81579
published_at 2026-04-09T12:55:00Z
7
value 0.01582
scoring_system epss
scoring_elements 0.81599
published_at 2026-04-11T12:55:00Z
8
value 0.01582
scoring_system epss
scoring_elements 0.81587
published_at 2026-04-12T12:55:00Z
9
value 0.01582
scoring_system epss
scoring_elements 0.8158
published_at 2026-04-13T12:55:00Z
10
value 0.01582
scoring_system epss
scoring_elements 0.81617
published_at 2026-04-16T12:55:00Z
11
value 0.01582
scoring_system epss
scoring_elements 0.81618
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-4463
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4463
4
reference_url http://securityreason.com/securityalert/286
reference_id
reference_type
scores
url http://securityreason.com/securityalert/286
5
reference_url http://www.securityfocus.com/archive/1/419994/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/419994/100/0/threaded
6
reference_url http://www.securityfocus.com/archive/1/419999/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/419999/100/0/threaded
7
reference_url http://www.securityfocus.com/archive/1/426304/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/426304/100/0/threaded
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-4463
reference_id CVE-2005-4463
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2005-4463
fixed_packages
0
url pkg:deb/debian/wordpress@1.5.2-1?distro=trixie
purl pkg:deb/debian/wordpress@1.5.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@1.5.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2005-4463
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ar2m-eryr-hba4
104
url VCID-aup2-49ee-jkdf
vulnerability_id VCID-aup2-49ee-jkdf
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16222
reference_id
reference_type
scores
0
value 0.02377
scoring_system epss
scoring_elements 0.85003
published_at 2026-04-21T12:55:00Z
1
value 0.02377
scoring_system epss
scoring_elements 0.85006
published_at 2026-04-18T12:55:00Z
2
value 0.02377
scoring_system epss
scoring_elements 0.84906
published_at 2026-04-01T12:55:00Z
3
value 0.02377
scoring_system epss
scoring_elements 0.84922
published_at 2026-04-02T12:55:00Z
4
value 0.02377
scoring_system epss
scoring_elements 0.84939
published_at 2026-04-04T12:55:00Z
5
value 0.02377
scoring_system epss
scoring_elements 0.84944
published_at 2026-04-07T12:55:00Z
6
value 0.02377
scoring_system epss
scoring_elements 0.84967
published_at 2026-04-08T12:55:00Z
7
value 0.02377
scoring_system epss
scoring_elements 0.84974
published_at 2026-04-09T12:55:00Z
8
value 0.02377
scoring_system epss
scoring_elements 0.84989
published_at 2026-04-11T12:55:00Z
9
value 0.02377
scoring_system epss
scoring_elements 0.84988
published_at 2026-04-12T12:55:00Z
10
value 0.02377
scoring_system epss
scoring_elements 0.84984
published_at 2026-04-13T12:55:00Z
11
value 0.02377
scoring_system epss
scoring_elements 0.85004
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16222
1
reference_url https://core.trac.wordpress.org/changeset/45997
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/45997
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
20
reference_url https://github.com/WordPress/WordPress/commit/30ac67579559fe42251b5a9f887211bf61a8ed68
reference_id
reference_type
scores
url https://github.com/WordPress/WordPress/commit/30ac67579559fe42251b5a9f887211bf61a8ed68
21
reference_url https://lists.debian.org/debian-lts-announce/2019/10/msg00023.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/10/msg00023.html
22
reference_url https://seclists.org/bugtraq/2020/Jan/8
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2020/Jan/8
23
reference_url https://wordpress.org/news/2019/09/wordpress-5-2-3-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2019/09/wordpress-5-2-3-security-and-maintenance-release/
24
reference_url https://wpvulndb.com/vulnerabilities/9867
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/9867
25
reference_url https://www.debian.org/security/2020/dsa-4599
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4599
26
reference_url https://www.debian.org/security/2020/dsa-4677
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4677
27
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939543
reference_id 939543
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939543
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-16222
reference_id CVE-2019-16222
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-16222
fixed_packages
0
url pkg:deb/debian/wordpress@5.2.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.2.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.2.3%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2019-16222
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aup2-49ee-jkdf
105
url VCID-azsx-2ydf-zyag
vulnerability_id VCID-azsx-2ydf-zyag
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-4050
reference_id
reference_type
scores
0
value 0.02416
scoring_system epss
scoring_elements 0.85038
published_at 2026-04-01T12:55:00Z
1
value 0.02416
scoring_system epss
scoring_elements 0.85051
published_at 2026-04-02T12:55:00Z
2
value 0.02416
scoring_system epss
scoring_elements 0.85068
published_at 2026-04-04T12:55:00Z
3
value 0.02416
scoring_system epss
scoring_elements 0.85073
published_at 2026-04-07T12:55:00Z
4
value 0.02416
scoring_system epss
scoring_elements 0.85094
published_at 2026-04-08T12:55:00Z
5
value 0.02416
scoring_system epss
scoring_elements 0.85101
published_at 2026-04-09T12:55:00Z
6
value 0.02416
scoring_system epss
scoring_elements 0.85117
published_at 2026-04-11T12:55:00Z
7
value 0.02416
scoring_system epss
scoring_elements 0.85114
published_at 2026-04-12T12:55:00Z
8
value 0.02416
scoring_system epss
scoring_elements 0.85111
published_at 2026-04-13T12:55:00Z
9
value 0.02416
scoring_system epss
scoring_elements 0.85133
published_at 2026-04-16T12:55:00Z
10
value 0.02416
scoring_system epss
scoring_elements 0.85135
published_at 2026-04-18T12:55:00Z
11
value 0.02416
scoring_system epss
scoring_elements 0.85132
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-4050
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25286
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4047
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4048
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4049
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4050
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962685
reference_id 962685
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962685
fixed_packages
0
url pkg:deb/debian/wordpress@5.4.2%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.4.2%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.4.2%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2020-4050
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-azsx-2ydf-zyag
106
url VCID-azyj-28v6-ufhg
vulnerability_id VCID-azyj-28v6-ufhg
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39201
reference_id
reference_type
scores
0
value 0.00495
scoring_system epss
scoring_elements 0.65694
published_at 2026-04-01T12:55:00Z
1
value 0.00495
scoring_system epss
scoring_elements 0.65743
published_at 2026-04-02T12:55:00Z
2
value 0.00495
scoring_system epss
scoring_elements 0.65773
published_at 2026-04-04T12:55:00Z
3
value 0.00495
scoring_system epss
scoring_elements 0.65738
published_at 2026-04-07T12:55:00Z
4
value 0.00495
scoring_system epss
scoring_elements 0.65791
published_at 2026-04-08T12:55:00Z
5
value 0.00495
scoring_system epss
scoring_elements 0.65802
published_at 2026-04-09T12:55:00Z
6
value 0.00495
scoring_system epss
scoring_elements 0.65822
published_at 2026-04-11T12:55:00Z
7
value 0.00495
scoring_system epss
scoring_elements 0.65808
published_at 2026-04-12T12:55:00Z
8
value 0.00495
scoring_system epss
scoring_elements 0.65778
published_at 2026-04-13T12:55:00Z
9
value 0.00495
scoring_system epss
scoring_elements 0.65812
published_at 2026-04-16T12:55:00Z
10
value 0.00495
scoring_system epss
scoring_elements 0.65826
published_at 2026-04-18T12:55:00Z
11
value 0.00495
scoring_system epss
scoring_elements 0.65813
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39201
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39201
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=994059
reference_id 994059
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=994059
fixed_packages
0
url pkg:deb/debian/wordpress@5.7.3%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.3%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.3%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@5.8.1%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.8.1%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.8.1%252Bdfsg1-1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2021-39201
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-azyj-28v6-ufhg
107
url VCID-b4h4-1gys-uqcc
vulnerability_id VCID-b4h4-1gys-uqcc
summary wp-admin/upgrade.php in WordPress, probably 2.6.x, allows remote attackers to upgrade the application, and possibly cause a denial of service (application outage), via a direct request.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-6767
reference_id
reference_type
scores
0
value 0.0074
scoring_system epss
scoring_elements 0.72855
published_at 2026-04-01T12:55:00Z
1
value 0.0074
scoring_system epss
scoring_elements 0.72863
published_at 2026-04-02T12:55:00Z
2
value 0.0074
scoring_system epss
scoring_elements 0.72883
published_at 2026-04-04T12:55:00Z
3
value 0.0074
scoring_system epss
scoring_elements 0.72858
published_at 2026-04-07T12:55:00Z
4
value 0.0074
scoring_system epss
scoring_elements 0.72895
published_at 2026-04-08T12:55:00Z
5
value 0.0074
scoring_system epss
scoring_elements 0.72909
published_at 2026-04-09T12:55:00Z
6
value 0.0074
scoring_system epss
scoring_elements 0.72934
published_at 2026-04-11T12:55:00Z
7
value 0.0074
scoring_system epss
scoring_elements 0.72917
published_at 2026-04-12T12:55:00Z
8
value 0.0074
scoring_system epss
scoring_elements 0.72911
published_at 2026-04-13T12:55:00Z
9
value 0.0074
scoring_system epss
scoring_elements 0.72952
published_at 2026-04-16T12:55:00Z
10
value 0.0074
scoring_system epss
scoring_elements 0.72962
published_at 2026-04-18T12:55:00Z
11
value 0.0074
scoring_system epss
scoring_elements 0.72955
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-6767
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6767
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=531736
reference_id 531736
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=531736
fixed_packages
0
url pkg:deb/debian/wordpress@2.8.3-1?distro=trixie
purl pkg:deb/debian/wordpress@2.8.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.8.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2008-6767
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b4h4-1gys-uqcc
108
url VCID-b8ex-3tnw-yuh8
vulnerability_id VCID-b8ex-3tnw-yuh8
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10102
reference_id
reference_type
scores
0
value 0.05168
scoring_system epss
scoring_elements 0.89859
published_at 2026-04-01T12:55:00Z
1
value 0.05168
scoring_system epss
scoring_elements 0.89862
published_at 2026-04-02T12:55:00Z
2
value 0.05168
scoring_system epss
scoring_elements 0.89875
published_at 2026-04-04T12:55:00Z
3
value 0.05168
scoring_system epss
scoring_elements 0.89881
published_at 2026-04-07T12:55:00Z
4
value 0.05168
scoring_system epss
scoring_elements 0.89897
published_at 2026-04-08T12:55:00Z
5
value 0.05168
scoring_system epss
scoring_elements 0.89902
published_at 2026-04-09T12:55:00Z
6
value 0.05168
scoring_system epss
scoring_elements 0.89909
published_at 2026-04-11T12:55:00Z
7
value 0.05168
scoring_system epss
scoring_elements 0.89907
published_at 2026-04-12T12:55:00Z
8
value 0.05168
scoring_system epss
scoring_elements 0.899
published_at 2026-04-13T12:55:00Z
9
value 0.05168
scoring_system epss
scoring_elements 0.89914
published_at 2026-04-16T12:55:00Z
10
value 0.05168
scoring_system epss
scoring_elements 0.89916
published_at 2026-04-18T12:55:00Z
11
value 0.05168
scoring_system epss
scoring_elements 0.8991
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10102
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10100
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10102
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=895034
reference_id 895034
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=895034
fixed_packages
0
url pkg:deb/debian/wordpress@4.9.5%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@4.9.5%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.9.5%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2018-10102
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b8ex-3tnw-yuh8
109
url VCID-ba3v-4d8e-mfgx
vulnerability_id VCID-ba3v-4d8e-mfgx
summary
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The _bad_protocol_once function in phpgwapi/inc/class.kses.inc.php in KSES, as used in eGroupWare before 1.4.003, Moodle before 1.8.5, and other products, allows remote attackers to bypass HTML filtering and conduct cross-site scripting (XSS) attacks via a string containing crafted URL protocols.
references
0
reference_url http://docs.moodle.org/en/Release_Notes#Moodle_1.8.5
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://docs.moodle.org/en/Release_Notes#Moodle_1.8.5
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1502.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1502.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1502
reference_id
reference_type
scores
0
value 0.01086
scoring_system epss
scoring_elements 0.77941
published_at 2026-04-18T12:55:00Z
1
value 0.01086
scoring_system epss
scoring_elements 0.77942
published_at 2026-04-16T12:55:00Z
2
value 0.01086
scoring_system epss
scoring_elements 0.77905
published_at 2026-04-13T12:55:00Z
3
value 0.01086
scoring_system epss
scoring_elements 0.77921
published_at 2026-04-11T12:55:00Z
4
value 0.01086
scoring_system epss
scoring_elements 0.77935
published_at 2026-04-21T12:55:00Z
5
value 0.01086
scoring_system epss
scoring_elements 0.77853
published_at 2026-04-02T12:55:00Z
6
value 0.01086
scoring_system epss
scoring_elements 0.77845
published_at 2026-04-01T12:55:00Z
7
value 0.01086
scoring_system epss
scoring_elements 0.77894
published_at 2026-04-09T12:55:00Z
8
value 0.01086
scoring_system epss
scoring_elements 0.77889
published_at 2026-04-08T12:55:00Z
9
value 0.01086
scoring_system epss
scoring_elements 0.77862
published_at 2026-04-07T12:55:00Z
10
value 0.01086
scoring_system epss
scoring_elements 0.7788
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1502
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1502
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/41435
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/41435
6
reference_url https://github.com/moodle/moodle
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/moodle/moodle
7
reference_url https://usn.ubuntu.com/658-1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/658-1
8
reference_url https://usn.ubuntu.com/658-1/
reference_id
reference_type
scores
url https://usn.ubuntu.com/658-1/
9
reference_url https://web.archive.org/web/20080709031015/http://www.securityfocus.com/bid/28424
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20080709031015/http://www.securityfocus.com/bid/28424
10
reference_url https://web.archive.org/web/20080828131802/http://secunia.com/advisories/31017
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20080828131802/http://secunia.com/advisories/31017
11
reference_url https://web.archive.org/web/20080905011948/http://secunia.com/advisories/31018
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20080905011948/http://secunia.com/advisories/31018
12
reference_url https://web.archive.org/web/20081011001554/http://secunia.com/advisories/31167
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20081011001554/http://secunia.com/advisories/31167
13
reference_url https://web.archive.org/web/20081025081058/http://secunia.com/advisories/32400
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20081025081058/http://secunia.com/advisories/32400
14
reference_url https://web.archive.org/web/20081028073531/http://secunia.com/advisories/32446
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20081028073531/http://secunia.com/advisories/32446
15
reference_url https://web.archive.org/web/20090129193143/http://secunia.com/advisories/30986
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20090129193143/http://secunia.com/advisories/30986
16
reference_url https://web.archive.org/web/20100819022833/http://secunia.com/advisories/30073
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20100819022833/http://secunia.com/advisories/30073
17
reference_url https://web.archive.org/web/20120719035305/http://secunia.com/advisories/29491
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20120719035305/http://secunia.com/advisories/29491
18
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00331.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00331.html
19
reference_url http://www.debian.org/security/2008/dsa-1691
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2008/dsa-1691
20
reference_url http://www.debian.org/security/2009/dsa-1871
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2009/dsa-1871
21
reference_url http://www.egroupware.org/changelog
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.egroupware.org/changelog
22
reference_url http://www.egroupware.org/viewvc/branches/1.4/phpgwapi/inc/class.kses.inc.php?r1=23625&r2=25110&pathrev=25110
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.egroupware.org/viewvc/branches/1.4/phpgwapi/inc/class.kses.inc.php?r1=23625&r2=25110&pathrev=25110
23
reference_url http://www.gentoo.org/security/en/glsa/glsa-200805-04.xml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.gentoo.org/security/en/glsa/glsa-200805-04.xml
24
reference_url http://www.openwall.com/lists/oss-security/2008/07/08/14
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2008/07/08/14
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=454246
reference_id 454246
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=454246
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504243
reference_id 504243
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504243
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-1502
reference_id CVE-2008-1502
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2008-1502
28
reference_url https://github.com/advisories/GHSA-v759-3wr5-p294
reference_id GHSA-v759-3wr5-p294
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-v759-3wr5-p294
29
reference_url https://security.gentoo.org/glsa/200805-04
reference_id GLSA-200805-04
reference_type
scores
url https://security.gentoo.org/glsa/200805-04
fixed_packages
0
url pkg:deb/debian/wordpress@2.5.0-1?distro=trixie
purl pkg:deb/debian/wordpress@2.5.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.5.0-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2008-1502, GHSA-v759-3wr5-p294
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ba3v-4d8e-mfgx
110
url VCID-bb3n-jh6p-vfhm
vulnerability_id VCID-bb3n-jh6p-vfhm
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21661
reference_id
reference_type
scores
0
value 0.90526
scoring_system epss
scoring_elements 0.99614
published_at 2026-04-21T12:55:00Z
1
value 0.90904
scoring_system epss
scoring_elements 0.9963
published_at 2026-04-04T12:55:00Z
2
value 0.90904
scoring_system epss
scoring_elements 0.99629
published_at 2026-04-02T12:55:00Z
3
value 0.90904
scoring_system epss
scoring_elements 0.99633
published_at 2026-04-18T12:55:00Z
4
value 0.90904
scoring_system epss
scoring_elements 0.99632
published_at 2026-04-13T12:55:00Z
5
value 0.90904
scoring_system epss
scoring_elements 0.99631
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21661
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21661
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21662
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21663
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21664
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1003243
reference_id 1003243
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1003243
6
reference_url https://github.com/WordPress/wordpress-develop/commit/17efac8c8ec64555eff5cf51a3eff81e06317214
reference_id 17efac8c8ec64555eff5cf51a3eff81e06317214
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-09T14:12:39Z/
url https://github.com/WordPress/wordpress-develop/commit/17efac8c8ec64555eff5cf51a3eff81e06317214
7
reference_url https://www.exploit-db.com/exploits/50663
reference_id 50663
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-09T14:12:39Z/
url https://www.exploit-db.com/exploits/50663
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4UNEC63UU5GEU47IIR4RMTZAHNEOJG/
reference_id CV4UNEC63UU5GEU47IIR4RMTZAHNEOJG
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-09T14:12:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4UNEC63UU5GEU47IIR4RMTZAHNEOJG/
9
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/50663.txt
reference_id CVE-2022-21661
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/50663.txt
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DM6XPH3JN6V4NF4WBOJTOXZIVE6VKKE3/
reference_id DM6XPH3JN6V4NF4WBOJTOXZIVE6VKKE3
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-09T14:12:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DM6XPH3JN6V4NF4WBOJTOXZIVE6VKKE3/
11
reference_url https://www.debian.org/security/2022/dsa-5039
reference_id dsa-5039
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-09T14:12:39Z/
url https://www.debian.org/security/2022/dsa-5039
12
reference_url https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-6676-cqfm-gw84
reference_id GHSA-6676-cqfm-gw84
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-09T14:12:39Z/
url https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-6676-cqfm-gw84
13
reference_url https://lists.debian.org/debian-lts-announce/2022/01/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-09T14:12:39Z/
url https://lists.debian.org/debian-lts-announce/2022/01/msg00019.html
14
reference_url https://wordpress.org/news/2022/01/wordpress-5-8-3-security-release/
reference_id wordpress-5-8-3-security-release
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-09T14:12:39Z/
url https://wordpress.org/news/2022/01/wordpress-5-8-3-security-release/
15
reference_url http://packetstormsecurity.com/files/165540/WordPress-Core-5.8.2-SQL-Injection.html
reference_id WordPress-Core-5.8.2-SQL-Injection.html
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-09T14:12:39Z/
url http://packetstormsecurity.com/files/165540/WordPress-Core-5.8.2-SQL-Injection.html
16
reference_url https://www.zerodayinitiative.com/advisories/ZDI-22-020/
reference_id ZDI-22-020
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-09T14:12:39Z/
url https://www.zerodayinitiative.com/advisories/ZDI-22-020/
fixed_packages
0
url pkg:deb/debian/wordpress@5.7.5%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.5%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.5%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@5.8.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.8.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.8.3%252Bdfsg1-1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2022-21661
risk_score 10.0
exploitability 2.0
weighted_severity 7.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bb3n-jh6p-vfhm
111
url VCID-bj42-unmz-w3ht
vulnerability_id VCID-bj42-unmz-w3ht
summary Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php in WordPress before 3.3.3 allows remote attackers to inject arbitrary web script or HTML via an editable slug field.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6633
reference_id
reference_type
scores
0
value 0.00392
scoring_system epss
scoring_elements 0.60081
published_at 2026-04-01T12:55:00Z
1
value 0.00392
scoring_system epss
scoring_elements 0.60159
published_at 2026-04-02T12:55:00Z
2
value 0.00392
scoring_system epss
scoring_elements 0.60184
published_at 2026-04-04T12:55:00Z
3
value 0.00392
scoring_system epss
scoring_elements 0.60153
published_at 2026-04-07T12:55:00Z
4
value 0.00392
scoring_system epss
scoring_elements 0.60203
published_at 2026-04-08T12:55:00Z
5
value 0.00392
scoring_system epss
scoring_elements 0.60217
published_at 2026-04-09T12:55:00Z
6
value 0.00392
scoring_system epss
scoring_elements 0.60238
published_at 2026-04-11T12:55:00Z
7
value 0.00392
scoring_system epss
scoring_elements 0.60225
published_at 2026-04-12T12:55:00Z
8
value 0.00392
scoring_system epss
scoring_elements 0.60207
published_at 2026-04-13T12:55:00Z
9
value 0.00392
scoring_system epss
scoring_elements 0.60247
published_at 2026-04-16T12:55:00Z
10
value 0.00392
scoring_system epss
scoring_elements 0.60254
published_at 2026-04-18T12:55:00Z
11
value 0.00392
scoring_system epss
scoring_elements 0.60241
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6633
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6633
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6633
fixed_packages
0
url pkg:deb/debian/wordpress@3.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.4%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2012-6633
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bj42-unmz-w3ht
112
url VCID-bjrn-fyux-wyh3
vulnerability_id VCID-bjrn-fyux-wyh3
summary wp-login.php in WordPress 1.5.1.2 and earlier allows remote attackers to change the content of the forgotten password e-mail message via the message variable, which is not initialized before use.
references
0
reference_url http://marc.info/?l=bugtraq&m=112006967221438&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=112006967221438&w=2
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-2109
reference_id
reference_type
scores
0
value 0.01077
scoring_system epss
scoring_elements 0.77838
published_at 2026-04-21T12:55:00Z
1
value 0.01077
scoring_system epss
scoring_elements 0.7775
published_at 2026-04-01T12:55:00Z
2
value 0.01077
scoring_system epss
scoring_elements 0.77756
published_at 2026-04-02T12:55:00Z
3
value 0.01077
scoring_system epss
scoring_elements 0.77783
published_at 2026-04-04T12:55:00Z
4
value 0.01077
scoring_system epss
scoring_elements 0.77767
published_at 2026-04-07T12:55:00Z
5
value 0.01077
scoring_system epss
scoring_elements 0.77794
published_at 2026-04-08T12:55:00Z
6
value 0.01077
scoring_system epss
scoring_elements 0.778
published_at 2026-04-09T12:55:00Z
7
value 0.01077
scoring_system epss
scoring_elements 0.77826
published_at 2026-04-11T12:55:00Z
8
value 0.01077
scoring_system epss
scoring_elements 0.7781
published_at 2026-04-12T12:55:00Z
9
value 0.01077
scoring_system epss
scoring_elements 0.77809
published_at 2026-04-13T12:55:00Z
10
value 0.01077
scoring_system epss
scoring_elements 0.77845
published_at 2026-04-16T12:55:00Z
11
value 0.01077
scoring_system epss
scoring_elements 0.77844
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-2109
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2109
3
reference_url http://secunia.com/advisories/15831
reference_id
reference_type
scores
url http://secunia.com/advisories/15831
4
reference_url http://www.gulftech.org/?node=research&article_id=00085-06282005
reference_id
reference_type
scores
url http://www.gulftech.org/?node=research&article_id=00085-06282005
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=316402
reference_id 316402
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=316402
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-2109
reference_id CVE-2005-2109
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2005-2109
fixed_packages
0
url pkg:deb/debian/wordpress@1.5.1.3-1?distro=trixie
purl pkg:deb/debian/wordpress@1.5.1.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@1.5.1.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2005-2109
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bjrn-fyux-wyh3
113
url VCID-bubm-v7mg-xkcg
vulnerability_id VCID-bubm-v7mg-xkcg
summary WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. In affected versions authenticated users who don't have permission to view private post types/data can bypass restrictions in the block editor under certain conditions. This affected WordPress 5.8 beta during the testing period. It's fixed in the final 5.8 release.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39203
reference_id
reference_type
scores
0
value 0.01232
scoring_system epss
scoring_elements 0.79124
published_at 2026-04-01T12:55:00Z
1
value 0.01232
scoring_system epss
scoring_elements 0.79131
published_at 2026-04-02T12:55:00Z
2
value 0.01232
scoring_system epss
scoring_elements 0.79156
published_at 2026-04-04T12:55:00Z
3
value 0.01232
scoring_system epss
scoring_elements 0.79142
published_at 2026-04-07T12:55:00Z
4
value 0.01232
scoring_system epss
scoring_elements 0.79166
published_at 2026-04-08T12:55:00Z
5
value 0.01232
scoring_system epss
scoring_elements 0.79174
published_at 2026-04-13T12:55:00Z
6
value 0.01232
scoring_system epss
scoring_elements 0.79198
published_at 2026-04-11T12:55:00Z
7
value 0.01232
scoring_system epss
scoring_elements 0.79183
published_at 2026-04-12T12:55:00Z
8
value 0.01232
scoring_system epss
scoring_elements 0.792
published_at 2026-04-16T12:55:00Z
9
value 0.01232
scoring_system epss
scoring_elements 0.79197
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39203
fixed_packages
0
url pkg:deb/debian/wordpress@0?distro=trixie
purl pkg:deb/debian/wordpress@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@0%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2021-39203
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bubm-v7mg-xkcg
114
url VCID-buuf-pyc5-ybcg
vulnerability_id VCID-buuf-pyc5-ybcg
summary wp-includes/class-wp-customize-widgets.php in the widget implementation in WordPress 3.9.x before 3.9.2 might allow remote attackers to execute arbitrary code via crafted serialized data.
references
0
reference_url http://openwall.com/lists/oss-security/2014/08/13/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2014/08/13/3
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5203
reference_id
reference_type
scores
0
value 0.06913
scoring_system epss
scoring_elements 0.91425
published_at 2026-04-21T12:55:00Z
1
value 0.06913
scoring_system epss
scoring_elements 0.91352
published_at 2026-04-01T12:55:00Z
2
value 0.06913
scoring_system epss
scoring_elements 0.91358
published_at 2026-04-02T12:55:00Z
3
value 0.06913
scoring_system epss
scoring_elements 0.91368
published_at 2026-04-04T12:55:00Z
4
value 0.06913
scoring_system epss
scoring_elements 0.91375
published_at 2026-04-07T12:55:00Z
5
value 0.06913
scoring_system epss
scoring_elements 0.91388
published_at 2026-04-08T12:55:00Z
6
value 0.06913
scoring_system epss
scoring_elements 0.91394
published_at 2026-04-09T12:55:00Z
7
value 0.06913
scoring_system epss
scoring_elements 0.91401
published_at 2026-04-11T12:55:00Z
8
value 0.06913
scoring_system epss
scoring_elements 0.91404
published_at 2026-04-12T12:55:00Z
9
value 0.06913
scoring_system epss
scoring_elements 0.91403
published_at 2026-04-13T12:55:00Z
10
value 0.06913
scoring_system epss
scoring_elements 0.91428
published_at 2026-04-16T12:55:00Z
11
value 0.06913
scoring_system epss
scoring_elements 0.91424
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5203
2
reference_url https://core.trac.wordpress.org/changeset/29389
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/29389
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5203
4
reference_url https://wordpress.org/news/2014/08/wordpress-3-9-2/
reference_id
reference_type
scores
url https://wordpress.org/news/2014/08/wordpress-3-9-2/
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757312
reference_id 757312
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757312
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-5203
reference_id CVE-2014-5203
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-5203
fixed_packages
0
url pkg:deb/debian/wordpress@3.9.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.9.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.9.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2014-5203
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-buuf-pyc5-ybcg
115
url VCID-c2ta-7w7f-kbed
vulnerability_id VCID-c2ta-7w7f-kbed
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16218
reference_id
reference_type
scores
0
value 0.02449
scoring_system epss
scoring_elements 0.85222
published_at 2026-04-18T12:55:00Z
1
value 0.02449
scoring_system epss
scoring_elements 0.8522
published_at 2026-04-21T12:55:00Z
2
value 0.02449
scoring_system epss
scoring_elements 0.85129
published_at 2026-04-01T12:55:00Z
3
value 0.02449
scoring_system epss
scoring_elements 0.85141
published_at 2026-04-02T12:55:00Z
4
value 0.02449
scoring_system epss
scoring_elements 0.85158
published_at 2026-04-04T12:55:00Z
5
value 0.02449
scoring_system epss
scoring_elements 0.8516
published_at 2026-04-07T12:55:00Z
6
value 0.02449
scoring_system epss
scoring_elements 0.85182
published_at 2026-04-08T12:55:00Z
7
value 0.02449
scoring_system epss
scoring_elements 0.8519
published_at 2026-04-09T12:55:00Z
8
value 0.02449
scoring_system epss
scoring_elements 0.85205
published_at 2026-04-11T12:55:00Z
9
value 0.02449
scoring_system epss
scoring_elements 0.85202
published_at 2026-04-12T12:55:00Z
10
value 0.02449
scoring_system epss
scoring_elements 0.85199
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16218
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
19
reference_url https://lists.debian.org/debian-lts-announce/2019/10/msg00023.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/10/msg00023.html
20
reference_url https://seclists.org/bugtraq/2020/Jan/8
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2020/Jan/8
21
reference_url https://wordpress.org/news/2019/09/wordpress-5-2-3-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2019/09/wordpress-5-2-3-security-and-maintenance-release/
22
reference_url https://wpvulndb.com/vulnerabilities/9861
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/9861
23
reference_url https://www.debian.org/security/2020/dsa-4599
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4599
24
reference_url https://www.debian.org/security/2020/dsa-4677
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4677
25
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939543
reference_id 939543
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939543
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-16218
reference_id CVE-2019-16218
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-16218
fixed_packages
0
url pkg:deb/debian/wordpress@5.2.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.2.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.2.3%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2019-16218
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c2ta-7w7f-kbed
116
url VCID-c62s-z1vc-nubq
vulnerability_id VCID-c62s-z1vc-nubq
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14720
reference_id
reference_type
scores
0
value 0.02645
scoring_system epss
scoring_elements 0.85749
published_at 2026-04-21T12:55:00Z
1
value 0.02645
scoring_system epss
scoring_elements 0.85756
published_at 2026-04-18T12:55:00Z
2
value 0.02645
scoring_system epss
scoring_elements 0.85658
published_at 2026-04-01T12:55:00Z
3
value 0.02645
scoring_system epss
scoring_elements 0.85671
published_at 2026-04-02T12:55:00Z
4
value 0.02645
scoring_system epss
scoring_elements 0.85688
published_at 2026-04-04T12:55:00Z
5
value 0.02645
scoring_system epss
scoring_elements 0.85695
published_at 2026-04-07T12:55:00Z
6
value 0.02645
scoring_system epss
scoring_elements 0.85714
published_at 2026-04-08T12:55:00Z
7
value 0.02645
scoring_system epss
scoring_elements 0.85725
published_at 2026-04-09T12:55:00Z
8
value 0.02645
scoring_system epss
scoring_elements 0.85741
published_at 2026-04-11T12:55:00Z
9
value 0.02645
scoring_system epss
scoring_elements 0.85737
published_at 2026-04-12T12:55:00Z
10
value 0.02645
scoring_system epss
scoring_elements 0.85733
published_at 2026-04-13T12:55:00Z
11
value 0.02645
scoring_system epss
scoring_elements 0.85751
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14720
1
reference_url https://core.trac.wordpress.org/changeset/41412
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/41412
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14718
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14720
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14721
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14722
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14723
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14726
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14726
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14990
11
reference_url https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
12
reference_url https://www.debian.org/security/2017/dsa-3997
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3997
13
reference_url http://www.securityfocus.com/bid/100912
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100912
14
reference_url http://www.securitytracker.com/id/1039553
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039553
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876274
reference_id 876274
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876274
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-14720
reference_id CVE-2017-14720
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-14720
fixed_packages
0
url pkg:deb/debian/wordpress@4.8.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.8.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.8.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-14720
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c62s-z1vc-nubq
117
url VCID-c7ej-2svr-uyd3
vulnerability_id VCID-c7ej-2svr-uyd3
summary WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. In addition, it also makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that have the comment block present and display the comment author's avatar.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4439
reference_id
reference_type
scores
0
value 0.90817
scoring_system epss
scoring_elements 0.99629
published_at 2026-04-18T12:55:00Z
1
value 0.90817
scoring_system epss
scoring_elements 0.99632
published_at 2026-04-21T12:55:00Z
2
value 0.91499
scoring_system epss
scoring_elements 0.99671
published_at 2026-04-16T12:55:00Z
3
value 0.91499
scoring_system epss
scoring_elements 0.99668
published_at 2026-04-07T12:55:00Z
4
value 0.91499
scoring_system epss
scoring_elements 0.99669
published_at 2026-04-12T12:55:00Z
5
value 0.91499
scoring_system epss
scoring_elements 0.9967
published_at 2026-04-13T12:55:00Z
6
value 0.91805
scoring_system epss
scoring_elements 0.99685
published_at 2026-04-02T12:55:00Z
7
value 0.91805
scoring_system epss
scoring_elements 0.99686
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4439
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069091
reference_id 1069091
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069091
2
reference_url https://core.trac.wordpress.org/changeset/57951/branches/6.4/src/wp-includes/blocks/avatar.php
reference_id avatar.php
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T19:37:57Z/
url https://core.trac.wordpress.org/changeset/57951/branches/6.4/src/wp-includes/blocks/avatar.php
3
reference_url https://core.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=57950%40%2F&new=57950%40%2F&sfp_email=&sfph_mail=#file3
reference_id changeset?sfp_email=&sfph_mail=&reponame=&old=57950%40%2F&new=57950%40%2F&sfp_email=&sfph_mail=#file3
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T19:37:57Z/
url https://core.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=57950%40%2F&new=57950%40%2F&sfp_email=&sfph_mail=#file3
4
reference_url https://www.wordfence.com/threat-intel/vulnerabilities/id/e363c09a-4381-4b3a-951c-9a0ff5669016?source=cve
reference_id e363c09a-4381-4b3a-951c-9a0ff5669016?source=cve
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T19:37:57Z/
url https://www.wordfence.com/threat-intel/vulnerabilities/id/e363c09a-4381-4b3a-951c-9a0ff5669016?source=cve
5
reference_url https://www.wordfence.com/blog/2024/04/unauthenticated-stored-cross-site-scripting-vulnerability-patched-in-wordpress-core/
reference_id unauthenticated-stored-cross-site-scripting-vulnerability-patched-in-wordpress-core
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T19:37:57Z/
url https://www.wordfence.com/blog/2024/04/unauthenticated-stored-cross-site-scripting-vulnerability-patched-in-wordpress-core/
6
reference_url https://wordpress.org/news/2024/04/wordpress-6-5-2-maintenance-and-security-release/
reference_id wordpress-6-5-2-maintenance-and-security-release
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T19:37:57Z/
url https://wordpress.org/news/2024/04/wordpress-6-5-2-maintenance-and-security-release/
fixed_packages
0
url pkg:deb/debian/wordpress@0?distro=trixie
purl pkg:deb/debian/wordpress@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@0%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.5.2%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.5.2%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.5.2%252Bdfsg1-1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2024-4439
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c7ej-2svr-uyd3
118
url VCID-c9m4-z6x3-8ubj
vulnerability_id VCID-c9m4-z6x3-8ubj
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8834
reference_id
reference_type
scores
0
value 0.00748
scoring_system epss
scoring_elements 0.73151
published_at 2026-04-21T12:55:00Z
1
value 0.00748
scoring_system epss
scoring_elements 0.73158
published_at 2026-04-18T12:55:00Z
2
value 0.00748
scoring_system epss
scoring_elements 0.73053
published_at 2026-04-01T12:55:00Z
3
value 0.00748
scoring_system epss
scoring_elements 0.73063
published_at 2026-04-02T12:55:00Z
4
value 0.00748
scoring_system epss
scoring_elements 0.73083
published_at 2026-04-04T12:55:00Z
5
value 0.00748
scoring_system epss
scoring_elements 0.73057
published_at 2026-04-07T12:55:00Z
6
value 0.00748
scoring_system epss
scoring_elements 0.73094
published_at 2026-04-08T12:55:00Z
7
value 0.00748
scoring_system epss
scoring_elements 0.73107
published_at 2026-04-09T12:55:00Z
8
value 0.00748
scoring_system epss
scoring_elements 0.73132
published_at 2026-04-11T12:55:00Z
9
value 0.00748
scoring_system epss
scoring_elements 0.73112
published_at 2026-04-12T12:55:00Z
10
value 0.00748
scoring_system epss
scoring_elements 0.73105
published_at 2026-04-13T12:55:00Z
11
value 0.00748
scoring_system epss
scoring_elements 0.73149
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8834
1
reference_url https://codex.wordpress.org/Version_4.2.2
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.2.2
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8834
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5832
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5832
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5834
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5835
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5837
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5838
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5838
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5839
9
reference_url https://wordpress.org/news/2015/05/wordpress-4-2-2/
reference_id
reference_type
scores
url https://wordpress.org/news/2015/05/wordpress-4-2-2/
10
reference_url http://www.debian.org/security/2016/dsa-3639
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3639
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8834
reference_id CVE-2015-8834
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-8834
fixed_packages
0
url pkg:deb/debian/wordpress@4.2.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.2.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.2.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2015-8834
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c9m4-z6x3-8ubj
119
url VCID-cce4-nh1p-f3gn
vulnerability_id VCID-cce4-nh1p-f3gn
summary security update
references
0
reference_url http://packetstormsecurity.com/files/152396/WordPress-5.0.0-crop-image-Shell-Upload.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/152396/WordPress-5.0.0-crop-image-Shell-Upload.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-8942
reference_id
reference_type
scores
0
value 0.92957
scoring_system epss
scoring_elements 0.99776
published_at 2026-04-02T12:55:00Z
1
value 0.93005
scoring_system epss
scoring_elements 0.99784
published_at 2026-04-21T12:55:00Z
2
value 0.93005
scoring_system epss
scoring_elements 0.99781
published_at 2026-04-04T12:55:00Z
3
value 0.93005
scoring_system epss
scoring_elements 0.99782
published_at 2026-04-07T12:55:00Z
4
value 0.93005
scoring_system epss
scoring_elements 0.99783
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-8942
2
reference_url https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/
reference_id
reference_type
scores
url https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20147
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20148
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20149
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20150
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20151
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20152
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20153
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8942
11
reference_url https://lists.debian.org/debian-lts-announce/2019/03/msg00044.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/03/msg00044.html
12
reference_url https://wpvulndb.com/vulnerabilities/9222
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/9222
13
reference_url https://www.debian.org/security/2019/dsa-4401
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4401
14
reference_url https://www.exploit-db.com/exploits/46511/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/46511/
15
reference_url https://www.exploit-db.com/exploits/46662/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/46662/
16
reference_url http://www.rapid7.com/db/modules/exploit/multi/http/wp_crop_rce
reference_id
reference_type
scores
url http://www.rapid7.com/db/modules/exploit/multi/http/wp_crop_rce
17
reference_url http://www.securityfocus.com/bid/107088
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107088
18
reference_url https://security.archlinux.org/AVG-910
reference_id AVG-910
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-910
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:5.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:5.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:5.0:-:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:5.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:5.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:5.0:beta1:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:5.0:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:5.0:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:5.0:beta2:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:5.0:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:5.0:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:5.0:beta3:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:5.0:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:5.0:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:5.0:beta4:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:5.0:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:5.0:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:5.0:beta5:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:5.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:5.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:5.0:rc1:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:5.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:5.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:5.0:rc2:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:5.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:5.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:5.0:rc3:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-8942
reference_id CVE-2019-8942
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-8942
31
reference_url https://gist.github.com/allyshka/f159c0b43f1374f87f2c3817d6401fd6
reference_id CVE-2019-8943;CVE-2019-8942
reference_type exploit
scores
url https://gist.github.com/allyshka/f159c0b43f1374f87f2c3817d6401fd6
32
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/46662.rb
reference_id CVE-2019-8943;CVE-2019-8942
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/remote/46662.rb
33
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/46511.js
reference_id CVE-2019-8943;CVE-2019-8942
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/46511.js
34
reference_url https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/wp_crop_rce.rb
reference_id CVE-2019-8943;CVE-2019-8942
reference_type exploit
scores
url https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/wp_crop_rce.rb
fixed_packages
0
url pkg:deb/debian/wordpress@5.0.1%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.0.1%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.0.1%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2019-8942
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cce4-nh1p-f3gn
120
url VCID-cdew-g3ut-vucc
vulnerability_id VCID-cdew-g3ut-vucc
summary wordpress: insufficient SSL communication enforcement
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3747.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3747.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3747
reference_id
reference_type
scores
0
value 0.01436
scoring_system epss
scoring_elements 0.80735
published_at 2026-04-21T12:55:00Z
1
value 0.01436
scoring_system epss
scoring_elements 0.80638
published_at 2026-04-01T12:55:00Z
2
value 0.01436
scoring_system epss
scoring_elements 0.80646
published_at 2026-04-02T12:55:00Z
3
value 0.01436
scoring_system epss
scoring_elements 0.80668
published_at 2026-04-04T12:55:00Z
4
value 0.01436
scoring_system epss
scoring_elements 0.80663
published_at 2026-04-07T12:55:00Z
5
value 0.01436
scoring_system epss
scoring_elements 0.80691
published_at 2026-04-08T12:55:00Z
6
value 0.01436
scoring_system epss
scoring_elements 0.80701
published_at 2026-04-09T12:55:00Z
7
value 0.01436
scoring_system epss
scoring_elements 0.80718
published_at 2026-04-11T12:55:00Z
8
value 0.01436
scoring_system epss
scoring_elements 0.80704
published_at 2026-04-12T12:55:00Z
9
value 0.01436
scoring_system epss
scoring_elements 0.80696
published_at 2026-04-13T12:55:00Z
10
value 0.01436
scoring_system epss
scoring_elements 0.80731
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3747
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3747
3
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44569
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44569
4
reference_url http://trac.wordpress.org/ticket/7359
reference_id
reference_type
scores
url http://trac.wordpress.org/ticket/7359
5
reference_url http://www.openwall.com/lists/oss-security/2008/08/19/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/08/19/1
6
reference_url http://www.openwall.com/lists/oss-security/2008/08/20/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/08/20/3
7
reference_url http://www.securityfocus.com/bid/30750
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30750
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=460416
reference_id 460416
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=460416
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=497216
reference_id 497216
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=497216
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.6.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.711:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.711:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.711:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.72:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.72:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.72:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.72:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.72:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.72:beta1:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.72:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.72:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.72:beta2:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.72:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.72:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.72:rc1:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:beta:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:rc1:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:beta3:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:rc1:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3747
reference_id CVE-2008-3747
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-3747
fixed_packages
0
url pkg:deb/debian/wordpress@2.5.1-6?distro=trixie
purl pkg:deb/debian/wordpress@2.5.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.5.1-6%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2008-3747
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cdew-g3ut-vucc
121
url VCID-cdj6-mgne-bkcs
vulnerability_id VCID-cdj6-mgne-bkcs
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6634
reference_id
reference_type
scores
0
value 0.00782
scoring_system epss
scoring_elements 0.73676
published_at 2026-04-01T12:55:00Z
1
value 0.00782
scoring_system epss
scoring_elements 0.73685
published_at 2026-04-02T12:55:00Z
2
value 0.00782
scoring_system epss
scoring_elements 0.73709
published_at 2026-04-04T12:55:00Z
3
value 0.00782
scoring_system epss
scoring_elements 0.73681
published_at 2026-04-07T12:55:00Z
4
value 0.00782
scoring_system epss
scoring_elements 0.73716
published_at 2026-04-08T12:55:00Z
5
value 0.00782
scoring_system epss
scoring_elements 0.73729
published_at 2026-04-09T12:55:00Z
6
value 0.00782
scoring_system epss
scoring_elements 0.73751
published_at 2026-04-11T12:55:00Z
7
value 0.00782
scoring_system epss
scoring_elements 0.73733
published_at 2026-04-12T12:55:00Z
8
value 0.00782
scoring_system epss
scoring_elements 0.73724
published_at 2026-04-13T12:55:00Z
9
value 0.00782
scoring_system epss
scoring_elements 0.73766
published_at 2026-04-21T12:55:00Z
10
value 0.00782
scoring_system epss
scoring_elements 0.73775
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6634
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4029
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6634
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6635
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7168
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7169
fixed_packages
0
url pkg:deb/debian/wordpress@4.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.5%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2016-6634
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cdj6-mgne-bkcs
122
url VCID-cg91-ww8b-jfep
vulnerability_id VCID-cg91-ww8b-jfep
summary several
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5738
reference_id
reference_type
scores
0
value 0.00715
scoring_system epss
scoring_elements 0.72301
published_at 2026-04-01T12:55:00Z
1
value 0.00715
scoring_system epss
scoring_elements 0.72307
published_at 2026-04-02T12:55:00Z
2
value 0.00715
scoring_system epss
scoring_elements 0.72326
published_at 2026-04-04T12:55:00Z
3
value 0.00715
scoring_system epss
scoring_elements 0.72303
published_at 2026-04-07T12:55:00Z
4
value 0.00715
scoring_system epss
scoring_elements 0.72341
published_at 2026-04-08T12:55:00Z
5
value 0.00715
scoring_system epss
scoring_elements 0.72353
published_at 2026-04-09T12:55:00Z
6
value 0.00715
scoring_system epss
scoring_elements 0.72376
published_at 2026-04-11T12:55:00Z
7
value 0.00715
scoring_system epss
scoring_elements 0.7236
published_at 2026-04-12T12:55:00Z
8
value 0.00715
scoring_system epss
scoring_elements 0.72347
published_at 2026-04-13T12:55:00Z
9
value 0.00715
scoring_system epss
scoring_elements 0.72389
published_at 2026-04-16T12:55:00Z
10
value 0.00715
scoring_system epss
scoring_elements 0.72398
published_at 2026-04-18T12:55:00Z
11
value 0.00715
scoring_system epss
scoring_elements 0.72385
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5738
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4338
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4339
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4339
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5739
fixed_packages
0
url pkg:deb/debian/wordpress@3.6.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.6.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.6.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2013-5738
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cg91-ww8b-jfep
123
url VCID-cjc2-1tw5-u7aj
vulnerability_id VCID-cjc2-1tw5-u7aj
summary wordpress: security fixes in upstream version 2.5.1 (CVE-2008-1930, CVE-2008-2068)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2068.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2068.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2068
reference_id
reference_type
scores
0
value 0.00673
scoring_system epss
scoring_elements 0.71331
published_at 2026-04-01T12:55:00Z
1
value 0.00673
scoring_system epss
scoring_elements 0.71338
published_at 2026-04-02T12:55:00Z
2
value 0.00673
scoring_system epss
scoring_elements 0.71356
published_at 2026-04-04T12:55:00Z
3
value 0.00673
scoring_system epss
scoring_elements 0.7133
published_at 2026-04-07T12:55:00Z
4
value 0.00673
scoring_system epss
scoring_elements 0.71371
published_at 2026-04-08T12:55:00Z
5
value 0.00673
scoring_system epss
scoring_elements 0.71384
published_at 2026-04-09T12:55:00Z
6
value 0.00673
scoring_system epss
scoring_elements 0.71407
published_at 2026-04-11T12:55:00Z
7
value 0.00673
scoring_system epss
scoring_elements 0.71392
published_at 2026-04-12T12:55:00Z
8
value 0.00673
scoring_system epss
scoring_elements 0.71374
published_at 2026-04-13T12:55:00Z
9
value 0.00673
scoring_system epss
scoring_elements 0.7142
published_at 2026-04-16T12:55:00Z
10
value 0.00673
scoring_system epss
scoring_elements 0.71426
published_at 2026-04-18T12:55:00Z
11
value 0.00673
scoring_system epss
scoring_elements 0.71405
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2068
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2068
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=444396
reference_id 444396
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=444396
fixed_packages
0
url pkg:deb/debian/wordpress@2.5.1-1?distro=trixie
purl pkg:deb/debian/wordpress@2.5.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.5.1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2008-2068
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cjc2-1tw5-u7aj
124
url VCID-cnz9-cwwa-23d1
vulnerability_id VCID-cnz9-cwwa-23d1
summary Multiple cross-site scripting (XSS) vulnerabilities in post.php in WordPress 1.5.1.2 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) p or (2) comment parameter.
references
0
reference_url http://marc.info/?l=bugtraq&m=112006967221438&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=112006967221438&w=2
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-2107
reference_id
reference_type
scores
0
value 0.00912
scoring_system epss
scoring_elements 0.75877
published_at 2026-04-21T12:55:00Z
1
value 0.00912
scoring_system epss
scoring_elements 0.75794
published_at 2026-04-01T12:55:00Z
2
value 0.00912
scoring_system epss
scoring_elements 0.75798
published_at 2026-04-02T12:55:00Z
3
value 0.00912
scoring_system epss
scoring_elements 0.7583
published_at 2026-04-04T12:55:00Z
4
value 0.00912
scoring_system epss
scoring_elements 0.75808
published_at 2026-04-07T12:55:00Z
5
value 0.00912
scoring_system epss
scoring_elements 0.75841
published_at 2026-04-08T12:55:00Z
6
value 0.00912
scoring_system epss
scoring_elements 0.75853
published_at 2026-04-09T12:55:00Z
7
value 0.00912
scoring_system epss
scoring_elements 0.75876
published_at 2026-04-11T12:55:00Z
8
value 0.00912
scoring_system epss
scoring_elements 0.75858
published_at 2026-04-12T12:55:00Z
9
value 0.00912
scoring_system epss
scoring_elements 0.75851
published_at 2026-04-13T12:55:00Z
10
value 0.00912
scoring_system epss
scoring_elements 0.75888
published_at 2026-04-16T12:55:00Z
11
value 0.00912
scoring_system epss
scoring_elements 0.75892
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-2107
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2107
3
reference_url http://secunia.com/advisories/15831
reference_id
reference_type
scores
url http://secunia.com/advisories/15831
4
reference_url http://www.gulftech.org/?node=research&article_id=00085-06282005
reference_id
reference_type
scores
url http://www.gulftech.org/?node=research&article_id=00085-06282005
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=316402
reference_id 316402
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=316402
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-2107
reference_id CVE-2005-2107
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2005-2107
fixed_packages
0
url pkg:deb/debian/wordpress@1.5.1.3-1?distro=trixie
purl pkg:deb/debian/wordpress@1.5.1.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@1.5.1.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2005-2107
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cnz9-cwwa-23d1
125
url VCID-cut3-n4rz-jqf7
vulnerability_id VCID-cut3-n4rz-jqf7
summary SQL injection vulnerability in options.php in WordPress 2.2.1 allows remote authenticated administrators to execute arbitrary SQL commands via the page_options parameter to (1) options-general.php, (2) options-writing.php, (3) options-reading.php, (4) options-discussion.php, (5) options-privacy.php, (6) options-permalink.php, (7) options-misc.php, and possibly other unspecified components.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4154
reference_id
reference_type
scores
0
value 0.00832
scoring_system epss
scoring_elements 0.74534
published_at 2026-04-01T12:55:00Z
1
value 0.00832
scoring_system epss
scoring_elements 0.74538
published_at 2026-04-02T12:55:00Z
2
value 0.00832
scoring_system epss
scoring_elements 0.74565
published_at 2026-04-04T12:55:00Z
3
value 0.00832
scoring_system epss
scoring_elements 0.74539
published_at 2026-04-07T12:55:00Z
4
value 0.00832
scoring_system epss
scoring_elements 0.74571
published_at 2026-04-08T12:55:00Z
5
value 0.00832
scoring_system epss
scoring_elements 0.74587
published_at 2026-04-09T12:55:00Z
6
value 0.00832
scoring_system epss
scoring_elements 0.7461
published_at 2026-04-11T12:55:00Z
7
value 0.00832
scoring_system epss
scoring_elements 0.7459
published_at 2026-04-12T12:55:00Z
8
value 0.00832
scoring_system epss
scoring_elements 0.74582
published_at 2026-04-13T12:55:00Z
9
value 0.00832
scoring_system epss
scoring_elements 0.74619
published_at 2026-04-16T12:55:00Z
10
value 0.00832
scoring_system epss
scoring_elements 0.74626
published_at 2026-04-18T12:55:00Z
11
value 0.00832
scoring_system epss
scoring_elements 0.74617
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4154
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4154
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4154
fixed_packages
0
url pkg:deb/debian/wordpress@2.2.2-1?distro=trixie
purl pkg:deb/debian/wordpress@2.2.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.2.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-4154
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cut3-n4rz-jqf7
126
url VCID-cuw7-7fmc-xbc1
vulnerability_id VCID-cuw7-7fmc-xbc1
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5488
reference_id
reference_type
scores
0
value 0.00882
scoring_system epss
scoring_elements 0.75426
published_at 2026-04-21T12:55:00Z
1
value 0.00882
scoring_system epss
scoring_elements 0.75334
published_at 2026-04-01T12:55:00Z
2
value 0.00882
scoring_system epss
scoring_elements 0.75338
published_at 2026-04-02T12:55:00Z
3
value 0.00882
scoring_system epss
scoring_elements 0.7537
published_at 2026-04-04T12:55:00Z
4
value 0.00882
scoring_system epss
scoring_elements 0.75349
published_at 2026-04-07T12:55:00Z
5
value 0.00882
scoring_system epss
scoring_elements 0.75393
published_at 2026-04-08T12:55:00Z
6
value 0.00882
scoring_system epss
scoring_elements 0.75403
published_at 2026-04-09T12:55:00Z
7
value 0.00882
scoring_system epss
scoring_elements 0.75423
published_at 2026-04-11T12:55:00Z
8
value 0.00882
scoring_system epss
scoring_elements 0.75401
published_at 2026-04-12T12:55:00Z
9
value 0.00882
scoring_system epss
scoring_elements 0.7539
published_at 2026-04-13T12:55:00Z
10
value 0.00882
scoring_system epss
scoring_elements 0.75431
published_at 2026-04-16T12:55:00Z
11
value 0.00882
scoring_system epss
scoring_elements 0.75437
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5488
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5488
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5489
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5490
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5491
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5492
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5493
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5612
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851310
reference_id 851310
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851310
11
reference_url https://security.archlinux.org/ASA-201701-22
reference_id ASA-201701-22
reference_type
scores
url https://security.archlinux.org/ASA-201701-22
12
reference_url https://security.archlinux.org/AVG-142
reference_id AVG-142
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-142
fixed_packages
0
url pkg:deb/debian/wordpress@4.7.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.7.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.7.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-5488
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cuw7-7fmc-xbc1
127
url VCID-cwud-1n3k-rfcs
vulnerability_id VCID-cwud-1n3k-rfcs
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17092
reference_id
reference_type
scores
0
value 0.03307
scoring_system epss
scoring_elements 0.87189
published_at 2026-04-01T12:55:00Z
1
value 0.03307
scoring_system epss
scoring_elements 0.87253
published_at 2026-04-11T12:55:00Z
2
value 0.03307
scoring_system epss
scoring_elements 0.87247
published_at 2026-04-12T12:55:00Z
3
value 0.03307
scoring_system epss
scoring_elements 0.87242
published_at 2026-04-13T12:55:00Z
4
value 0.03307
scoring_system epss
scoring_elements 0.87257
published_at 2026-04-16T12:55:00Z
5
value 0.03307
scoring_system epss
scoring_elements 0.87199
published_at 2026-04-02T12:55:00Z
6
value 0.03307
scoring_system epss
scoring_elements 0.87216
published_at 2026-04-04T12:55:00Z
7
value 0.03307
scoring_system epss
scoring_elements 0.87213
published_at 2026-04-07T12:55:00Z
8
value 0.03307
scoring_system epss
scoring_elements 0.87233
published_at 2026-04-08T12:55:00Z
9
value 0.03307
scoring_system epss
scoring_elements 0.8724
published_at 2026-04-09T12:55:00Z
10
value 0.04064
scoring_system epss
scoring_elements 0.88541
published_at 2026-04-21T12:55:00Z
11
value 0.04179
scoring_system epss
scoring_elements 0.88716
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17092
1
reference_url https://codex.wordpress.org/Version_4.9.1
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.9.1
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16510
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17091
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17093
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17094
7
reference_url https://github.com/WordPress/WordPress/commit/67d03a98c2cae5f41843c897f206adde299b0509
reference_id
reference_type
scores
url https://github.com/WordPress/WordPress/commit/67d03a98c2cae5f41843c897f206adde299b0509
8
reference_url https://lists.debian.org/debian-lts-announce/2017/12/msg00019.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/12/msg00019.html
9
reference_url https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
10
reference_url https://wpvulndb.com/vulnerabilities/8966
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8966
11
reference_url https://www.debian.org/security/2018/dsa-4090
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4090
12
reference_url http://www.securityfocus.com/bid/102024
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102024
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883314
reference_id 883314
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883314
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17092
reference_id CVE-2017-17092
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
1
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-17092
fixed_packages
0
url pkg:deb/debian/wordpress@4.9.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.9.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.9.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-17092
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cwud-1n3k-rfcs
128
url VCID-d4b9-ek6d-nbb3
vulnerability_id VCID-d4b9-ek6d-nbb3
summary The cookie authentication method in WordPress 2.5 relies on a hash of a concatenated string containing USERNAME and EXPIRY_TIME, which allows remote attackers to forge cookies by registering a username that results in the same concatenated string, as demonstrated by registering usernames beginning with "admin" to obtain administrator privileges, aka a "cryptographic splicing" issue. NOTE: this vulnerability exists because of an incomplete fix for CVE-2007-6013.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1930
reference_id
reference_type
scores
0
value 0.07663
scoring_system epss
scoring_elements 0.91858
published_at 2026-04-01T12:55:00Z
1
value 0.07663
scoring_system epss
scoring_elements 0.91866
published_at 2026-04-02T12:55:00Z
2
value 0.07663
scoring_system epss
scoring_elements 0.91873
published_at 2026-04-04T12:55:00Z
3
value 0.08455
scoring_system epss
scoring_elements 0.92333
published_at 2026-04-07T12:55:00Z
4
value 0.08455
scoring_system epss
scoring_elements 0.92344
published_at 2026-04-08T12:55:00Z
5
value 0.08455
scoring_system epss
scoring_elements 0.92349
published_at 2026-04-09T12:55:00Z
6
value 0.08455
scoring_system epss
scoring_elements 0.92354
published_at 2026-04-13T12:55:00Z
7
value 0.08455
scoring_system epss
scoring_elements 0.92356
published_at 2026-04-12T12:55:00Z
8
value 0.08455
scoring_system epss
scoring_elements 0.92365
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1930
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1930
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=477910
reference_id 477910
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=477910
fixed_packages
0
url pkg:deb/debian/wordpress@2.5.1-1?distro=trixie
purl pkg:deb/debian/wordpress@2.5.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.5.1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2008-1930
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d4b9-ek6d-nbb3
129
url VCID-d6e4-71uw-xyeb
vulnerability_id VCID-d6e4-71uw-xyeb
summary The wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 makes a get_plugin_data call before checking the update_plugins capability, which allows remote authenticated users to bypass intended read-access restrictions via the plugin parameter to wp-admin/admin-ajax.php, a related issue to CVE-2016-6896.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10148
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.63538
published_at 2026-04-01T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63598
published_at 2026-04-02T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63624
published_at 2026-04-04T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.63584
published_at 2026-04-07T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.63635
published_at 2026-04-08T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63652
published_at 2026-04-09T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63666
published_at 2026-04-11T12:55:00Z
7
value 0.0045
scoring_system epss
scoring_elements 0.63651
published_at 2026-04-12T12:55:00Z
8
value 0.0045
scoring_system epss
scoring_elements 0.63618
published_at 2026-04-13T12:55:00Z
9
value 0.0045
scoring_system epss
scoring_elements 0.63655
published_at 2026-04-16T12:55:00Z
10
value 0.0045
scoring_system epss
scoring_elements 0.63664
published_at 2026-04-18T12:55:00Z
11
value 0.0045
scoring_system epss
scoring_elements 0.63648
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10148
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10148
fixed_packages
0
url pkg:deb/debian/wordpress@4.6.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.6.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.6.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2016-10148
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d6e4-71uw-xyeb
130
url VCID-dfrf-wx3v-rfbg
vulnerability_id VCID-dfrf-wx3v-rfbg
summary Unrestricted file upload vulnerability in WordPress before 2.2.1 and WordPress MU before 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code by making a post that specifies a .php filename in the _wp_attached_file metadata field; and then sending this file's content, along with its post_ID value, to (1) wp-app.php or (2) app.php.
references
0
reference_url http://osvdb.org/37295
reference_id
reference_type
scores
url http://osvdb.org/37295
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3543
reference_id
reference_type
scores
0
value 0.01371
scoring_system epss
scoring_elements 0.8017
published_at 2026-04-01T12:55:00Z
1
value 0.01371
scoring_system epss
scoring_elements 0.80215
published_at 2026-04-08T12:55:00Z
2
value 0.01371
scoring_system epss
scoring_elements 0.80224
published_at 2026-04-09T12:55:00Z
3
value 0.01371
scoring_system epss
scoring_elements 0.80243
published_at 2026-04-11T12:55:00Z
4
value 0.01371
scoring_system epss
scoring_elements 0.80228
published_at 2026-04-12T12:55:00Z
5
value 0.01371
scoring_system epss
scoring_elements 0.80178
published_at 2026-04-02T12:55:00Z
6
value 0.01371
scoring_system epss
scoring_elements 0.80198
published_at 2026-04-04T12:55:00Z
7
value 0.01371
scoring_system epss
scoring_elements 0.80187
published_at 2026-04-07T12:55:00Z
8
value 0.01689
scoring_system epss
scoring_elements 0.82259
published_at 2026-04-21T12:55:00Z
9
value 0.01689
scoring_system epss
scoring_elements 0.82222
published_at 2026-04-13T12:55:00Z
10
value 0.01689
scoring_system epss
scoring_elements 0.82258
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3543
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3543
3
reference_url http://secunia.com/advisories/25794
reference_id
reference_type
scores
url http://secunia.com/advisories/25794
4
reference_url http://trac.mu.wordpress.org/changeset/1005
reference_id
reference_type
scores
url http://trac.mu.wordpress.org/changeset/1005
5
reference_url http://www.buayacorp.com/files/wordpress/wordpress-advisory.html
reference_id
reference_type
scores
url http://www.buayacorp.com/files/wordpress/wordpress-advisory.html
6
reference_url http://www.securityfocus.com/bid/24642
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24642
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3543
reference_id CVE-2007-3543
reference_type
scores
0
value 6.0
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-3543
fixed_packages
0
url pkg:deb/debian/wordpress@2.2.1-1?distro=trixie
purl pkg:deb/debian/wordpress@2.2.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.2.1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-3543
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dfrf-wx3v-rfbg
131
url VCID-dg97-fkvm-rqh2
vulnerability_id VCID-dg97-fkvm-rqh2
summary SQL injection vulnerability in the do_trackbacks function in wp-includes/comment.php in WordPress before 3.0.2 allows remote authenticated users to execute arbitrary SQL commands via the Send Trackbacks field.
references
0
reference_url http://blog.sjinks.pro/wordpress/858-information-disclosure-via-sql-injection-attack/
reference_id
reference_type
scores
url http://blog.sjinks.pro/wordpress/858-information-disclosure-via-sql-injection-attack/
1
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605603
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605603
2
reference_url http://codex.wordpress.org/Version_3.0.2
reference_id
reference_type
scores
url http://codex.wordpress.org/Version_3.0.2
3
reference_url http://core.trac.wordpress.org/changeset/16625
reference_id
reference_type
scores
url http://core.trac.wordpress.org/changeset/16625
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052879.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052879.html
5
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052892.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052892.html
6
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052917.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052917.html
7
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052932.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052932.html
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4257
reference_id
reference_type
scores
0
value 0.03296
scoring_system epss
scoring_elements 0.87237
published_at 2026-04-21T12:55:00Z
1
value 0.03296
scoring_system epss
scoring_elements 0.8717
published_at 2026-04-01T12:55:00Z
2
value 0.03296
scoring_system epss
scoring_elements 0.8718
published_at 2026-04-02T12:55:00Z
3
value 0.03296
scoring_system epss
scoring_elements 0.87197
published_at 2026-04-04T12:55:00Z
4
value 0.03296
scoring_system epss
scoring_elements 0.87194
published_at 2026-04-07T12:55:00Z
5
value 0.03296
scoring_system epss
scoring_elements 0.87215
published_at 2026-04-08T12:55:00Z
6
value 0.03296
scoring_system epss
scoring_elements 0.87222
published_at 2026-04-09T12:55:00Z
7
value 0.03296
scoring_system epss
scoring_elements 0.87235
published_at 2026-04-11T12:55:00Z
8
value 0.03296
scoring_system epss
scoring_elements 0.87228
published_at 2026-04-12T12:55:00Z
9
value 0.03296
scoring_system epss
scoring_elements 0.87224
published_at 2026-04-13T12:55:00Z
10
value 0.03296
scoring_system epss
scoring_elements 0.87239
published_at 2026-04-16T12:55:00Z
11
value 0.03296
scoring_system epss
scoring_elements 0.87244
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4257
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=659265
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=659265
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4257
11
reference_url http://secunia.com/advisories/42431
reference_id
reference_type
scores
url http://secunia.com/advisories/42431
12
reference_url http://secunia.com/advisories/42753
reference_id
reference_type
scores
url http://secunia.com/advisories/42753
13
reference_url http://secunia.com/advisories/42844
reference_id
reference_type
scores
url http://secunia.com/advisories/42844
14
reference_url http://secunia.com/advisories/42871
reference_id
reference_type
scores
url http://secunia.com/advisories/42871
15
reference_url http://wordpress.org/news/2010/11/wordpress-3-0-2/
reference_id
reference_type
scores
url http://wordpress.org/news/2010/11/wordpress-3-0-2/
16
reference_url http://www.debian.org/security/2010/dsa-2138
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2138
17
reference_url http://www.securityfocus.com/bid/45131
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45131
18
reference_url http://www.vupen.com/english/advisories/2010/3337
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3337
19
reference_url http://www.vupen.com/english/advisories/2011/0042
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0042
20
reference_url http://www.vupen.com/english/advisories/2011/0057
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0057
21
reference_url http://www.xakep.ru/magazine/xa/124/052/1.asp
reference_id
reference_type
scores
url http://www.xakep.ru/magazine/xa/124/052/1.asp
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605603
reference_id 605603
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605603
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4257
reference_id CVE-2010-4257
reference_type
scores
0
value 6.0
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-4257
fixed_packages
0
url pkg:deb/debian/wordpress@3.0.2-1?distro=trixie
purl pkg:deb/debian/wordpress@3.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.0.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2010-4257
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dg97-fkvm-rqh2
132
url VCID-dkht-9n6n-fucn
vulnerability_id VCID-dkht-9n6n-fucn
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14725
reference_id
reference_type
scores
0
value 0.03163
scoring_system epss
scoring_elements 0.8687
published_at 2026-04-01T12:55:00Z
1
value 0.03163
scoring_system epss
scoring_elements 0.86924
published_at 2026-04-13T12:55:00Z
2
value 0.03163
scoring_system epss
scoring_elements 0.8694
published_at 2026-04-16T12:55:00Z
3
value 0.03163
scoring_system epss
scoring_elements 0.86944
published_at 2026-04-18T12:55:00Z
4
value 0.03163
scoring_system epss
scoring_elements 0.8688
published_at 2026-04-02T12:55:00Z
5
value 0.03163
scoring_system epss
scoring_elements 0.86899
published_at 2026-04-04T12:55:00Z
6
value 0.03163
scoring_system epss
scoring_elements 0.86893
published_at 2026-04-07T12:55:00Z
7
value 0.03163
scoring_system epss
scoring_elements 0.86913
published_at 2026-04-08T12:55:00Z
8
value 0.03163
scoring_system epss
scoring_elements 0.86921
published_at 2026-04-09T12:55:00Z
9
value 0.03163
scoring_system epss
scoring_elements 0.86934
published_at 2026-04-11T12:55:00Z
10
value 0.03163
scoring_system epss
scoring_elements 0.8693
published_at 2026-04-12T12:55:00Z
11
value 0.04176
scoring_system epss
scoring_elements 0.88709
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14725
1
reference_url https://core.trac.wordpress.org/changeset/41398
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/41398
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14718
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14720
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14721
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14722
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14723
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14726
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14726
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14990
11
reference_url https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
12
reference_url https://wpvulndb.com/vulnerabilities/8910
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8910
13
reference_url https://www.debian.org/security/2017/dsa-3997
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3997
14
reference_url http://www.securityfocus.com/bid/100912
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100912
15
reference_url http://www.securitytracker.com/id/1039553
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039553
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876274
reference_id 876274
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876274
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-14725
reference_id CVE-2017-14725
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:N
1
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-14725
fixed_packages
0
url pkg:deb/debian/wordpress@4.8.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.8.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.8.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-14725
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dkht-9n6n-fucn
133
url VCID-dv3a-7kct-xqh6
vulnerability_id VCID-dv3a-7kct-xqh6
summary Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Automattic WordPress allows Relative Path Traversal.This issue affects WordPress: from 6.5 through 6.5.4, from 6.4 through 6.4.4, from 6.3 through 6.3.4, from 6.2 through 6.2.5, from 6.1 through 6.1.6, from 6.0 through 6.0.8, from 5.9 through 5.9.9, from 5.8 through 5.8.9, from 5.7 through 5.7.11, from 5.6 through 5.6.13, from 5.5 through 5.5.14, from 5.4 through 5.4.15, from 5.3 through 5.3.17, from 5.2 through 5.2.20, from 5.1 through 5.1.18, from 5.0 through 5.0.21, from 4.9 through 4.9.25, from 4.8 through 4.8.24, from 4.7 through 4.7.28, from 4.6 through 4.6.28, from 4.5 through 4.5.31, from 4.4 through 4.4.32, from 4.3 through 4.3.33, from 4.2 through 4.2.37, from 4.1 through 4.1.40.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-32111
reference_id
reference_type
scores
0
value 0.00406
scoring_system epss
scoring_elements 0.61112
published_at 2026-04-21T12:55:00Z
1
value 0.00406
scoring_system epss
scoring_elements 0.611
published_at 2026-04-12T12:55:00Z
2
value 0.00406
scoring_system epss
scoring_elements 0.6108
published_at 2026-04-13T12:55:00Z
3
value 0.00406
scoring_system epss
scoring_elements 0.61122
published_at 2026-04-16T12:55:00Z
4
value 0.00406
scoring_system epss
scoring_elements 0.61128
published_at 2026-04-18T12:55:00Z
5
value 0.00406
scoring_system epss
scoring_elements 0.61033
published_at 2026-04-02T12:55:00Z
6
value 0.00406
scoring_system epss
scoring_elements 0.61062
published_at 2026-04-04T12:55:00Z
7
value 0.00406
scoring_system epss
scoring_elements 0.61028
published_at 2026-04-07T12:55:00Z
8
value 0.00406
scoring_system epss
scoring_elements 0.61076
published_at 2026-04-08T12:55:00Z
9
value 0.00406
scoring_system epss
scoring_elements 0.61092
published_at 2026-04-09T12:55:00Z
10
value 0.00406
scoring_system epss
scoring_elements 0.61113
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-32111
1
reference_url https://wordpress.org/news/2024/06/wordpress-6-5-5/
reference_id wordpress-6-5-5
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-27T13:40:36Z/
url https://wordpress.org/news/2024/06/wordpress-6-5-5/
2
reference_url https://patchstack.com/database/vulnerability/wordpress/wordpress-core-6-5-5-contributor-arbitrary-html-file-read-windows-only-vulnerability?_s_id=cve
reference_id wordpress-core-6-5-5-contributor-arbitrary-html-file-read-windows-only-vulnerability?_s_id=cve
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-27T13:40:36Z/
url https://patchstack.com/database/vulnerability/wordpress/wordpress-core-6-5-5-contributor-arbitrary-html-file-read-windows-only-vulnerability?_s_id=cve
fixed_packages
0
url pkg:deb/debian/wordpress@0?distro=trixie
purl pkg:deb/debian/wordpress@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@0%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2024-32111
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dv3a-7kct-xqh6
134
url VCID-dw8d-4vse-jqbe
vulnerability_id VCID-dw8d-4vse-jqbe
summary security update
references
0
reference_url http://openwall.com/lists/oss-security/2015/08/04/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2015/08/04/7
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5734
reference_id
reference_type
scores
0
value 0.03446
scoring_system epss
scoring_elements 0.87512
published_at 2026-04-18T12:55:00Z
1
value 0.03446
scoring_system epss
scoring_elements 0.87441
published_at 2026-04-01T12:55:00Z
2
value 0.03446
scoring_system epss
scoring_elements 0.8745
published_at 2026-04-02T12:55:00Z
3
value 0.03446
scoring_system epss
scoring_elements 0.87464
published_at 2026-04-04T12:55:00Z
4
value 0.03446
scoring_system epss
scoring_elements 0.87466
published_at 2026-04-07T12:55:00Z
5
value 0.03446
scoring_system epss
scoring_elements 0.87485
published_at 2026-04-08T12:55:00Z
6
value 0.03446
scoring_system epss
scoring_elements 0.87491
published_at 2026-04-09T12:55:00Z
7
value 0.03446
scoring_system epss
scoring_elements 0.87502
published_at 2026-04-11T12:55:00Z
8
value 0.03446
scoring_system epss
scoring_elements 0.87498
published_at 2026-04-12T12:55:00Z
9
value 0.03446
scoring_system epss
scoring_elements 0.87495
published_at 2026-04-13T12:55:00Z
10
value 0.03446
scoring_system epss
scoring_elements 0.8751
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5734
2
reference_url https://blog.sucuri.net/2015/08/persistent-xss-vulnerability-in-wordpress-explained.html
reference_id
reference_type
scores
url https://blog.sucuri.net/2015/08/persistent-xss-vulnerability-in-wordpress-explained.html
3
reference_url https://codex.wordpress.org/Version_4.2.4
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.2.4
4
reference_url https://core.trac.wordpress.org/changeset/33549
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/33549
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2213
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5622
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5714
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5715
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5730
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5731
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5732
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5734
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7989
14
reference_url https://wordpress.org/news/2015/08/wordpress-4-2-4-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2015/08/wordpress-4-2-4-security-and-maintenance-release/
15
reference_url https://wpvulndb.com/vulnerabilities/8133
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8133
16
reference_url http://www.debian.org/security/2015/dsa-3332
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3332
17
reference_url http://www.debian.org/security/2015/dsa-3383
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3383
18
reference_url http://www.securityfocus.com/bid/76331
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/76331
19
reference_url http://www.securitytracker.com/id/1033178
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033178
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794560
reference_id 794560
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794560
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5734
reference_id CVE-2015-5734
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-5734
fixed_packages
0
url pkg:deb/debian/wordpress@4.2.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.2.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.2.4%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2015-5734
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dw8d-4vse-jqbe
135
url VCID-dzgs-vwe3-fub1
vulnerability_id VCID-dzgs-vwe3-fub1
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-20042
reference_id
reference_type
scores
0
value 0.0505
scoring_system epss
scoring_elements 0.8973
published_at 2026-04-01T12:55:00Z
1
value 0.0505
scoring_system epss
scoring_elements 0.89733
published_at 2026-04-02T12:55:00Z
2
value 0.0505
scoring_system epss
scoring_elements 0.89748
published_at 2026-04-04T12:55:00Z
3
value 0.0505
scoring_system epss
scoring_elements 0.89749
published_at 2026-04-07T12:55:00Z
4
value 0.0505
scoring_system epss
scoring_elements 0.89766
published_at 2026-04-08T12:55:00Z
5
value 0.0505
scoring_system epss
scoring_elements 0.89773
published_at 2026-04-09T12:55:00Z
6
value 0.0505
scoring_system epss
scoring_elements 0.8978
published_at 2026-04-11T12:55:00Z
7
value 0.0505
scoring_system epss
scoring_elements 0.89778
published_at 2026-04-12T12:55:00Z
8
value 0.0505
scoring_system epss
scoring_elements 0.89771
published_at 2026-04-13T12:55:00Z
9
value 0.0505
scoring_system epss
scoring_elements 0.89787
published_at 2026-04-18T12:55:00Z
10
value 0.0505
scoring_system epss
scoring_elements 0.89781
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-20042
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946905
reference_id 946905
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946905
fixed_packages
0
url pkg:deb/debian/wordpress@5.3.2%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.3.2%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.3.2%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2019-20042
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dzgs-vwe3-fub1
136
url VCID-e1ss-azne-d7ha
vulnerability_id VCID-e1ss-azne-d7ha
summary In WordPress before 4.7.3, there is cross-site request forgery (CSRF) in Press This (wp-admin/includes/class-wp-press-this.php), leading to excessive use of server resources. The CSRF can trigger an outbound HTTP request for a large file that is then parsed by Press This.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6819
reference_id
reference_type
scores
0
value 0.13419
scoring_system epss
scoring_elements 0.94215
published_at 2026-04-21T12:55:00Z
1
value 0.13419
scoring_system epss
scoring_elements 0.94153
published_at 2026-04-01T12:55:00Z
2
value 0.13419
scoring_system epss
scoring_elements 0.94163
published_at 2026-04-02T12:55:00Z
3
value 0.13419
scoring_system epss
scoring_elements 0.94174
published_at 2026-04-04T12:55:00Z
4
value 0.13419
scoring_system epss
scoring_elements 0.94176
published_at 2026-04-07T12:55:00Z
5
value 0.13419
scoring_system epss
scoring_elements 0.94186
published_at 2026-04-08T12:55:00Z
6
value 0.13419
scoring_system epss
scoring_elements 0.9419
published_at 2026-04-09T12:55:00Z
7
value 0.13419
scoring_system epss
scoring_elements 0.94195
published_at 2026-04-13T12:55:00Z
8
value 0.13419
scoring_system epss
scoring_elements 0.9421
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6819
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6819
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857026
reference_id 857026
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857026
3
reference_url https://security.archlinux.org/ASA-201703-14
reference_id ASA-201703-14
reference_type
scores
url https://security.archlinux.org/ASA-201703-14
4
reference_url https://security.archlinux.org/AVG-202
reference_id AVG-202
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-202
fixed_packages
0
url pkg:deb/debian/wordpress@4.7.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.7.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.7.3%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-6819
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e1ss-azne-d7ha
137
url VCID-e1ud-yfqb-4kca
vulnerability_id VCID-e1ud-yfqb-4kca
summary The create_post function in wp-includes/class-wp-atom-server.php in WordPress before 3.4.2 does not perform a capability check, which allows remote authenticated users to bypass intended access restrictions and publish new posts by leveraging the Contributor role and using the Atom Publishing Protocol (aka AtomPub) feature.
references
0
reference_url http://codex.wordpress.org/Version_3.4.2
reference_id
reference_type
scores
url http://codex.wordpress.org/Version_3.4.2
1
reference_url http://core.trac.wordpress.org/changeset?old_path=%2Ftags%2F3.4.1&old=21780&new_path=%2Ftags%2F3.4.2&new=21780#file2
reference_id
reference_type
scores
url http://core.trac.wordpress.org/changeset?old_path=%2Ftags%2F3.4.1&old=21780&new_path=%2Ftags%2F3.4.2&new=21780#file2
2
reference_url http://openwall.com/lists/oss-security/2012/09/13/4
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2012/09/13/4
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4421
reference_id
reference_type
scores
0
value 0.00204
scoring_system epss
scoring_elements 0.42569
published_at 2026-04-21T12:55:00Z
1
value 0.00204
scoring_system epss
scoring_elements 0.42529
published_at 2026-04-01T12:55:00Z
2
value 0.00204
scoring_system epss
scoring_elements 0.426
published_at 2026-04-02T12:55:00Z
3
value 0.00204
scoring_system epss
scoring_elements 0.42629
published_at 2026-04-04T12:55:00Z
4
value 0.00204
scoring_system epss
scoring_elements 0.42568
published_at 2026-04-07T12:55:00Z
5
value 0.00204
scoring_system epss
scoring_elements 0.4262
published_at 2026-04-08T12:55:00Z
6
value 0.00204
scoring_system epss
scoring_elements 0.42631
published_at 2026-04-09T12:55:00Z
7
value 0.00204
scoring_system epss
scoring_elements 0.42654
published_at 2026-04-11T12:55:00Z
8
value 0.00204
scoring_system epss
scoring_elements 0.42618
published_at 2026-04-12T12:55:00Z
9
value 0.00204
scoring_system epss
scoring_elements 0.42589
published_at 2026-04-13T12:55:00Z
10
value 0.00204
scoring_system epss
scoring_elements 0.42649
published_at 2026-04-16T12:55:00Z
11
value 0.00204
scoring_system epss
scoring_elements 0.42634
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4421
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4421
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4421
reference_id CVE-2012-4421
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-4421
fixed_packages
0
url pkg:deb/debian/wordpress@3.4.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.4.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.4.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2012-4421
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e1ud-yfqb-4kca
138
url VCID-e37d-h1k6-sud6
vulnerability_id VCID-e37d-h1k6-sud6
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14721
reference_id
reference_type
scores
0
value 0.02645
scoring_system epss
scoring_elements 0.85749
published_at 2026-04-21T12:55:00Z
1
value 0.02645
scoring_system epss
scoring_elements 0.85756
published_at 2026-04-18T12:55:00Z
2
value 0.02645
scoring_system epss
scoring_elements 0.85658
published_at 2026-04-01T12:55:00Z
3
value 0.02645
scoring_system epss
scoring_elements 0.85671
published_at 2026-04-02T12:55:00Z
4
value 0.02645
scoring_system epss
scoring_elements 0.85688
published_at 2026-04-04T12:55:00Z
5
value 0.02645
scoring_system epss
scoring_elements 0.85695
published_at 2026-04-07T12:55:00Z
6
value 0.02645
scoring_system epss
scoring_elements 0.85714
published_at 2026-04-08T12:55:00Z
7
value 0.02645
scoring_system epss
scoring_elements 0.85725
published_at 2026-04-09T12:55:00Z
8
value 0.02645
scoring_system epss
scoring_elements 0.85741
published_at 2026-04-11T12:55:00Z
9
value 0.02645
scoring_system epss
scoring_elements 0.85737
published_at 2026-04-12T12:55:00Z
10
value 0.02645
scoring_system epss
scoring_elements 0.85733
published_at 2026-04-13T12:55:00Z
11
value 0.02645
scoring_system epss
scoring_elements 0.85751
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14721
1
reference_url https://core.trac.wordpress.org/changeset/41412
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/41412
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14718
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14720
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14721
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14722
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14723
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14726
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14726
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14990
11
reference_url https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
12
reference_url https://www.debian.org/security/2017/dsa-3997
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3997
13
reference_url http://www.securityfocus.com/bid/100912
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100912
14
reference_url http://www.securitytracker.com/id/1039553
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039553
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876274
reference_id 876274
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876274
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-14721
reference_id CVE-2017-14721
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-14721
fixed_packages
0
url pkg:deb/debian/wordpress@4.8.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.8.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.8.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-14721
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e37d-h1k6-sud6
139
url VCID-e8s1-sduw-a7aa
vulnerability_id VCID-e8s1-sduw-a7aa
summary several
references
0
reference_url http://archives.neohapsis.com/archives/bugtraq/2013-06/0052.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/bugtraq/2013-06/0052.html
1
reference_url http://codex.wordpress.org/Version_3.5.2
reference_id
reference_type
scores
url http://codex.wordpress.org/Version_3.5.2
2
reference_url http://openwall.com/lists/oss-security/2013/06/12/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2013/06/12/2
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2173
reference_id
reference_type
scores
0
value 0.01677
scoring_system epss
scoring_elements 0.82201
published_at 2026-04-21T12:55:00Z
1
value 0.01677
scoring_system epss
scoring_elements 0.82093
published_at 2026-04-01T12:55:00Z
2
value 0.01677
scoring_system epss
scoring_elements 0.82105
published_at 2026-04-02T12:55:00Z
3
value 0.01677
scoring_system epss
scoring_elements 0.82126
published_at 2026-04-04T12:55:00Z
4
value 0.01677
scoring_system epss
scoring_elements 0.82122
published_at 2026-04-07T12:55:00Z
5
value 0.01677
scoring_system epss
scoring_elements 0.82149
published_at 2026-04-08T12:55:00Z
6
value 0.01677
scoring_system epss
scoring_elements 0.82156
published_at 2026-04-09T12:55:00Z
7
value 0.01677
scoring_system epss
scoring_elements 0.82175
published_at 2026-04-11T12:55:00Z
8
value 0.01677
scoring_system epss
scoring_elements 0.82167
published_at 2026-04-12T12:55:00Z
9
value 0.01677
scoring_system epss
scoring_elements 0.82161
published_at 2026-04-13T12:55:00Z
10
value 0.01677
scoring_system epss
scoring_elements 0.82199
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2173
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2173
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2173
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2199
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2200
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2201
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2202
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2203
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2204
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2205
12
reference_url https://github.com/wpscanteam/wpscan/issues/219
reference_id
reference_type
scores
url https://github.com/wpscanteam/wpscan/issues/219
13
reference_url https://vndh.net/note:wordpress-351-denial-service
reference_id
reference_type
scores
url https://vndh.net/note:wordpress-351-denial-service
14
reference_url http://wordpress.org/news/2013/06/wordpress-3-5-2/
reference_id
reference_type
scores
url http://wordpress.org/news/2013/06/wordpress-3-5-2/
15
reference_url http://www.debian.org/security/2013/dsa-2718
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2718
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=713947
reference_id 713947
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=713947
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2173
reference_id CVE-2013-2173
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-2173
fixed_packages
0
url pkg:deb/debian/wordpress@3.5.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.5.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.5.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2013-2173
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e8s1-sduw-a7aa
140
url VCID-ejtq-a5ca-ffbu
vulnerability_id VCID-ejtq-a5ca-ffbu
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16221
reference_id
reference_type
scores
0
value 0.02449
scoring_system epss
scoring_elements 0.85222
published_at 2026-04-18T12:55:00Z
1
value 0.02449
scoring_system epss
scoring_elements 0.8522
published_at 2026-04-21T12:55:00Z
2
value 0.02449
scoring_system epss
scoring_elements 0.85129
published_at 2026-04-01T12:55:00Z
3
value 0.02449
scoring_system epss
scoring_elements 0.85141
published_at 2026-04-02T12:55:00Z
4
value 0.02449
scoring_system epss
scoring_elements 0.85158
published_at 2026-04-04T12:55:00Z
5
value 0.02449
scoring_system epss
scoring_elements 0.8516
published_at 2026-04-07T12:55:00Z
6
value 0.02449
scoring_system epss
scoring_elements 0.85182
published_at 2026-04-08T12:55:00Z
7
value 0.02449
scoring_system epss
scoring_elements 0.8519
published_at 2026-04-09T12:55:00Z
8
value 0.02449
scoring_system epss
scoring_elements 0.85205
published_at 2026-04-11T12:55:00Z
9
value 0.02449
scoring_system epss
scoring_elements 0.85202
published_at 2026-04-12T12:55:00Z
10
value 0.02449
scoring_system epss
scoring_elements 0.85199
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16221
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
19
reference_url https://lists.debian.org/debian-lts-announce/2019/10/msg00023.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/10/msg00023.html
20
reference_url https://seclists.org/bugtraq/2020/Jan/8
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2020/Jan/8
21
reference_url https://wordpress.org/news/2019/09/wordpress-5-2-3-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2019/09/wordpress-5-2-3-security-and-maintenance-release/
22
reference_url https://wpvulndb.com/vulnerabilities/9865
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/9865
23
reference_url https://www.debian.org/security/2020/dsa-4599
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4599
24
reference_url https://www.debian.org/security/2020/dsa-4677
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4677
25
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939543
reference_id 939543
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939543
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-16221
reference_id CVE-2019-16221
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-16221
fixed_packages
0
url pkg:deb/debian/wordpress@5.2.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.2.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.2.3%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2019-16221
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ejtq-a5ca-ffbu
141
url VCID-ewvz-wnn2-57h2
vulnerability_id VCID-ewvz-wnn2-57h2
summary Multiple "unannounced" cross-site scripting (XSS) vulnerabilities in WordPress before 2.0.2 allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-1263
reference_id
reference_type
scores
0
value 0.00343
scoring_system epss
scoring_elements 0.5687
published_at 2026-04-01T12:55:00Z
1
value 0.00343
scoring_system epss
scoring_elements 0.56967
published_at 2026-04-02T12:55:00Z
2
value 0.00343
scoring_system epss
scoring_elements 0.56989
published_at 2026-04-04T12:55:00Z
3
value 0.00343
scoring_system epss
scoring_elements 0.56965
published_at 2026-04-07T12:55:00Z
4
value 0.00343
scoring_system epss
scoring_elements 0.57015
published_at 2026-04-08T12:55:00Z
5
value 0.00343
scoring_system epss
scoring_elements 0.57018
published_at 2026-04-09T12:55:00Z
6
value 0.00343
scoring_system epss
scoring_elements 0.57029
published_at 2026-04-11T12:55:00Z
7
value 0.00343
scoring_system epss
scoring_elements 0.57009
published_at 2026-04-12T12:55:00Z
8
value 0.00343
scoring_system epss
scoring_elements 0.56985
published_at 2026-04-13T12:55:00Z
9
value 0.00343
scoring_system epss
scoring_elements 0.57014
published_at 2026-04-16T12:55:00Z
10
value 0.00343
scoring_system epss
scoring_elements 0.57011
published_at 2026-04-18T12:55:00Z
11
value 0.00343
scoring_system epss
scoring_elements 0.56988
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-1263
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1263
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.2-1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2006-1263
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ewvz-wnn2-57h2
142
url VCID-f8cq-auvz-7be1
vulnerability_id VCID-f8cq-auvz-7be1
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5837
reference_id
reference_type
scores
0
value 0.00827
scoring_system epss
scoring_elements 0.74513
published_at 2026-04-21T12:55:00Z
1
value 0.00827
scoring_system epss
scoring_elements 0.74521
published_at 2026-04-18T12:55:00Z
2
value 0.00827
scoring_system epss
scoring_elements 0.74428
published_at 2026-04-01T12:55:00Z
3
value 0.00827
scoring_system epss
scoring_elements 0.74432
published_at 2026-04-02T12:55:00Z
4
value 0.00827
scoring_system epss
scoring_elements 0.74458
published_at 2026-04-04T12:55:00Z
5
value 0.00827
scoring_system epss
scoring_elements 0.74434
published_at 2026-04-07T12:55:00Z
6
value 0.00827
scoring_system epss
scoring_elements 0.74466
published_at 2026-04-08T12:55:00Z
7
value 0.00827
scoring_system epss
scoring_elements 0.74482
published_at 2026-04-09T12:55:00Z
8
value 0.00827
scoring_system epss
scoring_elements 0.74504
published_at 2026-04-11T12:55:00Z
9
value 0.00827
scoring_system epss
scoring_elements 0.74485
published_at 2026-04-12T12:55:00Z
10
value 0.00827
scoring_system epss
scoring_elements 0.74476
published_at 2026-04-13T12:55:00Z
11
value 0.00827
scoring_system epss
scoring_elements 0.74514
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5837
1
reference_url https://codex.wordpress.org/Version_4.5.3
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.5.3
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8834
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5832
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5832
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5834
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5835
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5837
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5838
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5838
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5839
9
reference_url https://wordpress.org/news/2016/06/wordpress-4-5-3/
reference_id
reference_type
scores
url https://wordpress.org/news/2016/06/wordpress-4-5-3/
10
reference_url https://wpvulndb.com/vulnerabilities/8520
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8520
11
reference_url http://www.debian.org/security/2016/dsa-3639
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3639
12
reference_url http://www.securityfocus.com/bid/91365
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91365
13
reference_url http://www.securitytracker.com/id/1036163
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036163
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5837
reference_id CVE-2016-5837
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-5837
fixed_packages
0
url pkg:deb/debian/wordpress@4.5.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.5.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.5.3%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2016-5837
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f8cq-auvz-7be1
143
url VCID-fa64-2upm-rfg5
vulnerability_id VCID-fa64-2upm-rfg5
summary Cross-site scripting (XSS) vulnerability in an mt import in wp-admin/admin.php in WordPress 2.1.2 allows remote authenticated administrators to inject arbitrary web script or HTML via the demo parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. NOTE: another researcher disputes this issue, stating that this is legitimate functionality for administrators. However, it has been patched by at least one vendor
references
0
reference_url http://codex.wordpress.org/Roles_and_Capabilities
reference_id
reference_type
scores
url http://codex.wordpress.org/Roles_and_Capabilities
1
reference_url http://marc.info/?l=bugtraq&m=117319839710382&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=117319839710382&w=2
2
reference_url http://osvdb.org/33884
reference_id
reference_type
scores
url http://osvdb.org/33884
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1732
reference_id
reference_type
scores
0
value 0.00439
scoring_system epss
scoring_elements 0.6304
published_at 2026-04-01T12:55:00Z
1
value 0.00439
scoring_system epss
scoring_elements 0.63178
published_at 2026-04-16T12:55:00Z
2
value 0.00439
scoring_system epss
scoring_elements 0.63185
published_at 2026-04-18T12:55:00Z
3
value 0.00439
scoring_system epss
scoring_elements 0.63099
published_at 2026-04-02T12:55:00Z
4
value 0.00439
scoring_system epss
scoring_elements 0.63129
published_at 2026-04-04T12:55:00Z
5
value 0.00439
scoring_system epss
scoring_elements 0.63094
published_at 2026-04-07T12:55:00Z
6
value 0.00439
scoring_system epss
scoring_elements 0.63146
published_at 2026-04-08T12:55:00Z
7
value 0.00439
scoring_system epss
scoring_elements 0.63163
published_at 2026-04-09T12:55:00Z
8
value 0.00439
scoring_system epss
scoring_elements 0.63181
published_at 2026-04-11T12:55:00Z
9
value 0.00439
scoring_system epss
scoring_elements 0.63165
published_at 2026-04-12T12:55:00Z
10
value 0.00439
scoring_system epss
scoring_elements 0.63143
published_at 2026-04-13T12:55:00Z
11
value 0.00456
scoring_system epss
scoring_elements 0.63918
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1732
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1732
5
reference_url http://secunia.com/advisories/24430
reference_id
reference_type
scores
url http://secunia.com/advisories/24430
6
reference_url http://secunia.com/advisories/24566
reference_id
reference_type
scores
url http://secunia.com/advisories/24566
7
reference_url http://www.gentoo.org/security/en/glsa/glsa-200703-23.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200703-23.xml
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1732
reference_id CVE-2007-1732
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2007-1732
fixed_packages
0
url pkg:deb/debian/wordpress@2.1.3-1?distro=trixie
purl pkg:deb/debian/wordpress@2.1.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.1.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-1732
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fa64-2upm-rfg5
144
url VCID-fc6e-njgb-pued
vulnerability_id VCID-fc6e-njgb-pued
summary WordPress allows remote attackers to determine the existence of arbitrary files, and possibly read portions of certain files, via pingback service calls with a source URI that corresponds to a local pathname, which triggers different fault codes for existing and non-existing files, and in certain configurations causes a brief file excerpt to be published as a blog comment.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0541
reference_id
reference_type
scores
0
value 0.01301
scoring_system epss
scoring_elements 0.7976
published_at 2026-04-21T12:55:00Z
1
value 0.01301
scoring_system epss
scoring_elements 0.79678
published_at 2026-04-01T12:55:00Z
2
value 0.01301
scoring_system epss
scoring_elements 0.79685
published_at 2026-04-02T12:55:00Z
3
value 0.01301
scoring_system epss
scoring_elements 0.79706
published_at 2026-04-04T12:55:00Z
4
value 0.01301
scoring_system epss
scoring_elements 0.79692
published_at 2026-04-07T12:55:00Z
5
value 0.01301
scoring_system epss
scoring_elements 0.7972
published_at 2026-04-08T12:55:00Z
6
value 0.01301
scoring_system epss
scoring_elements 0.79728
published_at 2026-04-09T12:55:00Z
7
value 0.01301
scoring_system epss
scoring_elements 0.79749
published_at 2026-04-11T12:55:00Z
8
value 0.01301
scoring_system epss
scoring_elements 0.79733
published_at 2026-04-12T12:55:00Z
9
value 0.01301
scoring_system epss
scoring_elements 0.79727
published_at 2026-04-13T12:55:00Z
10
value 0.01301
scoring_system epss
scoring_elements 0.79756
published_at 2026-04-16T12:55:00Z
11
value 0.01301
scoring_system epss
scoring_elements 0.79757
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0541
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0541
2
reference_url http://securityreason.com/securityalert/2191
reference_id
reference_type
scores
url http://securityreason.com/securityalert/2191
3
reference_url http://www.securityfocus.com/archive/1/457996/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/457996/100/0/threaded
4
reference_url http://www.securityfocus.com/archive/1/458003/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/458003/100/0/threaded
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0541
reference_id CVE-2007-0541
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2007-0541
fixed_packages
0
url pkg:deb/debian/wordpress@2.1.0-1?distro=trixie
purl pkg:deb/debian/wordpress@2.1.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.1.0-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-0541
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fc6e-njgb-pued
145
url VCID-fcqu-11yk-h3af
vulnerability_id VCID-fcqu-11yk-h3af
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20149
reference_id
reference_type
scores
0
value 0.04428
scoring_system epss
scoring_elements 0.88984
published_at 2026-04-01T12:55:00Z
1
value 0.04428
scoring_system epss
scoring_elements 0.88991
published_at 2026-04-02T12:55:00Z
2
value 0.04428
scoring_system epss
scoring_elements 0.89007
published_at 2026-04-04T12:55:00Z
3
value 0.04428
scoring_system epss
scoring_elements 0.89009
published_at 2026-04-07T12:55:00Z
4
value 0.04428
scoring_system epss
scoring_elements 0.89027
published_at 2026-04-08T12:55:00Z
5
value 0.04428
scoring_system epss
scoring_elements 0.89033
published_at 2026-04-09T12:55:00Z
6
value 0.04428
scoring_system epss
scoring_elements 0.89045
published_at 2026-04-11T12:55:00Z
7
value 0.04428
scoring_system epss
scoring_elements 0.8904
published_at 2026-04-12T12:55:00Z
8
value 0.04428
scoring_system epss
scoring_elements 0.89038
published_at 2026-04-13T12:55:00Z
9
value 0.04428
scoring_system epss
scoring_elements 0.89051
published_at 2026-04-18T12:55:00Z
10
value 0.04428
scoring_system epss
scoring_elements 0.89046
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20149
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20148
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20149
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20150
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20151
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20152
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20153
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8942
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916403
reference_id 916403
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916403
fixed_packages
0
url pkg:deb/debian/wordpress@5.0.1%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.0.1%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.0.1%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2018-20149
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fcqu-11yk-h3af
146
url VCID-fd51-1hat-v3ee
vulnerability_id VCID-fd51-1hat-v3ee
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17091
reference_id
reference_type
scores
0
value 0.04478
scoring_system epss
scoring_elements 0.89111
published_at 2026-04-21T12:55:00Z
1
value 0.04478
scoring_system epss
scoring_elements 0.89115
published_at 2026-04-18T12:55:00Z
2
value 0.04478
scoring_system epss
scoring_elements 0.89047
published_at 2026-04-01T12:55:00Z
3
value 0.04478
scoring_system epss
scoring_elements 0.89056
published_at 2026-04-02T12:55:00Z
4
value 0.04478
scoring_system epss
scoring_elements 0.89071
published_at 2026-04-04T12:55:00Z
5
value 0.04478
scoring_system epss
scoring_elements 0.89073
published_at 2026-04-07T12:55:00Z
6
value 0.04478
scoring_system epss
scoring_elements 0.89091
published_at 2026-04-08T12:55:00Z
7
value 0.04478
scoring_system epss
scoring_elements 0.89096
published_at 2026-04-09T12:55:00Z
8
value 0.04478
scoring_system epss
scoring_elements 0.89107
published_at 2026-04-11T12:55:00Z
9
value 0.04478
scoring_system epss
scoring_elements 0.89103
published_at 2026-04-12T12:55:00Z
10
value 0.04478
scoring_system epss
scoring_elements 0.89101
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17091
1
reference_url https://codex.wordpress.org/Version_4.9.1
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.9.1
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16510
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17091
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17093
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17094
7
reference_url https://github.com/WordPress/WordPress/commit/eaf1cfdc1fe0bdffabd8d879c591b864d833326c
reference_id
reference_type
scores
url https://github.com/WordPress/WordPress/commit/eaf1cfdc1fe0bdffabd8d879c591b864d833326c
8
reference_url https://lists.debian.org/debian-lts-announce/2017/12/msg00019.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/12/msg00019.html
9
reference_url https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
10
reference_url https://wpvulndb.com/vulnerabilities/8969
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8969
11
reference_url https://www.debian.org/security/2018/dsa-4090
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4090
12
reference_url http://www.securityfocus.com/bid/102024
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102024
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883314
reference_id 883314
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883314
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17091
reference_id CVE-2017-17091
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17091
fixed_packages
0
url pkg:deb/debian/wordpress@4.9.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.9.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.9.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-17091
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fd51-1hat-v3ee
147
url VCID-fdtx-uggj-ybby
vulnerability_id VCID-fdtx-uggj-ybby
summary The make_clickable function in wp-includes/formatting.php in WordPress before 3.1.1 does not properly check URLs before passing them to the PCRE library, which allows remote attackers to cause a denial of service (crash) via a comment with a crafted URL that triggers many recursive calls.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4957
reference_id
reference_type
scores
0
value 0.02802
scoring_system epss
scoring_elements 0.86051
published_at 2026-04-01T12:55:00Z
1
value 0.02802
scoring_system epss
scoring_elements 0.86062
published_at 2026-04-02T12:55:00Z
2
value 0.02802
scoring_system epss
scoring_elements 0.86079
published_at 2026-04-04T12:55:00Z
3
value 0.02802
scoring_system epss
scoring_elements 0.86078
published_at 2026-04-07T12:55:00Z
4
value 0.02802
scoring_system epss
scoring_elements 0.86097
published_at 2026-04-08T12:55:00Z
5
value 0.02802
scoring_system epss
scoring_elements 0.86108
published_at 2026-04-09T12:55:00Z
6
value 0.02802
scoring_system epss
scoring_elements 0.86122
published_at 2026-04-11T12:55:00Z
7
value 0.02802
scoring_system epss
scoring_elements 0.86121
published_at 2026-04-12T12:55:00Z
8
value 0.02802
scoring_system epss
scoring_elements 0.86117
published_at 2026-04-13T12:55:00Z
9
value 0.02802
scoring_system epss
scoring_elements 0.86134
published_at 2026-04-16T12:55:00Z
10
value 0.02802
scoring_system epss
scoring_elements 0.86139
published_at 2026-04-18T12:55:00Z
11
value 0.02802
scoring_system epss
scoring_elements 0.86132
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4957
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4957
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4957
fixed_packages
0
url pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.2.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2011-4957
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fdtx-uggj-ybby
148
url VCID-fkqw-vkvb-gydh
vulnerability_id VCID-fkqw-vkvb-gydh
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5832
reference_id
reference_type
scores
0
value 0.02598
scoring_system epss
scoring_elements 0.85631
published_at 2026-04-21T12:55:00Z
1
value 0.02598
scoring_system epss
scoring_elements 0.85634
published_at 2026-04-18T12:55:00Z
2
value 0.02598
scoring_system epss
scoring_elements 0.85534
published_at 2026-04-01T12:55:00Z
3
value 0.02598
scoring_system epss
scoring_elements 0.85546
published_at 2026-04-02T12:55:00Z
4
value 0.02598
scoring_system epss
scoring_elements 0.85564
published_at 2026-04-04T12:55:00Z
5
value 0.02598
scoring_system epss
scoring_elements 0.85569
published_at 2026-04-07T12:55:00Z
6
value 0.02598
scoring_system epss
scoring_elements 0.85589
published_at 2026-04-08T12:55:00Z
7
value 0.02598
scoring_system epss
scoring_elements 0.856
published_at 2026-04-09T12:55:00Z
8
value 0.02598
scoring_system epss
scoring_elements 0.85614
published_at 2026-04-11T12:55:00Z
9
value 0.02598
scoring_system epss
scoring_elements 0.85611
published_at 2026-04-12T12:55:00Z
10
value 0.02598
scoring_system epss
scoring_elements 0.85607
published_at 2026-04-13T12:55:00Z
11
value 0.02598
scoring_system epss
scoring_elements 0.85629
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5832
1
reference_url https://codex.wordpress.org/Version_4.5.3
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.5.3
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8834
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5832
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5832
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5834
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5835
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5837
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5838
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5838
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5839
9
reference_url https://wordpress.org/news/2016/06/wordpress-4-5-3/
reference_id
reference_type
scores
url https://wordpress.org/news/2016/06/wordpress-4-5-3/
10
reference_url https://wpvulndb.com/vulnerabilities/8522
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8522
11
reference_url http://www.debian.org/security/2016/dsa-3639
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3639
12
reference_url http://www.securityfocus.com/bid/91362
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91362
13
reference_url http://www.securitytracker.com/id/1036163
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036163
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5832
reference_id CVE-2016-5832
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-5832
fixed_packages
0
url pkg:deb/debian/wordpress@4.5.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.5.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.5.3%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2016-5832
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fkqw-vkvb-gydh
149
url VCID-fmzm-hb5j-dyfe
vulnerability_id VCID-fmzm-hb5j-dyfe
summary several
references
0
reference_url http://codex.wordpress.org/Version_3.5.2
reference_id
reference_type
scores
url http://codex.wordpress.org/Version_3.5.2
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2203
reference_id
reference_type
scores
0
value 0.00901
scoring_system epss
scoring_elements 0.75711
published_at 2026-04-21T12:55:00Z
1
value 0.00901
scoring_system epss
scoring_elements 0.75625
published_at 2026-04-01T12:55:00Z
2
value 0.00901
scoring_system epss
scoring_elements 0.75627
published_at 2026-04-02T12:55:00Z
3
value 0.00901
scoring_system epss
scoring_elements 0.75658
published_at 2026-04-04T12:55:00Z
4
value 0.00901
scoring_system epss
scoring_elements 0.75638
published_at 2026-04-07T12:55:00Z
5
value 0.00901
scoring_system epss
scoring_elements 0.75672
published_at 2026-04-08T12:55:00Z
6
value 0.00901
scoring_system epss
scoring_elements 0.75683
published_at 2026-04-09T12:55:00Z
7
value 0.00901
scoring_system epss
scoring_elements 0.75708
published_at 2026-04-11T12:55:00Z
8
value 0.00901
scoring_system epss
scoring_elements 0.75689
published_at 2026-04-12T12:55:00Z
9
value 0.00901
scoring_system epss
scoring_elements 0.75682
published_at 2026-04-13T12:55:00Z
10
value 0.00901
scoring_system epss
scoring_elements 0.75721
published_at 2026-04-16T12:55:00Z
11
value 0.00901
scoring_system epss
scoring_elements 0.75724
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2203
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=976784
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=976784
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2173
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2173
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2199
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2200
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2201
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2202
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2203
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2204
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2205
11
reference_url http://wordpress.org/news/2013/06/wordpress-3-5-2/
reference_id
reference_type
scores
url http://wordpress.org/news/2013/06/wordpress-3-5-2/
12
reference_url http://www.debian.org/security/2013/dsa-2718
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2718
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=713947
reference_id 713947
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=713947
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2203
reference_id CVE-2013-2203
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-2203
fixed_packages
0
url pkg:deb/debian/wordpress@3.5.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.5.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.5.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2013-2203
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fmzm-hb5j-dyfe
150
url VCID-fnf4-fykj-p3f7
vulnerability_id VCID-fnf4-fykj-p3f7
summary WordPress 2.0.1 and earlier allows remote attackers to obtain sensitive information via a direct request to (1) default-filters.php, (2) template-loader.php, (3) rss-functions.php, (4) locale.php, (5) wp-db.php, and (6) kses.php in the wp-includes/ directory; and (7) edit-form-advanced.php, (8) admin-functions.php, (9) edit-link-form.php, (10) edit-page-form.php, (11) admin-footer.php, and (12) menu.php in the wp-admin directory; and possibly (13) list directory contents of the wp-includes directory. NOTE: the vars.php, edit-form.php, wp-settings.php, and edit-form-comment.php vectors are already covered by CVE-2005-4463. The menu-header.php vector is already covered by CVE-2005-2110. Other vectors might be covered by CVE-2005-1688. NOTE: if the typical installation of WordPress does not list any site-specific files to wp-includes, then vector [13] is not an exposure.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-0986
reference_id
reference_type
scores
0
value 0.02177
scoring_system epss
scoring_elements 0.84269
published_at 2026-04-01T12:55:00Z
1
value 0.02177
scoring_system epss
scoring_elements 0.84282
published_at 2026-04-02T12:55:00Z
2
value 0.02177
scoring_system epss
scoring_elements 0.84302
published_at 2026-04-04T12:55:00Z
3
value 0.02177
scoring_system epss
scoring_elements 0.84303
published_at 2026-04-07T12:55:00Z
4
value 0.02177
scoring_system epss
scoring_elements 0.84324
published_at 2026-04-08T12:55:00Z
5
value 0.02177
scoring_system epss
scoring_elements 0.8433
published_at 2026-04-09T12:55:00Z
6
value 0.02177
scoring_system epss
scoring_elements 0.84348
published_at 2026-04-11T12:55:00Z
7
value 0.02177
scoring_system epss
scoring_elements 0.84341
published_at 2026-04-12T12:55:00Z
8
value 0.02177
scoring_system epss
scoring_elements 0.84337
published_at 2026-04-13T12:55:00Z
9
value 0.02177
scoring_system epss
scoring_elements 0.84359
published_at 2026-04-16T12:55:00Z
10
value 0.02177
scoring_system epss
scoring_elements 0.8436
published_at 2026-04-18T12:55:00Z
11
value 0.02177
scoring_system epss
scoring_elements 0.84363
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-0986
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0986
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0986
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=355055
reference_id 355055
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=355055
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.2-1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2006-0986
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fnf4-fykj-p3f7
151
url VCID-fpwa-74w6-mugt
vulnerability_id VCID-fpwa-74w6-mugt
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16780
reference_id
reference_type
scores
0
value 0.03606
scoring_system epss
scoring_elements 0.87723
published_at 2026-04-01T12:55:00Z
1
value 0.03606
scoring_system epss
scoring_elements 0.87734
published_at 2026-04-02T12:55:00Z
2
value 0.03606
scoring_system epss
scoring_elements 0.87747
published_at 2026-04-04T12:55:00Z
3
value 0.03606
scoring_system epss
scoring_elements 0.87749
published_at 2026-04-07T12:55:00Z
4
value 0.03606
scoring_system epss
scoring_elements 0.8777
published_at 2026-04-08T12:55:00Z
5
value 0.03606
scoring_system epss
scoring_elements 0.87776
published_at 2026-04-09T12:55:00Z
6
value 0.03606
scoring_system epss
scoring_elements 0.87787
published_at 2026-04-11T12:55:00Z
7
value 0.03606
scoring_system epss
scoring_elements 0.87782
published_at 2026-04-12T12:55:00Z
8
value 0.03606
scoring_system epss
scoring_elements 0.87781
published_at 2026-04-13T12:55:00Z
9
value 0.03606
scoring_system epss
scoring_elements 0.87795
published_at 2026-04-16T12:55:00Z
10
value 0.03606
scoring_system epss
scoring_elements 0.87794
published_at 2026-04-18T12:55:00Z
11
value 0.03606
scoring_system epss
scoring_elements 0.87792
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16780
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946905
reference_id 946905
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946905
fixed_packages
0
url pkg:deb/debian/wordpress@5.3.2%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.3.2%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.3.2%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2019-16780
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fpwa-74w6-mugt
152
url VCID-fqna-8mh3-rkd8
vulnerability_id VCID-fqna-8mh3-rkd8
summary Cross-site request forgery (CSRF) vulnerability in wp-admin/index.php in WordPress 3.4.2 allows remote attackers to hijack the authentication of administrators for requests that modify an RSS URL via a dashboard_incoming_links edit action.
references
0
reference_url http://openwall.com/lists/oss-security/2012/09/25/15
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2012/09/25/15
1
reference_url http://packetstormsecurity.org/files/116785/WordPress-3.4.2-Cross-Site-Request-Forgery.html
reference_id
reference_type
scores
url http://packetstormsecurity.org/files/116785/WordPress-3.4.2-Cross-Site-Request-Forgery.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4448
reference_id
reference_type
scores
0
value 0.00153
scoring_system epss
scoring_elements 0.35934
published_at 2026-04-21T12:55:00Z
1
value 0.00153
scoring_system epss
scoring_elements 0.35888
published_at 2026-04-01T12:55:00Z
2
value 0.00153
scoring_system epss
scoring_elements 0.36079
published_at 2026-04-02T12:55:00Z
3
value 0.00153
scoring_system epss
scoring_elements 0.36108
published_at 2026-04-04T12:55:00Z
4
value 0.00153
scoring_system epss
scoring_elements 0.35944
published_at 2026-04-07T12:55:00Z
5
value 0.00153
scoring_system epss
scoring_elements 0.35994
published_at 2026-04-08T12:55:00Z
6
value 0.00153
scoring_system epss
scoring_elements 0.36017
published_at 2026-04-09T12:55:00Z
7
value 0.00153
scoring_system epss
scoring_elements 0.36023
published_at 2026-04-11T12:55:00Z
8
value 0.00153
scoring_system epss
scoring_elements 0.35985
published_at 2026-04-12T12:55:00Z
9
value 0.00153
scoring_system epss
scoring_elements 0.3596
published_at 2026-04-13T12:55:00Z
10
value 0.00153
scoring_system epss
scoring_elements 0.35999
published_at 2026-04-16T12:55:00Z
11
value 0.00153
scoring_system epss
scoring_elements 0.35984
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4448
3
reference_url https://bugs.gentoo.org/show_bug.cgi?id=436198
reference_id
reference_type
scores
url https://bugs.gentoo.org/show_bug.cgi?id=436198
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=860261
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=860261
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4448
6
reference_url http://secunia.com/advisories/50715
reference_id
reference_type
scores
url http://secunia.com/advisories/50715
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689031
reference_id 689031
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689031
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4448
reference_id CVE-2012-4448
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-4448
fixed_packages
0
url pkg:deb/debian/wordpress@3.5.1%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/wordpress@3.5.1%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.5.1%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2012-4448
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fqna-8mh3-rkd8
153
url VCID-fra3-hye6-kqh7
vulnerability_id VCID-fra3-hye6-kqh7
summary
Insecure Deserialization of untrusted data in rmccue/requests
### Impact
Unserialization of untrusted data.

### Patches
The issue has been patched and users of `Requests` 1.6.0, 1.6.1 and 1.7.0 should update to version 1.8.0.

### References
Publications about the vulnerability:
* https://dannewitz.ninja/posts/php-unserialize-object-injection-yet-another-stars-rating-wordpress
* https://github.com/ambionics/phpggc/issues/52
* https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security/
* https://i.blackhat.com/us-18/Thu-August-9/us-18-Thomas-Its-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It.pdf
* https://cdn2.hubspot.net/hubfs/3853213/us-18-Thomas-It%27s-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-....pdf
* https://2018.zeronights.ru/wp-content/uploads/materials/9%20ZN2018%20WV%20-%20PHP%20unserialize.pdf
* https://medium.com/@knownsec404team/extend-the-attack-surface-of-php-deserialization-vulnerability-via-phar-d6455c6a1066#3c0f

Originally fixed in WordPress 5.5.2:
* https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3
* https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/

Related Security Advisories:
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-28032
* https://nvd.nist.gov/vuln/detail/CVE-2020-28032

Notification to the Requests repo including a fix in:
* https://github.com/rmccue/Requests/pull/421 and
* https://github.com/rmccue/Requests/pull/422

### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Request](https://github.com/WordPress/Requests/)
references
0
reference_url https://2018.zeronights.ru/wp-content/uploads/materials/9%20ZN2018%20WV%20-%20PHP%20unserialize.pdf
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://2018.zeronights.ru/wp-content/uploads/materials/9%20ZN2018%20WV%20-%20PHP%20unserialize.pdf
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-29476
reference_id
reference_type
scores
0
value 0.02219
scoring_system epss
scoring_elements 0.8451
published_at 2026-04-18T12:55:00Z
1
value 0.02219
scoring_system epss
scoring_elements 0.84489
published_at 2026-04-13T12:55:00Z
2
value 0.02219
scoring_system epss
scoring_elements 0.84493
published_at 2026-04-12T12:55:00Z
3
value 0.02219
scoring_system epss
scoring_elements 0.845
published_at 2026-04-11T12:55:00Z
4
value 0.02219
scoring_system epss
scoring_elements 0.84481
published_at 2026-04-09T12:55:00Z
5
value 0.02219
scoring_system epss
scoring_elements 0.84475
published_at 2026-04-08T12:55:00Z
6
value 0.02219
scoring_system epss
scoring_elements 0.84418
published_at 2026-04-01T12:55:00Z
7
value 0.02219
scoring_system epss
scoring_elements 0.84512
published_at 2026-04-21T12:55:00Z
8
value 0.02219
scoring_system epss
scoring_elements 0.84454
published_at 2026-04-07T12:55:00Z
9
value 0.02219
scoring_system epss
scoring_elements 0.84452
published_at 2026-04-04T12:55:00Z
10
value 0.02219
scoring_system epss
scoring_elements 0.84433
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-29476
2
reference_url https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security
3
reference_url https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security/
reference_id
reference_type
scores
url https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security/
4
reference_url https://cdn2.hubspot.net/hubfs/3853213/us-18-Thomas-It%27s-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-....pdf
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://cdn2.hubspot.net/hubfs/3853213/us-18-Thomas-It%27s-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-....pdf
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29476
6
reference_url https://dannewitz.ninja/posts/php-unserialize-object-injection-yet-another-stars-rating-wordpress
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://dannewitz.ninja/posts/php-unserialize-object-injection-yet-another-stars-rating-wordpress
7
reference_url https://github.com/ambionics/phpggc/issues/52
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/ambionics/phpggc/issues/52
8
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/rmccue/requests/CVE-2021-29476.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/rmccue/requests/CVE-2021-29476.yaml
9
reference_url https://github.com/rmccue/Requests/pull/421
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/rmccue/Requests/pull/421
10
reference_url https://github.com/WordPress/Requests/security/advisories/GHSA-52qp-jpq7-6c54
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/WordPress/Requests/security/advisories/GHSA-52qp-jpq7-6c54
11
reference_url https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3
12
reference_url https://i.blackhat.com/us-18/Thu-August-9/us-18-Thomas-Its-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It.pdf
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://i.blackhat.com/us-18/Thu-August-9/us-18-Thomas-Its-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It.pdf
13
reference_url https://medium.com/@knownsec404team/extend-the-attack-surface-of-php-deserialization-vulnerability-via-phar-d6455c6a1066#3c0f
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://medium.com/@knownsec404team/extend-the-attack-surface-of-php-deserialization-vulnerability-via-phar-d6455c6a1066#3c0f
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-29476
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-29476
15
reference_url https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release
16
reference_url https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/
17
reference_url https://github.com/advisories/GHSA-52qp-jpq7-6c54
reference_id GHSA-52qp-jpq7-6c54
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-52qp-jpq7-6c54
fixed_packages
0
url pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.5.3%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2021-29476, GHSA-52qp-jpq7-6c54
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fra3-hye6-kqh7
154
url VCID-fuma-nkmd-zkc1
vulnerability_id VCID-fuma-nkmd-zkc1
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17673
reference_id
reference_type
scores
0
value 0.03574
scoring_system epss
scoring_elements 0.87745
published_at 2026-04-21T12:55:00Z
1
value 0.03574
scoring_system epss
scoring_elements 0.87746
published_at 2026-04-18T12:55:00Z
2
value 0.03574
scoring_system epss
scoring_elements 0.87678
published_at 2026-04-01T12:55:00Z
3
value 0.03574
scoring_system epss
scoring_elements 0.87689
published_at 2026-04-02T12:55:00Z
4
value 0.03574
scoring_system epss
scoring_elements 0.87701
published_at 2026-04-04T12:55:00Z
5
value 0.03574
scoring_system epss
scoring_elements 0.87703
published_at 2026-04-07T12:55:00Z
6
value 0.03574
scoring_system epss
scoring_elements 0.87724
published_at 2026-04-08T12:55:00Z
7
value 0.03574
scoring_system epss
scoring_elements 0.8773
published_at 2026-04-09T12:55:00Z
8
value 0.03574
scoring_system epss
scoring_elements 0.87741
published_at 2026-04-11T12:55:00Z
9
value 0.03574
scoring_system epss
scoring_elements 0.87735
published_at 2026-04-12T12:55:00Z
10
value 0.03574
scoring_system epss
scoring_elements 0.87733
published_at 2026-04-13T12:55:00Z
11
value 0.03574
scoring_system epss
scoring_elements 0.87747
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17673
1
reference_url https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html
reference_id
reference_type
scores
url https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html
2
reference_url https://core.trac.wordpress.org/changeset/46478
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/46478
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
21
reference_url https://github.com/WordPress/WordPress/commit/b224c251adfa16a5f84074a3c0886270c9df38de
reference_id
reference_type
scores
url https://github.com/WordPress/WordPress/commit/b224c251adfa16a5f84074a3c0886270c9df38de
22
reference_url https://seclists.org/bugtraq/2020/Jan/8
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2020/Jan/8
23
reference_url https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/
24
reference_url https://wpvulndb.com/vulnerabilities/9911
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/9911
25
reference_url https://www.debian.org/security/2020/dsa-4599
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4599
26
reference_url https://www.debian.org/security/2020/dsa-4677
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4677
27
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942459
reference_id 942459
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942459
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-17673
reference_id CVE-2019-17673
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-17673
fixed_packages
0
url pkg:deb/debian/wordpress@5.2.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.2.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.2.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2019-17673
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fuma-nkmd-zkc1
155
url VCID-fykj-9gba-rqgn
vulnerability_id VCID-fykj-9gba-rqgn
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0493.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0493.html
1
reference_url http://openwall.com/lists/oss-security/2014/11/25/12
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2014/11/25/12
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9036
reference_id
reference_type
scores
0
value 0.00586
scoring_system epss
scoring_elements 0.69101
published_at 2026-04-21T12:55:00Z
1
value 0.00586
scoring_system epss
scoring_elements 0.69007
published_at 2026-04-01T12:55:00Z
2
value 0.00586
scoring_system epss
scoring_elements 0.69024
published_at 2026-04-02T12:55:00Z
3
value 0.00586
scoring_system epss
scoring_elements 0.69044
published_at 2026-04-04T12:55:00Z
4
value 0.00586
scoring_system epss
scoring_elements 0.69025
published_at 2026-04-07T12:55:00Z
5
value 0.00586
scoring_system epss
scoring_elements 0.69075
published_at 2026-04-08T12:55:00Z
6
value 0.00586
scoring_system epss
scoring_elements 0.69095
published_at 2026-04-09T12:55:00Z
7
value 0.00586
scoring_system epss
scoring_elements 0.69118
published_at 2026-04-11T12:55:00Z
8
value 0.00586
scoring_system epss
scoring_elements 0.69103
published_at 2026-04-12T12:55:00Z
9
value 0.00586
scoring_system epss
scoring_elements 0.69073
published_at 2026-04-13T12:55:00Z
10
value 0.00586
scoring_system epss
scoring_elements 0.69113
published_at 2026-04-16T12:55:00Z
11
value 0.00586
scoring_system epss
scoring_elements 0.69121
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9036
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039
11
reference_url https://wordpress.org/news/2014/11/wordpress-4-0-1/
reference_id
reference_type
scores
url https://wordpress.org/news/2014/11/wordpress-4-0-1/
12
reference_url http://www.debian.org/security/2014/dsa-3085
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3085
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:233
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:233
14
reference_url http://www.securityfocus.com/bid/71236
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71236
15
reference_url http://www.securitytracker.com/id/1031243
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031243
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425
reference_id 770425
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9036
reference_id CVE-2014-9036
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-9036
fixed_packages
0
url pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.0.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2014-9036
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fykj-9gba-rqgn
156
url VCID-fzyt-wpgd-byh1
vulnerability_id VCID-fzyt-wpgd-byh1
summary Multiple cross-site scripting (XSS) vulnerabilities in WordPress before 3.0.5 allow remote authenticated users to inject arbitrary web script or HTML via vectors related to (1) the Quick/Bulk Edit title (aka post title or post_title), (2) post_status, (3) comment_status, (4) ping_status, and (5) escaping of tags within the tags meta box.
references
0
reference_url http://codex.wordpress.org/Version_3.0.5
reference_id
reference_type
scores
url http://codex.wordpress.org/Version_3.0.5
1
reference_url http://core.trac.wordpress.org/changeset/17397
reference_id
reference_type
scores
url http://core.trac.wordpress.org/changeset/17397
2
reference_url http://core.trac.wordpress.org/changeset/17401
reference_id
reference_type
scores
url http://core.trac.wordpress.org/changeset/17401
3
reference_url http://core.trac.wordpress.org/changeset/17406
reference_id
reference_type
scores
url http://core.trac.wordpress.org/changeset/17406
4
reference_url http://core.trac.wordpress.org/changeset/17412
reference_id
reference_type
scores
url http://core.trac.wordpress.org/changeset/17412
5
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056412.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056412.html
6
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056998.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056998.html
7
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057003.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057003.html
8
reference_url http://openwall.com/lists/oss-security/2011/02/08/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/02/08/7
9
reference_url http://openwall.com/lists/oss-security/2011/02/09/13
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/02/09/13
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0700
reference_id
reference_type
scores
0
value 0.00793
scoring_system epss
scoring_elements 0.73888
published_at 2026-04-02T12:55:00Z
1
value 0.00793
scoring_system epss
scoring_elements 0.73912
published_at 2026-04-04T12:55:00Z
2
value 0.00793
scoring_system epss
scoring_elements 0.73877
published_at 2026-04-01T12:55:00Z
3
value 0.01074
scoring_system epss
scoring_elements 0.77761
published_at 2026-04-09T12:55:00Z
4
value 0.01074
scoring_system epss
scoring_elements 0.77787
published_at 2026-04-11T12:55:00Z
5
value 0.01074
scoring_system epss
scoring_elements 0.77771
published_at 2026-04-13T12:55:00Z
6
value 0.01074
scoring_system epss
scoring_elements 0.77807
published_at 2026-04-16T12:55:00Z
7
value 0.01074
scoring_system epss
scoring_elements 0.77806
published_at 2026-04-18T12:55:00Z
8
value 0.01074
scoring_system epss
scoring_elements 0.778
published_at 2026-04-21T12:55:00Z
9
value 0.01074
scoring_system epss
scoring_elements 0.77728
published_at 2026-04-07T12:55:00Z
10
value 0.01074
scoring_system epss
scoring_elements 0.77756
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0700
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0700
12
reference_url http://secunia.com/advisories/43729
reference_id
reference_type
scores
url http://secunia.com/advisories/43729
13
reference_url http://www.debian.org/security/2011/dsa-2190
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2190
14
reference_url http://www.securityfocus.com/bid/46249
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46249
15
reference_url http://www.vupen.com/english/advisories/2011/0658
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0658
16
reference_url http://www.vupen.com/english/advisories/2011/0721
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0721
17
reference_url http://www.wordpress.org/news/2011/02/wordpress-3-0-5/
reference_id
reference_type
scores
url http://www.wordpress.org/news/2011/02/wordpress-3-0-5/
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0700
reference_id CVE-2011-0700
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2011-0700
fixed_packages
0
url pkg:deb/debian/wordpress@3.0.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.0.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.0.5%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2011-0700
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fzyt-wpgd-byh1
157
url VCID-gakg-ky9v-ayej
vulnerability_id VCID-gakg-ky9v-ayej
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6635
reference_id
reference_type
scores
0
value 0.00289
scoring_system epss
scoring_elements 0.52228
published_at 2026-04-01T12:55:00Z
1
value 0.00289
scoring_system epss
scoring_elements 0.52271
published_at 2026-04-02T12:55:00Z
2
value 0.00289
scoring_system epss
scoring_elements 0.52299
published_at 2026-04-04T12:55:00Z
3
value 0.00289
scoring_system epss
scoring_elements 0.52261
published_at 2026-04-07T12:55:00Z
4
value 0.00289
scoring_system epss
scoring_elements 0.52313
published_at 2026-04-08T12:55:00Z
5
value 0.00289
scoring_system epss
scoring_elements 0.52308
published_at 2026-04-09T12:55:00Z
6
value 0.00289
scoring_system epss
scoring_elements 0.52358
published_at 2026-04-11T12:55:00Z
7
value 0.00289
scoring_system epss
scoring_elements 0.52343
published_at 2026-04-12T12:55:00Z
8
value 0.00289
scoring_system epss
scoring_elements 0.52328
published_at 2026-04-13T12:55:00Z
9
value 0.00289
scoring_system epss
scoring_elements 0.52366
published_at 2026-04-16T12:55:00Z
10
value 0.00289
scoring_system epss
scoring_elements 0.5237
published_at 2026-04-18T12:55:00Z
11
value 0.00289
scoring_system epss
scoring_elements 0.52354
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6635
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4029
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6634
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6635
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7168
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7169
fixed_packages
0
url pkg:deb/debian/wordpress@4.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.5%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2016-6635
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gakg-ky9v-ayej
158
url VCID-gfey-nhj7-6fap
vulnerability_id VCID-gfey-nhj7-6fap
summary wordpress cookie authentication vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6013.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6013.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6013
reference_id
reference_type
scores
0
value 0.01551
scoring_system epss
scoring_elements 0.81354
published_at 2026-04-01T12:55:00Z
1
value 0.01551
scoring_system epss
scoring_elements 0.81363
published_at 2026-04-02T12:55:00Z
2
value 0.01551
scoring_system epss
scoring_elements 0.81385
published_at 2026-04-04T12:55:00Z
3
value 0.01551
scoring_system epss
scoring_elements 0.81384
published_at 2026-04-07T12:55:00Z
4
value 0.01551
scoring_system epss
scoring_elements 0.81412
published_at 2026-04-08T12:55:00Z
5
value 0.01551
scoring_system epss
scoring_elements 0.81417
published_at 2026-04-09T12:55:00Z
6
value 0.01551
scoring_system epss
scoring_elements 0.81438
published_at 2026-04-11T12:55:00Z
7
value 0.01551
scoring_system epss
scoring_elements 0.81426
published_at 2026-04-12T12:55:00Z
8
value 0.01551
scoring_system epss
scoring_elements 0.81419
published_at 2026-04-13T12:55:00Z
9
value 0.01551
scoring_system epss
scoring_elements 0.81456
published_at 2026-04-16T12:55:00Z
10
value 0.01551
scoring_system epss
scoring_elements 0.81457
published_at 2026-04-18T12:55:00Z
11
value 0.01551
scoring_system epss
scoring_elements 0.81458
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6013
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6013
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=392411
reference_id 392411
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=392411
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452251
reference_id 452251
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452251
fixed_packages
0
url pkg:deb/debian/wordpress@2.5.0-1?distro=trixie
purl pkg:deb/debian/wordpress@2.5.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.5.0-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-6013
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gfey-nhj7-6fap
159
url VCID-ggs8-1k6e-ebc8
vulnerability_id VCID-ggs8-1k6e-ebc8
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7989
reference_id
reference_type
scores
0
value 0.0029
scoring_system epss
scoring_elements 0.52487
published_at 2026-04-21T12:55:00Z
1
value 0.0029
scoring_system epss
scoring_elements 0.52503
published_at 2026-04-18T12:55:00Z
2
value 0.0029
scoring_system epss
scoring_elements 0.52352
published_at 2026-04-01T12:55:00Z
3
value 0.0029
scoring_system epss
scoring_elements 0.52397
published_at 2026-04-02T12:55:00Z
4
value 0.0029
scoring_system epss
scoring_elements 0.52425
published_at 2026-04-04T12:55:00Z
5
value 0.0029
scoring_system epss
scoring_elements 0.5239
published_at 2026-04-07T12:55:00Z
6
value 0.0029
scoring_system epss
scoring_elements 0.52443
published_at 2026-04-08T12:55:00Z
7
value 0.0029
scoring_system epss
scoring_elements 0.52437
published_at 2026-04-09T12:55:00Z
8
value 0.0029
scoring_system epss
scoring_elements 0.52489
published_at 2026-04-11T12:55:00Z
9
value 0.0029
scoring_system epss
scoring_elements 0.52473
published_at 2026-04-12T12:55:00Z
10
value 0.0029
scoring_system epss
scoring_elements 0.52456
published_at 2026-04-13T12:55:00Z
11
value 0.0029
scoring_system epss
scoring_elements 0.52496
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7989
1
reference_url https://codex.wordpress.org/Version_4.3.1
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.3.1
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2213
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5622
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5714
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5715
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5731
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5732
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5734
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7989
10
reference_url https://github.com/WordPress/WordPress/commit/f91a5fd10ea7245e5b41e288624819a37adf290a
reference_id
reference_type
scores
url https://github.com/WordPress/WordPress/commit/f91a5fd10ea7245e5b41e288624819a37adf290a
11
reference_url https://security-tracker.debian.org/tracker/CVE-2015-7989
reference_id
reference_type
scores
url https://security-tracker.debian.org/tracker/CVE-2015-7989
12
reference_url https://wordpress.org/news/2015/09/wordpress-4-3-1/
reference_id
reference_type
scores
url https://wordpress.org/news/2015/09/wordpress-4-3-1/
13
reference_url https://wpvulndb.com/vulnerabilities/8187
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8187
14
reference_url http://www.debian.org/security/2015/dsa-3375
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3375
15
reference_url http://www.debian.org/security/2015/dsa-3383
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3383
16
reference_url http://www.securitytracker.com/id/1033979
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033979
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799140
reference_id 799140
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799140
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7989
reference_id CVE-2015-7989
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
1
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-7989
fixed_packages
0
url pkg:deb/debian/wordpress@4.3.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.3.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.3.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2015-7989
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ggs8-1k6e-ebc8
160
url VCID-ghn9-muv6-17d7
vulnerability_id VCID-ghn9-muv6-17d7
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14723
reference_id
reference_type
scores
0
value 0.10428
scoring_system epss
scoring_elements 0.9325
published_at 2026-04-21T12:55:00Z
1
value 0.10428
scoring_system epss
scoring_elements 0.93242
published_at 2026-04-18T12:55:00Z
2
value 0.10428
scoring_system epss
scoring_elements 0.93196
published_at 2026-04-01T12:55:00Z
3
value 0.10428
scoring_system epss
scoring_elements 0.93205
published_at 2026-04-02T12:55:00Z
4
value 0.10428
scoring_system epss
scoring_elements 0.93209
published_at 2026-04-04T12:55:00Z
5
value 0.10428
scoring_system epss
scoring_elements 0.93207
published_at 2026-04-07T12:55:00Z
6
value 0.10428
scoring_system epss
scoring_elements 0.93215
published_at 2026-04-08T12:55:00Z
7
value 0.10428
scoring_system epss
scoring_elements 0.93219
published_at 2026-04-09T12:55:00Z
8
value 0.10428
scoring_system epss
scoring_elements 0.93224
published_at 2026-04-11T12:55:00Z
9
value 0.10428
scoring_system epss
scoring_elements 0.93221
published_at 2026-04-12T12:55:00Z
10
value 0.10428
scoring_system epss
scoring_elements 0.93222
published_at 2026-04-13T12:55:00Z
11
value 0.10428
scoring_system epss
scoring_elements 0.93238
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14723
1
reference_url https://core.trac.wordpress.org/changeset/41470
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/41470
2
reference_url https://core.trac.wordpress.org/changeset/41496
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/41496
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14718
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14720
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14721
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14722
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14723
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14726
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14726
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14990
12
reference_url https://github.com/WordPress/WordPress/commit/70b21279098fc973eae803693c0705a548128e48
reference_id
reference_type
scores
url https://github.com/WordPress/WordPress/commit/70b21279098fc973eae803693c0705a548128e48
13
reference_url https://github.com/WordPress/WordPress/commit/fc930d3daed1c3acef010d04acc2c5de93cd18ec
reference_id
reference_type
scores
url https://github.com/WordPress/WordPress/commit/fc930d3daed1c3acef010d04acc2c5de93cd18ec
14
reference_url https://medium.com/websec/wordpress-sqli-bbb2afcc8e94
reference_id
reference_type
scores
url https://medium.com/websec/wordpress-sqli-bbb2afcc8e94
15
reference_url https://medium.com/websec/wordpress-sqli-poc-f1827c20bf8e
reference_id
reference_type
scores
url https://medium.com/websec/wordpress-sqli-poc-f1827c20bf8e
16
reference_url https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
17
reference_url https://www.debian.org/security/2017/dsa-3997
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3997
18
reference_url http://www.securityfocus.com/bid/100912
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100912
19
reference_url http://www.securitytracker.com/id/1039553
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039553
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876274
reference_id 876274
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876274
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-14723
reference_id CVE-2017-14723
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-14723
fixed_packages
0
url pkg:deb/debian/wordpress@4.8.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.8.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.8.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-14723
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ghn9-muv6-17d7
161
url VCID-gwks-aqn7-mud4
vulnerability_id VCID-gwks-aqn7-mud4
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9065
reference_id
reference_type
scores
0
value 0.03545
scoring_system epss
scoring_elements 0.87627
published_at 2026-04-01T12:55:00Z
1
value 0.03545
scoring_system epss
scoring_elements 0.87636
published_at 2026-04-02T12:55:00Z
2
value 0.03545
scoring_system epss
scoring_elements 0.87649
published_at 2026-04-04T12:55:00Z
3
value 0.03545
scoring_system epss
scoring_elements 0.8765
published_at 2026-04-07T12:55:00Z
4
value 0.03545
scoring_system epss
scoring_elements 0.87671
published_at 2026-04-08T12:55:00Z
5
value 0.03545
scoring_system epss
scoring_elements 0.87678
published_at 2026-04-09T12:55:00Z
6
value 0.03545
scoring_system epss
scoring_elements 0.87689
published_at 2026-04-11T12:55:00Z
7
value 0.03545
scoring_system epss
scoring_elements 0.87684
published_at 2026-04-12T12:55:00Z
8
value 0.03545
scoring_system epss
scoring_elements 0.87681
published_at 2026-04-13T12:55:00Z
9
value 0.03545
scoring_system epss
scoring_elements 0.87696
published_at 2026-04-16T12:55:00Z
10
value 0.03545
scoring_system epss
scoring_elements 0.87697
published_at 2026-04-18T12:55:00Z
11
value 0.03545
scoring_system epss
scoring_elements 0.87694
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9065
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8295
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9061
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9062
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9062
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9063
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9064
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9065
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862816
reference_id 862816
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862816
fixed_packages
0
url pkg:deb/debian/wordpress@4.7.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.7.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.7.5%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-9065
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gwks-aqn7-mud4
162
url VCID-gy54-apzn-7kef
vulnerability_id VCID-gy54-apzn-7kef
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28036
reference_id
reference_type
scores
0
value 0.04185
scoring_system epss
scoring_elements 0.88666
published_at 2026-04-02T12:55:00Z
1
value 0.04185
scoring_system epss
scoring_elements 0.88682
published_at 2026-04-04T12:55:00Z
2
value 0.04185
scoring_system epss
scoring_elements 0.88683
published_at 2026-04-07T12:55:00Z
3
value 0.04185
scoring_system epss
scoring_elements 0.88701
published_at 2026-04-08T12:55:00Z
4
value 0.04185
scoring_system epss
scoring_elements 0.88657
published_at 2026-04-01T12:55:00Z
5
value 0.06074
scoring_system epss
scoring_elements 0.90776
published_at 2026-04-16T12:55:00Z
6
value 0.06074
scoring_system epss
scoring_elements 0.90773
published_at 2026-04-18T12:55:00Z
7
value 0.06074
scoring_system epss
scoring_elements 0.90772
published_at 2026-04-21T12:55:00Z
8
value 0.06074
scoring_system epss
scoring_elements 0.90752
published_at 2026-04-09T12:55:00Z
9
value 0.06074
scoring_system epss
scoring_elements 0.90761
published_at 2026-04-11T12:55:00Z
10
value 0.06074
scoring_system epss
scoring_elements 0.9076
published_at 2026-04-12T12:55:00Z
11
value 0.06074
scoring_system epss
scoring_elements 0.90757
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28036
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562
reference_id 973562
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562
11
reference_url https://security.archlinux.org/ASA-202011-3
reference_id ASA-202011-3
reference_type
scores
url https://security.archlinux.org/ASA-202011-3
12
reference_url https://security.archlinux.org/AVG-1257
reference_id AVG-1257
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1257
fixed_packages
0
url pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.5.3%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2020-28036
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gy54-apzn-7kef
163
url VCID-gz89-rnrc-2ubc
vulnerability_id VCID-gz89-rnrc-2ubc
summary wp-includes/formatting.php in WordPress before 3.3.2 attempts to enable clickable links inside attributes, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2403
reference_id
reference_type
scores
0
value 0.03128
scoring_system epss
scoring_elements 0.86797
published_at 2026-04-01T12:55:00Z
1
value 0.03128
scoring_system epss
scoring_elements 0.86808
published_at 2026-04-02T12:55:00Z
2
value 0.03128
scoring_system epss
scoring_elements 0.86827
published_at 2026-04-04T12:55:00Z
3
value 0.03128
scoring_system epss
scoring_elements 0.8682
published_at 2026-04-07T12:55:00Z
4
value 0.03128
scoring_system epss
scoring_elements 0.8684
published_at 2026-04-08T12:55:00Z
5
value 0.03128
scoring_system epss
scoring_elements 0.86849
published_at 2026-04-09T12:55:00Z
6
value 0.03128
scoring_system epss
scoring_elements 0.86861
published_at 2026-04-11T12:55:00Z
7
value 0.03128
scoring_system epss
scoring_elements 0.86857
published_at 2026-04-12T12:55:00Z
8
value 0.03128
scoring_system epss
scoring_elements 0.86853
published_at 2026-04-13T12:55:00Z
9
value 0.03128
scoring_system epss
scoring_elements 0.8687
published_at 2026-04-16T12:55:00Z
10
value 0.03128
scoring_system epss
scoring_elements 0.86874
published_at 2026-04-18T12:55:00Z
11
value 0.03128
scoring_system epss
scoring_elements 0.86875
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2403
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2403
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670124
reference_id 670124
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670124
fixed_packages
0
url pkg:deb/debian/wordpress@3.3.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.3.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.3.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2012-2403
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gz89-rnrc-2ubc
164
url VCID-h1fb-65br-93fb
vulnerability_id VCID-h1fb-65br-93fb
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5838
reference_id
reference_type
scores
0
value 0.01728
scoring_system epss
scoring_elements 0.82481
published_at 2026-04-21T12:55:00Z
1
value 0.01728
scoring_system epss
scoring_elements 0.82477
published_at 2026-04-18T12:55:00Z
2
value 0.01728
scoring_system epss
scoring_elements 0.82367
published_at 2026-04-01T12:55:00Z
3
value 0.01728
scoring_system epss
scoring_elements 0.82381
published_at 2026-04-02T12:55:00Z
4
value 0.01728
scoring_system epss
scoring_elements 0.82399
published_at 2026-04-04T12:55:00Z
5
value 0.01728
scoring_system epss
scoring_elements 0.82396
published_at 2026-04-07T12:55:00Z
6
value 0.01728
scoring_system epss
scoring_elements 0.82423
published_at 2026-04-08T12:55:00Z
7
value 0.01728
scoring_system epss
scoring_elements 0.82431
published_at 2026-04-09T12:55:00Z
8
value 0.01728
scoring_system epss
scoring_elements 0.82449
published_at 2026-04-11T12:55:00Z
9
value 0.01728
scoring_system epss
scoring_elements 0.82445
published_at 2026-04-12T12:55:00Z
10
value 0.01728
scoring_system epss
scoring_elements 0.8244
published_at 2026-04-13T12:55:00Z
11
value 0.01728
scoring_system epss
scoring_elements 0.82476
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5838
1
reference_url https://codex.wordpress.org/Version_4.5.3
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.5.3
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8834
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5832
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5832
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5834
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5835
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5837
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5838
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5838
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5839
9
reference_url https://wordpress.org/news/2016/06/wordpress-4-5-3/
reference_id
reference_type
scores
url https://wordpress.org/news/2016/06/wordpress-4-5-3/
10
reference_url https://wpvulndb.com/vulnerabilities/8524
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8524
11
reference_url http://www.debian.org/security/2016/dsa-3639
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3639
12
reference_url http://www.securityfocus.com/bid/91367
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91367
13
reference_url http://www.securitytracker.com/id/1036163
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036163
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5838
reference_id CVE-2016-5838
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-5838
fixed_packages
0
url pkg:deb/debian/wordpress@4.5.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.5.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.5.3%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2016-5838
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h1fb-65br-93fb
165
url VCID-h2mz-4fad-9qdj
vulnerability_id VCID-h2mz-4fad-9qdj
summary Cross-site scripting (XSS) vulnerability in wp-admin/plugins.php in WordPress before 3.0.2 might allow remote attackers to inject arbitrary web script or HTML via a plugin's author field, which is not properly handled during a Delete Plugin action.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-5295
reference_id
reference_type
scores
0
value 0.005
scoring_system epss
scoring_elements 0.6589
published_at 2026-04-01T12:55:00Z
1
value 0.005
scoring_system epss
scoring_elements 0.65931
published_at 2026-04-02T12:55:00Z
2
value 0.005
scoring_system epss
scoring_elements 0.65961
published_at 2026-04-04T12:55:00Z
3
value 0.005
scoring_system epss
scoring_elements 0.65928
published_at 2026-04-07T12:55:00Z
4
value 0.005
scoring_system epss
scoring_elements 0.65979
published_at 2026-04-08T12:55:00Z
5
value 0.005
scoring_system epss
scoring_elements 0.65991
published_at 2026-04-09T12:55:00Z
6
value 0.005
scoring_system epss
scoring_elements 0.6601
published_at 2026-04-11T12:55:00Z
7
value 0.005
scoring_system epss
scoring_elements 0.65996
published_at 2026-04-12T12:55:00Z
8
value 0.005
scoring_system epss
scoring_elements 0.65966
published_at 2026-04-13T12:55:00Z
9
value 0.005
scoring_system epss
scoring_elements 0.66001
published_at 2026-04-16T12:55:00Z
10
value 0.005
scoring_system epss
scoring_elements 0.66015
published_at 2026-04-18T12:55:00Z
11
value 0.005
scoring_system epss
scoring_elements 0.66003
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-5295
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5295
fixed_packages
0
url pkg:deb/debian/wordpress@3.0.2-1?distro=trixie
purl pkg:deb/debian/wordpress@3.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.0.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2010-5295
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h2mz-4fad-9qdj
166
url VCID-h3ab-qy7a-r3ea
vulnerability_id VCID-h3ab-qy7a-r3ea
summary SQL injection vulnerability in XMLRPC server in WordPress 1.5.1.2 and earlier allows remote attackers to execute arbitrary SQL commands via input that is not filtered in the HTTP_RAW_POST_DATA variable, which stores the data in an XML file.
references
0
reference_url http://marc.info/?l=bugtraq&m=112006967221438&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=112006967221438&w=2
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-2108
reference_id
reference_type
scores
0
value 0.01061
scoring_system epss
scoring_elements 0.77674
published_at 2026-04-21T12:55:00Z
1
value 0.01061
scoring_system epss
scoring_elements 0.77587
published_at 2026-04-01T12:55:00Z
2
value 0.01061
scoring_system epss
scoring_elements 0.77594
published_at 2026-04-02T12:55:00Z
3
value 0.01061
scoring_system epss
scoring_elements 0.7762
published_at 2026-04-04T12:55:00Z
4
value 0.01061
scoring_system epss
scoring_elements 0.77602
published_at 2026-04-07T12:55:00Z
5
value 0.01061
scoring_system epss
scoring_elements 0.7763
published_at 2026-04-08T12:55:00Z
6
value 0.01061
scoring_system epss
scoring_elements 0.77637
published_at 2026-04-09T12:55:00Z
7
value 0.01061
scoring_system epss
scoring_elements 0.77663
published_at 2026-04-11T12:55:00Z
8
value 0.01061
scoring_system epss
scoring_elements 0.77647
published_at 2026-04-12T12:55:00Z
9
value 0.01061
scoring_system epss
scoring_elements 0.77645
published_at 2026-04-13T12:55:00Z
10
value 0.01061
scoring_system epss
scoring_elements 0.77683
published_at 2026-04-16T12:55:00Z
11
value 0.01061
scoring_system epss
scoring_elements 0.77681
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-2108
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2108
3
reference_url http://secunia.com/advisories/15831
reference_id
reference_type
scores
url http://secunia.com/advisories/15831
4
reference_url http://www.gulftech.org/?node=research&article_id=00085-06282005
reference_id
reference_type
scores
url http://www.gulftech.org/?node=research&article_id=00085-06282005
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=316402
reference_id 316402
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=316402
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-2108
reference_id CVE-2005-2108
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-2108
14
reference_url http://gulftech.org/advisories/WordPress%20Multiple%20Vulnerabilities/78
reference_id OSVDB-17637;CVE-2005-2108;GTSA-00078
reference_type exploit
scores
url http://gulftech.org/advisories/WordPress%20Multiple%20Vulnerabilities/78
15
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/1077.pl
reference_id OSVDB-17637;CVE-2005-2108;GTSA-00078
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/1077.pl
fixed_packages
0
url pkg:deb/debian/wordpress@1.5.1.3-1?distro=trixie
purl pkg:deb/debian/wordpress@1.5.1.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@1.5.1.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2005-2108
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h3ab-qy7a-r3ea
167
url VCID-h4xu-vw5g-x3gw
vulnerability_id VCID-h4xu-vw5g-x3gw
summary Cross-site scripting (XSS) vulnerability in the paging links functionality in template-functions-links.php in Wordpress 1.5.2, and possibly other versions before 2.0.1, allows remote attackers to inject arbitrary web script or HTML to Internet Explorer users via the request URI ($_SERVER['REQUEST_URI']).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-1796
reference_id
reference_type
scores
0
value 0.00455
scoring_system epss
scoring_elements 0.63735
published_at 2026-04-01T12:55:00Z
1
value 0.00455
scoring_system epss
scoring_elements 0.63796
published_at 2026-04-02T12:55:00Z
2
value 0.00455
scoring_system epss
scoring_elements 0.63823
published_at 2026-04-04T12:55:00Z
3
value 0.00455
scoring_system epss
scoring_elements 0.6378
published_at 2026-04-07T12:55:00Z
4
value 0.00455
scoring_system epss
scoring_elements 0.63831
published_at 2026-04-08T12:55:00Z
5
value 0.00455
scoring_system epss
scoring_elements 0.63848
published_at 2026-04-21T12:55:00Z
6
value 0.00455
scoring_system epss
scoring_elements 0.63862
published_at 2026-04-11T12:55:00Z
7
value 0.00455
scoring_system epss
scoring_elements 0.63814
published_at 2026-04-13T12:55:00Z
8
value 0.00455
scoring_system epss
scoring_elements 0.63849
published_at 2026-04-16T12:55:00Z
9
value 0.00455
scoring_system epss
scoring_elements 0.63858
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-1796
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1796
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=328909
reference_id 328909
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=328909
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2006-1796
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h4xu-vw5g-x3gw
168
url VCID-h5up-s13c-2ygg
vulnerability_id VCID-h5up-s13c-2ygg
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43497
reference_id
reference_type
scores
0
value 0.01519
scoring_system epss
scoring_elements 0.8128
published_at 2026-04-21T12:55:00Z
1
value 0.01519
scoring_system epss
scoring_elements 0.81265
published_at 2026-04-11T12:55:00Z
2
value 0.01519
scoring_system epss
scoring_elements 0.81251
published_at 2026-04-12T12:55:00Z
3
value 0.01519
scoring_system epss
scoring_elements 0.81243
published_at 2026-04-13T12:55:00Z
4
value 0.01519
scoring_system epss
scoring_elements 0.81279
published_at 2026-04-16T12:55:00Z
5
value 0.01519
scoring_system epss
scoring_elements 0.81281
published_at 2026-04-18T12:55:00Z
6
value 0.01519
scoring_system epss
scoring_elements 0.81188
published_at 2026-04-02T12:55:00Z
7
value 0.01519
scoring_system epss
scoring_elements 0.81211
published_at 2026-04-07T12:55:00Z
8
value 0.01519
scoring_system epss
scoring_elements 0.81239
published_at 2026-04-08T12:55:00Z
9
value 0.01519
scoring_system epss
scoring_elements 0.81244
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43497
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43497
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43500
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43504
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022575
reference_id 1022575
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022575
5
reference_url https://wordpress.org/download/
reference_id download
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:09:53Z/
url https://wordpress.org/download/
6
reference_url https://jvn.jp/en/jp/JVN09409909/index.html
reference_id index.html
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:09:53Z/
url https://jvn.jp/en/jp/JVN09409909/index.html
7
reference_url https://wordpress.org/news/2022/10/wordpress-6-0-3-security-release/
reference_id wordpress-6-0-3-security-release
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:09:53Z/
url https://wordpress.org/news/2022/10/wordpress-6-0-3-security-release/
fixed_packages
0
url pkg:deb/debian/wordpress@5.7.8%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.8%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.8%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.0.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.0.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.0.3%252Bdfsg1-1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2022-43497
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h5up-s13c-2ygg
169
url VCID-h644-6au9-q3c6
vulnerability_id VCID-h644-6au9-q3c6
summary WordPress is vulnerable to an SQL injection vulnerability.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-1012
reference_id
reference_type
scores
0
value 0.01865
scoring_system epss
scoring_elements 0.82998
published_at 2026-04-01T12:55:00Z
1
value 0.01865
scoring_system epss
scoring_elements 0.83014
published_at 2026-04-02T12:55:00Z
2
value 0.01865
scoring_system epss
scoring_elements 0.83028
published_at 2026-04-04T12:55:00Z
3
value 0.01865
scoring_system epss
scoring_elements 0.83026
published_at 2026-04-07T12:55:00Z
4
value 0.01865
scoring_system epss
scoring_elements 0.8305
published_at 2026-04-08T12:55:00Z
5
value 0.01865
scoring_system epss
scoring_elements 0.83058
published_at 2026-04-09T12:55:00Z
6
value 0.01865
scoring_system epss
scoring_elements 0.83074
published_at 2026-04-11T12:55:00Z
7
value 0.01865
scoring_system epss
scoring_elements 0.83068
published_at 2026-04-12T12:55:00Z
8
value 0.01865
scoring_system epss
scoring_elements 0.83063
published_at 2026-04-13T12:55:00Z
9
value 0.01865
scoring_system epss
scoring_elements 0.83102
published_at 2026-04-18T12:55:00Z
10
value 0.01865
scoring_system epss
scoring_elements 0.83105
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-1012
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1012
2
reference_url https://security.gentoo.org/glsa/200603-01
reference_id GLSA-200603-01
reference_type
scores
url https://security.gentoo.org/glsa/200603-01
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.1-1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2006-1012
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h644-6au9-q3c6
170
url VCID-h97y-a92u-2fay
vulnerability_id VCID-h97y-a92u-2fay
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28040
reference_id
reference_type
scores
0
value 0.00306
scoring_system epss
scoring_elements 0.53881
published_at 2026-04-21T12:55:00Z
1
value 0.00306
scoring_system epss
scoring_elements 0.53772
published_at 2026-04-01T12:55:00Z
2
value 0.00306
scoring_system epss
scoring_elements 0.53792
published_at 2026-04-07T12:55:00Z
3
value 0.00306
scoring_system epss
scoring_elements 0.53818
published_at 2026-04-04T12:55:00Z
4
value 0.00306
scoring_system epss
scoring_elements 0.53844
published_at 2026-04-08T12:55:00Z
5
value 0.00306
scoring_system epss
scoring_elements 0.53842
published_at 2026-04-09T12:55:00Z
6
value 0.00306
scoring_system epss
scoring_elements 0.5389
published_at 2026-04-11T12:55:00Z
7
value 0.00306
scoring_system epss
scoring_elements 0.53873
published_at 2026-04-12T12:55:00Z
8
value 0.00306
scoring_system epss
scoring_elements 0.53857
published_at 2026-04-13T12:55:00Z
9
value 0.00306
scoring_system epss
scoring_elements 0.53895
published_at 2026-04-16T12:55:00Z
10
value 0.00306
scoring_system epss
scoring_elements 0.539
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28040
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562
reference_id 973562
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562
11
reference_url https://security.archlinux.org/ASA-202011-3
reference_id ASA-202011-3
reference_type
scores
url https://security.archlinux.org/ASA-202011-3
12
reference_url https://security.archlinux.org/AVG-1257
reference_id AVG-1257
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1257
fixed_packages
0
url pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.5.3%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2020-28040
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h97y-a92u-2fay
171
url VCID-hamd-mn9k-q3f5
vulnerability_id VCID-hamd-mn9k-q3f5
summary Directory traversal vulnerability in the get_category_template function in wp-includes/theme.php in WordPress 2.3.3 and earlier, and 2.5, allows remote attackers to include and possibly execute arbitrary PHP files via the cat parameter in index.php. NOTE: some of these details are obtained from third party information.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4769
reference_id
reference_type
scores
0
value 0.1766
scoring_system epss
scoring_elements 0.95119
published_at 2026-04-21T12:55:00Z
1
value 0.1766
scoring_system epss
scoring_elements 0.95071
published_at 2026-04-01T12:55:00Z
2
value 0.1766
scoring_system epss
scoring_elements 0.95081
published_at 2026-04-02T12:55:00Z
3
value 0.1766
scoring_system epss
scoring_elements 0.95082
published_at 2026-04-04T12:55:00Z
4
value 0.1766
scoring_system epss
scoring_elements 0.95084
published_at 2026-04-07T12:55:00Z
5
value 0.1766
scoring_system epss
scoring_elements 0.95091
published_at 2026-04-08T12:55:00Z
6
value 0.1766
scoring_system epss
scoring_elements 0.95095
published_at 2026-04-09T12:55:00Z
7
value 0.1766
scoring_system epss
scoring_elements 0.951
published_at 2026-04-11T12:55:00Z
8
value 0.1766
scoring_system epss
scoring_elements 0.95102
published_at 2026-04-12T12:55:00Z
9
value 0.1766
scoring_system epss
scoring_elements 0.95105
published_at 2026-04-13T12:55:00Z
10
value 0.1766
scoring_system epss
scoring_elements 0.95114
published_at 2026-04-16T12:55:00Z
11
value 0.1766
scoring_system epss
scoring_elements 0.95117
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4769
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4769
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4769
2
reference_url http://secunia.com/advisories/29949
reference_id
reference_type
scores
url http://secunia.com/advisories/29949
3
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/41920
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/41920
4
reference_url http://trac.wordpress.org/changeset/7586
reference_id
reference_type
scores
url http://trac.wordpress.org/changeset/7586
5
reference_url http://www.debian.org/security/2009/dsa-1871
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1871
6
reference_url http://www.juniper.fi/security/auto/vulnerabilities/vuln28845.html
reference_id
reference_type
scores
url http://www.juniper.fi/security/auto/vulnerabilities/vuln28845.html
7
reference_url http://www.securityfocus.com/bid/28845
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/28845
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.6.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2.1:beta_2:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.6.2.1:beta_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2.1:beta_2:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2:beta_2:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.6.2:beta_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2:beta_2:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.711:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.711:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.711:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71-gold:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.71-gold:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71-gold:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.72:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.72:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.72:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.72:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.72:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.72:beta1:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.72:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.72:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.72:beta2:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.72:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.72:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.72:rc1:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1-miles:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1-miles:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1-miles:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2-blakey:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2-blakey:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2-blakey:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0-platinum:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0-platinum:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0-platinum:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:beta:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2-delta:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2-delta:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2-delta:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2-mingus:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2-mingus:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2-mingus:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5-strayhorn:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5-strayhorn:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5-strayhorn:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.6:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.10_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10_rc1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10_rc2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.10_rc2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10_rc2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.3_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3_rc1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3_rc2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.3_rc2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3_rc2:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:alpha_3:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1:alpha_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:alpha_3:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2_revision5002:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2_revision5002:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2_revision5002:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2_revision5003:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2_revision5003:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2_revision5003:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:rc1:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4769
reference_id CVE-2008-4769
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-4769
77
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/31670.txt
reference_id CVE-2008-4769;OSVDB-44591
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/31670.txt
78
reference_url https://www.securityfocus.com/bid/28845/info
reference_id CVE-2008-4769;OSVDB-44591
reference_type exploit
scores
url https://www.securityfocus.com/bid/28845/info
fixed_packages
0
url pkg:deb/debian/wordpress@2.5.1-1?distro=trixie
purl pkg:deb/debian/wordpress@2.5.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.5.1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2008-4769
risk_score 10.0
exploitability 2.0
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hamd-mn9k-q3f5
172
url VCID-hjhs-79fd-xff1
vulnerability_id VCID-hjhs-79fd-xff1
summary wp-comments-post.php in WordPress before 3.3.2 supports offsite redirects, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2404
reference_id
reference_type
scores
0
value 0.02327
scoring_system epss
scoring_elements 0.84747
published_at 2026-04-01T12:55:00Z
1
value 0.02327
scoring_system epss
scoring_elements 0.84762
published_at 2026-04-02T12:55:00Z
2
value 0.02327
scoring_system epss
scoring_elements 0.84781
published_at 2026-04-04T12:55:00Z
3
value 0.02327
scoring_system epss
scoring_elements 0.84782
published_at 2026-04-07T12:55:00Z
4
value 0.02327
scoring_system epss
scoring_elements 0.84805
published_at 2026-04-08T12:55:00Z
5
value 0.02327
scoring_system epss
scoring_elements 0.84812
published_at 2026-04-09T12:55:00Z
6
value 0.02327
scoring_system epss
scoring_elements 0.8483
published_at 2026-04-11T12:55:00Z
7
value 0.02327
scoring_system epss
scoring_elements 0.84826
published_at 2026-04-12T12:55:00Z
8
value 0.02327
scoring_system epss
scoring_elements 0.84821
published_at 2026-04-13T12:55:00Z
9
value 0.02327
scoring_system epss
scoring_elements 0.84843
published_at 2026-04-16T12:55:00Z
10
value 0.02327
scoring_system epss
scoring_elements 0.84844
published_at 2026-04-18T12:55:00Z
11
value 0.02327
scoring_system epss
scoring_elements 0.84842
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2404
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2404
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2404
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670124
reference_id 670124
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670124
fixed_packages
0
url pkg:deb/debian/wordpress@3.3.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.3.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.3.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2012-2404
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hjhs-79fd-xff1
173
url VCID-hkp2-z1em-x3gu
vulnerability_id VCID-hkp2-z1em-x3gu
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-16510
reference_id
reference_type
scores
0
value 0.04169
scoring_system epss
scoring_elements 0.887
published_at 2026-04-21T12:55:00Z
1
value 0.04169
scoring_system epss
scoring_elements 0.88702
published_at 2026-04-18T12:55:00Z
2
value 0.04169
scoring_system epss
scoring_elements 0.88637
published_at 2026-04-01T12:55:00Z
3
value 0.04169
scoring_system epss
scoring_elements 0.88646
published_at 2026-04-02T12:55:00Z
4
value 0.04169
scoring_system epss
scoring_elements 0.88662
published_at 2026-04-04T12:55:00Z
5
value 0.04169
scoring_system epss
scoring_elements 0.88663
published_at 2026-04-07T12:55:00Z
6
value 0.04169
scoring_system epss
scoring_elements 0.88681
published_at 2026-04-08T12:55:00Z
7
value 0.04169
scoring_system epss
scoring_elements 0.88687
published_at 2026-04-09T12:55:00Z
8
value 0.04169
scoring_system epss
scoring_elements 0.88699
published_at 2026-04-11T12:55:00Z
9
value 0.04169
scoring_system epss
scoring_elements 0.88692
published_at 2026-04-13T12:55:00Z
10
value 0.04169
scoring_system epss
scoring_elements 0.88706
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-16510
1
reference_url https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-technical.html
reference_id
reference_type
scores
url https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-technical.html
2
reference_url https://codex.wordpress.org/Version_4.8.3
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.8.3
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16510
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17091
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17092
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17093
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17094
8
reference_url https://github.com/WordPress/WordPress/commit/a2693fd8602e3263b5925b9d799ddd577202167d
reference_id
reference_type
scores
url https://github.com/WordPress/WordPress/commit/a2693fd8602e3263b5925b9d799ddd577202167d
9
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00003.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00003.html
10
reference_url https://wordpress.org/news/2017/10/wordpress-4-8-3-security-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2017/10/wordpress-4-8-3-security-release/
11
reference_url https://wpvulndb.com/vulnerabilities/8941
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8941
12
reference_url https://www.debian.org/security/2018/dsa-4090
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4090
13
reference_url http://www.securityfocus.com/bid/101638
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101638
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=880528
reference_id 880528
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=880528
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-16510
reference_id CVE-2017-16510
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-16510
fixed_packages
0
url pkg:deb/debian/wordpress@4.8.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.8.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.8.3%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-16510
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hkp2-z1em-x3gu
174
url VCID-hndb-7b4f-7bbw
vulnerability_id VCID-hndb-7b4f-7bbw
summary security update
references
0
reference_url http://packetstormsecurity.com/files/160745/WordPress-Core-5.2.2-Cross-Site-Scripting.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/160745/WordPress-Core-5.2.2-Cross-Site-Scripting.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16223
reference_id
reference_type
scores
0
value 0.04337
scoring_system epss
scoring_elements 0.88936
published_at 2026-04-21T12:55:00Z
1
value 0.04337
scoring_system epss
scoring_elements 0.8894
published_at 2026-04-18T12:55:00Z
2
value 0.04337
scoring_system epss
scoring_elements 0.88874
published_at 2026-04-01T12:55:00Z
3
value 0.04337
scoring_system epss
scoring_elements 0.88882
published_at 2026-04-02T12:55:00Z
4
value 0.04337
scoring_system epss
scoring_elements 0.88897
published_at 2026-04-04T12:55:00Z
5
value 0.04337
scoring_system epss
scoring_elements 0.88899
published_at 2026-04-07T12:55:00Z
6
value 0.04337
scoring_system epss
scoring_elements 0.88918
published_at 2026-04-08T12:55:00Z
7
value 0.04337
scoring_system epss
scoring_elements 0.88923
published_at 2026-04-09T12:55:00Z
8
value 0.04337
scoring_system epss
scoring_elements 0.88934
published_at 2026-04-11T12:55:00Z
9
value 0.04337
scoring_system epss
scoring_elements 0.88929
published_at 2026-04-12T12:55:00Z
10
value 0.04337
scoring_system epss
scoring_elements 0.88928
published_at 2026-04-13T12:55:00Z
11
value 0.04337
scoring_system epss
scoring_elements 0.88942
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16223
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
20
reference_url https://lists.debian.org/debian-lts-announce/2019/10/msg00023.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/10/msg00023.html
21
reference_url https://seclists.org/bugtraq/2020/Jan/8
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2020/Jan/8
22
reference_url https://wordpress.org/news/2019/09/wordpress-5-2-3-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2019/09/wordpress-5-2-3-security-and-maintenance-release/
23
reference_url https://wpvulndb.com/vulnerabilities/9862
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/9862
24
reference_url https://www.debian.org/security/2020/dsa-4599
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4599
25
reference_url https://www.debian.org/security/2020/dsa-4677
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4677
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939543
reference_id 939543
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939543
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
31
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/49338.txt
reference_id CVE-2019-16223
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/49338.txt
32
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-16223
reference_id CVE-2019-16223
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
1
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-16223
fixed_packages
0
url pkg:deb/debian/wordpress@5.2.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.2.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.2.3%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2019-16223
risk_score 9.8
exploitability 2.0
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hndb-7b4f-7bbw
175
url VCID-hq5p-xuuk-33f7
vulnerability_id VCID-hq5p-xuuk-33f7
summary WordPress through 4.8.2, when domain-based flashmediaelement.swf sandboxing is not used, allows remote attackers to conduct cross-domain Flash injection (XSF) attacks by leveraging code contained within the wp-includes/js/mediaelement/flashmediaelement.swf file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9263
reference_id
reference_type
scores
0
value 0.01241
scoring_system epss
scoring_elements 0.7928
published_at 2026-04-21T12:55:00Z
1
value 0.01241
scoring_system epss
scoring_elements 0.79279
published_at 2026-04-18T12:55:00Z
2
value 0.01241
scoring_system epss
scoring_elements 0.79209
published_at 2026-04-01T12:55:00Z
3
value 0.01241
scoring_system epss
scoring_elements 0.79216
published_at 2026-04-02T12:55:00Z
4
value 0.01241
scoring_system epss
scoring_elements 0.79239
published_at 2026-04-04T12:55:00Z
5
value 0.01241
scoring_system epss
scoring_elements 0.79225
published_at 2026-04-07T12:55:00Z
6
value 0.01241
scoring_system epss
scoring_elements 0.7925
published_at 2026-04-08T12:55:00Z
7
value 0.01241
scoring_system epss
scoring_elements 0.79258
published_at 2026-04-09T12:55:00Z
8
value 0.01241
scoring_system epss
scoring_elements 0.79281
published_at 2026-04-11T12:55:00Z
9
value 0.01241
scoring_system epss
scoring_elements 0.79266
published_at 2026-04-12T12:55:00Z
10
value 0.01241
scoring_system epss
scoring_elements 0.79255
published_at 2026-04-13T12:55:00Z
11
value 0.01241
scoring_system epss
scoring_elements 0.79282
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9263
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9263
2
reference_url https://opnsec.com/2017/10/cve-2016-9263-unpatched-xsf-vulnerability-in-wordpress/
reference_id
reference_type
scores
url https://opnsec.com/2017/10/cve-2016-9263-unpatched-xsf-vulnerability-in-wordpress/
3
reference_url http://www.securityfocus.com/bid/101294
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101294
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-9263
reference_id CVE-2016-9263
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:N
1
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-9263
fixed_packages
0
url pkg:deb/debian/wordpress@4.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2016-9263
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hq5p-xuuk-33f7
176
url VCID-hrr1-ygkz-4bhd
vulnerability_id VCID-hrr1-ygkz-4bhd
summary several
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4340
reference_id
reference_type
scores
0
value 0.00977
scoring_system epss
scoring_elements 0.76665
published_at 2026-04-01T12:55:00Z
1
value 0.00977
scoring_system epss
scoring_elements 0.76668
published_at 2026-04-02T12:55:00Z
2
value 0.00977
scoring_system epss
scoring_elements 0.76697
published_at 2026-04-04T12:55:00Z
3
value 0.00977
scoring_system epss
scoring_elements 0.76679
published_at 2026-04-07T12:55:00Z
4
value 0.00977
scoring_system epss
scoring_elements 0.76711
published_at 2026-04-08T12:55:00Z
5
value 0.00977
scoring_system epss
scoring_elements 0.76722
published_at 2026-04-13T12:55:00Z
6
value 0.00977
scoring_system epss
scoring_elements 0.7675
published_at 2026-04-11T12:55:00Z
7
value 0.00977
scoring_system epss
scoring_elements 0.7673
published_at 2026-04-12T12:55:00Z
8
value 0.00977
scoring_system epss
scoring_elements 0.76763
published_at 2026-04-16T12:55:00Z
9
value 0.00977
scoring_system epss
scoring_elements 0.76768
published_at 2026-04-18T12:55:00Z
10
value 0.00977
scoring_system epss
scoring_elements 0.7676
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4340
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4338
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4339
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4339
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5739
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722537
reference_id 722537
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722537
fixed_packages
0
url pkg:deb/debian/wordpress@3.6.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.6.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.6.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2013-4340
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hrr1-ygkz-4bhd
177
url VCID-htec-cnsd-4ke4
vulnerability_id VCID-htec-cnsd-4ke4
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21663
reference_id
reference_type
scores
0
value 0.0031
scoring_system epss
scoring_elements 0.5412
published_at 2026-04-02T12:55:00Z
1
value 0.0031
scoring_system epss
scoring_elements 0.54149
published_at 2026-04-04T12:55:00Z
2
value 0.0031
scoring_system epss
scoring_elements 0.54125
published_at 2026-04-07T12:55:00Z
3
value 0.0031
scoring_system epss
scoring_elements 0.54176
published_at 2026-04-08T12:55:00Z
4
value 0.0031
scoring_system epss
scoring_elements 0.54174
published_at 2026-04-09T12:55:00Z
5
value 0.0031
scoring_system epss
scoring_elements 0.54224
published_at 2026-04-11T12:55:00Z
6
value 0.0031
scoring_system epss
scoring_elements 0.54206
published_at 2026-04-12T12:55:00Z
7
value 0.0031
scoring_system epss
scoring_elements 0.54185
published_at 2026-04-13T12:55:00Z
8
value 0.0031
scoring_system epss
scoring_elements 0.54223
published_at 2026-04-16T12:55:00Z
9
value 0.0031
scoring_system epss
scoring_elements 0.54227
published_at 2026-04-18T12:55:00Z
10
value 0.0031
scoring_system epss
scoring_elements 0.54209
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21663
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21661
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21662
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21663
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21664
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1003243
reference_id 1003243
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1003243
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4UNEC63UU5GEU47IIR4RMTZAHNEOJG/
reference_id CV4UNEC63UU5GEU47IIR4RMTZAHNEOJG
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-22T15:45:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4UNEC63UU5GEU47IIR4RMTZAHNEOJG/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DM6XPH3JN6V4NF4WBOJTOXZIVE6VKKE3/
reference_id DM6XPH3JN6V4NF4WBOJTOXZIVE6VKKE3
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-22T15:45:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DM6XPH3JN6V4NF4WBOJTOXZIVE6VKKE3/
8
reference_url https://www.debian.org/security/2022/dsa-5039
reference_id dsa-5039
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-22T15:45:27Z/
url https://www.debian.org/security/2022/dsa-5039
9
reference_url https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-jmmq-m8p8-332h
reference_id GHSA-jmmq-m8p8-332h
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-22T15:45:27Z/
url https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-jmmq-m8p8-332h
10
reference_url https://lists.debian.org/debian-lts-announce/2022/01/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-22T15:45:27Z/
url https://lists.debian.org/debian-lts-announce/2022/01/msg00019.html
11
reference_url https://wordpress.org/news/2022/01/wordpress-5-8-3-security-release/
reference_id wordpress-5-8-3-security-release
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-22T15:45:27Z/
url https://wordpress.org/news/2022/01/wordpress-5-8-3-security-release/
12
reference_url https://blog.sonarsource.com/wordpress-object-injection-vulnerability/
reference_id wordpress-object-injection-vulnerability
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-22T15:45:27Z/
url https://blog.sonarsource.com/wordpress-object-injection-vulnerability/
fixed_packages
0
url pkg:deb/debian/wordpress@5.7.5%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.5%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.5%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@5.8.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.8.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.8.3%252Bdfsg1-1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2022-21663
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-htec-cnsd-4ke4
178
url VCID-htr5-ugyh-7yaz
vulnerability_id VCID-htr5-ugyh-7yaz
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-29447
reference_id
reference_type
scores
0
value 0.89634
scoring_system epss
scoring_elements 0.99565
published_at 2026-04-21T12:55:00Z
1
value 0.89975
scoring_system epss
scoring_elements 0.99577
published_at 2026-04-04T12:55:00Z
2
value 0.89975
scoring_system epss
scoring_elements 0.99578
published_at 2026-04-07T12:55:00Z
3
value 0.89975
scoring_system epss
scoring_elements 0.99576
published_at 2026-04-02T12:55:00Z
4
value 0.89975
scoring_system epss
scoring_elements 0.9958
published_at 2026-04-16T12:55:00Z
5
value 0.89975
scoring_system epss
scoring_elements 0.99581
published_at 2026-04-18T12:55:00Z
6
value 0.89975
scoring_system epss
scoring_elements 0.99579
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-29447
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29447
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29450
3
reference_url https://security.archlinux.org/AVG-1831
reference_id AVG-1831
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1831
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/50304.sh
reference_id CVE-2021-29447
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/50304.sh
fixed_packages
0
url pkg:deb/debian/wordpress@5.7.1%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.1%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.1%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2021-29447
risk_score 10.0
exploitability 2.0
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-htr5-ugyh-7yaz
179
url VCID-hx1m-3ehs-pudy
vulnerability_id VCID-hx1m-3ehs-pudy
summary Plupload before 1.5.4, as used in wp-includes/js/plupload/ in WordPress before 3.3.2 and other products, enables scripting regardless of the domain from which the SWF content was loaded, which allows remote attackers to bypass the Same Origin Policy via crafted content.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2401
reference_id
reference_type
scores
0
value 0.01038
scoring_system epss
scoring_elements 0.7735
published_at 2026-04-01T12:55:00Z
1
value 0.01038
scoring_system epss
scoring_elements 0.77357
published_at 2026-04-02T12:55:00Z
2
value 0.01038
scoring_system epss
scoring_elements 0.77384
published_at 2026-04-04T12:55:00Z
3
value 0.01038
scoring_system epss
scoring_elements 0.77364
published_at 2026-04-07T12:55:00Z
4
value 0.01038
scoring_system epss
scoring_elements 0.77394
published_at 2026-04-08T12:55:00Z
5
value 0.01038
scoring_system epss
scoring_elements 0.77404
published_at 2026-04-09T12:55:00Z
6
value 0.01038
scoring_system epss
scoring_elements 0.7743
published_at 2026-04-11T12:55:00Z
7
value 0.01038
scoring_system epss
scoring_elements 0.77409
published_at 2026-04-12T12:55:00Z
8
value 0.01038
scoring_system epss
scoring_elements 0.77406
published_at 2026-04-13T12:55:00Z
9
value 0.01038
scoring_system epss
scoring_elements 0.77445
published_at 2026-04-16T12:55:00Z
10
value 0.01038
scoring_system epss
scoring_elements 0.77444
published_at 2026-04-18T12:55:00Z
11
value 0.01038
scoring_system epss
scoring_elements 0.77436
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2401
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2401
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2401
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670124
reference_id 670124
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670124
fixed_packages
0
url pkg:deb/debian/wordpress@3.3.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.3.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.3.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2012-2401
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hx1m-3ehs-pudy
180
url VCID-hxky-9sa6-4udb
vulnerability_id VCID-hxky-9sa6-4udb
summary Cross-site scripting (XSS) vulnerability in wp-comments-post.php in WordPress 3.3.x before 3.3.1, when Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via the query string in a POST operation that is not properly handled by the "Duplicate comment detected" feature.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0287
reference_id
reference_type
scores
0
value 0.00601
scoring_system epss
scoring_elements 0.69417
published_at 2026-04-01T12:55:00Z
1
value 0.00601
scoring_system epss
scoring_elements 0.69428
published_at 2026-04-02T12:55:00Z
2
value 0.00601
scoring_system epss
scoring_elements 0.69444
published_at 2026-04-04T12:55:00Z
3
value 0.00601
scoring_system epss
scoring_elements 0.69424
published_at 2026-04-07T12:55:00Z
4
value 0.00601
scoring_system epss
scoring_elements 0.69474
published_at 2026-04-08T12:55:00Z
5
value 0.00601
scoring_system epss
scoring_elements 0.6949
published_at 2026-04-09T12:55:00Z
6
value 0.00601
scoring_system epss
scoring_elements 0.69512
published_at 2026-04-11T12:55:00Z
7
value 0.00601
scoring_system epss
scoring_elements 0.69496
published_at 2026-04-12T12:55:00Z
8
value 0.00601
scoring_system epss
scoring_elements 0.69482
published_at 2026-04-13T12:55:00Z
9
value 0.00601
scoring_system epss
scoring_elements 0.69521
published_at 2026-04-16T12:55:00Z
10
value 0.00601
scoring_system epss
scoring_elements 0.6953
published_at 2026-04-18T12:55:00Z
11
value 0.00601
scoring_system epss
scoring_elements 0.6951
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0287
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0287
fixed_packages
0
url pkg:deb/debian/wordpress@3.3.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.3.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.3.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2012-0287
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hxky-9sa6-4udb
181
url VCID-hyae-gf44-4qaa
vulnerability_id VCID-hyae-gf44-4qaa
summary several
references
0
reference_url http://codex.wordpress.org/Version_3.5.2
reference_id
reference_type
scores
url http://codex.wordpress.org/Version_3.5.2
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2199
reference_id
reference_type
scores
0
value 0.00831
scoring_system epss
scoring_elements 0.74593
published_at 2026-04-18T12:55:00Z
1
value 0.00831
scoring_system epss
scoring_elements 0.74499
published_at 2026-04-01T12:55:00Z
2
value 0.00831
scoring_system epss
scoring_elements 0.74504
published_at 2026-04-02T12:55:00Z
3
value 0.00831
scoring_system epss
scoring_elements 0.74531
published_at 2026-04-04T12:55:00Z
4
value 0.00831
scoring_system epss
scoring_elements 0.74505
published_at 2026-04-07T12:55:00Z
5
value 0.00831
scoring_system epss
scoring_elements 0.74537
published_at 2026-04-08T12:55:00Z
6
value 0.00831
scoring_system epss
scoring_elements 0.74553
published_at 2026-04-09T12:55:00Z
7
value 0.00831
scoring_system epss
scoring_elements 0.74575
published_at 2026-04-11T12:55:00Z
8
value 0.00831
scoring_system epss
scoring_elements 0.74556
published_at 2026-04-12T12:55:00Z
9
value 0.00831
scoring_system epss
scoring_elements 0.74548
published_at 2026-04-13T12:55:00Z
10
value 0.00831
scoring_system epss
scoring_elements 0.74585
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2199
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=976784
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=976784
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2173
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2173
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2199
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2200
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2201
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2202
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2203
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2204
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2205
11
reference_url http://wordpress.org/news/2013/06/wordpress-3-5-2/
reference_id
reference_type
scores
url http://wordpress.org/news/2013/06/wordpress-3-5-2/
12
reference_url http://www.debian.org/security/2013/dsa-2718
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2718
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=713947
reference_id 713947
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=713947
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2199
reference_id CVE-2013-2199
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-2199
fixed_packages
0
url pkg:deb/debian/wordpress@3.5.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.5.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.5.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2013-2199
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hyae-gf44-4qaa
182
url VCID-j33g-aex7-uke8
vulnerability_id VCID-j33g-aex7-uke8
summary The _httpsrequest function in Snoopy 1.2, as used in products such as (1) MagpieRSS, (2) WordPress, (3) Ampache, and (4) Jinzora, allows remote attackers to execute arbitrary commands via shell metacharacters in an HTTPS URL to an SSL protected web page, which is not properly handled by the fetch function.
references
0
reference_url http://marc.info/?l=bugtraq&m=113028858316430&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=113028858316430&w=2
1
reference_url http://marc.info/?l=bugtraq&m=113062897231412&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=113062897231412&w=2
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3330
reference_id
reference_type
scores
0
value 0.23773
scoring_system epss
scoring_elements 0.96023
published_at 2026-04-21T12:55:00Z
1
value 0.23773
scoring_system epss
scoring_elements 0.95971
published_at 2026-04-01T12:55:00Z
2
value 0.23773
scoring_system epss
scoring_elements 0.95978
published_at 2026-04-02T12:55:00Z
3
value 0.23773
scoring_system epss
scoring_elements 0.95985
published_at 2026-04-04T12:55:00Z
4
value 0.23773
scoring_system epss
scoring_elements 0.95989
published_at 2026-04-07T12:55:00Z
5
value 0.23773
scoring_system epss
scoring_elements 0.95999
published_at 2026-04-08T12:55:00Z
6
value 0.23773
scoring_system epss
scoring_elements 0.96001
published_at 2026-04-09T12:55:00Z
7
value 0.23773
scoring_system epss
scoring_elements 0.96005
published_at 2026-04-12T12:55:00Z
8
value 0.23773
scoring_system epss
scoring_elements 0.96007
published_at 2026-04-13T12:55:00Z
9
value 0.23773
scoring_system epss
scoring_elements 0.96017
published_at 2026-04-16T12:55:00Z
10
value 0.23773
scoring_system epss
scoring_elements 0.96022
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3330
3
reference_url http://secunia.com/advisories/17330
reference_id
reference_type
scores
url http://secunia.com/advisories/17330
4
reference_url http://secunia.com/advisories/17455
reference_id
reference_type
scores
url http://secunia.com/advisories/17455
5
reference_url http://secunia.com/advisories/17779
reference_id
reference_type
scores
url http://secunia.com/advisories/17779
6
reference_url http://secunia.com/advisories/17887
reference_id
reference_type
scores
url http://secunia.com/advisories/17887
7
reference_url http://securityreason.com/securityalert/117
reference_id
reference_type
scores
url http://securityreason.com/securityalert/117
8
reference_url http://securitytracker.com/id?1015104
reference_id
reference_type
scores
url http://securitytracker.com/id?1015104
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/22874
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/22874
10
reference_url http://sourceforge.net/project/shownotes.php?release_id=368750
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=368750
11
reference_url http://sourceforge.net/project/shownotes.php?release_id=375385
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=375385
12
reference_url https://svn.ampache.org/branches/3.3.1/docs/CHANGELOG
reference_id
reference_type
scores
url https://svn.ampache.org/branches/3.3.1/docs/CHANGELOG
13
reference_url http://www.osvdb.org/20316
reference_id
reference_type
scores
url http://www.osvdb.org/20316
14
reference_url http://www.securityfocus.com/bid/15213
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15213
15
reference_url http://www.vupen.com/english/advisories/2005/2202
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2202
16
reference_url http://www.vupen.com/english/advisories/2005/2335
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2335
17
reference_url http://www.vupen.com/english/advisories/2005/2727
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2727
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:snoopy:snoopy:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:snoopy:snoopy:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:snoopy:snoopy:1.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3330
reference_id CVE-2005-3330
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-3330
20
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/26424.txt
reference_id CVE-2005-3330;OSVDB-20316
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/26424.txt
21
reference_url https://www.securityfocus.com/bid/15213/info
reference_id CVE-2005-3330;OSVDB-20316
reference_type exploit
scores
url https://www.securityfocus.com/bid/15213/info
fixed_packages
0
url pkg:deb/debian/wordpress@0?distro=trixie
purl pkg:deb/debian/wordpress@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@0%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2005-3330
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j33g-aex7-uke8
183
url VCID-j45z-kwz2-b7hn
vulnerability_id VCID-j45z-kwz2-b7hn
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0493.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0493.html
1
reference_url http://klikki.fi/adv/wordpress.html
reference_id
reference_type
scores
url http://klikki.fi/adv/wordpress.html
2
reference_url http://openwall.com/lists/oss-security/2014/11/25/12
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2014/11/25/12
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9031
reference_id
reference_type
scores
0
value 0.00601
scoring_system epss
scoring_elements 0.69521
published_at 2026-04-18T12:55:00Z
1
value 0.00601
scoring_system epss
scoring_elements 0.69406
published_at 2026-04-01T12:55:00Z
2
value 0.00601
scoring_system epss
scoring_elements 0.69417
published_at 2026-04-02T12:55:00Z
3
value 0.00601
scoring_system epss
scoring_elements 0.69434
published_at 2026-04-04T12:55:00Z
4
value 0.00601
scoring_system epss
scoring_elements 0.69413
published_at 2026-04-07T12:55:00Z
5
value 0.00601
scoring_system epss
scoring_elements 0.69464
published_at 2026-04-08T12:55:00Z
6
value 0.00601
scoring_system epss
scoring_elements 0.69479
published_at 2026-04-09T12:55:00Z
7
value 0.00601
scoring_system epss
scoring_elements 0.69501
published_at 2026-04-21T12:55:00Z
8
value 0.00601
scoring_system epss
scoring_elements 0.69486
published_at 2026-04-12T12:55:00Z
9
value 0.00601
scoring_system epss
scoring_elements 0.69472
published_at 2026-04-13T12:55:00Z
10
value 0.00601
scoring_system epss
scoring_elements 0.69512
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9031
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039
12
reference_url http://seclists.org/fulldisclosure/2014/Nov/62
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2014/Nov/62
13
reference_url https://wordpress.org/news/2014/11/wordpress-4-0-1/
reference_id
reference_type
scores
url https://wordpress.org/news/2014/11/wordpress-4-0-1/
14
reference_url http://www.debian.org/security/2014/dsa-3085
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3085
15
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:233
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:233
16
reference_url http://www.securityfocus.com/bid/71237
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71237
17
reference_url http://www.securitytracker.com/id/1031243
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031243
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425
reference_id 770425
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9031
reference_id CVE-2014-9031
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-9031
fixed_packages
0
url pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.0.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2014-9031
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j45z-kwz2-b7hn
184
url VCID-j4bb-d6da-w3de
vulnerability_id VCID-j4bb-d6da-w3de
summary Auth. Stored (contributor+) Cross-Site Scripting (XSS) vulnerability in WordPress core 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.1.3, from 6.0 through 6.0.5, from 5.9 through 5.9.7 and Gutenberg plugin <= 16.8.0 versions.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38000
reference_id
reference_type
scores
0
value 0.00347
scoring_system epss
scoring_elements 0.57277
published_at 2026-04-02T12:55:00Z
1
value 0.00347
scoring_system epss
scoring_elements 0.573
published_at 2026-04-04T12:55:00Z
2
value 0.00347
scoring_system epss
scoring_elements 0.57276
published_at 2026-04-07T12:55:00Z
3
value 0.00347
scoring_system epss
scoring_elements 0.57327
published_at 2026-04-08T12:55:00Z
4
value 0.00347
scoring_system epss
scoring_elements 0.57329
published_at 2026-04-09T12:55:00Z
5
value 0.00347
scoring_system epss
scoring_elements 0.57343
published_at 2026-04-11T12:55:00Z
6
value 0.00347
scoring_system epss
scoring_elements 0.57324
published_at 2026-04-12T12:55:00Z
7
value 0.00347
scoring_system epss
scoring_elements 0.57303
published_at 2026-04-13T12:55:00Z
8
value 0.00347
scoring_system epss
scoring_elements 0.5733
published_at 2026-04-16T12:55:00Z
9
value 0.00347
scoring_system epss
scoring_elements 0.57326
published_at 2026-04-18T12:55:00Z
10
value 0.00347
scoring_system epss
scoring_elements 0.57305
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38000
fixed_packages
0
url pkg:deb/debian/wordpress@0?distro=trixie
purl pkg:deb/debian/wordpress@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@0%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.6%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.6%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.6%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.3.2%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.3.2%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.3.2%252Bdfsg1-1%3Fdistro=trixie
5
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2023-38000
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j4bb-d6da-w3de
185
url VCID-janm-1e9e-abb5
vulnerability_id VCID-janm-1e9e-abb5
summary WordPress before 3.4.1 does not properly restrict access to post contents such as private or draft posts, which allows remote authors or contributors to obtain sensitive information via unknown vectors.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3385
reference_id
reference_type
scores
0
value 0.00669
scoring_system epss
scoring_elements 0.71245
published_at 2026-04-07T12:55:00Z
1
value 0.00669
scoring_system epss
scoring_elements 0.71253
published_at 2026-04-02T12:55:00Z
2
value 0.00669
scoring_system epss
scoring_elements 0.7127
published_at 2026-04-04T12:55:00Z
3
value 0.00669
scoring_system epss
scoring_elements 0.71286
published_at 2026-04-08T12:55:00Z
4
value 0.00669
scoring_system epss
scoring_elements 0.713
published_at 2026-04-09T12:55:00Z
5
value 0.00669
scoring_system epss
scoring_elements 0.71322
published_at 2026-04-11T12:55:00Z
6
value 0.00669
scoring_system epss
scoring_elements 0.71307
published_at 2026-04-12T12:55:00Z
7
value 0.00669
scoring_system epss
scoring_elements 0.71291
published_at 2026-04-13T12:55:00Z
8
value 0.00669
scoring_system epss
scoring_elements 0.71337
published_at 2026-04-16T12:55:00Z
9
value 0.00669
scoring_system epss
scoring_elements 0.71344
published_at 2026-04-18T12:55:00Z
10
value 0.00669
scoring_system epss
scoring_elements 0.71323
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3385
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3385
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3385
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680721
reference_id 680721
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680721
fixed_packages
0
url pkg:deb/debian/wordpress@3.4.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.4.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.4.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2012-3385
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-janm-1e9e-abb5
186
url VCID-jf98-kean-p3b3
vulnerability_id VCID-jf98-kean-p3b3
summary In WordPress before 4.7.3 (wp-admin/js/tags-box.js), there is cross-site scripting (XSS) via taxonomy term names.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6818
reference_id
reference_type
scores
0
value 0.09282
scoring_system epss
scoring_elements 0.92753
published_at 2026-04-21T12:55:00Z
1
value 0.09282
scoring_system epss
scoring_elements 0.92706
published_at 2026-04-01T12:55:00Z
2
value 0.09282
scoring_system epss
scoring_elements 0.92713
published_at 2026-04-02T12:55:00Z
3
value 0.09282
scoring_system epss
scoring_elements 0.92719
published_at 2026-04-04T12:55:00Z
4
value 0.09282
scoring_system epss
scoring_elements 0.92717
published_at 2026-04-07T12:55:00Z
5
value 0.09282
scoring_system epss
scoring_elements 0.92727
published_at 2026-04-08T12:55:00Z
6
value 0.09282
scoring_system epss
scoring_elements 0.92732
published_at 2026-04-09T12:55:00Z
7
value 0.09282
scoring_system epss
scoring_elements 0.92738
published_at 2026-04-11T12:55:00Z
8
value 0.09282
scoring_system epss
scoring_elements 0.92736
published_at 2026-04-13T12:55:00Z
9
value 0.09282
scoring_system epss
scoring_elements 0.92748
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6818
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6818
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857026
reference_id 857026
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857026
3
reference_url https://security.archlinux.org/ASA-201703-14
reference_id ASA-201703-14
reference_type
scores
url https://security.archlinux.org/ASA-201703-14
4
reference_url https://security.archlinux.org/AVG-202
reference_id AVG-202
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-202
fixed_packages
0
url pkg:deb/debian/wordpress@4.7.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.7.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.7.3%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-6818
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jf98-kean-p3b3
187
url VCID-jgcr-7hau-1yff
vulnerability_id VCID-jgcr-7hau-1yff
summary wordpress-mu: XSS vulnerability in RSS Feed Generator
references
0
reference_url http://osvdb.org/50214
reference_id
reference_type
scores
url http://osvdb.org/50214
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5278.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5278.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5278
reference_id
reference_type
scores
0
value 0.03157
scoring_system epss
scoring_elements 0.8693
published_at 2026-04-21T12:55:00Z
1
value 0.03157
scoring_system epss
scoring_elements 0.86853
published_at 2026-04-01T12:55:00Z
2
value 0.03157
scoring_system epss
scoring_elements 0.86863
published_at 2026-04-02T12:55:00Z
3
value 0.03157
scoring_system epss
scoring_elements 0.86882
published_at 2026-04-04T12:55:00Z
4
value 0.03157
scoring_system epss
scoring_elements 0.86877
published_at 2026-04-07T12:55:00Z
5
value 0.03157
scoring_system epss
scoring_elements 0.86897
published_at 2026-04-08T12:55:00Z
6
value 0.03157
scoring_system epss
scoring_elements 0.86905
published_at 2026-04-09T12:55:00Z
7
value 0.03157
scoring_system epss
scoring_elements 0.86918
published_at 2026-04-11T12:55:00Z
8
value 0.03157
scoring_system epss
scoring_elements 0.86914
published_at 2026-04-12T12:55:00Z
9
value 0.03157
scoring_system epss
scoring_elements 0.86908
published_at 2026-04-13T12:55:00Z
10
value 0.03157
scoring_system epss
scoring_elements 0.86925
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5278
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5278
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5278
4
reference_url http://secunia.com/advisories/32882
reference_id
reference_type
scores
url http://secunia.com/advisories/32882
5
reference_url http://secunia.com/advisories/32966
reference_id
reference_type
scores
url http://secunia.com/advisories/32966
6
reference_url http://securityreason.com/securityalert/4662
reference_id
reference_type
scores
url http://securityreason.com/securityalert/4662
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/46882
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/46882
8
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00000.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00000.html
9
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00176.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00176.html
10
reference_url http://wordpress.org/development/2008/11/wordpress-265/
reference_id
reference_type
scores
url http://wordpress.org/development/2008/11/wordpress-265/
11
reference_url http://www.securityfocus.com/archive/1/498652
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/498652
12
reference_url http://www.securityfocus.com/bid/32476
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32476
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=473577
reference_id 473577
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=473577
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507193
reference_id 507193
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507193
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.6.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2.1:beta_2:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.6.2.1:beta_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2.1:beta_2:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2:beta_2:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.6.2:beta_2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.6.2:beta_2:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.711:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.711:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.711:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71-gold:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.71-gold:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71-gold:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.72:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.72:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.72:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.72:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.72:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.72:beta1:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.72:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.72:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.72:beta2:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.72:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.72:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.72:rc1:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1-miles:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1-miles:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1-miles:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2-blakey:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2-blakey:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2-blakey:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0-platinum:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0-platinum:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0-platinum:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:beta:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2-delta:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2-delta:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2-delta:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2-mingus:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2-mingus:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2-mingus:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5-strayhorn:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5-strayhorn:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5-strayhorn:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.6:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.10_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10_rc1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10_rc2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.10_rc2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10_rc2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.3_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3_rc1:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3_rc2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.3_rc2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3_rc2:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:alpha_3:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1:alpha_3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:alpha_3:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.0:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2_revision5002:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2_revision5002:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2_revision5002:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2_revision5003:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2_revision5003:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2_revision5003:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:rc1:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:beta3:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:rc1:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5278
reference_id CVE-2008-5278
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-5278
fixed_packages
0
url pkg:deb/debian/wordpress@2.5.1-11?distro=trixie
purl pkg:deb/debian/wordpress@2.5.1-11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.5.1-11%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2008-5278
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jgcr-7hau-1yff
188
url VCID-jh7f-mzcc-f3e9
vulnerability_id VCID-jh7f-mzcc-f3e9
summary WordPress fails to sufficiently check the format of cached username data.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2702
reference_id
reference_type
scores
0
value 0.0144
scoring_system epss
scoring_elements 0.80657
published_at 2026-04-01T12:55:00Z
1
value 0.0144
scoring_system epss
scoring_elements 0.80665
published_at 2026-04-02T12:55:00Z
2
value 0.0144
scoring_system epss
scoring_elements 0.80686
published_at 2026-04-04T12:55:00Z
3
value 0.0144
scoring_system epss
scoring_elements 0.80682
published_at 2026-04-07T12:55:00Z
4
value 0.0144
scoring_system epss
scoring_elements 0.8071
published_at 2026-04-08T12:55:00Z
5
value 0.0144
scoring_system epss
scoring_elements 0.8072
published_at 2026-04-09T12:55:00Z
6
value 0.0144
scoring_system epss
scoring_elements 0.80736
published_at 2026-04-11T12:55:00Z
7
value 0.0144
scoring_system epss
scoring_elements 0.80723
published_at 2026-04-12T12:55:00Z
8
value 0.0144
scoring_system epss
scoring_elements 0.80714
published_at 2026-04-13T12:55:00Z
9
value 0.0144
scoring_system epss
scoring_elements 0.8075
published_at 2026-04-16T12:55:00Z
10
value 0.0144
scoring_system epss
scoring_elements 0.80751
published_at 2026-04-18T12:55:00Z
11
value 0.0144
scoring_system epss
scoring_elements 0.80753
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2702
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2702
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=369014
reference_id 369014
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=369014
3
reference_url https://security.gentoo.org/glsa/200606-08
reference_id GLSA-200606-08
reference_type
scores
url https://security.gentoo.org/glsa/200606-08
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.3-1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2006-2702
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jh7f-mzcc-f3e9
189
url VCID-jjjw-sspg-q3c3
vulnerability_id VCID-jjjw-sspg-q3c3
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-20041
reference_id
reference_type
scores
0
value 0.01366
scoring_system epss
scoring_elements 0.8014
published_at 2026-04-01T12:55:00Z
1
value 0.01366
scoring_system epss
scoring_elements 0.80147
published_at 2026-04-02T12:55:00Z
2
value 0.01366
scoring_system epss
scoring_elements 0.80167
published_at 2026-04-04T12:55:00Z
3
value 0.01366
scoring_system epss
scoring_elements 0.80156
published_at 2026-04-07T12:55:00Z
4
value 0.01366
scoring_system epss
scoring_elements 0.80184
published_at 2026-04-08T12:55:00Z
5
value 0.01366
scoring_system epss
scoring_elements 0.80192
published_at 2026-04-09T12:55:00Z
6
value 0.01366
scoring_system epss
scoring_elements 0.80211
published_at 2026-04-11T12:55:00Z
7
value 0.01366
scoring_system epss
scoring_elements 0.80196
published_at 2026-04-12T12:55:00Z
8
value 0.01366
scoring_system epss
scoring_elements 0.80188
published_at 2026-04-13T12:55:00Z
9
value 0.01366
scoring_system epss
scoring_elements 0.80217
published_at 2026-04-18T12:55:00Z
10
value 0.01366
scoring_system epss
scoring_elements 0.8022
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-20041
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946905
reference_id 946905
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946905
fixed_packages
0
url pkg:deb/debian/wordpress@5.3.2%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.3.2%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.3.2%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2019-20041
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jjjw-sspg-q3c3
190
url VCID-jmhr-atwp-5kee
vulnerability_id VCID-jmhr-atwp-5kee
summary WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31211
reference_id
reference_type
scores
0
value 0.39711
scoring_system epss
scoring_elements 0.97326
published_at 2026-04-21T12:55:00Z
1
value 0.39711
scoring_system epss
scoring_elements 0.97322
published_at 2026-04-16T12:55:00Z
2
value 0.39711
scoring_system epss
scoring_elements 0.97325
published_at 2026-04-18T12:55:00Z
3
value 0.39711
scoring_system epss
scoring_elements 0.97298
published_at 2026-04-02T12:55:00Z
4
value 0.39711
scoring_system epss
scoring_elements 0.97303
published_at 2026-04-07T12:55:00Z
5
value 0.39711
scoring_system epss
scoring_elements 0.9731
published_at 2026-04-09T12:55:00Z
6
value 0.39711
scoring_system epss
scoring_elements 0.97313
published_at 2026-04-11T12:55:00Z
7
value 0.39711
scoring_system epss
scoring_elements 0.97314
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31211
1
reference_url https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-m257-q4m5-j653
reference_id GHSA-m257-q4m5-j653
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-05T14:00:20Z/
url https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-m257-q4m5-j653
fixed_packages
0
url pkg:deb/debian/wordpress@0?distro=trixie
purl pkg:deb/debian/wordpress@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@0%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.4.2%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.4.2%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.4.2%252Bdfsg1-1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2024-31211
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jmhr-atwp-5kee
191
url VCID-jmx6-p5md-dycf
vulnerability_id VCID-jmx6-p5md-dycf
summary security update
references
0
reference_url http://cgit.drupalcode.org/drupal/diff/includes/xmlrpc.inc?id=1849830
reference_id
reference_type
scores
url http://cgit.drupalcode.org/drupal/diff/includes/xmlrpc.inc?id=1849830
1
reference_url http://cgit.drupalcode.org/drupal/diff/modules/openid/xrds.inc?id=1849830
reference_id
reference_type
scores
url http://cgit.drupalcode.org/drupal/diff/modules/openid/xrds.inc?id=1849830
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5266
reference_id
reference_type
scores
0
value 0.76306
scoring_system epss
scoring_elements 0.98936
published_at 2026-04-21T12:55:00Z
1
value 0.76306
scoring_system epss
scoring_elements 0.9892
published_at 2026-04-01T12:55:00Z
2
value 0.76306
scoring_system epss
scoring_elements 0.98921
published_at 2026-04-02T12:55:00Z
3
value 0.76306
scoring_system epss
scoring_elements 0.98924
published_at 2026-04-04T12:55:00Z
4
value 0.76306
scoring_system epss
scoring_elements 0.98926
published_at 2026-04-07T12:55:00Z
5
value 0.76306
scoring_system epss
scoring_elements 0.98928
published_at 2026-04-09T12:55:00Z
6
value 0.76306
scoring_system epss
scoring_elements 0.98929
published_at 2026-04-11T12:55:00Z
7
value 0.76306
scoring_system epss
scoring_elements 0.9893
published_at 2026-04-12T12:55:00Z
8
value 0.76306
scoring_system epss
scoring_elements 0.98931
published_at 2026-04-13T12:55:00Z
9
value 0.76306
scoring_system epss
scoring_elements 0.98933
published_at 2026-04-16T12:55:00Z
10
value 0.76306
scoring_system epss
scoring_elements 0.98934
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5266
3
reference_url https://core.trac.wordpress.org/changeset/29404
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/29404
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2053
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5204
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5205
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5240
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5265
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5266
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5267
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5267
11
reference_url https://wordpress.org/news/2014/08/wordpress-3-9-2/
reference_id
reference_type
scores
url https://wordpress.org/news/2014/08/wordpress-3-9-2/
12
reference_url https://www.drupal.org/SA-CORE-2014-004
reference_id
reference_type
scores
url https://www.drupal.org/SA-CORE-2014-004
13
reference_url http://www.debian.org/security/2014/dsa-2999
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2999
14
reference_url http://www.debian.org/security/2014/dsa-3001
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3001
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757312
reference_id 757312
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757312
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:beta1:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.0:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:beta2:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.0:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:beta3:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.0:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:beta4:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:dev:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.0:dev:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:dev:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:rc1:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:rc2:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:rc3:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.0:rc4:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.10:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.11:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.12:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.13:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.14:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.15:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.16:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.17:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.18:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.19:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.20:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.21:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.22:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.23:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.24:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.25:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.26:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.27:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.28:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.29:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.3:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.30:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.31:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.32:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.4:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.5:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.6:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.7:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.8:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:6.9:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha1:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:alpha1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha1:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha2:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:alpha2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha2:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha3:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:alpha3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha3:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha4:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:alpha4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha4:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha5:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:alpha5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha5:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha6:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:alpha6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha6:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha7:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:alpha7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:alpha7:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:beta1:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:beta2:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:beta3:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:dev:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:dev:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:dev:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:rc1:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:rc2:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:rc3:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.0:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.0:rc4:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.1:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.10:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.11:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.12:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.13:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.14:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.15:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.16:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.17:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.18:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.19:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.2:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.20:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.21:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.22:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.23:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.24:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.25:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.26:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.27:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.28:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.29:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.3:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.30:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.4:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.5:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.6:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.7:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.8:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.9:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.x-dev:*:*:*:*:*:*:*
reference_id cpe:2.3:a:drupal:drupal:7.x-dev:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:7.x-dev:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.2:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2:beta1:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.1:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.6:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.6.1:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.1:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.0:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-5266
reference_id CVE-2014-5266
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-5266
fixed_packages
0
url pkg:deb/debian/wordpress@3.9.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.9.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.9.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2014-5266
risk_score 9.0
exploitability 2.0
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jmx6-p5md-dycf
192
url VCID-jntp-tjnu-ekbk
vulnerability_id VCID-jntp-tjnu-ekbk
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2222
reference_id
reference_type
scores
0
value 0.05172
scoring_system epss
scoring_elements 0.8992
published_at 2026-04-18T12:55:00Z
1
value 0.05172
scoring_system epss
scoring_elements 0.89918
published_at 2026-04-16T12:55:00Z
2
value 0.05172
scoring_system epss
scoring_elements 0.89863
published_at 2026-04-01T12:55:00Z
3
value 0.05172
scoring_system epss
scoring_elements 0.89866
published_at 2026-04-02T12:55:00Z
4
value 0.05172
scoring_system epss
scoring_elements 0.89879
published_at 2026-04-04T12:55:00Z
5
value 0.05172
scoring_system epss
scoring_elements 0.89885
published_at 2026-04-07T12:55:00Z
6
value 0.05172
scoring_system epss
scoring_elements 0.89901
published_at 2026-04-08T12:55:00Z
7
value 0.05172
scoring_system epss
scoring_elements 0.89906
published_at 2026-04-09T12:55:00Z
8
value 0.05172
scoring_system epss
scoring_elements 0.89914
published_at 2026-04-21T12:55:00Z
9
value 0.05172
scoring_system epss
scoring_elements 0.89912
published_at 2026-04-12T12:55:00Z
10
value 0.05172
scoring_system epss
scoring_elements 0.89905
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2222
1
reference_url https://codex.wordpress.org/Version_4.4.2
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.4.2
2
reference_url https://core.trac.wordpress.org/changeset/36435
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/36435
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2221
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2222
5
reference_url https://hackerone.com/reports/110801
reference_id
reference_type
scores
url https://hackerone.com/reports/110801
6
reference_url https://news.ycombinator.com/item?id=20433070
reference_id
reference_type
scores
url https://news.ycombinator.com/item?id=20433070
7
reference_url https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-release/
8
reference_url https://wpvulndb.com/vulnerabilities/8376
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8376
9
reference_url http://www.debian.org/security/2016/dsa-3472
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3472
10
reference_url http://www.securityfocus.com/bid/82454
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/82454
11
reference_url http://www.securitytracker.com/id/1034933
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034933
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813697
reference_id 813697
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813697
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.4.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2222
reference_id CVE-2016-2222
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-2222
fixed_packages
0
url pkg:deb/debian/wordpress@4.4.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.4.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.4.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2016-2222
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jntp-tjnu-ekbk
193
url VCID-jr4w-6wqz-cbe3
vulnerability_id VCID-jr4w-6wqz-cbe3
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0166
reference_id
reference_type
scores
0
value 0.31592
scoring_system epss
scoring_elements 0.96761
published_at 2026-04-01T12:55:00Z
1
value 0.31592
scoring_system epss
scoring_elements 0.9677
published_at 2026-04-02T12:55:00Z
2
value 0.31592
scoring_system epss
scoring_elements 0.96772
published_at 2026-04-04T12:55:00Z
3
value 0.31592
scoring_system epss
scoring_elements 0.96776
published_at 2026-04-07T12:55:00Z
4
value 0.31592
scoring_system epss
scoring_elements 0.96784
published_at 2026-04-08T12:55:00Z
5
value 0.31592
scoring_system epss
scoring_elements 0.96785
published_at 2026-04-09T12:55:00Z
6
value 0.31592
scoring_system epss
scoring_elements 0.96787
published_at 2026-04-12T12:55:00Z
7
value 0.31592
scoring_system epss
scoring_elements 0.9679
published_at 2026-04-13T12:55:00Z
8
value 0.31592
scoring_system epss
scoring_elements 0.96796
published_at 2026-04-16T12:55:00Z
9
value 0.31592
scoring_system epss
scoring_elements 0.968
published_at 2026-04-18T12:55:00Z
10
value 0.31592
scoring_system epss
scoring_elements 0.96803
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0166
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0165
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0165
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0166
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744018
reference_id 744018
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744018
fixed_packages
0
url pkg:deb/debian/wordpress@3.8.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.8.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.8.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2014-0166
risk_score 0.1
exploitability 0.5
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jr4w-6wqz-cbe3
194
url VCID-juwh-zmez-dfhy
vulnerability_id VCID-juwh-zmez-dfhy
summary Cross-site scripting (XSS) vulnerability in Plupload.as in Moxiecode plupload before 1.5.5, as used in WordPress before 3.5.1 and other products, allows remote attackers to inject arbitrary web script or HTML via the id parameter.
references
0
reference_url http://codex.wordpress.org/Version_3.5.1
reference_id
reference_type
scores
url http://codex.wordpress.org/Version_3.5.1
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0237
reference_id
reference_type
scores
0
value 0.0043
scoring_system epss
scoring_elements 0.62554
published_at 2026-04-21T12:55:00Z
1
value 0.0043
scoring_system epss
scoring_elements 0.62415
published_at 2026-04-01T12:55:00Z
2
value 0.0043
scoring_system epss
scoring_elements 0.62473
published_at 2026-04-07T12:55:00Z
3
value 0.0043
scoring_system epss
scoring_elements 0.62505
published_at 2026-04-04T12:55:00Z
4
value 0.0043
scoring_system epss
scoring_elements 0.62524
published_at 2026-04-08T12:55:00Z
5
value 0.0043
scoring_system epss
scoring_elements 0.6254
published_at 2026-04-09T12:55:00Z
6
value 0.0043
scoring_system epss
scoring_elements 0.62559
published_at 2026-04-11T12:55:00Z
7
value 0.0043
scoring_system epss
scoring_elements 0.62548
published_at 2026-04-12T12:55:00Z
8
value 0.0043
scoring_system epss
scoring_elements 0.62525
published_at 2026-04-13T12:55:00Z
9
value 0.0043
scoring_system epss
scoring_elements 0.62566
published_at 2026-04-16T12:55:00Z
10
value 0.0043
scoring_system epss
scoring_elements 0.62572
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0237
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=904122
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=904122
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0237
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0237
4
reference_url https://github.com/moxiecode/plupload/commit/2d746ee9083c184f1234d8fed311e89bdd1b39e5
reference_id
reference_type
scores
url https://github.com/moxiecode/plupload/commit/2d746ee9083c184f1234d8fed311e89bdd1b39e5
5
reference_url http://wordpress.org/news/2013/01/wordpress-3-5-1/
reference_id
reference_type
scores
url http://wordpress.org/news/2013/01/wordpress-3-5-1/
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698929
reference_id 698929
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698929
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moxiecode:plupload:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moxiecode:plupload:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moxiecode:plupload:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moxiecode:plupload:1.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moxiecode:plupload:1.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moxiecode:plupload:1.4.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moxiecode:plupload:1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moxiecode:plupload:1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moxiecode:plupload:1.4.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moxiecode:plupload:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moxiecode:plupload:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moxiecode:plupload:1.4.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moxiecode:plupload:1.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moxiecode:plupload:1.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moxiecode:plupload:1.4.3:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moxiecode:plupload:1.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moxiecode:plupload:1.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moxiecode:plupload:1.5.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moxiecode:plupload:1.5.0:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:moxiecode:plupload:1.5.0:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moxiecode:plupload:1.5.0:beta:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moxiecode:plupload:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moxiecode:plupload:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moxiecode:plupload:1.5.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moxiecode:plupload:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moxiecode:plupload:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moxiecode:plupload:1.5.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moxiecode:plupload:1.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moxiecode:plupload:1.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moxiecode:plupload:1.5.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0237
reference_id CVE-2013-0237
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-0237
fixed_packages
0
url pkg:deb/debian/wordpress@3.5.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.5.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.5.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2013-0237
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-juwh-zmez-dfhy
195
url VCID-k52x-fa57-hkfk
vulnerability_id VCID-k52x-fa57-hkfk
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16219
reference_id
reference_type
scores
0
value 0.04685
scoring_system epss
scoring_elements 0.89353
published_at 2026-04-21T12:55:00Z
1
value 0.04685
scoring_system epss
scoring_elements 0.89356
published_at 2026-04-18T12:55:00Z
2
value 0.04685
scoring_system epss
scoring_elements 0.89298
published_at 2026-04-01T12:55:00Z
3
value 0.04685
scoring_system epss
scoring_elements 0.89304
published_at 2026-04-02T12:55:00Z
4
value 0.04685
scoring_system epss
scoring_elements 0.89318
published_at 2026-04-04T12:55:00Z
5
value 0.04685
scoring_system epss
scoring_elements 0.8932
published_at 2026-04-07T12:55:00Z
6
value 0.04685
scoring_system epss
scoring_elements 0.89336
published_at 2026-04-08T12:55:00Z
7
value 0.04685
scoring_system epss
scoring_elements 0.89341
published_at 2026-04-09T12:55:00Z
8
value 0.04685
scoring_system epss
scoring_elements 0.8935
published_at 2026-04-11T12:55:00Z
9
value 0.04685
scoring_system epss
scoring_elements 0.89347
published_at 2026-04-12T12:55:00Z
10
value 0.04685
scoring_system epss
scoring_elements 0.89343
published_at 2026-04-13T12:55:00Z
11
value 0.04685
scoring_system epss
scoring_elements 0.89357
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16219
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
19
reference_url https://fortiguard.com/zeroday/FG-VD-18-165
reference_id
reference_type
scores
url https://fortiguard.com/zeroday/FG-VD-18-165
20
reference_url https://lists.debian.org/debian-lts-announce/2019/10/msg00023.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/10/msg00023.html
21
reference_url https://seclists.org/bugtraq/2020/Jan/8
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2020/Jan/8
22
reference_url https://wordpress.org/news/2019/09/wordpress-5-2-3-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2019/09/wordpress-5-2-3-security-and-maintenance-release/
23
reference_url https://wpvulndb.com/vulnerabilities/9864
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/9864
24
reference_url https://www.debian.org/security/2020/dsa-4599
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4599
25
reference_url https://www.debian.org/security/2020/dsa-4677
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4677
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939543
reference_id 939543
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939543
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-16219
reference_id CVE-2019-16219
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-16219
fixed_packages
0
url pkg:deb/debian/wordpress@5.2.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.2.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.2.3%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2019-16219
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k52x-fa57-hkfk
196
url VCID-k6a1-ag3k-y7d1
vulnerability_id VCID-k6a1-ag3k-y7d1
summary In WordPress before 4.7.5, there is insufficient redirect validation in the HTTP class, leading to SSRF.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9066
reference_id
reference_type
scores
0
value 0.01408
scoring_system epss
scoring_elements 0.8043
published_at 2026-04-01T12:55:00Z
1
value 0.01408
scoring_system epss
scoring_elements 0.80436
published_at 2026-04-02T12:55:00Z
2
value 0.01408
scoring_system epss
scoring_elements 0.80457
published_at 2026-04-04T12:55:00Z
3
value 0.01408
scoring_system epss
scoring_elements 0.80446
published_at 2026-04-07T12:55:00Z
4
value 0.01408
scoring_system epss
scoring_elements 0.80476
published_at 2026-04-08T12:55:00Z
5
value 0.01408
scoring_system epss
scoring_elements 0.80486
published_at 2026-04-09T12:55:00Z
6
value 0.01408
scoring_system epss
scoring_elements 0.80504
published_at 2026-04-11T12:55:00Z
7
value 0.01408
scoring_system epss
scoring_elements 0.80489
published_at 2026-04-12T12:55:00Z
8
value 0.01408
scoring_system epss
scoring_elements 0.80482
published_at 2026-04-13T12:55:00Z
9
value 0.01408
scoring_system epss
scoring_elements 0.80511
published_at 2026-04-16T12:55:00Z
10
value 0.01408
scoring_system epss
scoring_elements 0.80512
published_at 2026-04-18T12:55:00Z
11
value 0.01408
scoring_system epss
scoring_elements 0.80514
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9066
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9066
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862816
reference_id 862816
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862816
fixed_packages
0
url pkg:deb/debian/wordpress@4.7.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.7.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.7.5%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-9066
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k6a1-ag3k-y7d1
197
url VCID-k96h-dr15-ufhv
vulnerability_id VCID-k96h-dr15-ufhv
summary
PHPMailer Shell command injection
PHPMailer before 1.7.4, when configured to use sendmail, allows remote attackers to execute arbitrary shell commands via shell metacharacters in the SendmailSend function in `class.phpmailer.php`.

### Impact
Shell command injection, remotely exploitable if host application does not filter user data appropriately.

### Patches
Fixed in 1.7.4

### Workarounds
Filter and validate user-supplied data before putting in the into the `Sender` property.

### References
https://nvd.nist.gov/vuln/detail/CVE-2007-3215

### For more information
If you have any questions or comments about this advisory:
* Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)
references
0
reference_url http://larholm.com/2007/06/11/phpmailer-0day-remote-execution/
reference_id
reference_type
scores
url http://larholm.com/2007/06/11/phpmailer-0day-remote-execution/
1
reference_url http://osvdb.org/37206
reference_id
reference_type
scores
url http://osvdb.org/37206
2
reference_url http://osvdb.org/76139
reference_id
reference_type
scores
url http://osvdb.org/76139
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3215
reference_id
reference_type
scores
0
value 0.04403
scoring_system epss
scoring_elements 0.89016
published_at 2026-04-11T12:55:00Z
1
value 0.04403
scoring_system epss
scoring_elements 0.88962
published_at 2026-04-02T12:55:00Z
2
value 0.04403
scoring_system epss
scoring_elements 0.88978
published_at 2026-04-04T12:55:00Z
3
value 0.04403
scoring_system epss
scoring_elements 0.88981
published_at 2026-04-07T12:55:00Z
4
value 0.04403
scoring_system epss
scoring_elements 0.88999
published_at 2026-04-08T12:55:00Z
5
value 0.04403
scoring_system epss
scoring_elements 0.89004
published_at 2026-04-09T12:55:00Z
6
value 0.04403
scoring_system epss
scoring_elements 0.89017
published_at 2026-04-21T12:55:00Z
7
value 0.04403
scoring_system epss
scoring_elements 0.89021
published_at 2026-04-18T12:55:00Z
8
value 0.04403
scoring_system epss
scoring_elements 0.89023
published_at 2026-04-16T12:55:00Z
9
value 0.04403
scoring_system epss
scoring_elements 0.89009
published_at 2026-04-13T12:55:00Z
10
value 0.04403
scoring_system epss
scoring_elements 0.88954
published_at 2026-04-01T12:55:00Z
11
value 0.04403
scoring_system epss
scoring_elements 0.89011
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3215
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3215
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3215
5
reference_url https://cxsecurity.com/issue/WLB-2007060063
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://cxsecurity.com/issue/WLB-2007060063
6
reference_url http://seclists.org/fulldisclosure/2011/Oct/223
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2011/Oct/223
7
reference_url http://secunia.com/advisories/25626
reference_id
reference_type
scores
url http://secunia.com/advisories/25626
8
reference_url http://secunia.com/advisories/25755
reference_id
reference_type
scores
url http://secunia.com/advisories/25755
9
reference_url http://secunia.com/advisories/25758
reference_id
reference_type
scores
url http://secunia.com/advisories/25758
10
reference_url http://securityreason.com/securityalert/2802
reference_id
reference_type
scores
url http://securityreason.com/securityalert/2802
11
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/34818
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/34818
12
reference_url https://github.com/PHPMailer/PHPMailer
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/PHPMailer/PHPMailer
13
reference_url https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-6h78-85v2-mmch
reference_id
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-6h78-85v2-mmch
14
reference_url http://sourceforge.net/project/shownotes.php?release_id=517428&group_id=157374
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=517428&group_id=157374
15
reference_url https://seclists.org/fulldisclosure/2011/Oct/223
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://seclists.org/fulldisclosure/2011/Oct/223
16
reference_url https://sourceforge.net/p/phpmailer/bugs/192
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://sourceforge.net/p/phpmailer/bugs/192
17
reference_url https://sourceforge.net/p/phpmailer/bugs/192/
reference_id
reference_type
scores
url https://sourceforge.net/p/phpmailer/bugs/192/
18
reference_url https://sourceforge.net/tracker/index.php?func=detail&aid=1734811&group_id=26031&atid=385707
reference_id
reference_type
scores
url https://sourceforge.net/tracker/index.php?func=detail&aid=1734811&group_id=26031&atid=385707
19
reference_url https://web.archive.org/web/20070714054359/http://larholm.com/2007/06/11/phpmailer-0day-remote-execution
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20070714054359/http://larholm.com/2007/06/11/phpmailer-0day-remote-execution
20
reference_url https://web.archive.org/web/20070714054359/http://larholm.com/2007/06/11/phpmailer-0day-remote-execution/
reference_id
reference_type
scores
url https://web.archive.org/web/20070714054359/http://larholm.com/2007/06/11/phpmailer-0day-remote-execution/
21
reference_url https://yehg.net/lab/pr0js/advisories/%5BvTiger_5.2.1%5D_rce
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://yehg.net/lab/pr0js/advisories/%5BvTiger_5.2.1%5D_rce
22
reference_url http://www.debian.org/security/2007/dsa-1315
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1315
23
reference_url http://www.securityfocus.com/archive/1/471065/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/471065/100/0/threaded
24
reference_url http://www.securityfocus.com/bid/24417
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24417
25
reference_url http://www.vupen.com/english/advisories/2007/2161
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2161
26
reference_url http://www.vupen.com/english/advisories/2007/2267
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2267
27
reference_url http://yehg.net/lab/pr0js/advisories/%5BvTiger_5.2.1%5D_rce
reference_id
reference_type
scores
url http://yehg.net/lab/pr0js/advisories/%5BvTiger_5.2.1%5D_rce
28
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=429179
reference_id 429179
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=429179
29
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=429194
reference_id 429194
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=429194
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmailer:phpmailer:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmailer:phpmailer:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmailer:phpmailer:1.7:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmailer:phpmailer:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmailer:phpmailer:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmailer:phpmailer:1.7.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmailer:phpmailer:1.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmailer:phpmailer:1.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmailer:phpmailer:1.7.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmailer:phpmailer:1.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmailer:phpmailer:1.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmailer:phpmailer:1.7.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmailer:phpmailer:1.73:*:*:*:*:*:*:*
reference_id cpe:2.3:a:phpmailer:phpmailer:1.73:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:phpmailer:phpmailer:1.73:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3215
reference_id CVE-2007-3215
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-3215
36
reference_url https://github.com/advisories/GHSA-6h78-85v2-mmch
reference_id GHSA-6h78-85v2-mmch
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-6h78-85v2-mmch
37
reference_url https://usn.ubuntu.com/791-1/
reference_id USN-791-1
reference_type
scores
url https://usn.ubuntu.com/791-1/
fixed_packages
0
url pkg:deb/debian/wordpress@2.2.1-1?distro=trixie
purl pkg:deb/debian/wordpress@2.2.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.2.1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-3215, GHSA-6h78-85v2-mmch
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k96h-dr15-ufhv
198
url VCID-kdb9-npxe-tyc4
vulnerability_id VCID-kdb9-npxe-tyc4
summary WordPress before 3.0.1, when a Multisite installation is used, permanently retains the "site administrators can add users" option once changed, which might allow remote authenticated administrators to bypass intended access restrictions in opportunistic circumstances via an add action after a temporary change.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-5297
reference_id
reference_type
scores
0
value 0.00231
scoring_system epss
scoring_elements 0.45845
published_at 2026-04-01T12:55:00Z
1
value 0.00231
scoring_system epss
scoring_elements 0.45892
published_at 2026-04-02T12:55:00Z
2
value 0.00231
scoring_system epss
scoring_elements 0.45913
published_at 2026-04-04T12:55:00Z
3
value 0.00231
scoring_system epss
scoring_elements 0.45863
published_at 2026-04-07T12:55:00Z
4
value 0.00231
scoring_system epss
scoring_elements 0.45919
published_at 2026-04-08T12:55:00Z
5
value 0.00231
scoring_system epss
scoring_elements 0.45916
published_at 2026-04-09T12:55:00Z
6
value 0.00231
scoring_system epss
scoring_elements 0.45939
published_at 2026-04-11T12:55:00Z
7
value 0.00231
scoring_system epss
scoring_elements 0.4591
published_at 2026-04-12T12:55:00Z
8
value 0.00231
scoring_system epss
scoring_elements 0.45917
published_at 2026-04-13T12:55:00Z
9
value 0.00231
scoring_system epss
scoring_elements 0.45969
published_at 2026-04-16T12:55:00Z
10
value 0.00231
scoring_system epss
scoring_elements 0.45964
published_at 2026-04-18T12:55:00Z
11
value 0.00231
scoring_system epss
scoring_elements 0.45909
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-5297
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5297
fixed_packages
0
url pkg:deb/debian/wordpress@3.0.1-1?distro=trixie
purl pkg:deb/debian/wordpress@3.0.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.0.1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2010-5297
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kdb9-npxe-tyc4
199
url VCID-kdjp-qmxc-9qat
vulnerability_id VCID-kdjp-qmxc-9qat
summary The wp_remote_fopen function in WordPress before 2.1 allows remote attackers to cause a denial of service (bandwidth or thread consumption) via pingback service calls with a source URI that corresponds to a large file, which triggers a long download session without a timeout constraint.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0539
reference_id
reference_type
scores
0
value 0.0138
scoring_system epss
scoring_elements 0.80305
published_at 2026-04-21T12:55:00Z
1
value 0.0138
scoring_system epss
scoring_elements 0.80217
published_at 2026-04-01T12:55:00Z
2
value 0.0138
scoring_system epss
scoring_elements 0.80225
published_at 2026-04-02T12:55:00Z
3
value 0.0138
scoring_system epss
scoring_elements 0.80245
published_at 2026-04-04T12:55:00Z
4
value 0.0138
scoring_system epss
scoring_elements 0.80233
published_at 2026-04-07T12:55:00Z
5
value 0.0138
scoring_system epss
scoring_elements 0.80261
published_at 2026-04-08T12:55:00Z
6
value 0.0138
scoring_system epss
scoring_elements 0.80272
published_at 2026-04-09T12:55:00Z
7
value 0.0138
scoring_system epss
scoring_elements 0.8029
published_at 2026-04-11T12:55:00Z
8
value 0.0138
scoring_system epss
scoring_elements 0.80275
published_at 2026-04-12T12:55:00Z
9
value 0.0138
scoring_system epss
scoring_elements 0.80269
published_at 2026-04-13T12:55:00Z
10
value 0.0138
scoring_system epss
scoring_elements 0.80299
published_at 2026-04-16T12:55:00Z
11
value 0.0138
scoring_system epss
scoring_elements 0.80301
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0539
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0539
2
reference_url http://securityreason.com/securityalert/2191
reference_id
reference_type
scores
url http://securityreason.com/securityalert/2191
3
reference_url http://www.securityfocus.com/archive/1/457996/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/457996/100/0/threaded
4
reference_url http://www.securityfocus.com/archive/1/458003/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/458003/100/0/threaded
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0539
reference_id CVE-2007-0539
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-0539
fixed_packages
0
url pkg:deb/debian/wordpress@2.1.0-1?distro=trixie
purl pkg:deb/debian/wordpress@2.1.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.1.0-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-0539
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kdjp-qmxc-9qat
200
url VCID-kk83-bnn5-tuar
vulnerability_id VCID-kk83-bnn5-tuar
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-4048
reference_id
reference_type
scores
0
value 0.03502
scoring_system epss
scoring_elements 0.87556
published_at 2026-04-01T12:55:00Z
1
value 0.03502
scoring_system epss
scoring_elements 0.87565
published_at 2026-04-02T12:55:00Z
2
value 0.03502
scoring_system epss
scoring_elements 0.87579
published_at 2026-04-04T12:55:00Z
3
value 0.03502
scoring_system epss
scoring_elements 0.87581
published_at 2026-04-07T12:55:00Z
4
value 0.03502
scoring_system epss
scoring_elements 0.876
published_at 2026-04-08T12:55:00Z
5
value 0.03502
scoring_system epss
scoring_elements 0.87606
published_at 2026-04-09T12:55:00Z
6
value 0.03502
scoring_system epss
scoring_elements 0.87618
published_at 2026-04-11T12:55:00Z
7
value 0.03502
scoring_system epss
scoring_elements 0.87613
published_at 2026-04-12T12:55:00Z
8
value 0.03502
scoring_system epss
scoring_elements 0.8761
published_at 2026-04-13T12:55:00Z
9
value 0.03502
scoring_system epss
scoring_elements 0.87625
published_at 2026-04-18T12:55:00Z
10
value 0.03502
scoring_system epss
scoring_elements 0.87623
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-4048
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25286
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4047
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4048
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4049
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4050
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962685
reference_id 962685
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962685
fixed_packages
0
url pkg:deb/debian/wordpress@5.4.2%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.4.2%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.4.2%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2020-4048
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kk83-bnn5-tuar
201
url VCID-kkqs-rbpz-wqhf
vulnerability_id VCID-kkqs-rbpz-wqhf
summary Cross-site scripting (XSS) vulnerability in the refreshAdvancedAccessibilityOfItem function in wp-admin/js/nav-menu.js in WordPress before 4.2.4 allows remote attackers to inject arbitrary web script or HTML via an accessibility-helper title.
references
0
reference_url http://openwall.com/lists/oss-security/2015/08/04/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2015/08/04/7
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5733
reference_id
reference_type
scores
0
value 0.01502
scoring_system epss
scoring_elements 0.81186
published_at 2026-04-18T12:55:00Z
1
value 0.01502
scoring_system epss
scoring_elements 0.81083
published_at 2026-04-01T12:55:00Z
2
value 0.01502
scoring_system epss
scoring_elements 0.81091
published_at 2026-04-02T12:55:00Z
3
value 0.01502
scoring_system epss
scoring_elements 0.81116
published_at 2026-04-07T12:55:00Z
4
value 0.01502
scoring_system epss
scoring_elements 0.81144
published_at 2026-04-08T12:55:00Z
5
value 0.01502
scoring_system epss
scoring_elements 0.8115
published_at 2026-04-09T12:55:00Z
6
value 0.01502
scoring_system epss
scoring_elements 0.81168
published_at 2026-04-11T12:55:00Z
7
value 0.01502
scoring_system epss
scoring_elements 0.81154
published_at 2026-04-12T12:55:00Z
8
value 0.01502
scoring_system epss
scoring_elements 0.81148
published_at 2026-04-13T12:55:00Z
9
value 0.01502
scoring_system epss
scoring_elements 0.81184
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5733
2
reference_url https://codex.wordpress.org/Version_4.2.4
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.2.4
3
reference_url https://core.trac.wordpress.org/changeset/33540
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/33540
4
reference_url https://core.trac.wordpress.org/changeset/33541
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/33541
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5733
6
reference_url https://wordpress.org/news/2015/08/wordpress-4-2-4-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2015/08/wordpress-4-2-4-security-and-maintenance-release/
7
reference_url https://wpvulndb.com/vulnerabilities/8132
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8132
8
reference_url http://www.securityfocus.com/bid/76331
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/76331
9
reference_url http://www.securitytracker.com/id/1033178
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033178
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794560
reference_id 794560
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794560
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5733
reference_id CVE-2015-5733
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-5733
fixed_packages
0
url pkg:deb/debian/wordpress@4.2.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.2.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.2.4%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2015-5733
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kkqs-rbpz-wqhf
202
url VCID-kn9s-5v5u-d3fj
vulnerability_id VCID-kn9s-5v5u-d3fj
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-20043
reference_id
reference_type
scores
0
value 0.0117
scoring_system epss
scoring_elements 0.78609
published_at 2026-04-01T12:55:00Z
1
value 0.0117
scoring_system epss
scoring_elements 0.78615
published_at 2026-04-02T12:55:00Z
2
value 0.0117
scoring_system epss
scoring_elements 0.78646
published_at 2026-04-04T12:55:00Z
3
value 0.0117
scoring_system epss
scoring_elements 0.78627
published_at 2026-04-07T12:55:00Z
4
value 0.0117
scoring_system epss
scoring_elements 0.78653
published_at 2026-04-08T12:55:00Z
5
value 0.0117
scoring_system epss
scoring_elements 0.7866
published_at 2026-04-09T12:55:00Z
6
value 0.0117
scoring_system epss
scoring_elements 0.78685
published_at 2026-04-11T12:55:00Z
7
value 0.0117
scoring_system epss
scoring_elements 0.78666
published_at 2026-04-12T12:55:00Z
8
value 0.0117
scoring_system epss
scoring_elements 0.78658
published_at 2026-04-13T12:55:00Z
9
value 0.0117
scoring_system epss
scoring_elements 0.78686
published_at 2026-04-16T12:55:00Z
10
value 0.0117
scoring_system epss
scoring_elements 0.78684
published_at 2026-04-18T12:55:00Z
11
value 0.0117
scoring_system epss
scoring_elements 0.78681
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-20043
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946905
reference_id 946905
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946905
fixed_packages
0
url pkg:deb/debian/wordpress@5.3.2%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.3.2%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.3.2%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2019-20043
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kn9s-5v5u-d3fj
203
url VCID-kpem-j9we-vufs
vulnerability_id VCID-kpem-j9we-vufs
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5492
reference_id
reference_type
scores
0
value 0.00533
scoring_system epss
scoring_elements 0.67391
published_at 2026-04-21T12:55:00Z
1
value 0.00533
scoring_system epss
scoring_elements 0.67292
published_at 2026-04-01T12:55:00Z
2
value 0.00533
scoring_system epss
scoring_elements 0.67329
published_at 2026-04-07T12:55:00Z
3
value 0.00533
scoring_system epss
scoring_elements 0.67352
published_at 2026-04-04T12:55:00Z
4
value 0.00533
scoring_system epss
scoring_elements 0.6738
published_at 2026-04-08T12:55:00Z
5
value 0.00533
scoring_system epss
scoring_elements 0.67393
published_at 2026-04-09T12:55:00Z
6
value 0.00533
scoring_system epss
scoring_elements 0.67414
published_at 2026-04-11T12:55:00Z
7
value 0.00533
scoring_system epss
scoring_elements 0.67402
published_at 2026-04-12T12:55:00Z
8
value 0.00533
scoring_system epss
scoring_elements 0.67366
published_at 2026-04-13T12:55:00Z
9
value 0.00533
scoring_system epss
scoring_elements 0.67401
published_at 2026-04-16T12:55:00Z
10
value 0.00533
scoring_system epss
scoring_elements 0.67413
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5492
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5488
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5489
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5490
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5491
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5492
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5493
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5612
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851310
reference_id 851310
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851310
11
reference_url https://security.archlinux.org/ASA-201701-22
reference_id ASA-201701-22
reference_type
scores
url https://security.archlinux.org/ASA-201701-22
12
reference_url https://security.archlinux.org/AVG-142
reference_id AVG-142
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-142
fixed_packages
0
url pkg:deb/debian/wordpress@4.7.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.7.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.7.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-5492
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kpem-j9we-vufs
204
url VCID-ksx9-t81e-pkb3
vulnerability_id VCID-ksx9-t81e-pkb3
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0493.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0493.html
1
reference_url http://openwall.com/lists/oss-security/2014/11/25/12
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2014/11/25/12
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9038
reference_id
reference_type
scores
0
value 0.01235
scoring_system epss
scoring_elements 0.79222
published_at 2026-04-18T12:55:00Z
1
value 0.01235
scoring_system epss
scoring_elements 0.79149
published_at 2026-04-01T12:55:00Z
2
value 0.01235
scoring_system epss
scoring_elements 0.79155
published_at 2026-04-02T12:55:00Z
3
value 0.01235
scoring_system epss
scoring_elements 0.7918
published_at 2026-04-04T12:55:00Z
4
value 0.01235
scoring_system epss
scoring_elements 0.79166
published_at 2026-04-07T12:55:00Z
5
value 0.01235
scoring_system epss
scoring_elements 0.79191
published_at 2026-04-08T12:55:00Z
6
value 0.01235
scoring_system epss
scoring_elements 0.79199
published_at 2026-04-13T12:55:00Z
7
value 0.01235
scoring_system epss
scoring_elements 0.79223
published_at 2026-04-21T12:55:00Z
8
value 0.01235
scoring_system epss
scoring_elements 0.79208
published_at 2026-04-12T12:55:00Z
9
value 0.01235
scoring_system epss
scoring_elements 0.79226
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9038
3
reference_url https://core.trac.wordpress.org/changeset/30444
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/30444
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039
12
reference_url https://wordpress.org/news/2014/11/wordpress-4-0-1/
reference_id
reference_type
scores
url https://wordpress.org/news/2014/11/wordpress-4-0-1/
13
reference_url http://www.debian.org/security/2014/dsa-3085
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3085
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:233
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:233
15
reference_url http://www.securitytracker.com/id/1031243
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031243
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425
reference_id 770425
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9038
reference_id CVE-2014-9038
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-9038
fixed_packages
0
url pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.0.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2014-9038
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ksx9-t81e-pkb3
205
url VCID-kybz-d1hv-g3ae
vulnerability_id VCID-kybz-d1hv-g3ae
summary several
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4338
reference_id
reference_type
scores
0
value 0.09588
scoring_system epss
scoring_elements 0.92845
published_at 2026-04-01T12:55:00Z
1
value 0.09588
scoring_system epss
scoring_elements 0.92853
published_at 2026-04-02T12:55:00Z
2
value 0.09588
scoring_system epss
scoring_elements 0.92856
published_at 2026-04-04T12:55:00Z
3
value 0.09588
scoring_system epss
scoring_elements 0.92854
published_at 2026-04-07T12:55:00Z
4
value 0.09588
scoring_system epss
scoring_elements 0.92863
published_at 2026-04-08T12:55:00Z
5
value 0.09588
scoring_system epss
scoring_elements 0.92867
published_at 2026-04-09T12:55:00Z
6
value 0.09588
scoring_system epss
scoring_elements 0.92872
published_at 2026-04-11T12:55:00Z
7
value 0.09588
scoring_system epss
scoring_elements 0.92871
published_at 2026-04-13T12:55:00Z
8
value 0.09588
scoring_system epss
scoring_elements 0.92881
published_at 2026-04-16T12:55:00Z
9
value 0.09588
scoring_system epss
scoring_elements 0.92883
published_at 2026-04-18T12:55:00Z
10
value 0.09588
scoring_system epss
scoring_elements 0.92888
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4338
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4338
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4339
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4339
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5739
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722537
reference_id 722537
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722537
fixed_packages
0
url pkg:deb/debian/wordpress@3.6.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.6.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.6.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2013-4338
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kybz-d1hv-g3ae
206
url VCID-kyzb-5kb1-j7cf
vulnerability_id VCID-kyzb-5kb1-j7cf
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1564
reference_id
reference_type
scores
0
value 0.00673
scoring_system epss
scoring_elements 0.7141
published_at 2026-04-21T12:55:00Z
1
value 0.00673
scoring_system epss
scoring_elements 0.7143
published_at 2026-04-18T12:55:00Z
2
value 0.00673
scoring_system epss
scoring_elements 0.71335
published_at 2026-04-01T12:55:00Z
3
value 0.00673
scoring_system epss
scoring_elements 0.71342
published_at 2026-04-02T12:55:00Z
4
value 0.00673
scoring_system epss
scoring_elements 0.7136
published_at 2026-04-04T12:55:00Z
5
value 0.00673
scoring_system epss
scoring_elements 0.71334
published_at 2026-04-07T12:55:00Z
6
value 0.00673
scoring_system epss
scoring_elements 0.71375
published_at 2026-04-08T12:55:00Z
7
value 0.00673
scoring_system epss
scoring_elements 0.71388
published_at 2026-04-09T12:55:00Z
8
value 0.00673
scoring_system epss
scoring_elements 0.71411
published_at 2026-04-11T12:55:00Z
9
value 0.00673
scoring_system epss
scoring_elements 0.71396
published_at 2026-04-12T12:55:00Z
10
value 0.00673
scoring_system epss
scoring_elements 0.71378
published_at 2026-04-13T12:55:00Z
11
value 0.00673
scoring_system epss
scoring_elements 0.71425
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1564
1
reference_url https://codex.wordpress.org/Version_4.4.1
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.4.1
2
reference_url https://core.trac.wordpress.org/changeset/36185
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/36185
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1564
4
reference_url https://wordpress.org/news/2016/01/wordpress-4-4-1-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2016/01/wordpress-4-4-1-security-and-maintenance-release/
5
reference_url https://wpvulndb.com/vulnerabilities/8358
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8358
6
reference_url http://twitter.com/brutelogic/statuses/685105483397619713
reference_id
reference_type
scores
url http://twitter.com/brutelogic/statuses/685105483397619713
7
reference_url http://www.debian.org/security/2016/dsa-3444
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3444
8
reference_url http://www.openwall.com/lists/oss-security/2016/01/08/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/01/08/4
9
reference_url http://www.securitytracker.com/id/1034622
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034622
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810325
reference_id 810325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810325
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1564
reference_id CVE-2016-1564
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-1564
fixed_packages
0
url pkg:deb/debian/wordpress@4.4.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.4.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.4.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2016-1564
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kyzb-5kb1-j7cf
207
url VCID-m7yz-rv7g-jbat
vulnerability_id VCID-m7yz-rv7g-jbat
summary
Flaws in WordPress allow a Denial of Service, the disclosure of user
    metadata and the overwriting of restricted files.
references
0
reference_url http://bugs.gentoo.org/show_bug.cgi?id=153303
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=153303
1
reference_url http://markjaquith.wordpress.com/2006/10/17/changes-in-wordpress-205/
reference_id
reference_type
scores
url http://markjaquith.wordpress.com/2006/10/17/changes-in-wordpress-205/
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-5705
reference_id
reference_type
scores
0
value 0.04873
scoring_system epss
scoring_elements 0.89572
published_at 2026-04-21T12:55:00Z
1
value 0.04873
scoring_system epss
scoring_elements 0.89522
published_at 2026-04-01T12:55:00Z
2
value 0.04873
scoring_system epss
scoring_elements 0.89525
published_at 2026-04-02T12:55:00Z
3
value 0.04873
scoring_system epss
scoring_elements 0.89538
published_at 2026-04-04T12:55:00Z
4
value 0.04873
scoring_system epss
scoring_elements 0.89539
published_at 2026-04-07T12:55:00Z
5
value 0.04873
scoring_system epss
scoring_elements 0.89555
published_at 2026-04-08T12:55:00Z
6
value 0.04873
scoring_system epss
scoring_elements 0.8956
published_at 2026-04-13T12:55:00Z
7
value 0.04873
scoring_system epss
scoring_elements 0.89567
published_at 2026-04-11T12:55:00Z
8
value 0.04873
scoring_system epss
scoring_elements 0.89566
published_at 2026-04-12T12:55:00Z
9
value 0.04873
scoring_system epss
scoring_elements 0.89574
published_at 2026-04-16T12:55:00Z
10
value 0.04873
scoring_system epss
scoring_elements 0.89575
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-5705
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5705
4
reference_url http://secunia.com/advisories/22683
reference_id
reference_type
scores
url http://secunia.com/advisories/22683
5
reference_url http://secunia.com/advisories/22942
reference_id
reference_type
scores
url http://secunia.com/advisories/22942
6
reference_url http://trac.wordpress.org/changeset/4226
reference_id
reference_type
scores
url http://trac.wordpress.org/changeset/4226
7
reference_url http://wordpress.org/development/2006/10/205-ronan/
reference_id
reference_type
scores
url http://wordpress.org/development/2006/10/205-ronan/
8
reference_url http://www.gentoo.org/security/en/glsa/glsa-200611-10.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200611-10.xml
9
reference_url http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.027-wordpress.html
reference_id
reference_type
scores
url http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.027-wordpress.html
10
reference_url http://www.securityfocus.com/bid/20869
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/20869
11
reference_url http://www.vupen.com/english/advisories/2006/4307
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/4307
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-5705
reference_id CVE-2006-5705
reference_type
scores
0
value 6.0
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2006-5705
16
reference_url https://security.gentoo.org/glsa/200611-10
reference_id GLSA-200611-10
reference_type
scores
url https://security.gentoo.org/glsa/200611-10
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.5-0.1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.5-0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.5-0.1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2006-5705
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m7yz-rv7g-jbat
208
url VCID-m8mf-t2td-67h7
vulnerability_id VCID-m8mf-t2td-67h7
summary WordPress Core is vulnerable to Stored Cross-Site Scripting via the HTML API in various versions prior to 6.5.5 due to insufficient input sanitization and output escaping on URLs. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6307
reference_id
reference_type
scores
0
value 0.00635
scoring_system epss
scoring_elements 0.70437
published_at 2026-04-21T12:55:00Z
1
value 0.00635
scoring_system epss
scoring_elements 0.70352
published_at 2026-04-07T12:55:00Z
2
value 0.00635
scoring_system epss
scoring_elements 0.70397
published_at 2026-04-08T12:55:00Z
3
value 0.00635
scoring_system epss
scoring_elements 0.70412
published_at 2026-04-09T12:55:00Z
4
value 0.00635
scoring_system epss
scoring_elements 0.70436
published_at 2026-04-11T12:55:00Z
5
value 0.00635
scoring_system epss
scoring_elements 0.70421
published_at 2026-04-12T12:55:00Z
6
value 0.00635
scoring_system epss
scoring_elements 0.70406
published_at 2026-04-13T12:55:00Z
7
value 0.00635
scoring_system epss
scoring_elements 0.70448
published_at 2026-04-16T12:55:00Z
8
value 0.00635
scoring_system epss
scoring_elements 0.70457
published_at 2026-04-18T12:55:00Z
9
value 0.00635
scoring_system epss
scoring_elements 0.70356
published_at 2026-04-02T12:55:00Z
10
value 0.00635
scoring_system epss
scoring_elements 0.70373
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6307
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6307
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074486
reference_id 1074486
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074486
3
reference_url https://core.trac.wordpress.org/changeset/58472
reference_id 58472
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-06T03:09:30Z/
url https://core.trac.wordpress.org/changeset/58472
4
reference_url https://core.trac.wordpress.org/changeset/58473
reference_id 58473
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-06T03:09:30Z/
url https://core.trac.wordpress.org/changeset/58473
5
reference_url https://www.wordfence.com/threat-intel/vulnerabilities/id/bc0d36f8-6569-49a1-b722-5cf57c4bb32a?source=cve
reference_id bc0d36f8-6569-49a1-b722-5cf57c4bb32a?source=cve
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-06T03:09:30Z/
url https://www.wordfence.com/threat-intel/vulnerabilities/id/bc0d36f8-6569-49a1-b722-5cf57c4bb32a?source=cve
6
reference_url https://wordpress.org/news/2024/06/wordpress-6-5-5/
reference_id wordpress-6-5-5
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-06T03:09:30Z/
url https://wordpress.org/news/2024/06/wordpress-6-5-5/
fixed_packages
0
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.14%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.14%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.14%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.5.5%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.5.5%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.5.5%252Bdfsg1-1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2024-6307
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m8mf-t2td-67h7
209
url VCID-mcjm-c2c8-dkdp
vulnerability_id VCID-mcjm-c2c8-dkdp
summary Multiple cross-site scripting (XSS) vulnerabilities in the "post comment" functionality of WordPress 2.0.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) name, (2) website, and (3) comment parameters.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-0985
reference_id
reference_type
scores
0
value 0.00891
scoring_system epss
scoring_elements 0.75491
published_at 2026-04-01T12:55:00Z
1
value 0.00891
scoring_system epss
scoring_elements 0.75494
published_at 2026-04-02T12:55:00Z
2
value 0.00891
scoring_system epss
scoring_elements 0.75525
published_at 2026-04-04T12:55:00Z
3
value 0.00891
scoring_system epss
scoring_elements 0.75505
published_at 2026-04-07T12:55:00Z
4
value 0.00891
scoring_system epss
scoring_elements 0.75547
published_at 2026-04-13T12:55:00Z
5
value 0.00891
scoring_system epss
scoring_elements 0.75557
published_at 2026-04-09T12:55:00Z
6
value 0.00891
scoring_system epss
scoring_elements 0.75577
published_at 2026-04-11T12:55:00Z
7
value 0.00891
scoring_system epss
scoring_elements 0.75556
published_at 2026-04-12T12:55:00Z
8
value 0.00891
scoring_system epss
scoring_elements 0.7559
published_at 2026-04-16T12:55:00Z
9
value 0.00891
scoring_system epss
scoring_elements 0.75595
published_at 2026-04-18T12:55:00Z
10
value 0.00891
scoring_system epss
scoring_elements 0.75581
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-0985
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0985
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0985
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=355055
reference_id 355055
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=355055
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.2-1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2006-0985
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mcjm-c2c8-dkdp
210
url VCID-meg6-wfw8-63cn
vulnerability_id VCID-meg6-wfw8-63cn
summary Unrestricted file upload vulnerability in the wp_check_filetype function in wp-includes/functions.php in WordPress before 2.8.6, when a certain configuration of the mod_mime module in the Apache HTTP Server is enabled, allows remote authenticated users to execute arbitrary code by posting an attachment with a multiple-extension filename, and then accessing this attachment via a direct request to a wp-content/uploads/ pathname, as demonstrated by a .php.jpg filename.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3890
reference_id
reference_type
scores
0
value 0.10487
scoring_system epss
scoring_elements 0.93217
published_at 2026-04-01T12:55:00Z
1
value 0.10487
scoring_system epss
scoring_elements 0.93225
published_at 2026-04-02T12:55:00Z
2
value 0.10487
scoring_system epss
scoring_elements 0.93231
published_at 2026-04-04T12:55:00Z
3
value 0.10487
scoring_system epss
scoring_elements 0.93229
published_at 2026-04-07T12:55:00Z
4
value 0.10487
scoring_system epss
scoring_elements 0.93237
published_at 2026-04-08T12:55:00Z
5
value 0.10487
scoring_system epss
scoring_elements 0.93242
published_at 2026-04-09T12:55:00Z
6
value 0.10487
scoring_system epss
scoring_elements 0.93246
published_at 2026-04-11T12:55:00Z
7
value 0.10487
scoring_system epss
scoring_elements 0.93243
published_at 2026-04-12T12:55:00Z
8
value 0.10487
scoring_system epss
scoring_elements 0.93245
published_at 2026-04-13T12:55:00Z
9
value 0.10487
scoring_system epss
scoring_elements 0.93262
published_at 2026-04-16T12:55:00Z
10
value 0.10487
scoring_system epss
scoring_elements 0.93267
published_at 2026-04-18T12:55:00Z
11
value 0.10487
scoring_system epss
scoring_elements 0.93274
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3890
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3890
2
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/10089.txt
reference_id CVE-2009-3890;OSVDB-59958
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/10089.txt
fixed_packages
0
url pkg:deb/debian/wordpress@2.8.6-1?distro=trixie
purl pkg:deb/debian/wordpress@2.8.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.8.6-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2009-3890
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-meg6-wfw8-63cn
211
url VCID-mfvf-n63j-cfaf
vulnerability_id VCID-mfvf-n63j-cfaf
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0493.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0493.html
1
reference_url http://core.trac.wordpress.org/changeset/30467
reference_id
reference_type
scores
url http://core.trac.wordpress.org/changeset/30467
2
reference_url http://openwall.com/lists/oss-security/2014/11/25/12
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2014/11/25/12
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9034
reference_id
reference_type
scores
0
value 0.72483
scoring_system epss
scoring_elements 0.98771
published_at 2026-04-21T12:55:00Z
1
value 0.72483
scoring_system epss
scoring_elements 0.98755
published_at 2026-04-02T12:55:00Z
2
value 0.72483
scoring_system epss
scoring_elements 0.98759
published_at 2026-04-04T12:55:00Z
3
value 0.72483
scoring_system epss
scoring_elements 0.98761
published_at 2026-04-07T12:55:00Z
4
value 0.72483
scoring_system epss
scoring_elements 0.98762
published_at 2026-04-09T12:55:00Z
5
value 0.72483
scoring_system epss
scoring_elements 0.98764
published_at 2026-04-11T12:55:00Z
6
value 0.72483
scoring_system epss
scoring_elements 0.98765
published_at 2026-04-12T12:55:00Z
7
value 0.72483
scoring_system epss
scoring_elements 0.98766
published_at 2026-04-13T12:55:00Z
8
value 0.72483
scoring_system epss
scoring_elements 0.98769
published_at 2026-04-16T12:55:00Z
9
value 0.72483
scoring_system epss
scoring_elements 0.9877
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9034
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039
12
reference_url https://wordpress.org/news/2014/11/wordpress-4-0-1/
reference_id
reference_type
scores
url https://wordpress.org/news/2014/11/wordpress-4-0-1/
13
reference_url http://www.debian.org/security/2014/dsa-3085
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3085
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:233
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:233
15
reference_url http://www.securitytracker.com/id/1031243
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031243
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425
reference_id 770425
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9034
reference_id CVE-2014-9034
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-9034
28
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/35413.php
reference_id CVE-2014-9034;OSVDB-114857
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/35413.php
29
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/35414.txt
reference_id CVE-2014-9034;OSVDB-114857
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/35414.txt
fixed_packages
0
url pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.0.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2014-9034
risk_score 9.0
exploitability 2.0
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mfvf-n63j-cfaf
212
url VCID-msku-2thw-jfat
vulnerability_id VCID-msku-2thw-jfat
summary several
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5739
reference_id
reference_type
scores
0
value 0.0025
scoring_system epss
scoring_elements 0.4829
published_at 2026-04-01T12:55:00Z
1
value 0.0025
scoring_system epss
scoring_elements 0.48325
published_at 2026-04-02T12:55:00Z
2
value 0.0025
scoring_system epss
scoring_elements 0.48346
published_at 2026-04-04T12:55:00Z
3
value 0.0025
scoring_system epss
scoring_elements 0.48298
published_at 2026-04-07T12:55:00Z
4
value 0.0025
scoring_system epss
scoring_elements 0.48353
published_at 2026-04-08T12:55:00Z
5
value 0.0025
scoring_system epss
scoring_elements 0.48347
published_at 2026-04-09T12:55:00Z
6
value 0.0025
scoring_system epss
scoring_elements 0.48372
published_at 2026-04-11T12:55:00Z
7
value 0.0025
scoring_system epss
scoring_elements 0.48345
published_at 2026-04-12T12:55:00Z
8
value 0.0025
scoring_system epss
scoring_elements 0.48357
published_at 2026-04-13T12:55:00Z
9
value 0.0025
scoring_system epss
scoring_elements 0.48408
published_at 2026-04-16T12:55:00Z
10
value 0.0025
scoring_system epss
scoring_elements 0.48402
published_at 2026-04-18T12:55:00Z
11
value 0.0025
scoring_system epss
scoring_elements 0.48356
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5739
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4338
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4339
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4339
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5739
fixed_packages
0
url pkg:deb/debian/wordpress@3.6.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.6.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.6.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2013-5739
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-msku-2thw-jfat
213
url VCID-mu7j-73tw-xbc6
vulnerability_id VCID-mu7j-73tw-xbc6
summary security update
references
0
reference_url http://openwall.com/lists/oss-security/2015/08/04/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2015/08/04/7
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2213
reference_id
reference_type
scores
0
value 0.21244
scoring_system epss
scoring_elements 0.95689
published_at 2026-04-21T12:55:00Z
1
value 0.21244
scoring_system epss
scoring_elements 0.95639
published_at 2026-04-01T12:55:00Z
2
value 0.21244
scoring_system epss
scoring_elements 0.95648
published_at 2026-04-02T12:55:00Z
3
value 0.21244
scoring_system epss
scoring_elements 0.95654
published_at 2026-04-04T12:55:00Z
4
value 0.21244
scoring_system epss
scoring_elements 0.95656
published_at 2026-04-07T12:55:00Z
5
value 0.21244
scoring_system epss
scoring_elements 0.95664
published_at 2026-04-08T12:55:00Z
6
value 0.21244
scoring_system epss
scoring_elements 0.95668
published_at 2026-04-09T12:55:00Z
7
value 0.21244
scoring_system epss
scoring_elements 0.95673
published_at 2026-04-11T12:55:00Z
8
value 0.21244
scoring_system epss
scoring_elements 0.95672
published_at 2026-04-12T12:55:00Z
9
value 0.21244
scoring_system epss
scoring_elements 0.95675
published_at 2026-04-13T12:55:00Z
10
value 0.21244
scoring_system epss
scoring_elements 0.95683
published_at 2026-04-16T12:55:00Z
11
value 0.21244
scoring_system epss
scoring_elements 0.95687
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2213
2
reference_url https://codex.wordpress.org/Version_4.2.4
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.2.4
3
reference_url https://core.trac.wordpress.org/changeset/33555
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/33555
4
reference_url https://core.trac.wordpress.org/changeset/33556
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/33556
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2213
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5622
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5714
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5715
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5730
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5731
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5732
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5734
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7989
14
reference_url https://wordpress.org/news/2015/08/wordpress-4-2-4-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2015/08/wordpress-4-2-4-security-and-maintenance-release/
15
reference_url https://wpvulndb.com/vulnerabilities/8126
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8126
16
reference_url http://www.debian.org/security/2015/dsa-3332
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3332
17
reference_url http://www.debian.org/security/2015/dsa-3383
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3383
18
reference_url http://www.securityfocus.com/bid/76160
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/76160
19
reference_url http://www.securitytracker.com/id/1033178
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033178
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794560
reference_id 794560
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794560
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-2213
reference_id CVE-2015-2213
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-2213
fixed_packages
0
url pkg:deb/debian/wordpress@4.2.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.2.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.2.4%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2015-2213
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mu7j-73tw-xbc6
214
url VCID-mwcj-thjj-nyfd
vulnerability_id VCID-mwcj-thjj-nyfd
summary
A flaw in WordPress allows registered WordPress users to elevate
    privileges.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-3390
reference_id
reference_type
scores
0
value 0.0136
scoring_system epss
scoring_elements 0.80105
published_at 2026-04-01T12:55:00Z
1
value 0.0136
scoring_system epss
scoring_elements 0.80112
published_at 2026-04-02T12:55:00Z
2
value 0.0136
scoring_system epss
scoring_elements 0.80132
published_at 2026-04-04T12:55:00Z
3
value 0.0136
scoring_system epss
scoring_elements 0.8012
published_at 2026-04-07T12:55:00Z
4
value 0.0136
scoring_system epss
scoring_elements 0.80148
published_at 2026-04-08T12:55:00Z
5
value 0.0136
scoring_system epss
scoring_elements 0.80155
published_at 2026-04-09T12:55:00Z
6
value 0.0136
scoring_system epss
scoring_elements 0.80174
published_at 2026-04-11T12:55:00Z
7
value 0.0136
scoring_system epss
scoring_elements 0.80159
published_at 2026-04-12T12:55:00Z
8
value 0.0136
scoring_system epss
scoring_elements 0.8015
published_at 2026-04-13T12:55:00Z
9
value 0.0136
scoring_system epss
scoring_elements 0.80179
published_at 2026-04-16T12:55:00Z
10
value 0.0136
scoring_system epss
scoring_elements 0.8018
published_at 2026-04-18T12:55:00Z
11
value 0.0136
scoring_system epss
scoring_elements 0.80183
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-3390
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3390
2
reference_url https://security.gentoo.org/glsa/200608-19
reference_id GLSA-200608-19
reference_type
scores
url https://security.gentoo.org/glsa/200608-19
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.4-1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.4-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2006-3390
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mwcj-thjj-nyfd
215
url VCID-mxvk-932h-c7dp
vulnerability_id VCID-mxvk-932h-c7dp
summary
WordPress is vulnerable to SQL injection, information disclosure, and
    cross-site scripting attacks.
references
0
reference_url http://osvdb.org/31577
reference_id
reference_type
scores
url http://osvdb.org/31577
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0109
reference_id
reference_type
scores
0
value 0.01387
scoring_system epss
scoring_elements 0.80365
published_at 2026-04-21T12:55:00Z
1
value 0.01387
scoring_system epss
scoring_elements 0.80275
published_at 2026-04-01T12:55:00Z
2
value 0.01387
scoring_system epss
scoring_elements 0.80283
published_at 2026-04-02T12:55:00Z
3
value 0.01387
scoring_system epss
scoring_elements 0.80304
published_at 2026-04-04T12:55:00Z
4
value 0.01387
scoring_system epss
scoring_elements 0.80292
published_at 2026-04-07T12:55:00Z
5
value 0.01387
scoring_system epss
scoring_elements 0.8032
published_at 2026-04-08T12:55:00Z
6
value 0.01387
scoring_system epss
scoring_elements 0.80331
published_at 2026-04-09T12:55:00Z
7
value 0.01387
scoring_system epss
scoring_elements 0.80349
published_at 2026-04-11T12:55:00Z
8
value 0.01387
scoring_system epss
scoring_elements 0.80335
published_at 2026-04-12T12:55:00Z
9
value 0.01387
scoring_system epss
scoring_elements 0.80328
published_at 2026-04-13T12:55:00Z
10
value 0.01387
scoring_system epss
scoring_elements 0.80358
published_at 2026-04-16T12:55:00Z
11
value 0.01387
scoring_system epss
scoring_elements 0.8036
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0109
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0109
3
reference_url http://secunia.com/advisories/23621
reference_id
reference_type
scores
url http://secunia.com/advisories/23621
4
reference_url http://secunia.com/advisories/23741
reference_id
reference_type
scores
url http://secunia.com/advisories/23741
5
reference_url http://security.gentoo.org/glsa/glsa-200701-10.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200701-10.xml
6
reference_url http://securityreason.com/securityalert/2113
reference_id
reference_type
scores
url http://securityreason.com/securityalert/2113
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/31262
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/31262
8
reference_url http://www.securityfocus.com/archive/1/455927/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/455927/100/0/threaded
9
reference_url http://www.vupen.com/english/advisories/2007/0062
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0062
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0109
reference_id CVE-2007-0109
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2007-0109
17
reference_url https://security.gentoo.org/glsa/200701-10
reference_id GLSA-200701-10
reference_type
scores
url https://security.gentoo.org/glsa/200701-10
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.6-1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.6-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-0109
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mxvk-932h-c7dp
216
url VCID-n2ep-cw4n-gkda
vulnerability_id VCID-n2ep-cw4n-gkda
summary Cross-site scripting (XSS) vulnerability in wp-includes/general-template.php in WordPress before 20070309 allows remote attackers to inject arbitrary web script or HTML via the year parameter in the wp_title function.
references
0
reference_url http://chxsecurity.org/advisories/adv-1-mid.txt
reference_id
reference_type
scores
url http://chxsecurity.org/advisories/adv-1-mid.txt
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1894
reference_id
reference_type
scores
0
value 0.05601
scoring_system epss
scoring_elements 0.90332
published_at 2026-04-21T12:55:00Z
1
value 0.05601
scoring_system epss
scoring_elements 0.90275
published_at 2026-04-01T12:55:00Z
2
value 0.05601
scoring_system epss
scoring_elements 0.90277
published_at 2026-04-02T12:55:00Z
3
value 0.05601
scoring_system epss
scoring_elements 0.90291
published_at 2026-04-04T12:55:00Z
4
value 0.05601
scoring_system epss
scoring_elements 0.90296
published_at 2026-04-07T12:55:00Z
5
value 0.05601
scoring_system epss
scoring_elements 0.9031
published_at 2026-04-08T12:55:00Z
6
value 0.05601
scoring_system epss
scoring_elements 0.90317
published_at 2026-04-09T12:55:00Z
7
value 0.05601
scoring_system epss
scoring_elements 0.90325
published_at 2026-04-11T12:55:00Z
8
value 0.05601
scoring_system epss
scoring_elements 0.90324
published_at 2026-04-12T12:55:00Z
9
value 0.05601
scoring_system epss
scoring_elements 0.90318
published_at 2026-04-13T12:55:00Z
10
value 0.05601
scoring_system epss
scoring_elements 0.90334
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1894
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1894
3
reference_url http://secunia.com/advisories/24485
reference_id
reference_type
scores
url http://secunia.com/advisories/24485
4
reference_url http://secunia.com/advisories/25108
reference_id
reference_type
scores
url http://secunia.com/advisories/25108
5
reference_url http://securityreason.com/securityalert/2526
reference_id
reference_type
scores
url http://securityreason.com/securityalert/2526
6
reference_url http://trac.wordpress.org/changeset/5003
reference_id
reference_type
scores
url http://trac.wordpress.org/changeset/5003
7
reference_url http://trac.wordpress.org/ticket/4093
reference_id
reference_type
scores
url http://trac.wordpress.org/ticket/4093
8
reference_url http://www.debian.org/security/2007/dsa-1285
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1285
9
reference_url http://www.securityfocus.com/archive/1/462374/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/462374/100/0/threaded
10
reference_url http://www.securityfocus.com/bid/22902
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/22902
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2_revision5002:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2_revision5002:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2_revision5002:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1894
reference_id CVE-2007-1894
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2007-1894
fixed_packages
0
url pkg:deb/debian/wordpress@2.1.3-1?distro=trixie
purl pkg:deb/debian/wordpress@2.1.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.1.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-1894
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n2ep-cw4n-gkda
217
url VCID-n7ne-unru-7fhn
vulnerability_id VCID-n7ne-unru-7fhn
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28035
reference_id
reference_type
scores
0
value 0.06561
scoring_system epss
scoring_elements 0.9117
published_at 2026-04-21T12:55:00Z
1
value 0.06561
scoring_system epss
scoring_elements 0.91092
published_at 2026-04-01T12:55:00Z
2
value 0.06561
scoring_system epss
scoring_elements 0.91098
published_at 2026-04-02T12:55:00Z
3
value 0.06561
scoring_system epss
scoring_elements 0.91106
published_at 2026-04-04T12:55:00Z
4
value 0.06561
scoring_system epss
scoring_elements 0.91114
published_at 2026-04-07T12:55:00Z
5
value 0.06561
scoring_system epss
scoring_elements 0.91127
published_at 2026-04-08T12:55:00Z
6
value 0.06561
scoring_system epss
scoring_elements 0.91133
published_at 2026-04-09T12:55:00Z
7
value 0.06561
scoring_system epss
scoring_elements 0.91141
published_at 2026-04-11T12:55:00Z
8
value 0.06561
scoring_system epss
scoring_elements 0.91142
published_at 2026-04-13T12:55:00Z
9
value 0.06561
scoring_system epss
scoring_elements 0.91166
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28035
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562
reference_id 973562
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562
11
reference_url https://security.archlinux.org/ASA-202011-3
reference_id ASA-202011-3
reference_type
scores
url https://security.archlinux.org/ASA-202011-3
12
reference_url https://security.archlinux.org/AVG-1257
reference_id AVG-1257
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1257
fixed_packages
0
url pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.5.3%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2020-28035
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n7ne-unru-7fhn
218
url VCID-ncux-8918-rygk
vulnerability_id VCID-ncux-8918-rygk
summary wordpress: SQL injection when certain DB charsets are used
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6318.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6318.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6318
reference_id
reference_type
scores
0
value 0.03532
scoring_system epss
scoring_elements 0.87675
published_at 2026-04-21T12:55:00Z
1
value 0.03532
scoring_system epss
scoring_elements 0.8767
published_at 2026-04-11T12:55:00Z
2
value 0.03532
scoring_system epss
scoring_elements 0.87666
published_at 2026-04-12T12:55:00Z
3
value 0.03532
scoring_system epss
scoring_elements 0.87663
published_at 2026-04-13T12:55:00Z
4
value 0.03532
scoring_system epss
scoring_elements 0.87678
published_at 2026-04-18T12:55:00Z
5
value 0.03532
scoring_system epss
scoring_elements 0.87653
published_at 2026-04-08T12:55:00Z
6
value 0.03532
scoring_system epss
scoring_elements 0.87659
published_at 2026-04-09T12:55:00Z
7
value 0.04541
scoring_system epss
scoring_elements 0.89136
published_at 2026-04-02T12:55:00Z
8
value 0.04541
scoring_system epss
scoring_elements 0.89152
published_at 2026-04-04T12:55:00Z
9
value 0.04541
scoring_system epss
scoring_elements 0.89154
published_at 2026-04-07T12:55:00Z
10
value 0.04541
scoring_system epss
scoring_elements 0.89129
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6318
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6318
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=421141
reference_id 421141
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=421141
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=459305
reference_id 459305
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=459305
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/4721.txt
reference_id OSVDB-39552;CVE-2007-6318
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/4721.txt
6
reference_url http://www.abelcheung.org/advisory/20071210-wordpress-charset.txt
reference_id OSVDB-39552;CVE-2007-6318
reference_type exploit
scores
url http://www.abelcheung.org/advisory/20071210-wordpress-charset.txt
fixed_packages
0
url pkg:deb/debian/wordpress@2.3.2-1?distro=trixie
purl pkg:deb/debian/wordpress@2.3.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.3.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-6318
risk_score null
exploitability 2.0
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ncux-8918-rygk
219
url VCID-ng4k-69hk-9ueu
vulnerability_id VCID-ng4k-69hk-9ueu
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14990
reference_id
reference_type
scores
0
value 0.00383
scoring_system epss
scoring_elements 0.59653
published_at 2026-04-21T12:55:00Z
1
value 0.00383
scoring_system epss
scoring_elements 0.59668
published_at 2026-04-18T12:55:00Z
2
value 0.00383
scoring_system epss
scoring_elements 0.59513
published_at 2026-04-01T12:55:00Z
3
value 0.00383
scoring_system epss
scoring_elements 0.59586
published_at 2026-04-02T12:55:00Z
4
value 0.00383
scoring_system epss
scoring_elements 0.5961
published_at 2026-04-04T12:55:00Z
5
value 0.00383
scoring_system epss
scoring_elements 0.5958
published_at 2026-04-07T12:55:00Z
6
value 0.00383
scoring_system epss
scoring_elements 0.59631
published_at 2026-04-08T12:55:00Z
7
value 0.00383
scoring_system epss
scoring_elements 0.59644
published_at 2026-04-09T12:55:00Z
8
value 0.00383
scoring_system epss
scoring_elements 0.59664
published_at 2026-04-11T12:55:00Z
9
value 0.00383
scoring_system epss
scoring_elements 0.59647
published_at 2026-04-12T12:55:00Z
10
value 0.00383
scoring_system epss
scoring_elements 0.59627
published_at 2026-04-13T12:55:00Z
11
value 0.00383
scoring_system epss
scoring_elements 0.59661
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14990
1
reference_url https://core.trac.wordpress.org/ticket/38474
reference_id
reference_type
scores
url https://core.trac.wordpress.org/ticket/38474
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14718
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14720
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14721
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14722
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14723
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14726
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14726
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14990
11
reference_url https://www.debian.org/security/2017/dsa-3997
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3997
12
reference_url http://www.securitytracker.com/id/1039554
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039554
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877629
reference_id 877629
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877629
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.8.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-14990
reference_id CVE-2017-14990
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-14990
fixed_packages
0
url pkg:deb/debian/wordpress@4.8.2%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/wordpress@4.8.2%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.8.2%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-14990
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ng4k-69hk-9ueu
220
url VCID-ngkc-cwzj-nbdk
vulnerability_id VCID-ngkc-cwzj-nbdk
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28033
reference_id
reference_type
scores
0
value 0.01258
scoring_system epss
scoring_elements 0.79428
published_at 2026-04-21T12:55:00Z
1
value 0.01258
scoring_system epss
scoring_elements 0.79348
published_at 2026-04-01T12:55:00Z
2
value 0.01258
scoring_system epss
scoring_elements 0.79355
published_at 2026-04-02T12:55:00Z
3
value 0.01258
scoring_system epss
scoring_elements 0.79377
published_at 2026-04-04T12:55:00Z
4
value 0.01258
scoring_system epss
scoring_elements 0.79363
published_at 2026-04-07T12:55:00Z
5
value 0.01258
scoring_system epss
scoring_elements 0.7939
published_at 2026-04-08T12:55:00Z
6
value 0.01258
scoring_system epss
scoring_elements 0.79399
published_at 2026-04-09T12:55:00Z
7
value 0.01258
scoring_system epss
scoring_elements 0.79422
published_at 2026-04-11T12:55:00Z
8
value 0.01258
scoring_system epss
scoring_elements 0.79406
published_at 2026-04-12T12:55:00Z
9
value 0.01258
scoring_system epss
scoring_elements 0.79395
published_at 2026-04-13T12:55:00Z
10
value 0.01258
scoring_system epss
scoring_elements 0.79427
published_at 2026-04-16T12:55:00Z
11
value 0.01258
scoring_system epss
scoring_elements 0.79425
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28033
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562
reference_id 973562
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562
11
reference_url https://security.archlinux.org/ASA-202011-3
reference_id ASA-202011-3
reference_type
scores
url https://security.archlinux.org/ASA-202011-3
12
reference_url https://security.archlinux.org/AVG-1257
reference_id AVG-1257
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1257
fixed_packages
0
url pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.5.3%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2020-28033
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ngkc-cwzj-nbdk
221
url VCID-nj6g-ewk1-r7f1
vulnerability_id VCID-nj6g-ewk1-r7f1
summary Cross-site scripting (XSS) vulnerability in plupload.flash.swf in Plupload before 2.1.9, as used in WordPress before 4.5.2, allows remote attackers to inject arbitrary web script or HTML via a Same-Origin Method Execution (SOME) attack.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4566
reference_id
reference_type
scores
0
value 0.04653
scoring_system epss
scoring_elements 0.89315
published_at 2026-04-21T12:55:00Z
1
value 0.04653
scoring_system epss
scoring_elements 0.89319
published_at 2026-04-18T12:55:00Z
2
value 0.04653
scoring_system epss
scoring_elements 0.8926
published_at 2026-04-01T12:55:00Z
3
value 0.04653
scoring_system epss
scoring_elements 0.89266
published_at 2026-04-02T12:55:00Z
4
value 0.04653
scoring_system epss
scoring_elements 0.8928
published_at 2026-04-04T12:55:00Z
5
value 0.04653
scoring_system epss
scoring_elements 0.89282
published_at 2026-04-07T12:55:00Z
6
value 0.04653
scoring_system epss
scoring_elements 0.893
published_at 2026-04-08T12:55:00Z
7
value 0.04653
scoring_system epss
scoring_elements 0.89304
published_at 2026-04-09T12:55:00Z
8
value 0.04653
scoring_system epss
scoring_elements 0.89313
published_at 2026-04-11T12:55:00Z
9
value 0.04653
scoring_system epss
scoring_elements 0.8931
published_at 2026-04-12T12:55:00Z
10
value 0.04653
scoring_system epss
scoring_elements 0.89307
published_at 2026-04-13T12:55:00Z
11
value 0.04653
scoring_system epss
scoring_elements 0.8932
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4566
1
reference_url https://codex.wordpress.org/Version_4.5.2
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.5.2
2
reference_url https://core.trac.wordpress.org/changeset/37382/
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/37382/
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4566
4
reference_url https://gist.github.com/cure53/09a81530a44f6b8173f545accc9ed07e
reference_id
reference_type
scores
url https://gist.github.com/cure53/09a81530a44f6b8173f545accc9ed07e
5
reference_url https://wordpress.org/news/2016/05/wordpress-4-5-2/
reference_id
reference_type
scores
url https://wordpress.org/news/2016/05/wordpress-4-5-2/
6
reference_url https://wpvulndb.com/vulnerabilities/8489
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8489
7
reference_url http://www.openwall.com/lists/oss-security/2016/05/07/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/05/07/2
8
reference_url http://www.plupload.com/punbb/viewtopic.php?pid=28690
reference_id
reference_type
scores
url http://www.plupload.com/punbb/viewtopic.php?pid=28690
9
reference_url http://www.securitytracker.com/id/1035818
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035818
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823640
reference_id 823640
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823640
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:plupload:plupload:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:plupload:plupload:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:plupload:plupload:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4566
reference_id CVE-2016-4566
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-4566
fixed_packages
0
url pkg:deb/debian/wordpress@4.5.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.5.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.5.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2016-4566
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nj6g-ewk1-r7f1
222
url VCID-nrq5-a7qq-mucd
vulnerability_id VCID-nrq5-a7qq-mucd
summary Multiple cross-site scripting (XSS) vulnerabilities in WordPress before 3.5.1 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) gallery shortcodes or (2) the content of a post.
references
0
reference_url http://codex.wordpress.org/Version_3.5.1
reference_id
reference_type
scores
url http://codex.wordpress.org/Version_3.5.1
1
reference_url http://core.trac.wordpress.org/changeset/23317
reference_id
reference_type
scores
url http://core.trac.wordpress.org/changeset/23317
2
reference_url http://core.trac.wordpress.org/changeset/23322
reference_id
reference_type
scores
url http://core.trac.wordpress.org/changeset/23322
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0236
reference_id
reference_type
scores
0
value 0.00418
scoring_system epss
scoring_elements 0.61817
published_at 2026-04-21T12:55:00Z
1
value 0.00418
scoring_system epss
scoring_elements 0.6166
published_at 2026-04-01T12:55:00Z
2
value 0.00418
scoring_system epss
scoring_elements 0.61733
published_at 2026-04-02T12:55:00Z
3
value 0.00418
scoring_system epss
scoring_elements 0.61763
published_at 2026-04-04T12:55:00Z
4
value 0.00418
scoring_system epss
scoring_elements 0.61734
published_at 2026-04-07T12:55:00Z
5
value 0.00418
scoring_system epss
scoring_elements 0.61782
published_at 2026-04-08T12:55:00Z
6
value 0.00418
scoring_system epss
scoring_elements 0.61798
published_at 2026-04-09T12:55:00Z
7
value 0.00418
scoring_system epss
scoring_elements 0.61819
published_at 2026-04-11T12:55:00Z
8
value 0.00418
scoring_system epss
scoring_elements 0.61806
published_at 2026-04-12T12:55:00Z
9
value 0.00418
scoring_system epss
scoring_elements 0.61786
published_at 2026-04-13T12:55:00Z
10
value 0.00418
scoring_system epss
scoring_elements 0.61829
published_at 2026-04-16T12:55:00Z
11
value 0.00418
scoring_system epss
scoring_elements 0.61834
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0236
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=904121
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=904121
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0236
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0236
6
reference_url http://wordpress.org/news/2013/01/wordpress-3-5-1/
reference_id
reference_type
scores
url http://wordpress.org/news/2013/01/wordpress-3-5-1/
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698927
reference_id 698927
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698927
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0236
reference_id CVE-2013-0236
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-0236
fixed_packages
0
url pkg:deb/debian/wordpress@3.5.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.5.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.5.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2013-0236
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nrq5-a7qq-mucd
223
url VCID-ns2b-cr6m-t7gq
vulnerability_id VCID-ns2b-cr6m-t7gq
summary security update
references
0
reference_url http://openwall.com/lists/oss-security/2015/08/04/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2015/08/04/7
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5732
reference_id
reference_type
scores
0
value 0.01687
scoring_system epss
scoring_elements 0.82249
published_at 2026-04-21T12:55:00Z
1
value 0.01687
scoring_system epss
scoring_elements 0.82141
published_at 2026-04-01T12:55:00Z
2
value 0.01687
scoring_system epss
scoring_elements 0.82154
published_at 2026-04-02T12:55:00Z
3
value 0.01687
scoring_system epss
scoring_elements 0.82175
published_at 2026-04-04T12:55:00Z
4
value 0.01687
scoring_system epss
scoring_elements 0.82172
published_at 2026-04-07T12:55:00Z
5
value 0.01687
scoring_system epss
scoring_elements 0.82198
published_at 2026-04-08T12:55:00Z
6
value 0.01687
scoring_system epss
scoring_elements 0.82205
published_at 2026-04-09T12:55:00Z
7
value 0.01687
scoring_system epss
scoring_elements 0.82225
published_at 2026-04-11T12:55:00Z
8
value 0.01687
scoring_system epss
scoring_elements 0.82217
published_at 2026-04-12T12:55:00Z
9
value 0.01687
scoring_system epss
scoring_elements 0.82211
published_at 2026-04-13T12:55:00Z
10
value 0.01687
scoring_system epss
scoring_elements 0.82248
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5732
2
reference_url https://codex.wordpress.org/Version_4.2.4
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.2.4
3
reference_url https://core.trac.wordpress.org/changeset/33529
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/33529
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2213
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5622
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5714
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5715
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5730
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5731
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5732
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5734
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7989
13
reference_url https://wordpress.org/news/2015/08/wordpress-4-2-4-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2015/08/wordpress-4-2-4-security-and-maintenance-release/
14
reference_url https://wpvulndb.com/vulnerabilities/8131
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8131
15
reference_url http://www.debian.org/security/2015/dsa-3332
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3332
16
reference_url http://www.debian.org/security/2015/dsa-3383
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3383
17
reference_url http://www.securityfocus.com/bid/76160
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/76160
18
reference_url http://www.securitytracker.com/id/1033178
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033178
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794560
reference_id 794560
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794560
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5732
reference_id CVE-2015-5732
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-5732
fixed_packages
0
url pkg:deb/debian/wordpress@4.2.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.2.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.2.4%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2015-5732
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ns2b-cr6m-t7gq
224
url VCID-ny68-2wje-q3df
vulnerability_id VCID-ny68-2wje-q3df
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20153
reference_id
reference_type
scores
0
value 0.05377
scoring_system epss
scoring_elements 0.90057
published_at 2026-04-01T12:55:00Z
1
value 0.05377
scoring_system epss
scoring_elements 0.9006
published_at 2026-04-02T12:55:00Z
2
value 0.05377
scoring_system epss
scoring_elements 0.90071
published_at 2026-04-04T12:55:00Z
3
value 0.05377
scoring_system epss
scoring_elements 0.90077
published_at 2026-04-07T12:55:00Z
4
value 0.05377
scoring_system epss
scoring_elements 0.90092
published_at 2026-04-08T12:55:00Z
5
value 0.05377
scoring_system epss
scoring_elements 0.90098
published_at 2026-04-09T12:55:00Z
6
value 0.05377
scoring_system epss
scoring_elements 0.90107
published_at 2026-04-11T12:55:00Z
7
value 0.05377
scoring_system epss
scoring_elements 0.90105
published_at 2026-04-12T12:55:00Z
8
value 0.05377
scoring_system epss
scoring_elements 0.901
published_at 2026-04-13T12:55:00Z
9
value 0.05377
scoring_system epss
scoring_elements 0.90117
published_at 2026-04-18T12:55:00Z
10
value 0.05377
scoring_system epss
scoring_elements 0.90114
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20153
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20148
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20149
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20150
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20151
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20152
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20153
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8942
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916403
reference_id 916403
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916403
fixed_packages
0
url pkg:deb/debian/wordpress@5.0.1%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.0.1%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.0.1%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2018-20153
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ny68-2wje-q3df
225
url VCID-nztu-n4pg-p3be
vulnerability_id VCID-nztu-n4pg-p3be
summary Cross-site scripting (XSS) vulnerability in sidebar.php in WordPress, when custom 404 pages that call get_sidebar are used, allows remote attackers to inject arbitrary web script or HTML via the query string (PHP_SELF), a different vulnerability than CVE-2007-1622.
references
0
reference_url http://osvdb.org/37296
reference_id
reference_type
scores
url http://osvdb.org/37296
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2627
reference_id
reference_type
scores
0
value 0.01033
scoring_system epss
scoring_elements 0.77387
published_at 2026-04-21T12:55:00Z
1
value 0.01033
scoring_system epss
scoring_elements 0.77297
published_at 2026-04-01T12:55:00Z
2
value 0.01033
scoring_system epss
scoring_elements 0.77304
published_at 2026-04-02T12:55:00Z
3
value 0.01033
scoring_system epss
scoring_elements 0.77332
published_at 2026-04-04T12:55:00Z
4
value 0.01033
scoring_system epss
scoring_elements 0.77313
published_at 2026-04-07T12:55:00Z
5
value 0.01033
scoring_system epss
scoring_elements 0.77343
published_at 2026-04-08T12:55:00Z
6
value 0.01033
scoring_system epss
scoring_elements 0.77352
published_at 2026-04-09T12:55:00Z
7
value 0.01033
scoring_system epss
scoring_elements 0.77379
published_at 2026-04-11T12:55:00Z
8
value 0.01033
scoring_system epss
scoring_elements 0.77359
published_at 2026-04-12T12:55:00Z
9
value 0.01033
scoring_system epss
scoring_elements 0.77355
published_at 2026-04-13T12:55:00Z
10
value 0.01033
scoring_system epss
scoring_elements 0.77395
published_at 2026-04-16T12:55:00Z
11
value 0.01033
scoring_system epss
scoring_elements 0.77394
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2627
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2627
3
reference_url http://securityreason.com/securityalert/2694
reference_id
reference_type
scores
url http://securityreason.com/securityalert/2694
4
reference_url http://www.securityfocus.com/archive/1/467360/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/467360/100/0/threaded
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2627
reference_id CVE-2007-2627
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-2627
fixed_packages
0
url pkg:deb/debian/wordpress@2.2.2-1?distro=trixie
purl pkg:deb/debian/wordpress@2.2.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.2.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-2627
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nztu-n4pg-p3be
226
url VCID-p1c8-hj6e-mkg4
vulnerability_id VCID-p1c8-hj6e-mkg4
summary security update
references
0
reference_url http://openwall.com/lists/oss-security/2014/08/13/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2014/08/13/3
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5204
reference_id
reference_type
scores
0
value 0.00234
scoring_system epss
scoring_elements 0.46332
published_at 2026-04-21T12:55:00Z
1
value 0.00234
scoring_system epss
scoring_elements 0.46265
published_at 2026-04-01T12:55:00Z
2
value 0.00234
scoring_system epss
scoring_elements 0.46305
published_at 2026-04-02T12:55:00Z
3
value 0.00234
scoring_system epss
scoring_elements 0.46327
published_at 2026-04-04T12:55:00Z
4
value 0.00234
scoring_system epss
scoring_elements 0.46273
published_at 2026-04-07T12:55:00Z
5
value 0.00234
scoring_system epss
scoring_elements 0.46328
published_at 2026-04-09T12:55:00Z
6
value 0.00234
scoring_system epss
scoring_elements 0.46352
published_at 2026-04-11T12:55:00Z
7
value 0.00234
scoring_system epss
scoring_elements 0.46324
published_at 2026-04-12T12:55:00Z
8
value 0.00234
scoring_system epss
scoring_elements 0.46333
published_at 2026-04-13T12:55:00Z
9
value 0.00234
scoring_system epss
scoring_elements 0.4639
published_at 2026-04-16T12:55:00Z
10
value 0.00234
scoring_system epss
scoring_elements 0.46387
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5204
2
reference_url https://core.trac.wordpress.org/changeset/29384
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/29384
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2053
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5204
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5205
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5240
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5265
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5266
9
reference_url https://wordpress.org/news/2014/08/wordpress-3-9-2/
reference_id
reference_type
scores
url https://wordpress.org/news/2014/08/wordpress-3-9-2/
10
reference_url http://www.debian.org/security/2014/dsa-3001
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3001
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757312
reference_id 757312
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757312
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-5204
reference_id CVE-2014-5204
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-5204
fixed_packages
0
url pkg:deb/debian/wordpress@3.9.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.9.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.9.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2014-5204
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p1c8-hj6e-mkg4
227
url VCID-p371-1hxy-eueh
vulnerability_id VCID-p371-1hxy-eueh
summary WordPress fails to sufficiently check the format of cached username data.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2667
reference_id
reference_type
scores
0
value 0.32191
scoring_system epss
scoring_elements 0.96805
published_at 2026-04-01T12:55:00Z
1
value 0.32191
scoring_system epss
scoring_elements 0.96812
published_at 2026-04-02T12:55:00Z
2
value 0.32191
scoring_system epss
scoring_elements 0.96814
published_at 2026-04-04T12:55:00Z
3
value 0.32191
scoring_system epss
scoring_elements 0.96817
published_at 2026-04-07T12:55:00Z
4
value 0.32191
scoring_system epss
scoring_elements 0.96826
published_at 2026-04-08T12:55:00Z
5
value 0.32191
scoring_system epss
scoring_elements 0.96827
published_at 2026-04-09T12:55:00Z
6
value 0.32191
scoring_system epss
scoring_elements 0.96829
published_at 2026-04-11T12:55:00Z
7
value 0.32191
scoring_system epss
scoring_elements 0.9683
published_at 2026-04-12T12:55:00Z
8
value 0.32191
scoring_system epss
scoring_elements 0.96831
published_at 2026-04-13T12:55:00Z
9
value 0.32191
scoring_system epss
scoring_elements 0.96837
published_at 2026-04-16T12:55:00Z
10
value 0.32191
scoring_system epss
scoring_elements 0.96841
published_at 2026-04-18T12:55:00Z
11
value 0.32191
scoring_system epss
scoring_elements 0.96843
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2667
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2667
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=369014
reference_id 369014
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=369014
3
reference_url https://security.gentoo.org/glsa/200606-08
reference_id GLSA-200606-08
reference_type
scores
url https://security.gentoo.org/glsa/200606-08
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/6.php
reference_id OSVDB-25777;CVE-2006-2667
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/6.php
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.3-1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2006-2667
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p371-1hxy-eueh
228
url VCID-p4r5-fz39-hkej
vulnerability_id VCID-p4r5-fz39-hkej
summary The XMLRPC API in WordPress before 3.5.1 allows remote attackers to send HTTP requests to intranet servers, and conduct port-scanning attacks, by specifying a crafted source URL for a pingback, related to a Server-Side Request Forgery (SSRF) issue.
references
0
reference_url http://codex.wordpress.org/Version_3.5.1
reference_id
reference_type
scores
url http://codex.wordpress.org/Version_3.5.1
1
reference_url http://core.trac.wordpress.org/changeset/23330
reference_id
reference_type
scores
url http://core.trac.wordpress.org/changeset/23330
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0235
reference_id
reference_type
scores
0
value 0.5836
scoring_system epss
scoring_elements 0.98205
published_at 2026-04-18T12:55:00Z
1
value 0.5836
scoring_system epss
scoring_elements 0.98182
published_at 2026-04-01T12:55:00Z
2
value 0.5836
scoring_system epss
scoring_elements 0.98185
published_at 2026-04-02T12:55:00Z
3
value 0.5836
scoring_system epss
scoring_elements 0.98189
published_at 2026-04-04T12:55:00Z
4
value 0.5836
scoring_system epss
scoring_elements 0.9819
published_at 2026-04-07T12:55:00Z
5
value 0.5836
scoring_system epss
scoring_elements 0.98195
published_at 2026-04-09T12:55:00Z
6
value 0.5836
scoring_system epss
scoring_elements 0.98198
published_at 2026-04-13T12:55:00Z
7
value 0.5836
scoring_system epss
scoring_elements 0.98204
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0235
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=904120
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=904120
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0235
5
reference_url http://wordpress.org/news/2013/01/wordpress-3-5-1/
reference_id
reference_type
scores
url http://wordpress.org/news/2013/01/wordpress-3-5-1/
6
reference_url http://www.acunetix.com/blog/web-security-zone/wordpress-pingback-vulnerability/
reference_id
reference_type
scores
url http://www.acunetix.com/blog/web-security-zone/wordpress-pingback-vulnerability/
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698916
reference_id 698916
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698916
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0235
reference_id CVE-2013-0235
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-0235
fixed_packages
0
url pkg:deb/debian/wordpress@3.5.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.5.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.5.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2013-0235
risk_score 10.0
exploitability 2.0
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p4r5-fz39-hkej
229
url VCID-pb81-1zfe-hqfb
vulnerability_id VCID-pb81-1zfe-hqfb
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5834
reference_id
reference_type
scores
0
value 0.01221
scoring_system epss
scoring_elements 0.79093
published_at 2026-04-18T12:55:00Z
1
value 0.01221
scoring_system epss
scoring_elements 0.79096
published_at 2026-04-16T12:55:00Z
2
value 0.01221
scoring_system epss
scoring_elements 0.79019
published_at 2026-04-01T12:55:00Z
3
value 0.01221
scoring_system epss
scoring_elements 0.79025
published_at 2026-04-02T12:55:00Z
4
value 0.01221
scoring_system epss
scoring_elements 0.79051
published_at 2026-04-04T12:55:00Z
5
value 0.01221
scoring_system epss
scoring_elements 0.79036
published_at 2026-04-07T12:55:00Z
6
value 0.01221
scoring_system epss
scoring_elements 0.7906
published_at 2026-04-08T12:55:00Z
7
value 0.01221
scoring_system epss
scoring_elements 0.79068
published_at 2026-04-13T12:55:00Z
8
value 0.01221
scoring_system epss
scoring_elements 0.79092
published_at 2026-04-21T12:55:00Z
9
value 0.01221
scoring_system epss
scoring_elements 0.79078
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5834
1
reference_url https://codex.wordpress.org/Version_4.5.3
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.5.3
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8834
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5832
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5832
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5834
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5835
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5837
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5838
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5838
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5839
9
reference_url https://github.com/WordPress/WordPress/commit/4372cdf45d0f49c74bbd4d60db7281de83e32648
reference_id
reference_type
scores
url https://github.com/WordPress/WordPress/commit/4372cdf45d0f49c74bbd4d60db7281de83e32648
10
reference_url https://wordpress.org/news/2016/06/wordpress-4-5-3/
reference_id
reference_type
scores
url https://wordpress.org/news/2016/06/wordpress-4-5-3/
11
reference_url https://wpvulndb.com/vulnerabilities/8518
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8518
12
reference_url http://www.debian.org/security/2016/dsa-3639
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3639
13
reference_url http://www.securityfocus.com/bid/91368
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91368
14
reference_url http://www.securitytracker.com/id/1036163
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036163
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5834
reference_id CVE-2016-5834
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-5834
fixed_packages
0
url pkg:deb/debian/wordpress@4.5.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.5.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.5.3%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2016-5834
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pb81-1zfe-hqfb
230
url VCID-pc7x-gaqm-e7dj
vulnerability_id VCID-pc7x-gaqm-e7dj
summary
Wordpress contains several cross-site scripting, cross-site request forgery
    and information leak vulnerabilities.
references
0
reference_url http://osvdb.org/34361
reference_id
reference_type
scores
url http://osvdb.org/34361
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1230
reference_id
reference_type
scores
0
value 0.00582
scoring_system epss
scoring_elements 0.68959
published_at 2026-04-21T12:55:00Z
1
value 0.00582
scoring_system epss
scoring_elements 0.68861
published_at 2026-04-01T12:55:00Z
2
value 0.00582
scoring_system epss
scoring_elements 0.68879
published_at 2026-04-02T12:55:00Z
3
value 0.00582
scoring_system epss
scoring_elements 0.689
published_at 2026-04-04T12:55:00Z
4
value 0.00582
scoring_system epss
scoring_elements 0.6888
published_at 2026-04-07T12:55:00Z
5
value 0.00582
scoring_system epss
scoring_elements 0.68931
published_at 2026-04-08T12:55:00Z
6
value 0.00582
scoring_system epss
scoring_elements 0.6895
published_at 2026-04-09T12:55:00Z
7
value 0.00582
scoring_system epss
scoring_elements 0.68972
published_at 2026-04-11T12:55:00Z
8
value 0.00582
scoring_system epss
scoring_elements 0.68958
published_at 2026-04-12T12:55:00Z
9
value 0.00582
scoring_system epss
scoring_elements 0.68928
published_at 2026-04-13T12:55:00Z
10
value 0.00582
scoring_system epss
scoring_elements 0.68969
published_at 2026-04-16T12:55:00Z
11
value 0.00582
scoring_system epss
scoring_elements 0.68979
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1230
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1230
3
reference_url http://secunia.com/advisories/24566
reference_id
reference_type
scores
url http://secunia.com/advisories/24566
4
reference_url http://trac.wordpress.org/changeset/4951
reference_id
reference_type
scores
url http://trac.wordpress.org/changeset/4951
5
reference_url http://trac.wordpress.org/changeset/4952
reference_id
reference_type
scores
url http://trac.wordpress.org/changeset/4952
6
reference_url http://www.gentoo.org/security/en/glsa/glsa-200703-23.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200703-23.xml
7
reference_url http://www.vupen.com/english/advisories/2007/0756
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0756
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1230
reference_id CVE-2007-1230
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2007-1230
10
reference_url https://security.gentoo.org/glsa/200703-23
reference_id GLSA-200703-23
reference_type
scores
url https://security.gentoo.org/glsa/200703-23
fixed_packages
0
url pkg:deb/debian/wordpress@2.1.2-1?distro=trixie
purl pkg:deb/debian/wordpress@2.1.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.1.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-1230
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pc7x-gaqm-e7dj
231
url VCID-pd4w-3ttq-9yfs
vulnerability_id VCID-pd4w-3ttq-9yfs
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0493.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0493.html
1
reference_url http://openwall.com/lists/oss-security/2014/11/25/12
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2014/11/25/12
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9035
reference_id
reference_type
scores
0
value 0.00586
scoring_system epss
scoring_elements 0.69101
published_at 2026-04-21T12:55:00Z
1
value 0.00586
scoring_system epss
scoring_elements 0.69007
published_at 2026-04-01T12:55:00Z
2
value 0.00586
scoring_system epss
scoring_elements 0.69024
published_at 2026-04-02T12:55:00Z
3
value 0.00586
scoring_system epss
scoring_elements 0.69044
published_at 2026-04-04T12:55:00Z
4
value 0.00586
scoring_system epss
scoring_elements 0.69025
published_at 2026-04-07T12:55:00Z
5
value 0.00586
scoring_system epss
scoring_elements 0.69075
published_at 2026-04-08T12:55:00Z
6
value 0.00586
scoring_system epss
scoring_elements 0.69095
published_at 2026-04-09T12:55:00Z
7
value 0.00586
scoring_system epss
scoring_elements 0.69118
published_at 2026-04-11T12:55:00Z
8
value 0.00586
scoring_system epss
scoring_elements 0.69103
published_at 2026-04-12T12:55:00Z
9
value 0.00586
scoring_system epss
scoring_elements 0.69073
published_at 2026-04-13T12:55:00Z
10
value 0.00586
scoring_system epss
scoring_elements 0.69113
published_at 2026-04-16T12:55:00Z
11
value 0.00586
scoring_system epss
scoring_elements 0.69121
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9035
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039
11
reference_url https://wordpress.org/news/2014/11/wordpress-4-0-1/
reference_id
reference_type
scores
url https://wordpress.org/news/2014/11/wordpress-4-0-1/
12
reference_url http://www.debian.org/security/2014/dsa-3085
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3085
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:233
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:233
14
reference_url http://www.securityfocus.com/bid/71236
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71236
15
reference_url http://www.securitytracker.com/id/1031243
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031243
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425
reference_id 770425
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9035
reference_id CVE-2014-9035
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-9035
fixed_packages
0
url pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.0.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2014-9035
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pd4w-3ttq-9yfs
232
url VCID-pgn4-7tt1-v7ct
vulnerability_id VCID-pgn4-7tt1-v7ct
summary wordpress: sql column truncation flaw
references
0
reference_url http://marc.info/?l=oss-security&m=122152830017099&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=122152830017099&w=2
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4106.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4106.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4106
reference_id
reference_type
scores
0
value 0.14591
scoring_system epss
scoring_elements 0.94494
published_at 2026-04-21T12:55:00Z
1
value 0.14591
scoring_system epss
scoring_elements 0.94433
published_at 2026-04-01T12:55:00Z
2
value 0.14591
scoring_system epss
scoring_elements 0.94441
published_at 2026-04-02T12:55:00Z
3
value 0.14591
scoring_system epss
scoring_elements 0.94452
published_at 2026-04-04T12:55:00Z
4
value 0.14591
scoring_system epss
scoring_elements 0.94453
published_at 2026-04-07T12:55:00Z
5
value 0.14591
scoring_system epss
scoring_elements 0.94463
published_at 2026-04-08T12:55:00Z
6
value 0.14591
scoring_system epss
scoring_elements 0.94466
published_at 2026-04-09T12:55:00Z
7
value 0.14591
scoring_system epss
scoring_elements 0.9447
published_at 2026-04-11T12:55:00Z
8
value 0.14591
scoring_system epss
scoring_elements 0.94472
published_at 2026-04-13T12:55:00Z
9
value 0.14591
scoring_system epss
scoring_elements 0.94487
published_at 2026-04-16T12:55:00Z
10
value 0.14591
scoring_system epss
scoring_elements 0.9449
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4106
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4106
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4106
4
reference_url http://secunia.com/advisories/31737
reference_id
reference_type
scores
url http://secunia.com/advisories/31737
5
reference_url http://secunia.com/advisories/31870
reference_id
reference_type
scores
url http://secunia.com/advisories/31870
6
reference_url http://securityreason.com/securityalert/4272
reference_id
reference_type
scores
url http://securityreason.com/securityalert/4272
7
reference_url http://securitytracker.com/id?1020869
reference_id
reference_type
scores
url http://securitytracker.com/id?1020869
8
reference_url https://www.exploit-db.com/exploits/6397
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/6397
9
reference_url https://www.exploit-db.com/exploits/6421
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/6421
10
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00607.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00607.html
11
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00629.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00629.html
12
reference_url http://wordpress.org/development/2008/09/wordpress-262/
reference_id
reference_type
scores
url http://wordpress.org/development/2008/09/wordpress-262/
13
reference_url http://www.debian.org/security/2009/dsa-1871
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1871
14
reference_url http://www.openwall.com/lists/oss-security/2008/09/11/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/09/11/6
15
reference_url http://www.securityfocus.com/archive/1/496287/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/496287/100/0/threaded
16
reference_url http://www.securityfocus.com/bid/31068
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31068
17
reference_url http://www.sektioneins.de/advisories/SE-2008-05.txt
reference_id
reference_type
scores
url http://www.sektioneins.de/advisories/SE-2008-05.txt
18
reference_url http://www.suspekt.org/2008/08/18/mysql-and-sql-column-truncation-vulnerabilities/
reference_id
reference_type
scores
url http://www.suspekt.org/2008/08/18/mysql-and-sql-column-truncation-vulnerabilities/
19
reference_url http://www.vupen.com/english/advisories/2008/2553
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2553
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=462770
reference_id 462770
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=462770
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=500115
reference_id 500115
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=500115
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71-gold:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.71-gold:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71-gold:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1-miles:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1-miles:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1-miles:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2-blakey:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2-blakey:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2-blakey:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0-platinum:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0-platinum:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0-platinum:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2-delta:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2-delta:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2-delta:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2-mingus:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2-mingus:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2-mingus:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5-strayhorn:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5-strayhorn:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5-strayhorn:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4106
reference_id CVE-2008-4106
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-4106
fixed_packages
0
url pkg:deb/debian/wordpress@2.5.1-8?distro=trixie
purl pkg:deb/debian/wordpress@2.5.1-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.5.1-8%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2008-4106
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pgn4-7tt1-v7ct
233
url VCID-pkjb-8649-fqd2
vulnerability_id VCID-pkjb-8649-fqd2
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28034
reference_id
reference_type
scores
0
value 0.02678
scoring_system epss
scoring_elements 0.85851
published_at 2026-04-21T12:55:00Z
1
value 0.02678
scoring_system epss
scoring_elements 0.85761
published_at 2026-04-01T12:55:00Z
2
value 0.02678
scoring_system epss
scoring_elements 0.85774
published_at 2026-04-02T12:55:00Z
3
value 0.02678
scoring_system epss
scoring_elements 0.85792
published_at 2026-04-04T12:55:00Z
4
value 0.02678
scoring_system epss
scoring_elements 0.85797
published_at 2026-04-07T12:55:00Z
5
value 0.02678
scoring_system epss
scoring_elements 0.85816
published_at 2026-04-08T12:55:00Z
6
value 0.02678
scoring_system epss
scoring_elements 0.85827
published_at 2026-04-09T12:55:00Z
7
value 0.02678
scoring_system epss
scoring_elements 0.85841
published_at 2026-04-11T12:55:00Z
8
value 0.02678
scoring_system epss
scoring_elements 0.85838
published_at 2026-04-12T12:55:00Z
9
value 0.02678
scoring_system epss
scoring_elements 0.85834
published_at 2026-04-13T12:55:00Z
10
value 0.02678
scoring_system epss
scoring_elements 0.85853
published_at 2026-04-16T12:55:00Z
11
value 0.02678
scoring_system epss
scoring_elements 0.85857
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28034
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562
reference_id 973562
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562
11
reference_url https://security.archlinux.org/ASA-202011-3
reference_id ASA-202011-3
reference_type
scores
url https://security.archlinux.org/ASA-202011-3
12
reference_url https://security.archlinux.org/AVG-1257
reference_id AVG-1257
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1257
fixed_packages
0
url pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.5.3%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2020-28034
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pkjb-8649-fqd2
234
url VCID-psca-f78j-hbc2
vulnerability_id VCID-psca-f78j-hbc2
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28039
reference_id
reference_type
scores
0
value 0.05996
scoring_system epss
scoring_elements 0.90701
published_at 2026-04-21T12:55:00Z
1
value 0.05996
scoring_system epss
scoring_elements 0.90642
published_at 2026-04-01T12:55:00Z
2
value 0.05996
scoring_system epss
scoring_elements 0.90646
published_at 2026-04-02T12:55:00Z
3
value 0.05996
scoring_system epss
scoring_elements 0.90657
published_at 2026-04-04T12:55:00Z
4
value 0.05996
scoring_system epss
scoring_elements 0.90665
published_at 2026-04-07T12:55:00Z
5
value 0.05996
scoring_system epss
scoring_elements 0.90676
published_at 2026-04-08T12:55:00Z
6
value 0.05996
scoring_system epss
scoring_elements 0.90682
published_at 2026-04-09T12:55:00Z
7
value 0.05996
scoring_system epss
scoring_elements 0.9069
published_at 2026-04-11T12:55:00Z
8
value 0.05996
scoring_system epss
scoring_elements 0.90691
published_at 2026-04-12T12:55:00Z
9
value 0.05996
scoring_system epss
scoring_elements 0.90687
published_at 2026-04-13T12:55:00Z
10
value 0.05996
scoring_system epss
scoring_elements 0.90706
published_at 2026-04-16T12:55:00Z
11
value 0.05996
scoring_system epss
scoring_elements 0.90703
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28039
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562
reference_id 973562
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562
11
reference_url https://security.archlinux.org/ASA-202011-3
reference_id ASA-202011-3
reference_type
scores
url https://security.archlinux.org/ASA-202011-3
12
reference_url https://security.archlinux.org/AVG-1257
reference_id AVG-1257
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1257
fixed_packages
0
url pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.5.3%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2020-28039
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-psca-f78j-hbc2
235
url VCID-pv2z-zrfb-83fy
vulnerability_id VCID-pv2z-zrfb-83fy
summary Cross-site scripting (XSS) vulnerability in index.php in the Blue Memories theme 1.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter, possibly a related issue to CVE-2007-2757 and CVE-2007-4014. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4165
reference_id
reference_type
scores
0
value 0.01299
scoring_system epss
scoring_elements 0.79672
published_at 2026-04-01T12:55:00Z
1
value 0.01299
scoring_system epss
scoring_elements 0.79679
published_at 2026-04-02T12:55:00Z
2
value 0.01299
scoring_system epss
scoring_elements 0.79699
published_at 2026-04-04T12:55:00Z
3
value 0.01299
scoring_system epss
scoring_elements 0.79685
published_at 2026-04-07T12:55:00Z
4
value 0.01299
scoring_system epss
scoring_elements 0.79714
published_at 2026-04-08T12:55:00Z
5
value 0.01299
scoring_system epss
scoring_elements 0.7972
published_at 2026-04-09T12:55:00Z
6
value 0.01299
scoring_system epss
scoring_elements 0.79742
published_at 2026-04-11T12:55:00Z
7
value 0.01299
scoring_system epss
scoring_elements 0.79725
published_at 2026-04-12T12:55:00Z
8
value 0.01299
scoring_system epss
scoring_elements 0.79719
published_at 2026-04-13T12:55:00Z
9
value 0.01299
scoring_system epss
scoring_elements 0.79748
published_at 2026-04-16T12:55:00Z
10
value 0.01299
scoring_system epss
scoring_elements 0.79749
published_at 2026-04-18T12:55:00Z
11
value 0.01299
scoring_system epss
scoring_elements 0.79752
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4165
fixed_packages
0
url pkg:deb/debian/wordpress@0?distro=trixie
purl pkg:deb/debian/wordpress@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@0%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-4165
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pv2z-zrfb-83fy
236
url VCID-pwgx-qq3w-5baf
vulnerability_id VCID-pwgx-qq3w-5baf
summary WordPress: Resource exhaustion (DoS)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3622.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3622.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3622
reference_id
reference_type
scores
0
value 0.06065
scoring_system epss
scoring_elements 0.90702
published_at 2026-04-01T12:55:00Z
1
value 0.06065
scoring_system epss
scoring_elements 0.90708
published_at 2026-04-02T12:55:00Z
2
value 0.06065
scoring_system epss
scoring_elements 0.90718
published_at 2026-04-04T12:55:00Z
3
value 0.06065
scoring_system epss
scoring_elements 0.90729
published_at 2026-04-07T12:55:00Z
4
value 0.06065
scoring_system epss
scoring_elements 0.9074
published_at 2026-04-08T12:55:00Z
5
value 0.06065
scoring_system epss
scoring_elements 0.90745
published_at 2026-04-09T12:55:00Z
6
value 0.06065
scoring_system epss
scoring_elements 0.90754
published_at 2026-04-12T12:55:00Z
7
value 0.08278
scoring_system epss
scoring_elements 0.92244
published_at 2026-04-13T12:55:00Z
8
value 0.08278
scoring_system epss
scoring_elements 0.92256
published_at 2026-04-21T12:55:00Z
9
value 0.08278
scoring_system epss
scoring_elements 0.92255
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3622
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3622
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=530056
reference_id 530056
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=530056
fixed_packages
0
url pkg:deb/debian/wordpress@2.8.5-1?distro=trixie
purl pkg:deb/debian/wordpress@2.8.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.8.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2009-3622
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pwgx-qq3w-5baf
237
url VCID-pyzc-scrd-bufa
vulnerability_id VCID-pyzc-scrd-bufa
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-11025
reference_id
reference_type
scores
0
value 0.01427
scoring_system epss
scoring_elements 0.80576
published_at 2026-04-01T12:55:00Z
1
value 0.01427
scoring_system epss
scoring_elements 0.80583
published_at 2026-04-02T12:55:00Z
2
value 0.01427
scoring_system epss
scoring_elements 0.80605
published_at 2026-04-04T12:55:00Z
3
value 0.01427
scoring_system epss
scoring_elements 0.80598
published_at 2026-04-07T12:55:00Z
4
value 0.01427
scoring_system epss
scoring_elements 0.80625
published_at 2026-04-08T12:55:00Z
5
value 0.01427
scoring_system epss
scoring_elements 0.80635
published_at 2026-04-09T12:55:00Z
6
value 0.01427
scoring_system epss
scoring_elements 0.80651
published_at 2026-04-11T12:55:00Z
7
value 0.01427
scoring_system epss
scoring_elements 0.80638
published_at 2026-04-12T12:55:00Z
8
value 0.01427
scoring_system epss
scoring_elements 0.8063
published_at 2026-04-13T12:55:00Z
9
value 0.01427
scoring_system epss
scoring_elements 0.80659
published_at 2026-04-16T12:55:00Z
10
value 0.01427
scoring_system epss
scoring_elements 0.80661
published_at 2026-04-18T12:55:00Z
11
value 0.01427
scoring_system epss
scoring_elements 0.80663
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-11025
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11025
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11026
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11027
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11027
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11028
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11029
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959391
reference_id 959391
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959391
fixed_packages
0
url pkg:deb/debian/wordpress@5.4.1%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.4.1%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.4.1%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2020-11025
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pyzc-scrd-bufa
238
url VCID-pz3b-294m-nqfn
vulnerability_id VCID-pz3b-294m-nqfn
summary Before WordPress 4.9.5, the URL validator assumed URLs with the hostname localhost were on the same host as the WordPress server.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10101
reference_id
reference_type
scores
0
value 0.09391
scoring_system epss
scoring_elements 0.92757
published_at 2026-04-01T12:55:00Z
1
value 0.09391
scoring_system epss
scoring_elements 0.92764
published_at 2026-04-02T12:55:00Z
2
value 0.09391
scoring_system epss
scoring_elements 0.92769
published_at 2026-04-04T12:55:00Z
3
value 0.09391
scoring_system epss
scoring_elements 0.92766
published_at 2026-04-07T12:55:00Z
4
value 0.09391
scoring_system epss
scoring_elements 0.92775
published_at 2026-04-08T12:55:00Z
5
value 0.09391
scoring_system epss
scoring_elements 0.9278
published_at 2026-04-09T12:55:00Z
6
value 0.09391
scoring_system epss
scoring_elements 0.92785
published_at 2026-04-11T12:55:00Z
7
value 0.09391
scoring_system epss
scoring_elements 0.92784
published_at 2026-04-13T12:55:00Z
8
value 0.09391
scoring_system epss
scoring_elements 0.92795
published_at 2026-04-16T12:55:00Z
9
value 0.09391
scoring_system epss
scoring_elements 0.92796
published_at 2026-04-18T12:55:00Z
10
value 0.09391
scoring_system epss
scoring_elements 0.92799
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10101
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10101
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=895034
reference_id 895034
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=895034
fixed_packages
0
url pkg:deb/debian/wordpress@4.9.5%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@4.9.5%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.9.5%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2018-10101
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pz3b-294m-nqfn
239
url VCID-q146-rfqv-1ych
vulnerability_id VCID-q146-rfqv-1ych
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14719
reference_id
reference_type
scores
0
value 0.50739
scoring_system epss
scoring_elements 0.97863
published_at 2026-04-21T12:55:00Z
1
value 0.50739
scoring_system epss
scoring_elements 0.97865
published_at 2026-04-18T12:55:00Z
2
value 0.50739
scoring_system epss
scoring_elements 0.97832
published_at 2026-04-01T12:55:00Z
3
value 0.50739
scoring_system epss
scoring_elements 0.97838
published_at 2026-04-02T12:55:00Z
4
value 0.50739
scoring_system epss
scoring_elements 0.97839
published_at 2026-04-04T12:55:00Z
5
value 0.50739
scoring_system epss
scoring_elements 0.97842
published_at 2026-04-07T12:55:00Z
6
value 0.50739
scoring_system epss
scoring_elements 0.97846
published_at 2026-04-08T12:55:00Z
7
value 0.50739
scoring_system epss
scoring_elements 0.97849
published_at 2026-04-09T12:55:00Z
8
value 0.50739
scoring_system epss
scoring_elements 0.97852
published_at 2026-04-11T12:55:00Z
9
value 0.50739
scoring_system epss
scoring_elements 0.97853
published_at 2026-04-12T12:55:00Z
10
value 0.50739
scoring_system epss
scoring_elements 0.97855
published_at 2026-04-13T12:55:00Z
11
value 0.50739
scoring_system epss
scoring_elements 0.97862
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14719
1
reference_url https://core.trac.wordpress.org/changeset/41457
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/41457
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14718
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14720
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14721
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14722
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14723
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14726
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14726
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14990
11
reference_url https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
12
reference_url https://wpvulndb.com/vulnerabilities/8911
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8911
13
reference_url https://www.debian.org/security/2017/dsa-3997
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3997
14
reference_url http://www.securityfocus.com/bid/100912
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100912
15
reference_url http://www.securitytracker.com/id/1039553
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039553
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876274
reference_id 876274
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876274
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.6.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.10:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.11:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.12:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.13:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.14:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.15:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.16:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.17:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.18:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.19:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.2:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.20:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.21:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.22:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.4:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.5:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.6:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.7:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.8:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.9:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.10:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.11:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.12:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.13:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.14:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.15:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.16:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.17:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.18:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.19:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.20:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.21:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.22:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.5:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.6:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.7:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.8:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.9:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.10:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.11:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.12:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.13:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.14:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.15:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.16:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.17:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.18:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.19:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.20:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.3:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.4:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.5:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.6:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.7:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.8:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.9:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.1:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.10:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.11:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.12:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.13:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.14:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.15:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.16:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.17:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.18:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.19:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.2:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.3:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.4:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.5:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.6:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.7:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.8:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0.9:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.1:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.10:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.11:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.12:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.13:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.14:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.15:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.16:*:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.17:*:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.18:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.19:*:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.2:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.3:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.4:*:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.5:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.6:*:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.7:*:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.8:*:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.1.9:*:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2:*:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.1:*:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.10:*:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.11:*:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.12:*:*:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.13:*:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.14:*:*:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.15:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.16:*:*:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.2:*:*:*:*:*:*:*
160
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.3:*:*:*:*:*:*:*
161
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.4:*:*:*:*:*:*:*
162
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.5:*:*:*:*:*:*:*
163
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.6:*:*:*:*:*:*:*
164
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.7:*:*:*:*:*:*:*
165
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.8:*:*:*:*:*:*:*
166
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.2.9:*:*:*:*:*:*:*
167
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.3:*:*:*:*:*:*:*
168
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.3.1:*:*:*:*:*:*:*
169
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.3.10:*:*:*:*:*:*:*
170
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.3.11:*:*:*:*:*:*:*
171
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.3.12:*:*:*:*:*:*:*
172
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.3.2:*:*:*:*:*:*:*
173
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.3.3:*:*:*:*:*:*:*
174
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.3.4:*:*:*:*:*:*:*
175
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.3.5:*:*:*:*:*:*:*
176
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.3.6:*:*:*:*:*:*:*
177
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.3.7:*:*:*:*:*:*:*
178
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.3.8:*:*:*:*:*:*:*
179
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.3.9:*:*:*:*:*:*:*
180
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.4:*:*:*:*:*:*:*
181
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.4.1:*:*:*:*:*:*:*
182
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.4.10:*:*:*:*:*:*:*
183
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.4.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.4.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.4.11:*:*:*:*:*:*:*
184
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.4.2:*:*:*:*:*:*:*
185
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.4.3:*:*:*:*:*:*:*
186
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.4.4:*:*:*:*:*:*:*
187
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.4.5:*:*:*:*:*:*:*
188
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.4.6:*:*:*:*:*:*:*
189
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.4.7:*:*:*:*:*:*:*
190
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.4.8:*:*:*:*:*:*:*
191
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.4.9:*:*:*:*:*:*:*
192
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.5:*:*:*:*:*:*:*
193
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.5.1:*:*:*:*:*:*:*
194
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.5.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.5.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.5.10:*:*:*:*:*:*:*
195
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.5.2:*:*:*:*:*:*:*
196
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.5.3:*:*:*:*:*:*:*
197
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.5.4:*:*:*:*:*:*:*
198
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.5.5:*:*:*:*:*:*:*
199
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.5.6:*:*:*:*:*:*:*
200
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.5.7:*:*:*:*:*:*:*
201
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.5.8:*:*:*:*:*:*:*
202
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.5.9:*:*:*:*:*:*:*
203
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.6:*:*:*:*:*:*:*
204
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.6.1:*:*:*:*:*:*:*
205
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.6.2:*:*:*:*:*:*:*
206
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.6.3:*:*:*:*:*:*:*
207
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.6.4:*:*:*:*:*:*:*
208
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.6.5:*:*:*:*:*:*:*
209
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.6.6:*:*:*:*:*:*:*
210
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.6.7:*:*:*:*:*:*:*
211
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7:*:*:*:*:*:*:*
212
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7.1:*:*:*:*:*:*:*
213
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7.2:*:*:*:*:*:*:*
214
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7.3:*:*:*:*:*:*:*
215
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7.4:*:*:*:*:*:*:*
216
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7.5:*:*:*:*:*:*:*
217
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.8:*:*:*:*:*:*:*
218
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.8.1:*:*:*:*:*:*:*
219
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-14719
reference_id CVE-2017-14719
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-14719
fixed_packages
0
url pkg:deb/debian/wordpress@4.8.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.8.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.8.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-14719
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q146-rfqv-1ych
240
url VCID-q527-42sm-x7fz
vulnerability_id VCID-q527-42sm-x7fz
summary Unspecified vulnerability in wp-includes/js/swfobject.js in WordPress before 3.3.2 has unknown impact and attack vectors.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2400
reference_id
reference_type
scores
0
value 0.01738
scoring_system epss
scoring_elements 0.82411
published_at 2026-04-01T12:55:00Z
1
value 0.01738
scoring_system epss
scoring_elements 0.82426
published_at 2026-04-02T12:55:00Z
2
value 0.01738
scoring_system epss
scoring_elements 0.82443
published_at 2026-04-04T12:55:00Z
3
value 0.01738
scoring_system epss
scoring_elements 0.8244
published_at 2026-04-07T12:55:00Z
4
value 0.01738
scoring_system epss
scoring_elements 0.82467
published_at 2026-04-08T12:55:00Z
5
value 0.01738
scoring_system epss
scoring_elements 0.82474
published_at 2026-04-09T12:55:00Z
6
value 0.01738
scoring_system epss
scoring_elements 0.82492
published_at 2026-04-11T12:55:00Z
7
value 0.01738
scoring_system epss
scoring_elements 0.82488
published_at 2026-04-12T12:55:00Z
8
value 0.01738
scoring_system epss
scoring_elements 0.82483
published_at 2026-04-13T12:55:00Z
9
value 0.01738
scoring_system epss
scoring_elements 0.8252
published_at 2026-04-16T12:55:00Z
10
value 0.01738
scoring_system epss
scoring_elements 0.82521
published_at 2026-04-18T12:55:00Z
11
value 0.01738
scoring_system epss
scoring_elements 0.82525
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2400
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2400
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670124
reference_id 670124
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670124
fixed_packages
0
url pkg:deb/debian/wordpress@3.3.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.3.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.3.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2012-2400
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q527-42sm-x7fz
241
url VCID-q84d-utmc-g3fn
vulnerability_id VCID-q84d-utmc-g3fn
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25286
reference_id
reference_type
scores
0
value 0.0058
scoring_system epss
scoring_elements 0.68824
published_at 2026-04-01T12:55:00Z
1
value 0.0058
scoring_system epss
scoring_elements 0.68842
published_at 2026-04-02T12:55:00Z
2
value 0.0058
scoring_system epss
scoring_elements 0.68863
published_at 2026-04-04T12:55:00Z
3
value 0.0058
scoring_system epss
scoring_elements 0.68843
published_at 2026-04-07T12:55:00Z
4
value 0.0058
scoring_system epss
scoring_elements 0.68893
published_at 2026-04-08T12:55:00Z
5
value 0.0058
scoring_system epss
scoring_elements 0.68912
published_at 2026-04-09T12:55:00Z
6
value 0.0058
scoring_system epss
scoring_elements 0.68934
published_at 2026-04-11T12:55:00Z
7
value 0.0058
scoring_system epss
scoring_elements 0.6892
published_at 2026-04-12T12:55:00Z
8
value 0.0058
scoring_system epss
scoring_elements 0.68891
published_at 2026-04-13T12:55:00Z
9
value 0.0058
scoring_system epss
scoring_elements 0.68932
published_at 2026-04-16T12:55:00Z
10
value 0.0058
scoring_system epss
scoring_elements 0.68942
published_at 2026-04-18T12:55:00Z
11
value 0.0058
scoring_system epss
scoring_elements 0.68921
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25286
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25286
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4047
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4048
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4049
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4050
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962685
reference_id 962685
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962685
fixed_packages
0
url pkg:deb/debian/wordpress@5.4.2%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.4.2%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.4.2%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2020-25286
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q84d-utmc-g3fn
242
url VCID-q9xz-t5cc-2uf7
vulnerability_id VCID-q9xz-t5cc-2uf7
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5715
reference_id
reference_type
scores
0
value 0.28517
scoring_system epss
scoring_elements 0.96544
published_at 2026-04-21T12:55:00Z
1
value 0.28517
scoring_system epss
scoring_elements 0.96543
published_at 2026-04-18T12:55:00Z
2
value 0.28517
scoring_system epss
scoring_elements 0.96497
published_at 2026-04-01T12:55:00Z
3
value 0.28517
scoring_system epss
scoring_elements 0.96506
published_at 2026-04-02T12:55:00Z
4
value 0.28517
scoring_system epss
scoring_elements 0.9651
published_at 2026-04-04T12:55:00Z
5
value 0.28517
scoring_system epss
scoring_elements 0.96513
published_at 2026-04-07T12:55:00Z
6
value 0.28517
scoring_system epss
scoring_elements 0.96521
published_at 2026-04-08T12:55:00Z
7
value 0.28517
scoring_system epss
scoring_elements 0.96524
published_at 2026-04-09T12:55:00Z
8
value 0.28517
scoring_system epss
scoring_elements 0.96527
published_at 2026-04-12T12:55:00Z
9
value 0.28517
scoring_system epss
scoring_elements 0.9653
published_at 2026-04-13T12:55:00Z
10
value 0.28517
scoring_system epss
scoring_elements 0.96537
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5715
1
reference_url https://codex.wordpress.org/Version_4.3.1
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.3.1
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2213
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5622
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5714
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5715
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5731
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5732
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5734
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7989
10
reference_url https://github.com/WordPress/WordPress/commit/9c57f3a4291f2311ae05f22c10eedeb0f69337ab
reference_id
reference_type
scores
url https://github.com/WordPress/WordPress/commit/9c57f3a4291f2311ae05f22c10eedeb0f69337ab
11
reference_url https://security-tracker.debian.org/tracker/CVE-2015-5715
reference_id
reference_type
scores
url https://security-tracker.debian.org/tracker/CVE-2015-5715
12
reference_url https://wordpress.org/news/2015/09/wordpress-4-3-1/
reference_id
reference_type
scores
url https://wordpress.org/news/2015/09/wordpress-4-3-1/
13
reference_url https://wpvulndb.com/vulnerabilities/8188
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8188
14
reference_url http://www.debian.org/security/2015/dsa-3375
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3375
15
reference_url http://www.debian.org/security/2015/dsa-3383
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3383
16
reference_url http://www.securityfocus.com/bid/76748
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/76748
17
reference_url http://www.securitytracker.com/id/1033979
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033979
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799140
reference_id 799140
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799140
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5715
reference_id CVE-2015-5715
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:N
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-5715
fixed_packages
0
url pkg:deb/debian/wordpress@4.3.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.3.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.3.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2015-5715
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q9xz-t5cc-2uf7
243
url VCID-qj5d-cu2t-efah
vulnerability_id VCID-qj5d-cu2t-efah
summary Open redirect vulnerability in wp-admin/upgrade.php in WordPress, probably 2.6.x, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the backto parameter.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-6762
reference_id
reference_type
scores
0
value 0.00287
scoring_system epss
scoring_elements 0.52108
published_at 2026-04-01T12:55:00Z
1
value 0.00287
scoring_system epss
scoring_elements 0.52152
published_at 2026-04-02T12:55:00Z
2
value 0.00287
scoring_system epss
scoring_elements 0.52179
published_at 2026-04-04T12:55:00Z
3
value 0.00287
scoring_system epss
scoring_elements 0.52143
published_at 2026-04-07T12:55:00Z
4
value 0.00287
scoring_system epss
scoring_elements 0.52197
published_at 2026-04-08T12:55:00Z
5
value 0.00287
scoring_system epss
scoring_elements 0.52193
published_at 2026-04-09T12:55:00Z
6
value 0.00287
scoring_system epss
scoring_elements 0.52244
published_at 2026-04-11T12:55:00Z
7
value 0.00287
scoring_system epss
scoring_elements 0.52228
published_at 2026-04-12T12:55:00Z
8
value 0.00287
scoring_system epss
scoring_elements 0.52214
published_at 2026-04-13T12:55:00Z
9
value 0.00287
scoring_system epss
scoring_elements 0.52252
published_at 2026-04-16T12:55:00Z
10
value 0.00287
scoring_system epss
scoring_elements 0.52256
published_at 2026-04-18T12:55:00Z
11
value 0.00287
scoring_system epss
scoring_elements 0.52239
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-6762
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6762
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=531736
reference_id 531736
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=531736
fixed_packages
0
url pkg:deb/debian/wordpress@2.8.3-1?distro=trixie
purl pkg:deb/debian/wordpress@2.8.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.8.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2008-6762
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qj5d-cu2t-efah
244
url VCID-qjdf-s39r-5bdb
vulnerability_id VCID-qjdf-s39r-5bdb
summary
PHP Spellchecker addon for TinyMCE allows attackers to trigger arbitrary outbound HTTP requests
classes/GoogleSpell.php in the PHP Spellchecker (aka Google Spellchecker) addon before 2.0.6.1 for TinyMCE, as used in Moodle 2.1.x before 2.1.10, 2.2.x before 2.2.7, 2.3.x before 2.3.4, and 2.4.x before 2.4.1 and other products, does not properly handle control characters, which allows remote attackers to trigger arbitrary outbound HTTP requests via a crafted string.
references
0
reference_url http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-37283
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-37283
1
reference_url http://openwall.com/lists/oss-security/2013/01/21/1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://openwall.com/lists/oss-security/2013/01/21/1
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6112
reference_id
reference_type
scores
0
value 0.006
scoring_system epss
scoring_elements 0.69477
published_at 2026-04-21T12:55:00Z
1
value 0.006
scoring_system epss
scoring_elements 0.6938
published_at 2026-04-01T12:55:00Z
2
value 0.006
scoring_system epss
scoring_elements 0.69392
published_at 2026-04-02T12:55:00Z
3
value 0.006
scoring_system epss
scoring_elements 0.69408
published_at 2026-04-04T12:55:00Z
4
value 0.006
scoring_system epss
scoring_elements 0.69388
published_at 2026-04-07T12:55:00Z
5
value 0.006
scoring_system epss
scoring_elements 0.69438
published_at 2026-04-08T12:55:00Z
6
value 0.006
scoring_system epss
scoring_elements 0.69454
published_at 2026-04-09T12:55:00Z
7
value 0.006
scoring_system epss
scoring_elements 0.69476
published_at 2026-04-11T12:55:00Z
8
value 0.006
scoring_system epss
scoring_elements 0.69461
published_at 2026-04-12T12:55:00Z
9
value 0.006
scoring_system epss
scoring_elements 0.69447
published_at 2026-04-13T12:55:00Z
10
value 0.006
scoring_system epss
scoring_elements 0.69485
published_at 2026-04-16T12:55:00Z
11
value 0.006
scoring_system epss
scoring_elements 0.69496
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6112
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6112
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6112
4
reference_url https://github.com/moodle/moodle
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/moodle/moodle
5
reference_url https://github.com/moodle/moodle/commit/6fac8f7f04c9fe7f8bbb54a9c00ec5f9ea4f09e0
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/moodle/moodle/commit/6fac8f7f04c9fe7f8bbb54a9c00ec5f9ea4f09e0
6
reference_url https://github.com/moodle/moodle/commit/9803d8fc3ce08c8f8b88ad3a95d9a7c97678a3e3
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/moodle/moodle/commit/9803d8fc3ce08c8f8b88ad3a95d9a7c97678a3e3
7
reference_url https://github.com/moodle/moodle/commit/a3243760c243ddad76e91840134009c3681cb16a
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/moodle/moodle/commit/a3243760c243ddad76e91840134009c3681cb16a
8
reference_url https://github.com/moodle/moodle/commit/f938b1a89b8f381129120a37915d1b345333b3fb
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/moodle/moodle/commit/f938b1a89b8f381129120a37915d1b345333b3fb
9
reference_url https://github.com/tinymce/tinymce_spellchecker_php/commit/22910187bfb9edae90c26e10100d8145b505b974
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/tinymce/tinymce_spellchecker_php/commit/22910187bfb9edae90c26e10100d8145b505b974
10
reference_url https://moodle.org/mod/forum/discuss.php?d=220157
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://moodle.org/mod/forum/discuss.php?d=220157
11
reference_url https://web.archive.org/web/20121015010345/http://www.tinymce.com/develop/changelog/?type=phpspell
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20121015010345/http://www.tinymce.com/develop/changelog/?type=phpspell
12
reference_url https://web.archive.org/web/20121129021911/http://www.tinymce.com/forum/viewtopic.php?id=30036
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20121129021911/http://www.tinymce.com/forum/viewtopic.php?id=30036
13
reference_url http://www.tinymce.com/develop/changelog/?type=phpspell
reference_id
reference_type
scores
url http://www.tinymce.com/develop/changelog/?type=phpspell
14
reference_url http://www.tinymce.com/forum/viewtopic.php?id=30036
reference_id
reference_type
scores
url http://www.tinymce.com/forum/viewtopic.php?id=30036
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701667
reference_id 701667
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701667
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:2.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.1.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.1.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.1.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.1.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:2.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.1.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.1.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:2.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.1.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.1.7:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:2.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.1.8:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.1.9:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.2.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.2.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.2.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.2.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:2.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.2.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:2.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.2.5:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:2.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.2.6:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.3.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.3.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.3.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.3.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:2.4.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tinymce:spellchecker_php:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tinymce:spellchecker_php:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tinymce:spellchecker_php:2.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tinymce:spellchecker_php:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tinymce:spellchecker_php:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tinymce:spellchecker_php:2.0.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tinymce:spellchecker_php:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tinymce:spellchecker_php:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tinymce:spellchecker_php:2.0.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tinymce:spellchecker_php:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tinymce:spellchecker_php:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tinymce:spellchecker_php:2.0.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tinymce:spellchecker_php:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tinymce:spellchecker_php:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tinymce:spellchecker_php:2.0.6:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tinymce:spellchecker_php:2.0:a1:*:*:*:*:*:*
reference_id cpe:2.3:a:tinymce:spellchecker_php:2.0:a1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tinymce:spellchecker_php:2.0:a1:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tinymce:spellchecker_php:2.0:a2:*:*:*:*:*:*
reference_id cpe:2.3:a:tinymce:spellchecker_php:2.0:a2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tinymce:spellchecker_php:2.0:a2:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tinymce:spellchecker_php:2.0:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:tinymce:spellchecker_php:2.0:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tinymce:spellchecker_php:2.0:b1:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tinymce:spellchecker_php:2.0:b2:*:*:*:*:*:*
reference_id cpe:2.3:a:tinymce:spellchecker_php:2.0:b2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tinymce:spellchecker_php:2.0:b2:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tinymce:spellchecker_php:2.0:b3:*:*:*:*:*:*
reference_id cpe:2.3:a:tinymce:spellchecker_php:2.0:b3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tinymce:spellchecker_php:2.0:b3:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tinymce:spellchecker_php:2.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:tinymce:spellchecker_php:2.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tinymce:spellchecker_php:2.0:rc1:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-6112
reference_id CVE-2012-6112
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2012-6112
50
reference_url https://github.com/advisories/GHSA-fx5h-3786-h2w6
reference_id GHSA-fx5h-3786-h2w6
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fx5h-3786-h2w6
fixed_packages
0
url pkg:deb/debian/wordpress@3.5.1%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/wordpress@3.5.1%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.5.1%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2012-6112, GHSA-fx5h-3786-h2w6
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qjdf-s39r-5bdb
245
url VCID-qpsj-hsmm-6qa8
vulnerability_id VCID-qpsj-hsmm-6qa8
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6816
reference_id
reference_type
scores
0
value 0.02621
scoring_system epss
scoring_elements 0.8569
published_at 2026-04-18T12:55:00Z
1
value 0.02621
scoring_system epss
scoring_elements 0.85587
published_at 2026-04-01T12:55:00Z
2
value 0.02621
scoring_system epss
scoring_elements 0.856
published_at 2026-04-02T12:55:00Z
3
value 0.02621
scoring_system epss
scoring_elements 0.85618
published_at 2026-04-04T12:55:00Z
4
value 0.02621
scoring_system epss
scoring_elements 0.85624
published_at 2026-04-07T12:55:00Z
5
value 0.02621
scoring_system epss
scoring_elements 0.85644
published_at 2026-04-08T12:55:00Z
6
value 0.02621
scoring_system epss
scoring_elements 0.85655
published_at 2026-04-09T12:55:00Z
7
value 0.02621
scoring_system epss
scoring_elements 0.8567
published_at 2026-04-11T12:55:00Z
8
value 0.02621
scoring_system epss
scoring_elements 0.85666
published_at 2026-04-12T12:55:00Z
9
value 0.02621
scoring_system epss
scoring_elements 0.85662
published_at 2026-04-13T12:55:00Z
10
value 0.02621
scoring_system epss
scoring_elements 0.85685
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6816
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6814
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6815
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6816
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6817
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857026
reference_id 857026
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857026
6
reference_url https://security.archlinux.org/ASA-201703-14
reference_id ASA-201703-14
reference_type
scores
url https://security.archlinux.org/ASA-201703-14
7
reference_url https://security.archlinux.org/AVG-202
reference_id AVG-202
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-202
fixed_packages
0
url pkg:deb/debian/wordpress@4.7.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.7.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.7.3%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-6816
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qpsj-hsmm-6qa8
246
url VCID-qpzg-tnaj-3uab
vulnerability_id VCID-qpzg-tnaj-3uab
summary Cross-site scripting (XSS) vulnerability in wp-db-backup.php in WordPress 2.0.11 and earlier, and possibly 2.1.x through 2.3.x, allows remote attackers to inject arbitrary web script or HTML via the backup parameter in a wp-db-backup.php action to wp-admin/edit.php.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0193
reference_id
reference_type
scores
0
value 0.01859
scoring_system epss
scoring_elements 0.82974
published_at 2026-04-01T12:55:00Z
1
value 0.01859
scoring_system epss
scoring_elements 0.82991
published_at 2026-04-02T12:55:00Z
2
value 0.01859
scoring_system epss
scoring_elements 0.83004
published_at 2026-04-04T12:55:00Z
3
value 0.01859
scoring_system epss
scoring_elements 0.83001
published_at 2026-04-07T12:55:00Z
4
value 0.01859
scoring_system epss
scoring_elements 0.83026
published_at 2026-04-08T12:55:00Z
5
value 0.01859
scoring_system epss
scoring_elements 0.83033
published_at 2026-04-09T12:55:00Z
6
value 0.01859
scoring_system epss
scoring_elements 0.83049
published_at 2026-04-11T12:55:00Z
7
value 0.01859
scoring_system epss
scoring_elements 0.83042
published_at 2026-04-12T12:55:00Z
8
value 0.01859
scoring_system epss
scoring_elements 0.83038
published_at 2026-04-13T12:55:00Z
9
value 0.01859
scoring_system epss
scoring_elements 0.83076
published_at 2026-04-18T12:55:00Z
10
value 0.01859
scoring_system epss
scoring_elements 0.83079
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0193
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0193
2
reference_url https://www.securityfocus.com/bid/27123/info
reference_id CVE-2008-0192;OSVDB-40224
reference_type exploit
scores
url https://www.securityfocus.com/bid/27123/info
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/30979.txt
reference_id CVE-2008-0193;OSVDB-43408
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/30979.txt
fixed_packages
0
url pkg:deb/debian/wordpress@2.1.0-1?distro=trixie
purl pkg:deb/debian/wordpress@2.1.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.1.0-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2008-0193
risk_score null
exploitability 2.0
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qpzg-tnaj-3uab
247
url VCID-qu9h-p3s6-8bd2
vulnerability_id VCID-qu9h-p3s6-8bd2
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17093
reference_id
reference_type
scores
0
value 0.06276
scoring_system epss
scoring_elements 0.9095
published_at 2026-04-21T12:55:00Z
1
value 0.06276
scoring_system epss
scoring_elements 0.90952
published_at 2026-04-16T12:55:00Z
2
value 0.06276
scoring_system epss
scoring_elements 0.90877
published_at 2026-04-01T12:55:00Z
3
value 0.06276
scoring_system epss
scoring_elements 0.90882
published_at 2026-04-02T12:55:00Z
4
value 0.06276
scoring_system epss
scoring_elements 0.90892
published_at 2026-04-04T12:55:00Z
5
value 0.06276
scoring_system epss
scoring_elements 0.90901
published_at 2026-04-07T12:55:00Z
6
value 0.06276
scoring_system epss
scoring_elements 0.90913
published_at 2026-04-08T12:55:00Z
7
value 0.06276
scoring_system epss
scoring_elements 0.9092
published_at 2026-04-09T12:55:00Z
8
value 0.06276
scoring_system epss
scoring_elements 0.90928
published_at 2026-04-11T12:55:00Z
9
value 0.06276
scoring_system epss
scoring_elements 0.90929
published_at 2026-04-12T12:55:00Z
10
value 0.06276
scoring_system epss
scoring_elements 0.90927
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17093
1
reference_url https://codex.wordpress.org/Version_4.9.1
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.9.1
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16510
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17091
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17093
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17094
7
reference_url https://github.com/WordPress/WordPress/commit/3713ac5ebc90fb2011e98dfd691420f43da6c09a
reference_id
reference_type
scores
url https://github.com/WordPress/WordPress/commit/3713ac5ebc90fb2011e98dfd691420f43da6c09a
8
reference_url https://lists.debian.org/debian-lts-announce/2017/12/msg00019.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/12/msg00019.html
9
reference_url https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
10
reference_url https://wpvulndb.com/vulnerabilities/8968
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8968
11
reference_url https://www.debian.org/security/2018/dsa-4090
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4090
12
reference_url http://www.securityfocus.com/bid/102024
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102024
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883314
reference_id 883314
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883314
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17093
reference_id CVE-2017-17093
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
1
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-17093
fixed_packages
0
url pkg:deb/debian/wordpress@4.9.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.9.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.9.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-17093
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qu9h-p3s6-8bd2
248
url VCID-qwg1-c8b8-23gc
vulnerability_id VCID-qwg1-c8b8-23gc
summary SQL injection vulnerability in log.header.php in WordPress 0.7 and earlier allows remote attackers to execute arbitrary SQL commands via the posts variable.
references
0
reference_url http://osvdb.org/show/osvdb/4610
reference_id
reference_type
scores
url http://osvdb.org/show/osvdb/4610
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-1598
reference_id
reference_type
scores
0
value 0.01082
scoring_system epss
scoring_elements 0.77889
published_at 2026-04-21T12:55:00Z
1
value 0.01082
scoring_system epss
scoring_elements 0.778
published_at 2026-04-01T12:55:00Z
2
value 0.01082
scoring_system epss
scoring_elements 0.77807
published_at 2026-04-02T12:55:00Z
3
value 0.01082
scoring_system epss
scoring_elements 0.77834
published_at 2026-04-04T12:55:00Z
4
value 0.01082
scoring_system epss
scoring_elements 0.77817
published_at 2026-04-07T12:55:00Z
5
value 0.01082
scoring_system epss
scoring_elements 0.77845
published_at 2026-04-08T12:55:00Z
6
value 0.01082
scoring_system epss
scoring_elements 0.7785
published_at 2026-04-09T12:55:00Z
7
value 0.01082
scoring_system epss
scoring_elements 0.77876
published_at 2026-04-11T12:55:00Z
8
value 0.01082
scoring_system epss
scoring_elements 0.7786
published_at 2026-04-13T12:55:00Z
9
value 0.01082
scoring_system epss
scoring_elements 0.77897
published_at 2026-04-16T12:55:00Z
10
value 0.01082
scoring_system epss
scoring_elements 0.77895
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-1598
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1598
3
reference_url http://seclists.org/oss-sec/2012/q1/77
reference_id
reference_type
scores
url http://seclists.org/oss-sec/2012/q1/77
4
reference_url http://secunia.com/advisories/8954/
reference_id
reference_type
scores
url http://secunia.com/advisories/8954/
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/12204
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/12204
6
reference_url http://www.kernelpanik.org/docs/kernelpanik/wordpressadv.txt
reference_id
reference_type
scores
url http://www.kernelpanik.org/docs/kernelpanik/wordpressadv.txt
7
reference_url http://www.securityfocus.com/bid/7784
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/7784
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2003-1598
reference_id CVE-2003-1598
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2003-1598
fixed_packages
0
url pkg:deb/debian/wordpress@1.0.1-1?distro=trixie
purl pkg:deb/debian/wordpress@1.0.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@1.0.1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2003-1598
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qwg1-c8b8-23gc
249
url VCID-qwk7-gv3y-97ck
vulnerability_id VCID-qwk7-gv3y-97ck
summary several
references
0
reference_url http://codex.wordpress.org/Version_3.5.2
reference_id
reference_type
scores
url http://codex.wordpress.org/Version_3.5.2
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2202
reference_id
reference_type
scores
0
value 0.01357
scoring_system epss
scoring_elements 0.80169
published_at 2026-04-21T12:55:00Z
1
value 0.01357
scoring_system epss
scoring_elements 0.8009
published_at 2026-04-01T12:55:00Z
2
value 0.01357
scoring_system epss
scoring_elements 0.80097
published_at 2026-04-02T12:55:00Z
3
value 0.01357
scoring_system epss
scoring_elements 0.80117
published_at 2026-04-04T12:55:00Z
4
value 0.01357
scoring_system epss
scoring_elements 0.80105
published_at 2026-04-07T12:55:00Z
5
value 0.01357
scoring_system epss
scoring_elements 0.80134
published_at 2026-04-08T12:55:00Z
6
value 0.01357
scoring_system epss
scoring_elements 0.8014
published_at 2026-04-09T12:55:00Z
7
value 0.01357
scoring_system epss
scoring_elements 0.80159
published_at 2026-04-11T12:55:00Z
8
value 0.01357
scoring_system epss
scoring_elements 0.80144
published_at 2026-04-12T12:55:00Z
9
value 0.01357
scoring_system epss
scoring_elements 0.80135
published_at 2026-04-13T12:55:00Z
10
value 0.01357
scoring_system epss
scoring_elements 0.80165
published_at 2026-04-16T12:55:00Z
11
value 0.01357
scoring_system epss
scoring_elements 0.80166
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2202
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=976784
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=976784
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2173
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2173
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2199
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2200
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2201
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2202
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2203
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2204
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2205
11
reference_url http://wordpress.org/news/2013/06/wordpress-3-5-2/
reference_id
reference_type
scores
url http://wordpress.org/news/2013/06/wordpress-3-5-2/
12
reference_url http://www.debian.org/security/2013/dsa-2718
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2718
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=713947
reference_id 713947
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=713947
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2202
reference_id CVE-2013-2202
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-2202
fixed_packages
0
url pkg:deb/debian/wordpress@3.5.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.5.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.5.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2013-2202
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qwk7-gv3y-97ck
250
url VCID-r4qy-1wa6-t7gh
vulnerability_id VCID-r4qy-1wa6-t7gh
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17672
reference_id
reference_type
scores
0
value 0.05346
scoring_system epss
scoring_elements 0.90085
published_at 2026-04-21T12:55:00Z
1
value 0.05346
scoring_system epss
scoring_elements 0.90087
published_at 2026-04-18T12:55:00Z
2
value 0.05346
scoring_system epss
scoring_elements 0.90029
published_at 2026-04-01T12:55:00Z
3
value 0.05346
scoring_system epss
scoring_elements 0.90032
published_at 2026-04-02T12:55:00Z
4
value 0.05346
scoring_system epss
scoring_elements 0.90043
published_at 2026-04-04T12:55:00Z
5
value 0.05346
scoring_system epss
scoring_elements 0.90048
published_at 2026-04-07T12:55:00Z
6
value 0.05346
scoring_system epss
scoring_elements 0.90064
published_at 2026-04-08T12:55:00Z
7
value 0.05346
scoring_system epss
scoring_elements 0.90069
published_at 2026-04-09T12:55:00Z
8
value 0.05346
scoring_system epss
scoring_elements 0.90078
published_at 2026-04-11T12:55:00Z
9
value 0.05346
scoring_system epss
scoring_elements 0.90076
published_at 2026-04-12T12:55:00Z
10
value 0.05346
scoring_system epss
scoring_elements 0.9007
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17672
1
reference_url https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html
reference_id
reference_type
scores
url https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16217
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16218
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16219
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16221
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16223
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
20
reference_url https://seclists.org/bugtraq/2020/Jan/8
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2020/Jan/8
21
reference_url https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/
22
reference_url https://wpvulndb.com/vulnerabilities/9910
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/9910
23
reference_url https://www.debian.org/security/2020/dsa-4599
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4599
24
reference_url https://www.debian.org/security/2020/dsa-4677
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4677
25
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942459
reference_id 942459
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942459
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-17672
reference_id CVE-2019-17672
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-17672
fixed_packages
0
url pkg:deb/debian/wordpress@5.2.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.2.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.2.4%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2019-17672
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r4qy-1wa6-t7gh
251
url VCID-r5u7-bft7-6bd3
vulnerability_id VCID-r5u7-bft7-6bd3
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8295
reference_id
reference_type
scores
0
value 0.77097
scoring_system epss
scoring_elements 0.9897
published_at 2026-04-21T12:55:00Z
1
value 0.77097
scoring_system epss
scoring_elements 0.98969
published_at 2026-04-18T12:55:00Z
2
value 0.77097
scoring_system epss
scoring_elements 0.98957
published_at 2026-04-01T12:55:00Z
3
value 0.77097
scoring_system epss
scoring_elements 0.98959
published_at 2026-04-02T12:55:00Z
4
value 0.77097
scoring_system epss
scoring_elements 0.98961
published_at 2026-04-04T12:55:00Z
5
value 0.77097
scoring_system epss
scoring_elements 0.98963
published_at 2026-04-07T12:55:00Z
6
value 0.77097
scoring_system epss
scoring_elements 0.98965
published_at 2026-04-09T12:55:00Z
7
value 0.77097
scoring_system epss
scoring_elements 0.98966
published_at 2026-04-11T12:55:00Z
8
value 0.77097
scoring_system epss
scoring_elements 0.98967
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8295
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8295
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9061
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9062
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9062
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9063
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9064
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9065
7
reference_url https://wpvulndb.com/vulnerabilities/8807
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8807
8
reference_url https://www.exploit-db.com/exploits/41963/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/41963/
9
reference_url http://www.debian.org/security/2017/dsa-3870
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3870
10
reference_url http://www.securityfocus.com/bid/98295
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/98295
11
reference_url http://www.securitytracker.com/id/1038403
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038403
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862053
reference_id 862053
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862053
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
14
reference_url https://exploitbox.io/vuln/WordPress-Exploit-4-7-Unauth-Password-Reset-0day-CVE-2017-8295.html
reference_id CVE-2017-8295
reference_type exploit
scores
url https://exploitbox.io/vuln/WordPress-Exploit-4-7-Unauth-Password-Reset-0day-CVE-2017-8295.html
15
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/webapps/41963.txt
reference_id CVE-2017-8295
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/webapps/41963.txt
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-8295
reference_id CVE-2017-8295
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-8295
fixed_packages
0
url pkg:deb/debian/wordpress@4.7.5%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/wordpress@4.7.5%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.7.5%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-8295
risk_score 10.0
exploitability 2.0
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r5u7-bft7-6bd3
252
url VCID-rcvm-b2u5-43dc
vulnerability_id VCID-rcvm-b2u5-43dc
summary Cross-site request forgery (CSRF) vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 allows remote attackers to hijack the authentication of subscribers for /dev/random read operations by leveraging a late call to the check_ajax_referer function, a related issue to CVE-2016-6896.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6897
reference_id
reference_type
scores
0
value 0.30259
scoring_system epss
scoring_elements 0.96649
published_at 2026-04-01T12:55:00Z
1
value 0.30259
scoring_system epss
scoring_elements 0.96658
published_at 2026-04-02T12:55:00Z
2
value 0.30259
scoring_system epss
scoring_elements 0.96664
published_at 2026-04-04T12:55:00Z
3
value 0.30259
scoring_system epss
scoring_elements 0.96668
published_at 2026-04-07T12:55:00Z
4
value 0.30259
scoring_system epss
scoring_elements 0.96675
published_at 2026-04-08T12:55:00Z
5
value 0.30259
scoring_system epss
scoring_elements 0.96677
published_at 2026-04-09T12:55:00Z
6
value 0.30259
scoring_system epss
scoring_elements 0.96679
published_at 2026-04-11T12:55:00Z
7
value 0.30259
scoring_system epss
scoring_elements 0.9668
published_at 2026-04-12T12:55:00Z
8
value 0.30259
scoring_system epss
scoring_elements 0.96682
published_at 2026-04-13T12:55:00Z
9
value 0.30259
scoring_system epss
scoring_elements 0.96689
published_at 2026-04-16T12:55:00Z
10
value 0.30259
scoring_system epss
scoring_elements 0.96693
published_at 2026-04-18T12:55:00Z
11
value 0.30259
scoring_system epss
scoring_elements 0.96697
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6897
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6897
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6897
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837090
reference_id 837090
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837090
fixed_packages
0
url pkg:deb/debian/wordpress@4.6.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.6.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.6.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2016-6897
risk_score 0.6
exploitability 2.0
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rcvm-b2u5-43dc
253
url VCID-re92-3yew-1bft
vulnerability_id VCID-re92-3yew-1bft
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0493.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0493.html
1
reference_url http://openwall.com/lists/oss-security/2014/11/25/12
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2014/11/25/12
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9037
reference_id
reference_type
scores
0
value 0.02617
scoring_system epss
scoring_elements 0.85676
published_at 2026-04-21T12:55:00Z
1
value 0.02617
scoring_system epss
scoring_elements 0.85579
published_at 2026-04-01T12:55:00Z
2
value 0.02617
scoring_system epss
scoring_elements 0.8559
published_at 2026-04-02T12:55:00Z
3
value 0.02617
scoring_system epss
scoring_elements 0.85608
published_at 2026-04-04T12:55:00Z
4
value 0.02617
scoring_system epss
scoring_elements 0.85614
published_at 2026-04-07T12:55:00Z
5
value 0.02617
scoring_system epss
scoring_elements 0.85634
published_at 2026-04-08T12:55:00Z
6
value 0.02617
scoring_system epss
scoring_elements 0.85645
published_at 2026-04-09T12:55:00Z
7
value 0.02617
scoring_system epss
scoring_elements 0.8566
published_at 2026-04-11T12:55:00Z
8
value 0.02617
scoring_system epss
scoring_elements 0.85656
published_at 2026-04-12T12:55:00Z
9
value 0.02617
scoring_system epss
scoring_elements 0.85652
published_at 2026-04-13T12:55:00Z
10
value 0.02617
scoring_system epss
scoring_elements 0.85675
published_at 2026-04-16T12:55:00Z
11
value 0.02617
scoring_system epss
scoring_elements 0.8568
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9037
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039
11
reference_url https://wordpress.org/news/2014/11/wordpress-4-0-1/
reference_id
reference_type
scores
url https://wordpress.org/news/2014/11/wordpress-4-0-1/
12
reference_url http://www.debian.org/security/2014/dsa-3085
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3085
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:233
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:233
14
reference_url http://www.securitytracker.com/id/1031243
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031243
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425
reference_id 770425
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9037
reference_id CVE-2014-9037
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-9037
fixed_packages
0
url pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.0.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2014-9037
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-re92-3yew-1bft
254
url VCID-ruuu-vphs-5qap
vulnerability_id VCID-ruuu-vphs-5qap
summary security update
references
0
reference_url http://openwall.com/lists/oss-security/2014/08/13/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2014/08/13/3
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5240
reference_id
reference_type
scores
0
value 0.00634
scoring_system epss
scoring_elements 0.70399
published_at 2026-04-21T12:55:00Z
1
value 0.00634
scoring_system epss
scoring_elements 0.70304
published_at 2026-04-01T12:55:00Z
2
value 0.00634
scoring_system epss
scoring_elements 0.70317
published_at 2026-04-02T12:55:00Z
3
value 0.00634
scoring_system epss
scoring_elements 0.70334
published_at 2026-04-04T12:55:00Z
4
value 0.00634
scoring_system epss
scoring_elements 0.70312
published_at 2026-04-07T12:55:00Z
5
value 0.00634
scoring_system epss
scoring_elements 0.70357
published_at 2026-04-08T12:55:00Z
6
value 0.00634
scoring_system epss
scoring_elements 0.70371
published_at 2026-04-09T12:55:00Z
7
value 0.00634
scoring_system epss
scoring_elements 0.70395
published_at 2026-04-11T12:55:00Z
8
value 0.00634
scoring_system epss
scoring_elements 0.7038
published_at 2026-04-12T12:55:00Z
9
value 0.00634
scoring_system epss
scoring_elements 0.70366
published_at 2026-04-13T12:55:00Z
10
value 0.00634
scoring_system epss
scoring_elements 0.70409
published_at 2026-04-16T12:55:00Z
11
value 0.00634
scoring_system epss
scoring_elements 0.70418
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5240
2
reference_url https://core.trac.wordpress.org/changeset/29398
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/29398
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2053
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5204
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5205
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5240
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5265
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5266
9
reference_url https://wordpress.org/news/2014/08/wordpress-3-9-2/
reference_id
reference_type
scores
url https://wordpress.org/news/2014/08/wordpress-3-9-2/
10
reference_url http://www.debian.org/security/2014/dsa-3001
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3001
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757312
reference_id 757312
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757312
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.2:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2:beta1:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.6.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-5240
reference_id CVE-2014-5240
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-5240
fixed_packages
0
url pkg:deb/debian/wordpress@3.9.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.9.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.9.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2014-5240
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ruuu-vphs-5qap
255
url VCID-rz89-bchd-zqge
vulnerability_id VCID-rz89-bchd-zqge
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0493.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0493.html
1
reference_url http://core.trac.wordpress.org/changeset/30418
reference_id
reference_type
scores
url http://core.trac.wordpress.org/changeset/30418
2
reference_url http://openwall.com/lists/oss-security/2014/11/25/12
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2014/11/25/12
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9033
reference_id
reference_type
scores
0
value 0.00804
scoring_system epss
scoring_elements 0.74156
published_at 2026-04-21T12:55:00Z
1
value 0.00804
scoring_system epss
scoring_elements 0.7407
published_at 2026-04-01T12:55:00Z
2
value 0.00804
scoring_system epss
scoring_elements 0.74076
published_at 2026-04-02T12:55:00Z
3
value 0.00804
scoring_system epss
scoring_elements 0.74102
published_at 2026-04-04T12:55:00Z
4
value 0.00804
scoring_system epss
scoring_elements 0.74074
published_at 2026-04-07T12:55:00Z
5
value 0.00804
scoring_system epss
scoring_elements 0.74107
published_at 2026-04-08T12:55:00Z
6
value 0.00804
scoring_system epss
scoring_elements 0.74122
published_at 2026-04-09T12:55:00Z
7
value 0.00804
scoring_system epss
scoring_elements 0.74143
published_at 2026-04-11T12:55:00Z
8
value 0.00804
scoring_system epss
scoring_elements 0.74125
published_at 2026-04-12T12:55:00Z
9
value 0.00804
scoring_system epss
scoring_elements 0.74119
published_at 2026-04-13T12:55:00Z
10
value 0.00804
scoring_system epss
scoring_elements 0.74157
published_at 2026-04-16T12:55:00Z
11
value 0.00804
scoring_system epss
scoring_elements 0.74166
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9033
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039
12
reference_url https://wordpress.org/news/2014/11/wordpress-4-0-1/
reference_id
reference_type
scores
url https://wordpress.org/news/2014/11/wordpress-4-0-1/
13
reference_url http://www.debian.org/security/2014/dsa-3085
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3085
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:233
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:233
15
reference_url http://www.securitytracker.com/id/1031243
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031243
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425
reference_id 770425
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9033
reference_id CVE-2014-9033
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-9033
fixed_packages
0
url pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.0.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2014-9033
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rz89-bchd-zqge
256
url VCID-s677-mr1w-q3he
vulnerability_id VCID-s677-mr1w-q3he
summary WordPress 2.1.1, as downloaded from some official distribution sites during February and March 2007, contains an externally introduced backdoor that allows remote attackers to execute arbitrary commands via (1) an eval injection vulnerability in the ix parameter to wp-includes/feed.php, and (2) an untrusted passthru call in the iz parameter to wp-includes/theme.php.
references
0
reference_url http://ifsec.blogspot.com/2007/03/wordpress-code-compromised-to-enable.html
reference_id
reference_type
scores
url http://ifsec.blogspot.com/2007/03/wordpress-code-compromised-to-enable.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1277
reference_id
reference_type
scores
0
value 0.84865
scoring_system epss
scoring_elements 0.99349
published_at 2026-04-21T12:55:00Z
1
value 0.84865
scoring_system epss
scoring_elements 0.99338
published_at 2026-04-01T12:55:00Z
2
value 0.84865
scoring_system epss
scoring_elements 0.99339
published_at 2026-04-02T12:55:00Z
3
value 0.84865
scoring_system epss
scoring_elements 0.99341
published_at 2026-04-04T12:55:00Z
4
value 0.84865
scoring_system epss
scoring_elements 0.99342
published_at 2026-04-07T12:55:00Z
5
value 0.84865
scoring_system epss
scoring_elements 0.99344
published_at 2026-04-09T12:55:00Z
6
value 0.84865
scoring_system epss
scoring_elements 0.99345
published_at 2026-04-11T12:55:00Z
7
value 0.84865
scoring_system epss
scoring_elements 0.99346
published_at 2026-04-12T12:55:00Z
8
value 0.84865
scoring_system epss
scoring_elements 0.99347
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1277
2
reference_url http://secunia.com/advisories/24374
reference_id
reference_type
scores
url http://secunia.com/advisories/24374
3
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/32804
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/32804
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/32807
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/32807
5
reference_url http://wordpress.org/development/2007/03/upgrade-212/
reference_id
reference_type
scores
url http://wordpress.org/development/2007/03/upgrade-212/
6
reference_url http://www.kb.cert.org/vuls/id/214480
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/214480
7
reference_url http://www.kb.cert.org/vuls/id/641456
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/641456
8
reference_url http://www.securityfocus.com/archive/1/461794/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/461794/100/0/threaded
9
reference_url http://www.securityfocus.com/bid/22797
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/22797
10
reference_url http://www.vupen.com/english/advisories/2007/0812
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0812
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1277
reference_id CVE-2007-1277
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-1277
13
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/29701.txt
reference_id CVE-2007-1277;OSVDB-33908
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/29701.txt
14
reference_url https://www.securityfocus.com/bid/22797/info
reference_id CVE-2007-1277;OSVDB-33908
reference_type exploit
scores
url https://www.securityfocus.com/bid/22797/info
15
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/29702.txt
reference_id CVE-2007-1277;OSVDB-33909
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/29702.txt
fixed_packages
0
url pkg:deb/debian/wordpress@0?distro=trixie
purl pkg:deb/debian/wordpress@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@0%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-1277
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s677-mr1w-q3he
257
url VCID-sany-su2d-73cn
vulnerability_id VCID-sany-su2d-73cn
summary wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5487
reference_id
reference_type
scores
0
value 0.92497
scoring_system epss
scoring_elements 0.99732
published_at 2026-04-02T12:55:00Z
1
value 0.92497
scoring_system epss
scoring_elements 0.99734
published_at 2026-04-13T12:55:00Z
2
value 0.92497
scoring_system epss
scoring_elements 0.99735
published_at 2026-04-16T12:55:00Z
3
value 0.92497
scoring_system epss
scoring_elements 0.99736
published_at 2026-04-18T12:55:00Z
4
value 0.92497
scoring_system epss
scoring_elements 0.99737
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5487
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5487
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851310
reference_id 851310
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851310
3
reference_url https://security.archlinux.org/ASA-201701-22
reference_id ASA-201701-22
reference_type
scores
url https://security.archlinux.org/ASA-201701-22
4
reference_url https://security.archlinux.org/AVG-142
reference_id AVG-142
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-142
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/41497.php
reference_id CVE-2017-5487
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/41497.php
fixed_packages
0
url pkg:deb/debian/wordpress@4.7.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.7.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.7.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-5487
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sany-su2d-73cn
258
url VCID-sh9a-167m-57cw
vulnerability_id VCID-sh9a-167m-57cw
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5622
reference_id
reference_type
scores
0
value 0.00968
scoring_system epss
scoring_elements 0.76539
published_at 2026-04-01T12:55:00Z
1
value 0.00968
scoring_system epss
scoring_elements 0.76544
published_at 2026-04-02T12:55:00Z
2
value 0.00968
scoring_system epss
scoring_elements 0.76573
published_at 2026-04-04T12:55:00Z
3
value 0.00968
scoring_system epss
scoring_elements 0.76553
published_at 2026-04-07T12:55:00Z
4
value 0.00968
scoring_system epss
scoring_elements 0.76585
published_at 2026-04-08T12:55:00Z
5
value 0.00968
scoring_system epss
scoring_elements 0.76597
published_at 2026-04-09T12:55:00Z
6
value 0.00968
scoring_system epss
scoring_elements 0.76623
published_at 2026-04-11T12:55:00Z
7
value 0.00968
scoring_system epss
scoring_elements 0.76603
published_at 2026-04-12T12:55:00Z
8
value 0.00968
scoring_system epss
scoring_elements 0.76593
published_at 2026-04-13T12:55:00Z
9
value 0.00968
scoring_system epss
scoring_elements 0.76635
published_at 2026-04-16T12:55:00Z
10
value 0.00968
scoring_system epss
scoring_elements 0.76638
published_at 2026-04-18T12:55:00Z
11
value 0.00968
scoring_system epss
scoring_elements 0.76627
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5622
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2213
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5622
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5714
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5715
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5730
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5731
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5732
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5734
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7989
fixed_packages
0
url pkg:deb/debian/wordpress@4.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.2.3%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2015-5622
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sh9a-167m-57cw
259
url VCID-sj2p-hvgn-nbhe
vulnerability_id VCID-sj2p-hvgn-nbhe
summary wordpress: Malicious File Execution Vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2392.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2392.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2392
reference_id
reference_type
scores
0
value 0.01929
scoring_system epss
scoring_elements 0.83316
published_at 2026-04-01T12:55:00Z
1
value 0.01929
scoring_system epss
scoring_elements 0.83331
published_at 2026-04-02T12:55:00Z
2
value 0.01929
scoring_system epss
scoring_elements 0.83346
published_at 2026-04-07T12:55:00Z
3
value 0.01929
scoring_system epss
scoring_elements 0.8337
published_at 2026-04-08T12:55:00Z
4
value 0.01929
scoring_system epss
scoring_elements 0.83379
published_at 2026-04-09T12:55:00Z
5
value 0.01929
scoring_system epss
scoring_elements 0.83394
published_at 2026-04-11T12:55:00Z
6
value 0.01929
scoring_system epss
scoring_elements 0.83388
published_at 2026-04-12T12:55:00Z
7
value 0.01929
scoring_system epss
scoring_elements 0.83384
published_at 2026-04-13T12:55:00Z
8
value 0.01929
scoring_system epss
scoring_elements 0.8342
published_at 2026-04-16T12:55:00Z
9
value 0.01929
scoring_system epss
scoring_elements 0.83421
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2392
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2392
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=447888
reference_id 447888
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=447888
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485807
reference_id 485807
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485807
fixed_packages
0
url pkg:deb/debian/wordpress@2.5.1-4?distro=trixie
purl pkg:deb/debian/wordpress@2.5.1-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.5.1-4%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2008-2392
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sj2p-hvgn-nbhe
260
url VCID-sjz4-5jm5-nfdy
vulnerability_id VCID-sjz4-5jm5-nfdy
summary
Wordpress contains several cross-site scripting, cross-site request forgery
    and information leak vulnerabilities.
references
0
reference_url http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0583.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0583.html
1
reference_url http://osvdb.org/33787
reference_id
reference_type
scores
url http://osvdb.org/33787
2
reference_url http://osvdb.org/33788
reference_id
reference_type
scores
url http://osvdb.org/33788
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1244
reference_id
reference_type
scores
0
value 0.07986
scoring_system epss
scoring_elements 0.92093
published_at 2026-04-21T12:55:00Z
1
value 0.07986
scoring_system epss
scoring_elements 0.92053
published_at 2026-04-01T12:55:00Z
2
value 0.07986
scoring_system epss
scoring_elements 0.92059
published_at 2026-04-02T12:55:00Z
3
value 0.07986
scoring_system epss
scoring_elements 0.92067
published_at 2026-04-04T12:55:00Z
4
value 0.07986
scoring_system epss
scoring_elements 0.92071
published_at 2026-04-07T12:55:00Z
5
value 0.07986
scoring_system epss
scoring_elements 0.92083
published_at 2026-04-08T12:55:00Z
6
value 0.07986
scoring_system epss
scoring_elements 0.92086
published_at 2026-04-13T12:55:00Z
7
value 0.07986
scoring_system epss
scoring_elements 0.9209
published_at 2026-04-12T12:55:00Z
8
value 0.07986
scoring_system epss
scoring_elements 0.92097
published_at 2026-04-16T12:55:00Z
9
value 0.07986
scoring_system epss
scoring_elements 0.92095
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1244
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1244
5
reference_url http://secunia.com/advisories/24566
reference_id
reference_type
scores
url http://secunia.com/advisories/24566
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/32703
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/32703
7
reference_url http://www.gentoo.org/security/en/glsa/glsa-200703-23.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200703-23.xml
8
reference_url http://www.securityfocus.com/archive/1/461351/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/461351/100/0/threaded
9
reference_url http://www.securityfocus.com/bid/22735
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/22735
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1244
reference_id CVE-2007-1244
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-1244
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/29682.txt
reference_id CVE-2007-1244;OSVDB-33788
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/29682.txt
13
reference_url https://www.securityfocus.com/bid/22735/info
reference_id CVE-2007-1244;OSVDB-33788
reference_type exploit
scores
url https://www.securityfocus.com/bid/22735/info
14
reference_url https://security.gentoo.org/glsa/200703-23
reference_id GLSA-200703-23
reference_type
scores
url https://security.gentoo.org/glsa/200703-23
fixed_packages
0
url pkg:deb/debian/wordpress@2.1.2-1?distro=trixie
purl pkg:deb/debian/wordpress@2.1.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.1.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-1244
risk_score 10.0
exploitability 2.0
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sjz4-5jm5-nfdy
261
url VCID-snd3-cbgy-ybb2
vulnerability_id VCID-snd3-cbgy-ybb2
summary SQL injection vulnerability in wp-admin/admin-ajax.php in WordPress before 2.2 allows remote attackers to execute arbitrary SQL commands via the cookie parameter.
references
0
reference_url http://osvdb.org/36311
reference_id
reference_type
scores
url http://osvdb.org/36311
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2821
reference_id
reference_type
scores
0
value 0.05685
scoring_system epss
scoring_elements 0.90412
published_at 2026-04-21T12:55:00Z
1
value 0.05685
scoring_system epss
scoring_elements 0.90358
published_at 2026-04-01T12:55:00Z
2
value 0.05685
scoring_system epss
scoring_elements 0.90361
published_at 2026-04-02T12:55:00Z
3
value 0.05685
scoring_system epss
scoring_elements 0.90373
published_at 2026-04-04T12:55:00Z
4
value 0.05685
scoring_system epss
scoring_elements 0.90377
published_at 2026-04-07T12:55:00Z
5
value 0.05685
scoring_system epss
scoring_elements 0.90391
published_at 2026-04-08T12:55:00Z
6
value 0.05685
scoring_system epss
scoring_elements 0.90398
published_at 2026-04-13T12:55:00Z
7
value 0.05685
scoring_system epss
scoring_elements 0.90405
published_at 2026-04-12T12:55:00Z
8
value 0.05685
scoring_system epss
scoring_elements 0.90414
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2821
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2821
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2821
3
reference_url http://secunia.com/advisories/25345
reference_id
reference_type
scores
url http://secunia.com/advisories/25345
4
reference_url http://secunia.com/advisories/29014
reference_id
reference_type
scores
url http://secunia.com/advisories/29014
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/34399
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/34399
6
reference_url http://www.debian.org/security/2008/dsa-1502
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1502
7
reference_url http://www.exploit-db.com/exploits/3960
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/3960
8
reference_url http://www.securityfocus.com/archive/1/469258/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/469258/100/0/threaded
9
reference_url http://www.securityfocus.com/bid/24076
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24076
10
reference_url http://www.vupen.com/english/advisories/2007/1889
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1889
11
reference_url http://www.waraxe.us/advisory-50.html
reference_id
reference_type
scores
url http://www.waraxe.us/advisory-50.html
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2821
reference_id CVE-2007-2821
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-2821
14
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/3960.php
reference_id OSVDB-36311;CVE-2007-2821
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/3960.php
fixed_packages
0
url pkg:deb/debian/wordpress@2.2-1?distro=trixie
purl pkg:deb/debian/wordpress@2.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-2821
risk_score 10.0
exploitability 2.0
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-snd3-cbgy-ybb2
262
url VCID-srjh-2qnk-e7c6
vulnerability_id VCID-srjh-2qnk-e7c6
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6817
reference_id
reference_type
scores
0
value 0.06131
scoring_system epss
scoring_elements 0.90825
published_at 2026-04-21T12:55:00Z
1
value 0.06131
scoring_system epss
scoring_elements 0.90757
published_at 2026-04-01T12:55:00Z
2
value 0.06131
scoring_system epss
scoring_elements 0.90763
published_at 2026-04-02T12:55:00Z
3
value 0.06131
scoring_system epss
scoring_elements 0.90774
published_at 2026-04-04T12:55:00Z
4
value 0.06131
scoring_system epss
scoring_elements 0.90784
published_at 2026-04-07T12:55:00Z
5
value 0.06131
scoring_system epss
scoring_elements 0.90795
published_at 2026-04-08T12:55:00Z
6
value 0.06131
scoring_system epss
scoring_elements 0.90802
published_at 2026-04-09T12:55:00Z
7
value 0.06131
scoring_system epss
scoring_elements 0.9081
published_at 2026-04-12T12:55:00Z
8
value 0.06131
scoring_system epss
scoring_elements 0.90808
published_at 2026-04-13T12:55:00Z
9
value 0.06131
scoring_system epss
scoring_elements 0.90828
published_at 2026-04-16T12:55:00Z
10
value 0.06131
scoring_system epss
scoring_elements 0.90826
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6817
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6814
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6815
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6816
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6817
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857026
reference_id 857026
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857026
6
reference_url https://security.archlinux.org/ASA-201703-14
reference_id ASA-201703-14
reference_type
scores
url https://security.archlinux.org/ASA-201703-14
7
reference_url https://security.archlinux.org/AVG-202
reference_id AVG-202
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-202
fixed_packages
0
url pkg:deb/debian/wordpress@4.7.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.7.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.7.3%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-6817
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-srjh-2qnk-e7c6
263
url VCID-sszr-mn9y-kkhg
vulnerability_id VCID-sszr-mn9y-kkhg
summary WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4973
reference_id
reference_type
scores
0
value 0.01268
scoring_system epss
scoring_elements 0.79503
published_at 2026-04-21T12:55:00Z
1
value 0.01268
scoring_system epss
scoring_elements 0.79466
published_at 2026-04-08T12:55:00Z
2
value 0.01268
scoring_system epss
scoring_elements 0.79476
published_at 2026-04-09T12:55:00Z
3
value 0.01268
scoring_system epss
scoring_elements 0.79498
published_at 2026-04-11T12:55:00Z
4
value 0.01268
scoring_system epss
scoring_elements 0.79481
published_at 2026-04-12T12:55:00Z
5
value 0.01268
scoring_system epss
scoring_elements 0.79471
published_at 2026-04-13T12:55:00Z
6
value 0.01268
scoring_system epss
scoring_elements 0.79501
published_at 2026-04-16T12:55:00Z
7
value 0.01268
scoring_system epss
scoring_elements 0.79499
published_at 2026-04-18T12:55:00Z
8
value 0.01268
scoring_system epss
scoring_elements 0.79428
published_at 2026-04-02T12:55:00Z
9
value 0.01268
scoring_system epss
scoring_elements 0.79451
published_at 2026-04-04T12:55:00Z
10
value 0.01268
scoring_system epss
scoring_elements 0.79437
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4973
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4973
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018863
reference_id 1018863
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018863
3
reference_url https://core.trac.wordpress.org/changeset/53961
reference_id 53961
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-16T12:59:16Z/
url https://core.trac.wordpress.org/changeset/53961
4
reference_url https://www.wordfence.com/threat-intel/vulnerabilities/id/b5582e89-83e6-4898-b9fe-09eddeb5f7ae?source=cve
reference_id b5582e89-83e6-4898-b9fe-09eddeb5f7ae?source=cve
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-16T12:59:16Z/
url https://www.wordfence.com/threat-intel/vulnerabilities/id/b5582e89-83e6-4898-b9fe-09eddeb5f7ae?source=cve
5
reference_url https://wordpress.org/news/2022/08/wordpress-6-0-2-security-and-maintenance-release/
reference_id wordpress-6-0-2-security-and-maintenance-release
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-16T12:59:16Z/
url https://wordpress.org/news/2022/08/wordpress-6-0-2-security-and-maintenance-release/
6
reference_url https://www.wordfence.com/blog/2022/08/wordpress-core-6-0-2-security-maintenance-release-what-you-need-to-know/
reference_id wordpress-core-6-0-2-security-maintenance-release-what-you-need-to-know
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-16T12:59:16Z/
url https://www.wordfence.com/blog/2022/08/wordpress-core-6-0-2-security-maintenance-release-what-you-need-to-know/
fixed_packages
0
url pkg:deb/debian/wordpress@5.7.8%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.8%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.8%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.0.2%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.0.2%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.0.2%252Bdfsg1-1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2022-4973
risk_score 1.7
exploitability 0.5
weighted_severity 3.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sszr-mn9y-kkhg
264
url VCID-swnk-8ave-bff2
vulnerability_id VCID-swnk-8ave-bff2
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20148
reference_id
reference_type
scores
0
value 0.54862
scoring_system epss
scoring_elements 0.98027
published_at 2026-04-01T12:55:00Z
1
value 0.54862
scoring_system epss
scoring_elements 0.98032
published_at 2026-04-02T12:55:00Z
2
value 0.54862
scoring_system epss
scoring_elements 0.98034
published_at 2026-04-04T12:55:00Z
3
value 0.54862
scoring_system epss
scoring_elements 0.98036
published_at 2026-04-07T12:55:00Z
4
value 0.54862
scoring_system epss
scoring_elements 0.9804
published_at 2026-04-08T12:55:00Z
5
value 0.54862
scoring_system epss
scoring_elements 0.98041
published_at 2026-04-09T12:55:00Z
6
value 0.54862
scoring_system epss
scoring_elements 0.98046
published_at 2026-04-12T12:55:00Z
7
value 0.54862
scoring_system epss
scoring_elements 0.98047
published_at 2026-04-13T12:55:00Z
8
value 0.54862
scoring_system epss
scoring_elements 0.98053
published_at 2026-04-18T12:55:00Z
9
value 0.54862
scoring_system epss
scoring_elements 0.9805
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20148
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20148
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20149
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20150
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20151
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20152
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20153
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8942
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916403
reference_id 916403
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916403
fixed_packages
0
url pkg:deb/debian/wordpress@5.0.1%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.0.1%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.0.1%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2018-20148
risk_score 0.2
exploitability 0.5
weighted_severity 0.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-swnk-8ave-bff2
265
url VCID-sz3u-x51u-r3dn
vulnerability_id VCID-sz3u-x51u-r3dn
summary Cross-site scripting (XSS) vulnerability in index.php in the WordPress Classic 1.5 theme in WordPress before 2.1.3 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO (PHP_SELF).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4483
reference_id
reference_type
scores
0
value 0.00459
scoring_system epss
scoring_elements 0.63958
published_at 2026-04-01T12:55:00Z
1
value 0.00459
scoring_system epss
scoring_elements 0.64016
published_at 2026-04-02T12:55:00Z
2
value 0.00459
scoring_system epss
scoring_elements 0.64043
published_at 2026-04-04T12:55:00Z
3
value 0.00459
scoring_system epss
scoring_elements 0.64003
published_at 2026-04-07T12:55:00Z
4
value 0.00459
scoring_system epss
scoring_elements 0.64054
published_at 2026-04-08T12:55:00Z
5
value 0.00459
scoring_system epss
scoring_elements 0.64071
published_at 2026-04-09T12:55:00Z
6
value 0.00503
scoring_system epss
scoring_elements 0.6614
published_at 2026-04-11T12:55:00Z
7
value 0.00503
scoring_system epss
scoring_elements 0.66128
published_at 2026-04-12T12:55:00Z
8
value 0.00503
scoring_system epss
scoring_elements 0.66098
published_at 2026-04-13T12:55:00Z
9
value 0.00503
scoring_system epss
scoring_elements 0.66133
published_at 2026-04-16T12:55:00Z
10
value 0.00503
scoring_system epss
scoring_elements 0.66147
published_at 2026-04-18T12:55:00Z
11
value 0.00503
scoring_system epss
scoring_elements 0.66135
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4483
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4483
fixed_packages
0
url pkg:deb/debian/wordpress@2.1.3-1?distro=trixie
purl pkg:deb/debian/wordpress@2.1.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.1.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-4483
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sz3u-x51u-r3dn
266
url VCID-t4fg-hrp7-c7h9
vulnerability_id VCID-t4fg-hrp7-c7h9
summary WordPress before 4.9.2 has XSS in the Flash fallback files in MediaElement (under wp-includes/js/mediaelement).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5776
reference_id
reference_type
scores
0
value 0.03133
scoring_system epss
scoring_elements 0.86815
published_at 2026-04-01T12:55:00Z
1
value 0.03133
scoring_system epss
scoring_elements 0.86826
published_at 2026-04-02T12:55:00Z
2
value 0.03133
scoring_system epss
scoring_elements 0.86845
published_at 2026-04-04T12:55:00Z
3
value 0.03133
scoring_system epss
scoring_elements 0.86839
published_at 2026-04-07T12:55:00Z
4
value 0.03133
scoring_system epss
scoring_elements 0.86859
published_at 2026-04-08T12:55:00Z
5
value 0.03133
scoring_system epss
scoring_elements 0.86867
published_at 2026-04-09T12:55:00Z
6
value 0.03133
scoring_system epss
scoring_elements 0.8688
published_at 2026-04-11T12:55:00Z
7
value 0.03133
scoring_system epss
scoring_elements 0.86875
published_at 2026-04-12T12:55:00Z
8
value 0.03133
scoring_system epss
scoring_elements 0.86871
published_at 2026-04-13T12:55:00Z
9
value 0.03133
scoring_system epss
scoring_elements 0.86888
published_at 2026-04-16T12:55:00Z
10
value 0.03133
scoring_system epss
scoring_elements 0.86893
published_at 2026-04-18T12:55:00Z
11
value 0.03133
scoring_system epss
scoring_elements 0.86894
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5776
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5776
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887596
reference_id 887596
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887596
fixed_packages
0
url pkg:deb/debian/wordpress@4.9.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.9.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.9.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2018-5776
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t4fg-hrp7-c7h9
267
url VCID-t4mw-4vck-d7ek
vulnerability_id VCID-t4mw-4vck-d7ek
summary The file upload functionality in WordPress 3.1 before 3.1.3 and 3.2 before Beta 2, when running "on hosts with dangerous security settings," has unknown impact and attack vectors, possibly related to dangerous filenames.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3129
reference_id
reference_type
scores
0
value 0.00612
scoring_system epss
scoring_elements 0.6976
published_at 2026-04-01T12:55:00Z
1
value 0.00612
scoring_system epss
scoring_elements 0.69772
published_at 2026-04-02T12:55:00Z
2
value 0.00612
scoring_system epss
scoring_elements 0.69788
published_at 2026-04-04T12:55:00Z
3
value 0.00612
scoring_system epss
scoring_elements 0.69764
published_at 2026-04-07T12:55:00Z
4
value 0.00612
scoring_system epss
scoring_elements 0.69812
published_at 2026-04-08T12:55:00Z
5
value 0.00612
scoring_system epss
scoring_elements 0.69827
published_at 2026-04-09T12:55:00Z
6
value 0.00612
scoring_system epss
scoring_elements 0.6985
published_at 2026-04-11T12:55:00Z
7
value 0.00612
scoring_system epss
scoring_elements 0.69835
published_at 2026-04-12T12:55:00Z
8
value 0.00612
scoring_system epss
scoring_elements 0.6982
published_at 2026-04-13T12:55:00Z
9
value 0.00612
scoring_system epss
scoring_elements 0.69862
published_at 2026-04-16T12:55:00Z
10
value 0.00612
scoring_system epss
scoring_elements 0.69872
published_at 2026-04-18T12:55:00Z
11
value 0.00612
scoring_system epss
scoring_elements 0.69853
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3129
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3129
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3129
fixed_packages
0
url pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.2.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2011-3129
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t4mw-4vck-d7ek
268
url VCID-tc97-uxfe-rqdc
vulnerability_id VCID-tc97-uxfe-rqdc
summary security update
references
0
reference_url http://openwall.com/lists/oss-security/2014/08/13/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2014/08/13/3
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5205
reference_id
reference_type
scores
0
value 0.00142
scoring_system epss
scoring_elements 0.34402
published_at 2026-04-21T12:55:00Z
1
value 0.00142
scoring_system epss
scoring_elements 0.34178
published_at 2026-04-01T12:55:00Z
2
value 0.00142
scoring_system epss
scoring_elements 0.34516
published_at 2026-04-02T12:55:00Z
3
value 0.00142
scoring_system epss
scoring_elements 0.34544
published_at 2026-04-04T12:55:00Z
4
value 0.00142
scoring_system epss
scoring_elements 0.34411
published_at 2026-04-07T12:55:00Z
5
value 0.00142
scoring_system epss
scoring_elements 0.34454
published_at 2026-04-08T12:55:00Z
6
value 0.00142
scoring_system epss
scoring_elements 0.34483
published_at 2026-04-09T12:55:00Z
7
value 0.00142
scoring_system epss
scoring_elements 0.34484
published_at 2026-04-11T12:55:00Z
8
value 0.00142
scoring_system epss
scoring_elements 0.34446
published_at 2026-04-12T12:55:00Z
9
value 0.00142
scoring_system epss
scoring_elements 0.34422
published_at 2026-04-13T12:55:00Z
10
value 0.00142
scoring_system epss
scoring_elements 0.34456
published_at 2026-04-16T12:55:00Z
11
value 0.00142
scoring_system epss
scoring_elements 0.34442
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5205
2
reference_url https://core.trac.wordpress.org/changeset/29408
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/29408
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2053
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5204
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5205
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5240
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5265
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5266
9
reference_url https://wordpress.org/news/2014/08/wordpress-3-9-2/
reference_id
reference_type
scores
url https://wordpress.org/news/2014/08/wordpress-3-9-2/
10
reference_url http://www.debian.org/security/2014/dsa-3001
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3001
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757312
reference_id 757312
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757312
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-5205
reference_id CVE-2014-5205
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-5205
fixed_packages
0
url pkg:deb/debian/wordpress@3.9.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.9.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.9.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2014-5205
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tc97-uxfe-rqdc
269
url VCID-tcbf-ura1-mbfv
vulnerability_id VCID-tcbf-ura1-mbfv
summary Cross-site scripting (XSS) vulnerability in the media-playlists feature in WordPress before 3.9.x before 3.9.3 and 4.x before 4.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0493.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0493.html
1
reference_url http://openwall.com/lists/oss-security/2014/11/25/12
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2014/11/25/12
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9032
reference_id
reference_type
scores
0
value 0.0042
scoring_system epss
scoring_elements 0.61954
published_at 2026-04-21T12:55:00Z
1
value 0.0042
scoring_system epss
scoring_elements 0.61796
published_at 2026-04-01T12:55:00Z
2
value 0.0042
scoring_system epss
scoring_elements 0.6187
published_at 2026-04-02T12:55:00Z
3
value 0.0042
scoring_system epss
scoring_elements 0.619
published_at 2026-04-04T12:55:00Z
4
value 0.0042
scoring_system epss
scoring_elements 0.61871
published_at 2026-04-07T12:55:00Z
5
value 0.0042
scoring_system epss
scoring_elements 0.6192
published_at 2026-04-08T12:55:00Z
6
value 0.0042
scoring_system epss
scoring_elements 0.61937
published_at 2026-04-09T12:55:00Z
7
value 0.0042
scoring_system epss
scoring_elements 0.61959
published_at 2026-04-11T12:55:00Z
8
value 0.0042
scoring_system epss
scoring_elements 0.61947
published_at 2026-04-12T12:55:00Z
9
value 0.0042
scoring_system epss
scoring_elements 0.61927
published_at 2026-04-13T12:55:00Z
10
value 0.0042
scoring_system epss
scoring_elements 0.6197
published_at 2026-04-16T12:55:00Z
11
value 0.0042
scoring_system epss
scoring_elements 0.61974
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9032
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9032
4
reference_url https://wordpress.org/news/2014/11/wordpress-4-0-1/
reference_id
reference_type
scores
url https://wordpress.org/news/2014/11/wordpress-4-0-1/
5
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:233
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:233
6
reference_url http://www.securityfocus.com/bid/71236
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71236
7
reference_url http://www.securitytracker.com/id/1031243
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031243
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425
reference_id 770425
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9032
reference_id CVE-2014-9032
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-9032
fixed_packages
0
url pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.0.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2014-9032
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tcbf-ura1-mbfv
270
url VCID-tekr-xkck-pkfu
vulnerability_id VCID-tekr-xkck-pkfu
summary
Multiple vulnerabilities in Asterisk might allow remote attackers to cause
    a Denial of Service condition, or conduct other attacks.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-7220.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-7220.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-7220
reference_id
reference_type
scores
0
value 0.10024
scoring_system epss
scoring_elements 0.93033
published_at 2026-04-01T12:55:00Z
1
value 0.10024
scoring_system epss
scoring_elements 0.93041
published_at 2026-04-02T12:55:00Z
2
value 0.10024
scoring_system epss
scoring_elements 0.93045
published_at 2026-04-07T12:55:00Z
3
value 0.10024
scoring_system epss
scoring_elements 0.93053
published_at 2026-04-08T12:55:00Z
4
value 0.10024
scoring_system epss
scoring_elements 0.93058
published_at 2026-04-09T12:55:00Z
5
value 0.10024
scoring_system epss
scoring_elements 0.93063
published_at 2026-04-11T12:55:00Z
6
value 0.10024
scoring_system epss
scoring_elements 0.9306
published_at 2026-04-12T12:55:00Z
7
value 0.10024
scoring_system epss
scoring_elements 0.93062
published_at 2026-04-13T12:55:00Z
8
value 0.10024
scoring_system epss
scoring_elements 0.93073
published_at 2026-04-16T12:55:00Z
9
value 0.10024
scoring_system epss
scoring_elements 0.93076
published_at 2026-04-18T12:55:00Z
10
value 0.10024
scoring_system epss
scoring_elements 0.93082
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-7220
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7220
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=523277
reference_id 523277
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=523277
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555220
reference_id 555220
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555220
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555221
reference_id 555221
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555221
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555242
reference_id 555242
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555242
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555244
reference_id 555244
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555244
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555250
reference_id 555250
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555250
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555255
reference_id 555255
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555255
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555259
reference_id 555259
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555259
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555266
reference_id 555266
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555266
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=558977
reference_id 558977
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=558977
13
reference_url https://security.gentoo.org/glsa/201006-20
reference_id GLSA-201006-20
reference_type
scores
url https://security.gentoo.org/glsa/201006-20
fixed_packages
0
url pkg:deb/debian/wordpress@2.5.0-2?distro=trixie
purl pkg:deb/debian/wordpress@2.5.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.5.0-2%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2008-7220
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tekr-xkck-pkfu
271
url VCID-tf2e-bgq5-9ff5
vulnerability_id VCID-tf2e-bgq5-9ff5
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5611
reference_id
reference_type
scores
0
value 0.12378
scoring_system epss
scoring_elements 0.93849
published_at 2026-04-01T12:55:00Z
1
value 0.12378
scoring_system epss
scoring_elements 0.93858
published_at 2026-04-02T12:55:00Z
2
value 0.12378
scoring_system epss
scoring_elements 0.93867
published_at 2026-04-04T12:55:00Z
3
value 0.12378
scoring_system epss
scoring_elements 0.9387
published_at 2026-04-07T12:55:00Z
4
value 0.12378
scoring_system epss
scoring_elements 0.93879
published_at 2026-04-08T12:55:00Z
5
value 0.12378
scoring_system epss
scoring_elements 0.93882
published_at 2026-04-09T12:55:00Z
6
value 0.12378
scoring_system epss
scoring_elements 0.93887
published_at 2026-04-13T12:55:00Z
7
value 0.12378
scoring_system epss
scoring_elements 0.93888
published_at 2026-04-12T12:55:00Z
8
value 0.12378
scoring_system epss
scoring_elements 0.93909
published_at 2026-04-16T12:55:00Z
9
value 0.12378
scoring_system epss
scoring_elements 0.93915
published_at 2026-04-18T12:55:00Z
10
value 0.12378
scoring_system epss
scoring_elements 0.93916
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5611
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5488
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5489
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5490
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5491
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5492
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5493
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5612
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=852767
reference_id 852767
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=852767
fixed_packages
0
url pkg:deb/debian/wordpress@4.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.7.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-5611
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tf2e-bgq5-9ff5
272
url VCID-tf2u-dse2-mufb
vulnerability_id VCID-tf2u-dse2-mufb
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6814
reference_id
reference_type
scores
0
value 0.02424
scoring_system epss
scoring_elements 0.8516
published_at 2026-04-21T12:55:00Z
1
value 0.02424
scoring_system epss
scoring_elements 0.85068
published_at 2026-04-01T12:55:00Z
2
value 0.02424
scoring_system epss
scoring_elements 0.85081
published_at 2026-04-02T12:55:00Z
3
value 0.02424
scoring_system epss
scoring_elements 0.85099
published_at 2026-04-04T12:55:00Z
4
value 0.02424
scoring_system epss
scoring_elements 0.85103
published_at 2026-04-07T12:55:00Z
5
value 0.02424
scoring_system epss
scoring_elements 0.85124
published_at 2026-04-08T12:55:00Z
6
value 0.02424
scoring_system epss
scoring_elements 0.85131
published_at 2026-04-09T12:55:00Z
7
value 0.02424
scoring_system epss
scoring_elements 0.85146
published_at 2026-04-11T12:55:00Z
8
value 0.02424
scoring_system epss
scoring_elements 0.85143
published_at 2026-04-12T12:55:00Z
9
value 0.02424
scoring_system epss
scoring_elements 0.8514
published_at 2026-04-13T12:55:00Z
10
value 0.02424
scoring_system epss
scoring_elements 0.85161
published_at 2026-04-16T12:55:00Z
11
value 0.02424
scoring_system epss
scoring_elements 0.85162
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6814
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6814
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6815
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6816
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6817
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857026
reference_id 857026
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857026
6
reference_url https://security.archlinux.org/ASA-201703-14
reference_id ASA-201703-14
reference_type
scores
url https://security.archlinux.org/ASA-201703-14
7
reference_url https://security.archlinux.org/AVG-202
reference_id AVG-202
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-202
fixed_packages
0
url pkg:deb/debian/wordpress@4.7.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.7.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.7.3%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-6814
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tf2u-dse2-mufb
273
url VCID-tffx-7mmd-gkcf
vulnerability_id VCID-tffx-7mmd-gkcf
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28038
reference_id
reference_type
scores
0
value 0.16023
scoring_system epss
scoring_elements 0.94794
published_at 2026-04-21T12:55:00Z
1
value 0.16023
scoring_system epss
scoring_elements 0.94745
published_at 2026-04-01T12:55:00Z
2
value 0.16023
scoring_system epss
scoring_elements 0.94754
published_at 2026-04-02T12:55:00Z
3
value 0.16023
scoring_system epss
scoring_elements 0.94758
published_at 2026-04-04T12:55:00Z
4
value 0.16023
scoring_system epss
scoring_elements 0.94759
published_at 2026-04-07T12:55:00Z
5
value 0.16023
scoring_system epss
scoring_elements 0.94768
published_at 2026-04-08T12:55:00Z
6
value 0.16023
scoring_system epss
scoring_elements 0.94773
published_at 2026-04-09T12:55:00Z
7
value 0.16023
scoring_system epss
scoring_elements 0.94776
published_at 2026-04-11T12:55:00Z
8
value 0.16023
scoring_system epss
scoring_elements 0.9478
published_at 2026-04-12T12:55:00Z
9
value 0.16023
scoring_system epss
scoring_elements 0.94781
published_at 2026-04-13T12:55:00Z
10
value 0.16023
scoring_system epss
scoring_elements 0.94789
published_at 2026-04-16T12:55:00Z
11
value 0.16023
scoring_system epss
scoring_elements 0.94792
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28038
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562
reference_id 973562
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562
11
reference_url https://security.archlinux.org/ASA-202011-3
reference_id ASA-202011-3
reference_type
scores
url https://security.archlinux.org/ASA-202011-3
12
reference_url https://security.archlinux.org/AVG-1257
reference_id AVG-1257
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1257
fixed_packages
0
url pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.5.3%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2020-28038
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tffx-7mmd-gkcf
274
url VCID-tgfm-2c63-d7dk
vulnerability_id VCID-tgfm-2c63-d7dk
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-4049
reference_id
reference_type
scores
0
value 0.05886
scoring_system epss
scoring_elements 0.90536
published_at 2026-04-01T12:55:00Z
1
value 0.05886
scoring_system epss
scoring_elements 0.9054
published_at 2026-04-02T12:55:00Z
2
value 0.05886
scoring_system epss
scoring_elements 0.90551
published_at 2026-04-04T12:55:00Z
3
value 0.05886
scoring_system epss
scoring_elements 0.90558
published_at 2026-04-07T12:55:00Z
4
value 0.05886
scoring_system epss
scoring_elements 0.9057
published_at 2026-04-08T12:55:00Z
5
value 0.05886
scoring_system epss
scoring_elements 0.90576
published_at 2026-04-09T12:55:00Z
6
value 0.05886
scoring_system epss
scoring_elements 0.90585
published_at 2026-04-12T12:55:00Z
7
value 0.05886
scoring_system epss
scoring_elements 0.90579
published_at 2026-04-13T12:55:00Z
8
value 0.05886
scoring_system epss
scoring_elements 0.90597
published_at 2026-04-18T12:55:00Z
9
value 0.05886
scoring_system epss
scoring_elements 0.90594
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-4049
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25286
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4047
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4048
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4049
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4050
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962685
reference_id 962685
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962685
fixed_packages
0
url pkg:deb/debian/wordpress@5.4.2%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.4.2%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.4.2%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2020-4049
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tgfm-2c63-d7dk
275
url VCID-tr8v-5ee5-aqfp
vulnerability_id VCID-tr8v-5ee5-aqfp
summary The map_meta_cap function in wp-includes/capabilities.php in WordPress 3.4.x before 3.4.2, when the multisite feature is enabled, does not properly assign the unfiltered_html capability, which allows remote authenticated users to bypass intended access restrictions and conduct cross-site scripting (XSS) attacks by leveraging the Administrator or Editor role and composing crafted text.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3383
reference_id
reference_type
scores
0
value 0.00154
scoring_system epss
scoring_elements 0.36022
published_at 2026-04-01T12:55:00Z
1
value 0.00154
scoring_system epss
scoring_elements 0.36216
published_at 2026-04-02T12:55:00Z
2
value 0.00154
scoring_system epss
scoring_elements 0.36245
published_at 2026-04-04T12:55:00Z
3
value 0.00154
scoring_system epss
scoring_elements 0.3608
published_at 2026-04-07T12:55:00Z
4
value 0.00154
scoring_system epss
scoring_elements 0.36129
published_at 2026-04-08T12:55:00Z
5
value 0.00154
scoring_system epss
scoring_elements 0.36147
published_at 2026-04-09T12:55:00Z
6
value 0.00154
scoring_system epss
scoring_elements 0.36154
published_at 2026-04-11T12:55:00Z
7
value 0.00154
scoring_system epss
scoring_elements 0.36117
published_at 2026-04-12T12:55:00Z
8
value 0.00154
scoring_system epss
scoring_elements 0.36091
published_at 2026-04-13T12:55:00Z
9
value 0.00154
scoring_system epss
scoring_elements 0.36132
published_at 2026-04-16T12:55:00Z
10
value 0.00154
scoring_system epss
scoring_elements 0.36118
published_at 2026-04-18T12:55:00Z
11
value 0.00154
scoring_system epss
scoring_elements 0.36065
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3383
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3383
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680721
reference_id 680721
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680721
fixed_packages
0
url pkg:deb/debian/wordpress@3.4.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.4.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.4.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2012-3383
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tr8v-5ee5-aqfp
276
url VCID-trn4-a55k-sqad
vulnerability_id VCID-trn4-a55k-sqad
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5490
reference_id
reference_type
scores
0
value 0.01307
scoring_system epss
scoring_elements 0.79806
published_at 2026-04-21T12:55:00Z
1
value 0.01307
scoring_system epss
scoring_elements 0.79725
published_at 2026-04-01T12:55:00Z
2
value 0.01307
scoring_system epss
scoring_elements 0.79733
published_at 2026-04-02T12:55:00Z
3
value 0.01307
scoring_system epss
scoring_elements 0.79754
published_at 2026-04-04T12:55:00Z
4
value 0.01307
scoring_system epss
scoring_elements 0.7974
published_at 2026-04-07T12:55:00Z
5
value 0.01307
scoring_system epss
scoring_elements 0.79769
published_at 2026-04-08T12:55:00Z
6
value 0.01307
scoring_system epss
scoring_elements 0.79775
published_at 2026-04-09T12:55:00Z
7
value 0.01307
scoring_system epss
scoring_elements 0.79797
published_at 2026-04-11T12:55:00Z
8
value 0.01307
scoring_system epss
scoring_elements 0.79781
published_at 2026-04-12T12:55:00Z
9
value 0.01307
scoring_system epss
scoring_elements 0.79774
published_at 2026-04-13T12:55:00Z
10
value 0.01307
scoring_system epss
scoring_elements 0.79801
published_at 2026-04-16T12:55:00Z
11
value 0.01307
scoring_system epss
scoring_elements 0.79803
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5490
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5488
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5489
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5490
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5491
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5492
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5493
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5612
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851310
reference_id 851310
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851310
11
reference_url https://security.archlinux.org/ASA-201701-22
reference_id ASA-201701-22
reference_type
scores
url https://security.archlinux.org/ASA-201701-22
12
reference_url https://security.archlinux.org/AVG-142
reference_id AVG-142
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-142
fixed_packages
0
url pkg:deb/debian/wordpress@4.7.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.7.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.7.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-5490
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-trn4-a55k-sqad
277
url VCID-ttaw-fpb8-27hp
vulnerability_id VCID-ttaw-fpb8-27hp
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2221
reference_id
reference_type
scores
0
value 0.03465
scoring_system epss
scoring_elements 0.87548
published_at 2026-04-21T12:55:00Z
1
value 0.03465
scoring_system epss
scoring_elements 0.8755
published_at 2026-04-18T12:55:00Z
2
value 0.03465
scoring_system epss
scoring_elements 0.87479
published_at 2026-04-01T12:55:00Z
3
value 0.03465
scoring_system epss
scoring_elements 0.87489
published_at 2026-04-02T12:55:00Z
4
value 0.03465
scoring_system epss
scoring_elements 0.87503
published_at 2026-04-04T12:55:00Z
5
value 0.03465
scoring_system epss
scoring_elements 0.87505
published_at 2026-04-07T12:55:00Z
6
value 0.03465
scoring_system epss
scoring_elements 0.87524
published_at 2026-04-08T12:55:00Z
7
value 0.03465
scoring_system epss
scoring_elements 0.87531
published_at 2026-04-09T12:55:00Z
8
value 0.03465
scoring_system epss
scoring_elements 0.87543
published_at 2026-04-11T12:55:00Z
9
value 0.03465
scoring_system epss
scoring_elements 0.87538
published_at 2026-04-12T12:55:00Z
10
value 0.03465
scoring_system epss
scoring_elements 0.87534
published_at 2026-04-13T12:55:00Z
11
value 0.03465
scoring_system epss
scoring_elements 0.87549
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2221
1
reference_url https://codex.wordpress.org/Version_4.4.2
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.4.2
2
reference_url https://core.trac.wordpress.org/changeset/36444
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/36444
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2221
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2222
5
reference_url https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-release/
6
reference_url https://wpvulndb.com/vulnerabilities/8377
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8377
7
reference_url http://www.debian.org/security/2016/dsa-3472
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3472
8
reference_url http://www.securityfocus.com/bid/82463
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/82463
9
reference_url http://www.securitytracker.com/id/1034933
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034933
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813697
reference_id 813697
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813697
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2221
reference_id CVE-2016-2221
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
1
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-2221
fixed_packages
0
url pkg:deb/debian/wordpress@4.4.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.4.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.4.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2016-2221
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ttaw-fpb8-27hp
278
url VCID-tugh-42tp-8udr
vulnerability_id VCID-tugh-42tp-8udr
summary Cross-site scripting (XSS) vulnerability in wp-register.php in WordPress 2.0 allows remote attackers to inject arbitrary web script or HTML via the user_login parameter.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5106
reference_id
reference_type
scores
0
value 0.00357
scoring_system epss
scoring_elements 0.57869
published_at 2026-04-01T12:55:00Z
1
value 0.00357
scoring_system epss
scoring_elements 0.57953
published_at 2026-04-02T12:55:00Z
2
value 0.00357
scoring_system epss
scoring_elements 0.57972
published_at 2026-04-04T12:55:00Z
3
value 0.00357
scoring_system epss
scoring_elements 0.57948
published_at 2026-04-07T12:55:00Z
4
value 0.00357
scoring_system epss
scoring_elements 0.58003
published_at 2026-04-08T12:55:00Z
5
value 0.00357
scoring_system epss
scoring_elements 0.58005
published_at 2026-04-09T12:55:00Z
6
value 0.00357
scoring_system epss
scoring_elements 0.58021
published_at 2026-04-11T12:55:00Z
7
value 0.00357
scoring_system epss
scoring_elements 0.57999
published_at 2026-04-12T12:55:00Z
8
value 0.00357
scoring_system epss
scoring_elements 0.57979
published_at 2026-04-13T12:55:00Z
9
value 0.00357
scoring_system epss
scoring_elements 0.58009
published_at 2026-04-16T12:55:00Z
10
value 0.00357
scoring_system epss
scoring_elements 0.58007
published_at 2026-04-18T12:55:00Z
11
value 0.00357
scoring_system epss
scoring_elements 0.57985
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5106
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5106
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5106
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.2-1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-5106
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tugh-42tp-8udr
279
url VCID-u1fw-ahar-8uc1
vulnerability_id VCID-u1fw-ahar-8uc1
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-4047
reference_id
reference_type
scores
0
value 0.05566
scoring_system epss
scoring_elements 0.90242
published_at 2026-04-01T12:55:00Z
1
value 0.05566
scoring_system epss
scoring_elements 0.90245
published_at 2026-04-02T12:55:00Z
2
value 0.05566
scoring_system epss
scoring_elements 0.90258
published_at 2026-04-04T12:55:00Z
3
value 0.05566
scoring_system epss
scoring_elements 0.90262
published_at 2026-04-07T12:55:00Z
4
value 0.05566
scoring_system epss
scoring_elements 0.90277
published_at 2026-04-08T12:55:00Z
5
value 0.05566
scoring_system epss
scoring_elements 0.90284
published_at 2026-04-09T12:55:00Z
6
value 0.05566
scoring_system epss
scoring_elements 0.90292
published_at 2026-04-12T12:55:00Z
7
value 0.05566
scoring_system epss
scoring_elements 0.90286
published_at 2026-04-13T12:55:00Z
8
value 0.05566
scoring_system epss
scoring_elements 0.90302
published_at 2026-04-18T12:55:00Z
9
value 0.05566
scoring_system epss
scoring_elements 0.90299
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-4047
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25286
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4047
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4048
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4049
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4050
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962685
reference_id 962685
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962685
fixed_packages
0
url pkg:deb/debian/wordpress@5.4.2%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.4.2%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.4.2%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2020-4047
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u1fw-ahar-8uc1
280
url VCID-u4ef-4sne-tbeg
vulnerability_id VCID-u4ef-4sne-tbeg
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20147
reference_id
reference_type
scores
0
value 0.05788
scoring_system epss
scoring_elements 0.90458
published_at 2026-04-01T12:55:00Z
1
value 0.05788
scoring_system epss
scoring_elements 0.90463
published_at 2026-04-02T12:55:00Z
2
value 0.05788
scoring_system epss
scoring_elements 0.90474
published_at 2026-04-04T12:55:00Z
3
value 0.05788
scoring_system epss
scoring_elements 0.9048
published_at 2026-04-07T12:55:00Z
4
value 0.05788
scoring_system epss
scoring_elements 0.90492
published_at 2026-04-08T12:55:00Z
5
value 0.05788
scoring_system epss
scoring_elements 0.90498
published_at 2026-04-09T12:55:00Z
6
value 0.05788
scoring_system epss
scoring_elements 0.90505
published_at 2026-04-12T12:55:00Z
7
value 0.05788
scoring_system epss
scoring_elements 0.90499
published_at 2026-04-13T12:55:00Z
8
value 0.05788
scoring_system epss
scoring_elements 0.90516
published_at 2026-04-18T12:55:00Z
9
value 0.05788
scoring_system epss
scoring_elements 0.90514
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20147
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20148
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20149
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20150
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20151
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20152
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20153
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8942
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916403
reference_id 916403
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916403
fixed_packages
0
url pkg:deb/debian/wordpress@5.0.1%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.0.1%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.0.1%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2018-20147
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u4ef-4sne-tbeg
281
url VCID-u93v-9mz6-cubm
vulnerability_id VCID-u93v-9mz6-cubm
summary wordpress: XML-RPC interface vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0664.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0664.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0664
reference_id
reference_type
scores
0
value 0.06837
scoring_system epss
scoring_elements 0.91298
published_at 2026-04-01T12:55:00Z
1
value 0.06837
scoring_system epss
scoring_elements 0.91302
published_at 2026-04-02T12:55:00Z
2
value 0.06837
scoring_system epss
scoring_elements 0.91313
published_at 2026-04-04T12:55:00Z
3
value 0.06837
scoring_system epss
scoring_elements 0.9132
published_at 2026-04-07T12:55:00Z
4
value 0.06837
scoring_system epss
scoring_elements 0.91332
published_at 2026-04-08T12:55:00Z
5
value 0.06837
scoring_system epss
scoring_elements 0.91338
published_at 2026-04-09T12:55:00Z
6
value 0.06837
scoring_system epss
scoring_elements 0.91345
published_at 2026-04-11T12:55:00Z
7
value 0.06837
scoring_system epss
scoring_elements 0.91348
published_at 2026-04-12T12:55:00Z
8
value 0.06837
scoring_system epss
scoring_elements 0.91346
published_at 2026-04-13T12:55:00Z
9
value 0.06837
scoring_system epss
scoring_elements 0.91372
published_at 2026-04-21T12:55:00Z
10
value 0.06837
scoring_system epss
scoring_elements 0.9137
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0664
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0664
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=431547
reference_id 431547
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=431547
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464170
reference_id 464170
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464170
fixed_packages
0
url pkg:deb/debian/wordpress@2.3.3-1?distro=trixie
purl pkg:deb/debian/wordpress@2.3.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.3.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2008-0664
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u93v-9mz6-cubm
282
url VCID-ufsd-zp75-u3h7
vulnerability_id VCID-ufsd-zp75-u3h7
summary wp-admin/press-this.php in WordPress before 3.0.6 does not enforce the publish_posts capability requirement, which allows remote authenticated users to perform publish actions by leveraging the Contributor role.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-5270
reference_id
reference_type
scores
0
value 0.00506
scoring_system epss
scoring_elements 0.66162
published_at 2026-04-01T12:55:00Z
1
value 0.00506
scoring_system epss
scoring_elements 0.66203
published_at 2026-04-02T12:55:00Z
2
value 0.00506
scoring_system epss
scoring_elements 0.6623
published_at 2026-04-04T12:55:00Z
3
value 0.00506
scoring_system epss
scoring_elements 0.662
published_at 2026-04-07T12:55:00Z
4
value 0.00506
scoring_system epss
scoring_elements 0.66247
published_at 2026-04-08T12:55:00Z
5
value 0.00506
scoring_system epss
scoring_elements 0.6626
published_at 2026-04-09T12:55:00Z
6
value 0.00506
scoring_system epss
scoring_elements 0.66281
published_at 2026-04-11T12:55:00Z
7
value 0.00506
scoring_system epss
scoring_elements 0.66268
published_at 2026-04-12T12:55:00Z
8
value 0.00506
scoring_system epss
scoring_elements 0.66237
published_at 2026-04-13T12:55:00Z
9
value 0.00506
scoring_system epss
scoring_elements 0.66271
published_at 2026-04-21T12:55:00Z
10
value 0.00506
scoring_system epss
scoring_elements 0.66287
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-5270
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5270
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5270
fixed_packages
0
url pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.2.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2011-5270
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ufsd-zp75-u3h7
283
url VCID-uja6-g5w2-1qd2
vulnerability_id VCID-uja6-g5w2-1qd2
summary several
references
0
reference_url http://codex.wordpress.org/Version_3.5.2
reference_id
reference_type
scores
url http://codex.wordpress.org/Version_3.5.2
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2204
reference_id
reference_type
scores
0
value 0.00658
scoring_system epss
scoring_elements 0.7109
published_at 2026-04-18T12:55:00Z
1
value 0.00658
scoring_system epss
scoring_elements 0.70985
published_at 2026-04-01T12:55:00Z
2
value 0.00658
scoring_system epss
scoring_elements 0.70996
published_at 2026-04-02T12:55:00Z
3
value 0.00658
scoring_system epss
scoring_elements 0.71014
published_at 2026-04-04T12:55:00Z
4
value 0.00658
scoring_system epss
scoring_elements 0.70988
published_at 2026-04-07T12:55:00Z
5
value 0.00658
scoring_system epss
scoring_elements 0.71031
published_at 2026-04-08T12:55:00Z
6
value 0.00658
scoring_system epss
scoring_elements 0.71046
published_at 2026-04-09T12:55:00Z
7
value 0.00658
scoring_system epss
scoring_elements 0.71069
published_at 2026-04-21T12:55:00Z
8
value 0.00658
scoring_system epss
scoring_elements 0.71054
published_at 2026-04-12T12:55:00Z
9
value 0.00658
scoring_system epss
scoring_elements 0.71036
published_at 2026-04-13T12:55:00Z
10
value 0.00658
scoring_system epss
scoring_elements 0.71082
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2204
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=976784
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=976784
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2173
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2173
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2199
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2200
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2201
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2202
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2203
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2204
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2205
11
reference_url https://github.com/moxiecode/moxieplayer/commit/b61ac518ffa2657e2dc9019b2dcf2f3f37dbfab0
reference_id
reference_type
scores
url https://github.com/moxiecode/moxieplayer/commit/b61ac518ffa2657e2dc9019b2dcf2f3f37dbfab0
12
reference_url http://wordpress.org/news/2013/06/wordpress-3-5-2/
reference_id
reference_type
scores
url http://wordpress.org/news/2013/06/wordpress-3-5-2/
13
reference_url http://www.debian.org/security/2013/dsa-2718
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2718
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=713947
reference_id 713947
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=713947
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tinymce:media:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tinymce:media:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tinymce:media:-:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2204
reference_id CVE-2013-2204
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-2204
fixed_packages
0
url pkg:deb/debian/wordpress@3.5.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.5.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.5.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2013-2204
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uja6-g5w2-1qd2
284
url VCID-ujms-xfg5-77e8
vulnerability_id VCID-ujms-xfg5-77e8
summary Directory traversal vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress 4.5.3 allows remote authenticated users to cause a denial of service or read certain text files via a .. (dot dot) in the plugin parameter to wp-admin/admin-ajax.php, as demonstrated by /dev/random read operations that deplete the entropy pool.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6896
reference_id
reference_type
scores
0
value 0.35182
scoring_system epss
scoring_elements 0.97006
published_at 2026-04-01T12:55:00Z
1
value 0.35182
scoring_system epss
scoring_elements 0.97014
published_at 2026-04-02T12:55:00Z
2
value 0.35182
scoring_system epss
scoring_elements 0.97018
published_at 2026-04-04T12:55:00Z
3
value 0.35182
scoring_system epss
scoring_elements 0.97019
published_at 2026-04-07T12:55:00Z
4
value 0.35182
scoring_system epss
scoring_elements 0.97028
published_at 2026-04-08T12:55:00Z
5
value 0.35182
scoring_system epss
scoring_elements 0.97029
published_at 2026-04-09T12:55:00Z
6
value 0.35182
scoring_system epss
scoring_elements 0.97032
published_at 2026-04-11T12:55:00Z
7
value 0.35182
scoring_system epss
scoring_elements 0.97033
published_at 2026-04-13T12:55:00Z
8
value 0.35182
scoring_system epss
scoring_elements 0.97043
published_at 2026-04-16T12:55:00Z
9
value 0.35182
scoring_system epss
scoring_elements 0.97047
published_at 2026-04-18T12:55:00Z
10
value 0.35182
scoring_system epss
scoring_elements 0.97051
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6896
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6896
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6896
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837090
reference_id 837090
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837090
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/40288.txt
reference_id CVE-2016-6897;CVE-2016-6896
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/40288.txt
fixed_packages
0
url pkg:deb/debian/wordpress@4.6.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.6.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.6.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2016-6896
risk_score 0.6
exploitability 2.0
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ujms-xfg5-77e8
285
url VCID-uwyj-2kgc-zyg6
vulnerability_id VCID-uwyj-2kgc-zyg6
summary WordPress through 6.1.1 depends on unpredictable client visits to cause wp-cron.php execution and the resulting security updates, and the source code describes "the scenario where a site may not receive enough visits to execute scheduled tasks in a timely manner," but neither the installation guide nor the security guide mentions this default behavior, or alerts the user about security risks on installations with very few visits.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22622
reference_id
reference_type
scores
0
value 0.08419
scoring_system epss
scoring_elements 0.92308
published_at 2026-04-02T12:55:00Z
1
value 0.08419
scoring_system epss
scoring_elements 0.92313
published_at 2026-04-04T12:55:00Z
2
value 0.08419
scoring_system epss
scoring_elements 0.92316
published_at 2026-04-07T12:55:00Z
3
value 0.08419
scoring_system epss
scoring_elements 0.92328
published_at 2026-04-08T12:55:00Z
4
value 0.08419
scoring_system epss
scoring_elements 0.92332
published_at 2026-04-09T12:55:00Z
5
value 0.08419
scoring_system epss
scoring_elements 0.92337
published_at 2026-04-13T12:55:00Z
6
value 0.08419
scoring_system epss
scoring_elements 0.92339
published_at 2026-04-12T12:55:00Z
7
value 0.08419
scoring_system epss
scoring_elements 0.92348
published_at 2026-04-16T12:55:00Z
8
value 0.08419
scoring_system epss
scoring_elements 0.92347
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22622
1
reference_url https://www.tenable.com/plugins/was/113449
reference_id 113449
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-07T18:06:54Z/
url https://www.tenable.com/plugins/was/113449
2
reference_url https://developer.wordpress.org/plugins/cron/
reference_id cron
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-07T18:06:54Z/
url https://developer.wordpress.org/plugins/cron/
3
reference_url https://wordpress.org/support/article/how-to-install-wordpress/
reference_id how-to-install-wordpress
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-07T18:06:54Z/
url https://wordpress.org/support/article/how-to-install-wordpress/
4
reference_url https://wordpress.org/about/security/
reference_id security
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-07T18:06:54Z/
url https://wordpress.org/about/security/
5
reference_url https://patchstack.com/articles/solving-unpredictable-wp-cron-problems-addressing-cve-2023-22622/
reference_id solving-unpredictable-wp-cron-problems-addressing-cve-2023-22622
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-07T18:06:54Z/
url https://patchstack.com/articles/solving-unpredictable-wp-cron-problems-addressing-cve-2023-22622/
6
reference_url https://medium.com/%40thecpanelguy/the-nightmare-that-is-wpcron-php-ae31c1d3ae30
reference_id the-nightmare-that-is-wpcron-php-ae31c1d3ae30
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-07T18:06:54Z/
url https://medium.com/%40thecpanelguy/the-nightmare-that-is-wpcron-php-ae31c1d3ae30
7
reference_url https://github.com/WordPress/WordPress/blob/dca7b5204b5fea54e6d1774689777b359a9222ab/wp-cron.php#L5-L8
reference_id wp-cron.php#L5-L8
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-07T18:06:54Z/
url https://github.com/WordPress/WordPress/blob/dca7b5204b5fea54e6d1774689777b359a9222ab/wp-cron.php#L5-L8
fixed_packages
0
url pkg:deb/debian/wordpress@0?distro=trixie
purl pkg:deb/debian/wordpress@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@0%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2023-22622
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uwyj-2kgc-zyg6
286
url VCID-uymd-e4m2-muem
vulnerability_id VCID-uymd-e4m2-muem
summary wordpress: multiple vulnerabilities
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2431.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2431.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2431
reference_id
reference_type
scores
0
value 0.01187
scoring_system epss
scoring_elements 0.78748
published_at 2026-04-01T12:55:00Z
1
value 0.01187
scoring_system epss
scoring_elements 0.78755
published_at 2026-04-02T12:55:00Z
2
value 0.01187
scoring_system epss
scoring_elements 0.78786
published_at 2026-04-04T12:55:00Z
3
value 0.01187
scoring_system epss
scoring_elements 0.78769
published_at 2026-04-07T12:55:00Z
4
value 0.01187
scoring_system epss
scoring_elements 0.78794
published_at 2026-04-08T12:55:00Z
5
value 0.01187
scoring_system epss
scoring_elements 0.78802
published_at 2026-04-09T12:55:00Z
6
value 0.01187
scoring_system epss
scoring_elements 0.78825
published_at 2026-04-18T12:55:00Z
7
value 0.01187
scoring_system epss
scoring_elements 0.78808
published_at 2026-04-12T12:55:00Z
8
value 0.01187
scoring_system epss
scoring_elements 0.78799
published_at 2026-04-13T12:55:00Z
9
value 0.01187
scoring_system epss
scoring_elements 0.78827
published_at 2026-04-16T12:55:00Z
10
value 0.01187
scoring_system epss
scoring_elements 0.78822
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2431
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2431
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2431
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=510745
reference_id 510745
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=510745
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=537146
reference_id 537146
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=537146
fixed_packages
0
url pkg:deb/debian/wordpress@2.8.3-1?distro=trixie
purl pkg:deb/debian/wordpress@2.8.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.8.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2009-2431
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uymd-e4m2-muem
287
url VCID-uzm6-mwhv-xfbj
vulnerability_id VCID-uzm6-mwhv-xfbj
summary Directory traversal vulnerability in wp-db-backup.php in Skippy WP-DB-Backup plugin for WordPress 1.7 and earlier allows remote authenticated users with administrative privileges to read arbitrary files via a .. (dot dot) in the backup parameter to edit.php.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4208
reference_id
reference_type
scores
0
value 0.27172
scoring_system epss
scoring_elements 0.96352
published_at 2026-04-01T12:55:00Z
1
value 0.27172
scoring_system epss
scoring_elements 0.96359
published_at 2026-04-02T12:55:00Z
2
value 0.27172
scoring_system epss
scoring_elements 0.96363
published_at 2026-04-04T12:55:00Z
3
value 0.27172
scoring_system epss
scoring_elements 0.96367
published_at 2026-04-07T12:55:00Z
4
value 0.27172
scoring_system epss
scoring_elements 0.96376
published_at 2026-04-08T12:55:00Z
5
value 0.27172
scoring_system epss
scoring_elements 0.96379
published_at 2026-04-09T12:55:00Z
6
value 0.27172
scoring_system epss
scoring_elements 0.96383
published_at 2026-04-12T12:55:00Z
7
value 0.27172
scoring_system epss
scoring_elements 0.96386
published_at 2026-04-13T12:55:00Z
8
value 0.27172
scoring_system epss
scoring_elements 0.96393
published_at 2026-04-16T12:55:00Z
9
value 0.27172
scoring_system epss
scoring_elements 0.96398
published_at 2026-04-18T12:55:00Z
10
value 0.27172
scoring_system epss
scoring_elements 0.96399
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4208
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4208
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384800
reference_id 384800
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384800
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/28382.txt
reference_id CVE-2006-4208;OSVDB-27979
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/28382.txt
4
reference_url https://www.securityfocus.com/bid/19504/info
reference_id CVE-2006-4208;OSVDB-27979
reference_type exploit
scores
url https://www.securityfocus.com/bid/19504/info
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.5-0.1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.5-0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.5-0.1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2006-4208
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uzm6-mwhv-xfbj
288
url VCID-v2xf-n28d-kfcx
vulnerability_id VCID-v2xf-n28d-kfcx
summary security update
references
0
reference_url http://packetstormsecurity.com/files/164633/WordPress-4.9.6-Arbitrary-File-Deletion.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/164633/WordPress-4.9.6-Arbitrary-File-Deletion.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12895
reference_id
reference_type
scores
0
value 0.89023
scoring_system epss
scoring_elements 0.99532
published_at 2026-04-21T12:55:00Z
1
value 0.89023
scoring_system epss
scoring_elements 0.99531
published_at 2026-04-18T12:55:00Z
2
value 0.89023
scoring_system epss
scoring_elements 0.99523
published_at 2026-04-02T12:55:00Z
3
value 0.89023
scoring_system epss
scoring_elements 0.99525
published_at 2026-04-07T12:55:00Z
4
value 0.89023
scoring_system epss
scoring_elements 0.99526
published_at 2026-04-08T12:55:00Z
5
value 0.89023
scoring_system epss
scoring_elements 0.99527
published_at 2026-04-09T12:55:00Z
6
value 0.89023
scoring_system epss
scoring_elements 0.99528
published_at 2026-04-13T12:55:00Z
7
value 0.89023
scoring_system epss
scoring_elements 0.9953
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12895
2
reference_url https://blog.ripstech.com/2018/wordpress-file-delete-to-code-execution/
reference_id
reference_type
scores
url https://blog.ripstech.com/2018/wordpress-file-delete-to-code-execution/
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12895
4
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00046.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00046.html
5
reference_url https://wpvulndb.com/vulnerabilities/9100
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/9100
6
reference_url https://www.debian.org/security/2018/dsa-4250
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4250
7
reference_url http://www.securityfocus.com/bid/104569
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104569
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=902876
reference_id 902876
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=902876
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12895
reference_id CVE-2018-12895
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-12895
fixed_packages
0
url pkg:deb/debian/wordpress@4.9.7%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@4.9.7%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.9.7%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2018-12895
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v2xf-n28d-kfcx
289
url VCID-v5s7-vwe3-5bak
vulnerability_id VCID-v5s7-vwe3-5bak
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-11029
reference_id
reference_type
scores
0
value 0.0265
scoring_system epss
scoring_elements 0.85684
published_at 2026-04-01T12:55:00Z
1
value 0.0265
scoring_system epss
scoring_elements 0.85697
published_at 2026-04-02T12:55:00Z
2
value 0.0265
scoring_system epss
scoring_elements 0.85715
published_at 2026-04-04T12:55:00Z
3
value 0.0265
scoring_system epss
scoring_elements 0.85721
published_at 2026-04-07T12:55:00Z
4
value 0.0265
scoring_system epss
scoring_elements 0.8574
published_at 2026-04-08T12:55:00Z
5
value 0.0265
scoring_system epss
scoring_elements 0.85751
published_at 2026-04-09T12:55:00Z
6
value 0.0265
scoring_system epss
scoring_elements 0.85766
published_at 2026-04-11T12:55:00Z
7
value 0.0265
scoring_system epss
scoring_elements 0.85763
published_at 2026-04-12T12:55:00Z
8
value 0.0265
scoring_system epss
scoring_elements 0.85759
published_at 2026-04-13T12:55:00Z
9
value 0.0265
scoring_system epss
scoring_elements 0.85777
published_at 2026-04-16T12:55:00Z
10
value 0.0265
scoring_system epss
scoring_elements 0.85782
published_at 2026-04-18T12:55:00Z
11
value 0.0265
scoring_system epss
scoring_elements 0.85775
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-11029
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11025
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11026
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11027
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11027
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11028
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11029
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959391
reference_id 959391
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959391
fixed_packages
0
url pkg:deb/debian/wordpress@5.4.1%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.4.1%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.4.1%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2020-11029
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v5s7-vwe3-5bak
290
url VCID-v7ph-mtd1-y3e1
vulnerability_id VCID-v7ph-mtd1-y3e1
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43500
reference_id
reference_type
scores
0
value 0.01042
scoring_system epss
scoring_elements 0.7748
published_at 2026-04-21T12:55:00Z
1
value 0.01042
scoring_system epss
scoring_elements 0.77472
published_at 2026-04-11T12:55:00Z
2
value 0.01042
scoring_system epss
scoring_elements 0.77452
published_at 2026-04-12T12:55:00Z
3
value 0.01042
scoring_system epss
scoring_elements 0.77449
published_at 2026-04-13T12:55:00Z
4
value 0.01042
scoring_system epss
scoring_elements 0.77489
published_at 2026-04-16T12:55:00Z
5
value 0.01042
scoring_system epss
scoring_elements 0.77487
published_at 2026-04-18T12:55:00Z
6
value 0.01042
scoring_system epss
scoring_elements 0.77401
published_at 2026-04-02T12:55:00Z
7
value 0.01042
scoring_system epss
scoring_elements 0.77427
published_at 2026-04-04T12:55:00Z
8
value 0.01042
scoring_system epss
scoring_elements 0.77407
published_at 2026-04-07T12:55:00Z
9
value 0.01042
scoring_system epss
scoring_elements 0.77437
published_at 2026-04-08T12:55:00Z
10
value 0.01042
scoring_system epss
scoring_elements 0.77446
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43500
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43497
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43500
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43504
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022575
reference_id 1022575
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022575
5
reference_url https://wordpress.org/download/
reference_id download
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:06:13Z/
url https://wordpress.org/download/
6
reference_url https://jvn.jp/en/jp/JVN09409909/index.html
reference_id index.html
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:06:13Z/
url https://jvn.jp/en/jp/JVN09409909/index.html
7
reference_url https://wordpress.org/news/2022/10/wordpress-6-0-3-security-release/
reference_id wordpress-6-0-3-security-release
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:06:13Z/
url https://wordpress.org/news/2022/10/wordpress-6-0-3-security-release/
fixed_packages
0
url pkg:deb/debian/wordpress@5.7.8%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.8%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.8%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.0.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.0.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.0.3%252Bdfsg1-1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2022-43500
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v7ph-mtd1-y3e1
291
url VCID-v8by-vn2q-r7gx
vulnerability_id VCID-v8by-vn2q-r7gx
summary wp-admin/async-upload.php in the media uploader in WordPress before 3.0.5 allows remote authenticated users to read (1) draft posts or (2) private posts via a modified attachment_id parameter.
references
0
reference_url http://codex.wordpress.org/Version_3.0.5
reference_id
reference_type
scores
url http://codex.wordpress.org/Version_3.0.5
1
reference_url http://core.trac.wordpress.org/changeset/17393
reference_id
reference_type
scores
url http://core.trac.wordpress.org/changeset/17393
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056412.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056412.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056998.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056998.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057003.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-March/057003.html
5
reference_url http://openwall.com/lists/oss-security/2011/02/08/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/02/08/7
6
reference_url http://openwall.com/lists/oss-security/2011/02/09/13
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/02/09/13
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0701
reference_id
reference_type
scores
0
value 0.01555
scoring_system epss
scoring_elements 0.81476
published_at 2026-04-21T12:55:00Z
1
value 0.01555
scoring_system epss
scoring_elements 0.8137
published_at 2026-04-01T12:55:00Z
2
value 0.01555
scoring_system epss
scoring_elements 0.81379
published_at 2026-04-02T12:55:00Z
3
value 0.01555
scoring_system epss
scoring_elements 0.81402
published_at 2026-04-04T12:55:00Z
4
value 0.01555
scoring_system epss
scoring_elements 0.814
published_at 2026-04-07T12:55:00Z
5
value 0.01555
scoring_system epss
scoring_elements 0.81429
published_at 2026-04-08T12:55:00Z
6
value 0.01555
scoring_system epss
scoring_elements 0.81434
published_at 2026-04-09T12:55:00Z
7
value 0.01555
scoring_system epss
scoring_elements 0.81456
published_at 2026-04-11T12:55:00Z
8
value 0.01555
scoring_system epss
scoring_elements 0.81443
published_at 2026-04-12T12:55:00Z
9
value 0.01555
scoring_system epss
scoring_elements 0.81436
published_at 2026-04-13T12:55:00Z
10
value 0.01555
scoring_system epss
scoring_elements 0.81473
published_at 2026-04-16T12:55:00Z
11
value 0.01555
scoring_system epss
scoring_elements 0.81474
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0701
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0701
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0701
9
reference_url http://secunia.com/advisories/43729
reference_id
reference_type
scores
url http://secunia.com/advisories/43729
10
reference_url http://www.debian.org/security/2011/dsa-2190
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2190
11
reference_url http://www.securityfocus.com/bid/46249
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46249
12
reference_url http://www.vupen.com/english/advisories/2011/0658
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0658
13
reference_url http://www.vupen.com/english/advisories/2011/0721
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0721
14
reference_url http://www.wordpress.org/news/2011/02/wordpress-3-0-5/
reference_id
reference_type
scores
url http://www.wordpress.org/news/2011/02/wordpress-3-0-5/
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0701
reference_id CVE-2011-0701
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2011-0701
fixed_packages
0
url pkg:deb/debian/wordpress@3.0.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.0.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.0.5%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2011-0701
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v8by-vn2q-r7gx
292
url VCID-vchz-vuh2-cfd9
vulnerability_id VCID-vchz-vuh2-cfd9
summary Cross-site scripting (XSS) vulnerability in wp-admin/vars.php in WordPress before 2.0.10 RC2, and before 2.1.3 RC2 in the 2.1 series, allows remote authenticated users with theme privileges to inject arbitrary web script or HTML via the PATH_INFO in the administration interface, related to loose regular expression processing of PHP_SELF.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1622
reference_id
reference_type
scores
0
value 0.03283
scoring_system epss
scoring_elements 0.87198
published_at 2026-04-21T12:55:00Z
1
value 0.03283
scoring_system epss
scoring_elements 0.87129
published_at 2026-04-01T12:55:00Z
2
value 0.03283
scoring_system epss
scoring_elements 0.8714
published_at 2026-04-02T12:55:00Z
3
value 0.03283
scoring_system epss
scoring_elements 0.87156
published_at 2026-04-04T12:55:00Z
4
value 0.03283
scoring_system epss
scoring_elements 0.87153
published_at 2026-04-07T12:55:00Z
5
value 0.03283
scoring_system epss
scoring_elements 0.87173
published_at 2026-04-08T12:55:00Z
6
value 0.03283
scoring_system epss
scoring_elements 0.87181
published_at 2026-04-09T12:55:00Z
7
value 0.03283
scoring_system epss
scoring_elements 0.87194
published_at 2026-04-11T12:55:00Z
8
value 0.03283
scoring_system epss
scoring_elements 0.87188
published_at 2026-04-12T12:55:00Z
9
value 0.03283
scoring_system epss
scoring_elements 0.87184
published_at 2026-04-13T12:55:00Z
10
value 0.03283
scoring_system epss
scoring_elements 0.87199
published_at 2026-04-16T12:55:00Z
11
value 0.03283
scoring_system epss
scoring_elements 0.87204
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1622
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1622
2
reference_url http://secunia.com/advisories/24567
reference_id
reference_type
scores
url http://secunia.com/advisories/24567
3
reference_url http://secunia.com/advisories/25108
reference_id
reference_type
scores
url http://secunia.com/advisories/25108
4
reference_url http://sla.ckers.org/forum/read.php?2%2C7935#msg-8006
reference_id
reference_type
scores
url http://sla.ckers.org/forum/read.php?2%2C7935#msg-8006
5
reference_url http://www.buayacorp.com/files/wordpress/wordpress-advisory.txt
reference_id
reference_type
scores
url http://www.buayacorp.com/files/wordpress/wordpress-advisory.txt
6
reference_url http://www.debian.org/security/2007/dsa-1285
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1285
7
reference_url http://www.securityfocus.com/bid/23027
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23027
8
reference_url http://www.vupen.com/english/advisories/2007/1005
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1005
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.10_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10_rc1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3_rc1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.3_rc1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3_rc1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1622
reference_id CVE-2007-1622
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2007-1622
24
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/29754.html
reference_id CVE-2007-1622;OSVDB-34348
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/29754.html
25
reference_url https://www.securityfocus.com/bid/23027/info
reference_id CVE-2007-1622;OSVDB-34348
reference_type exploit
scores
url https://www.securityfocus.com/bid/23027/info
fixed_packages
0
url pkg:deb/debian/wordpress@2.1.3-1?distro=trixie
purl pkg:deb/debian/wordpress@2.1.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.1.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-1622
risk_score 7.8
exploitability 2.0
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vchz-vuh2-cfd9
293
url VCID-vg54-wjcw-fuh4
vulnerability_id VCID-vg54-wjcw-fuh4
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5610
reference_id
reference_type
scores
0
value 0.0086
scoring_system epss
scoring_elements 0.74973
published_at 2026-04-01T12:55:00Z
1
value 0.0086
scoring_system epss
scoring_elements 0.74976
published_at 2026-04-02T12:55:00Z
2
value 0.0086
scoring_system epss
scoring_elements 0.75005
published_at 2026-04-04T12:55:00Z
3
value 0.0086
scoring_system epss
scoring_elements 0.74981
published_at 2026-04-07T12:55:00Z
4
value 0.0086
scoring_system epss
scoring_elements 0.75015
published_at 2026-04-08T12:55:00Z
5
value 0.0086
scoring_system epss
scoring_elements 0.75027
published_at 2026-04-12T12:55:00Z
6
value 0.0086
scoring_system epss
scoring_elements 0.75048
published_at 2026-04-11T12:55:00Z
7
value 0.0086
scoring_system epss
scoring_elements 0.75017
published_at 2026-04-13T12:55:00Z
8
value 0.0086
scoring_system epss
scoring_elements 0.75053
published_at 2026-04-16T12:55:00Z
9
value 0.0086
scoring_system epss
scoring_elements 0.75061
published_at 2026-04-18T12:55:00Z
10
value 0.0086
scoring_system epss
scoring_elements 0.7505
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5610
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5488
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5489
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5490
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5491
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5492
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5493
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5612
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=852767
reference_id 852767
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=852767
fixed_packages
0
url pkg:deb/debian/wordpress@4.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.7.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-5610
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vg54-wjcw-fuh4
294
url VCID-vhnc-k9yw-cuar
vulnerability_id VCID-vhnc-k9yw-cuar
summary wp-includes/comment.php in WordPress before 3.0.2 does not properly whitelist trackbacks and pingbacks in the blogroll, which allows remote attackers to bypass intended spam restrictions via a crafted URL, as demonstrated by a URL that triggers a substring match.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-5293
reference_id
reference_type
scores
0
value 0.00387
scoring_system epss
scoring_elements 0.59697
published_at 2026-04-01T12:55:00Z
1
value 0.00387
scoring_system epss
scoring_elements 0.5977
published_at 2026-04-02T12:55:00Z
2
value 0.00387
scoring_system epss
scoring_elements 0.59795
published_at 2026-04-04T12:55:00Z
3
value 0.00387
scoring_system epss
scoring_elements 0.59764
published_at 2026-04-07T12:55:00Z
4
value 0.00387
scoring_system epss
scoring_elements 0.59815
published_at 2026-04-13T12:55:00Z
5
value 0.00387
scoring_system epss
scoring_elements 0.59829
published_at 2026-04-09T12:55:00Z
6
value 0.00387
scoring_system epss
scoring_elements 0.59849
published_at 2026-04-11T12:55:00Z
7
value 0.00387
scoring_system epss
scoring_elements 0.59833
published_at 2026-04-12T12:55:00Z
8
value 0.00387
scoring_system epss
scoring_elements 0.59852
published_at 2026-04-16T12:55:00Z
9
value 0.00387
scoring_system epss
scoring_elements 0.59859
published_at 2026-04-18T12:55:00Z
10
value 0.00387
scoring_system epss
scoring_elements 0.59842
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-5293
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5293
fixed_packages
0
url pkg:deb/debian/wordpress@3.0.2-1?distro=trixie
purl pkg:deb/debian/wordpress@3.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.0.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2010-5293
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vhnc-k9yw-cuar
295
url VCID-vj6y-1qup-jubg
vulnerability_id VCID-vj6y-1qup-jubg
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5493
reference_id
reference_type
scores
0
value 0.01668
scoring_system epss
scoring_elements 0.82138
published_at 2026-04-21T12:55:00Z
1
value 0.01668
scoring_system epss
scoring_elements 0.82038
published_at 2026-04-01T12:55:00Z
2
value 0.01668
scoring_system epss
scoring_elements 0.82049
published_at 2026-04-02T12:55:00Z
3
value 0.01668
scoring_system epss
scoring_elements 0.82071
published_at 2026-04-04T12:55:00Z
4
value 0.01668
scoring_system epss
scoring_elements 0.82066
published_at 2026-04-07T12:55:00Z
5
value 0.01668
scoring_system epss
scoring_elements 0.82093
published_at 2026-04-08T12:55:00Z
6
value 0.01668
scoring_system epss
scoring_elements 0.821
published_at 2026-04-09T12:55:00Z
7
value 0.01668
scoring_system epss
scoring_elements 0.82119
published_at 2026-04-11T12:55:00Z
8
value 0.01668
scoring_system epss
scoring_elements 0.8211
published_at 2026-04-12T12:55:00Z
9
value 0.01668
scoring_system epss
scoring_elements 0.82102
published_at 2026-04-13T12:55:00Z
10
value 0.01668
scoring_system epss
scoring_elements 0.82137
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5493
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5488
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5489
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5490
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5491
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5492
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5493
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5610
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5612
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851310
reference_id 851310
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851310
11
reference_url https://security.archlinux.org/ASA-201701-22
reference_id ASA-201701-22
reference_type
scores
url https://security.archlinux.org/ASA-201701-22
12
reference_url https://security.archlinux.org/AVG-142
reference_id AVG-142
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-142
fixed_packages
0
url pkg:deb/debian/wordpress@4.7.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.7.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.7.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-5493
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vj6y-1qup-jubg
296
url VCID-vn8w-n4v7-kkfd
vulnerability_id VCID-vn8w-n4v7-kkfd
summary WordPress 2.0.11 and earlier allows remote attackers to obtain sensitive information via an empty value of the page parameter to certain PHP scripts under wp-admin/, which reveals the path in various error messages.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0195
reference_id
reference_type
scores
0
value 0.02394
scoring_system epss
scoring_elements 0.84962
published_at 2026-04-01T12:55:00Z
1
value 0.02394
scoring_system epss
scoring_elements 0.84976
published_at 2026-04-02T12:55:00Z
2
value 0.02394
scoring_system epss
scoring_elements 0.84993
published_at 2026-04-04T12:55:00Z
3
value 0.02394
scoring_system epss
scoring_elements 0.84998
published_at 2026-04-07T12:55:00Z
4
value 0.02394
scoring_system epss
scoring_elements 0.8502
published_at 2026-04-08T12:55:00Z
5
value 0.02394
scoring_system epss
scoring_elements 0.85027
published_at 2026-04-09T12:55:00Z
6
value 0.02394
scoring_system epss
scoring_elements 0.85043
published_at 2026-04-11T12:55:00Z
7
value 0.02394
scoring_system epss
scoring_elements 0.85042
published_at 2026-04-12T12:55:00Z
8
value 0.02394
scoring_system epss
scoring_elements 0.85038
published_at 2026-04-13T12:55:00Z
9
value 0.02394
scoring_system epss
scoring_elements 0.85059
published_at 2026-04-21T12:55:00Z
10
value 0.02394
scoring_system epss
scoring_elements 0.85061
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0195
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0195
fixed_packages
0
url pkg:deb/debian/wordpress@2.1.0-1?distro=trixie
purl pkg:deb/debian/wordpress@2.1.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.1.0-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2008-0195
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vn8w-n4v7-kkfd
297
url VCID-vr2c-p6jy-3bb9
vulnerability_id VCID-vr2c-p6jy-3bb9
summary several
references
0
reference_url http://codex.wordpress.org/Version_3.5.2
reference_id
reference_type
scores
url http://codex.wordpress.org/Version_3.5.2
1
reference_url http://make.wordpress.org/core/2013/06/21/secure-swfupload/
reference_id
reference_type
scores
url http://make.wordpress.org/core/2013/06/21/secure-swfupload/
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2205
reference_id
reference_type
scores
0
value 0.0059
scoring_system epss
scoring_elements 0.69216
published_at 2026-04-21T12:55:00Z
1
value 0.0059
scoring_system epss
scoring_elements 0.69123
published_at 2026-04-01T12:55:00Z
2
value 0.0059
scoring_system epss
scoring_elements 0.69139
published_at 2026-04-02T12:55:00Z
3
value 0.0059
scoring_system epss
scoring_elements 0.6916
published_at 2026-04-04T12:55:00Z
4
value 0.0059
scoring_system epss
scoring_elements 0.69141
published_at 2026-04-07T12:55:00Z
5
value 0.0059
scoring_system epss
scoring_elements 0.69191
published_at 2026-04-08T12:55:00Z
6
value 0.0059
scoring_system epss
scoring_elements 0.6921
published_at 2026-04-09T12:55:00Z
7
value 0.0059
scoring_system epss
scoring_elements 0.69232
published_at 2026-04-11T12:55:00Z
8
value 0.0059
scoring_system epss
scoring_elements 0.69218
published_at 2026-04-12T12:55:00Z
9
value 0.0059
scoring_system epss
scoring_elements 0.69189
published_at 2026-04-13T12:55:00Z
10
value 0.0059
scoring_system epss
scoring_elements 0.69229
published_at 2026-04-16T12:55:00Z
11
value 0.0059
scoring_system epss
scoring_elements 0.69237
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2205
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=976784
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=976784
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2173
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2173
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2199
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2200
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2201
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2202
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2203
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2204
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2205
12
reference_url http://wordpress.org/news/2013/06/wordpress-3-5-2/
reference_id
reference_type
scores
url http://wordpress.org/news/2013/06/wordpress-3-5-2/
13
reference_url http://www.debian.org/security/2013/dsa-2718
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2718
14
reference_url http://www.securityfocus.com/bid/60759
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/60759
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=713947
reference_id 713947
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=713947
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2205
reference_id CVE-2013-2205
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-2205
fixed_packages
0
url pkg:deb/debian/wordpress@3.5.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.5.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.5.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2013-2205
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vr2c-p6jy-3bb9
298
url VCID-vs2q-hgzx-jkgk
vulnerability_id VCID-vs2q-hgzx-jkgk
summary Cross-site scripting (XSS) vulnerability in WordPress before 3.1.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4956
reference_id
reference_type
scores
0
value 0.00791
scoring_system epss
scoring_elements 0.73836
published_at 2026-04-01T12:55:00Z
1
value 0.00791
scoring_system epss
scoring_elements 0.73846
published_at 2026-04-02T12:55:00Z
2
value 0.00791
scoring_system epss
scoring_elements 0.73871
published_at 2026-04-04T12:55:00Z
3
value 0.00791
scoring_system epss
scoring_elements 0.73842
published_at 2026-04-07T12:55:00Z
4
value 0.00791
scoring_system epss
scoring_elements 0.73877
published_at 2026-04-08T12:55:00Z
5
value 0.00791
scoring_system epss
scoring_elements 0.7389
published_at 2026-04-09T12:55:00Z
6
value 0.00791
scoring_system epss
scoring_elements 0.73912
published_at 2026-04-11T12:55:00Z
7
value 0.00791
scoring_system epss
scoring_elements 0.73894
published_at 2026-04-12T12:55:00Z
8
value 0.00791
scoring_system epss
scoring_elements 0.73886
published_at 2026-04-13T12:55:00Z
9
value 0.00791
scoring_system epss
scoring_elements 0.73928
published_at 2026-04-21T12:55:00Z
10
value 0.00791
scoring_system epss
scoring_elements 0.73936
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4956
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4956
fixed_packages
0
url pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.2.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2011-4956
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vs2q-hgzx-jkgk
299
url VCID-vvb8-5w2s-euc2
vulnerability_id VCID-vvb8-5w2s-euc2
summary several
references
0
reference_url http://codex.wordpress.org/Version_3.5.2
reference_id
reference_type
scores
url http://codex.wordpress.org/Version_3.5.2
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2201
reference_id
reference_type
scores
0
value 0.00749
scoring_system epss
scoring_elements 0.73174
published_at 2026-04-21T12:55:00Z
1
value 0.00749
scoring_system epss
scoring_elements 0.73077
published_at 2026-04-01T12:55:00Z
2
value 0.00749
scoring_system epss
scoring_elements 0.73087
published_at 2026-04-02T12:55:00Z
3
value 0.00749
scoring_system epss
scoring_elements 0.73108
published_at 2026-04-04T12:55:00Z
4
value 0.00749
scoring_system epss
scoring_elements 0.73082
published_at 2026-04-07T12:55:00Z
5
value 0.00749
scoring_system epss
scoring_elements 0.73118
published_at 2026-04-08T12:55:00Z
6
value 0.00749
scoring_system epss
scoring_elements 0.73131
published_at 2026-04-09T12:55:00Z
7
value 0.00749
scoring_system epss
scoring_elements 0.73156
published_at 2026-04-11T12:55:00Z
8
value 0.00749
scoring_system epss
scoring_elements 0.73136
published_at 2026-04-12T12:55:00Z
9
value 0.00749
scoring_system epss
scoring_elements 0.7313
published_at 2026-04-13T12:55:00Z
10
value 0.00749
scoring_system epss
scoring_elements 0.73173
published_at 2026-04-16T12:55:00Z
11
value 0.00749
scoring_system epss
scoring_elements 0.73182
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2201
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=976784
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=976784
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2173
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2173
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2199
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2200
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2201
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2202
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2203
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2204
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2205
11
reference_url http://wordpress.org/news/2013/06/wordpress-3-5-2/
reference_id
reference_type
scores
url http://wordpress.org/news/2013/06/wordpress-3-5-2/
12
reference_url http://www.debian.org/security/2013/dsa-2718
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2718
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=713947
reference_id 713947
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=713947
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2201
reference_id CVE-2013-2201
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-2201
fixed_packages
0
url pkg:deb/debian/wordpress@3.5.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.5.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.5.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2013-2201
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vvb8-5w2s-euc2
300
url VCID-vyw2-2d41-6fhh
vulnerability_id VCID-vyw2-2d41-6fhh
summary Multiple cross-site scripting (XSS) vulnerabilities in Wordpress 1.2 allow remote attackers to inject arbitrary web script or HTML via the (1) redirect_to, text, popupurl, or popuptitle parameters to wp-login.php, (2) redirect_url parameter to admin-header.php, (3) popuptitle, popupurl, content, or post_title parameters to bookmarklet.php, (4) cat_ID parameter to categories.php, (5) s parameter to edit.php, or (6) s or mode parameter to edit-comments.php.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-1559
reference_id
reference_type
scores
0
value 0.01332
scoring_system epss
scoring_elements 0.79908
published_at 2026-04-01T12:55:00Z
1
value 0.01332
scoring_system epss
scoring_elements 0.79915
published_at 2026-04-02T12:55:00Z
2
value 0.01332
scoring_system epss
scoring_elements 0.79936
published_at 2026-04-04T12:55:00Z
3
value 0.01332
scoring_system epss
scoring_elements 0.79924
published_at 2026-04-07T12:55:00Z
4
value 0.01332
scoring_system epss
scoring_elements 0.79953
published_at 2026-04-08T12:55:00Z
5
value 0.01332
scoring_system epss
scoring_elements 0.79962
published_at 2026-04-09T12:55:00Z
6
value 0.01332
scoring_system epss
scoring_elements 0.79982
published_at 2026-04-11T12:55:00Z
7
value 0.01332
scoring_system epss
scoring_elements 0.79965
published_at 2026-04-12T12:55:00Z
8
value 0.01332
scoring_system epss
scoring_elements 0.79956
published_at 2026-04-13T12:55:00Z
9
value 0.01332
scoring_system epss
scoring_elements 0.79985
published_at 2026-04-18T12:55:00Z
10
value 0.01332
scoring_system epss
scoring_elements 0.79988
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-1559
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1559
2
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/24641.txt
reference_id CVE-2004-1559;OSVDB-10410
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/24641.txt
3
reference_url https://www.securityfocus.com/bid/11268/info
reference_id CVE-2004-1559;OSVDB-10410
reference_type exploit
scores
url https://www.securityfocus.com/bid/11268/info
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/24642.txt
reference_id CVE-2004-1559;OSVDB-10411
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/24642.txt
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/24643.txt
reference_id CVE-2004-1559;OSVDB-10412
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/24643.txt
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/24644.txt
reference_id CVE-2004-1559;OSVDB-10413
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/24644.txt
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/24645.txt
reference_id CVE-2004-1559;OSVDB-10414
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/24645.txt
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/24646.txt
reference_id CVE-2004-1559;OSVDB-10415
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/24646.txt
fixed_packages
0
url pkg:deb/debian/wordpress@1.2.2-1.1?distro=trixie
purl pkg:deb/debian/wordpress@1.2.2-1.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@1.2.2-1.1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2004-1559
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vyw2-2d41-6fhh
301
url VCID-vywc-p4tw-8yd2
vulnerability_id VCID-vywc-p4tw-8yd2
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6815
reference_id
reference_type
scores
0
value 0.06385
scoring_system epss
scoring_elements 0.91042
published_at 2026-04-18T12:55:00Z
1
value 0.06385
scoring_system epss
scoring_elements 0.90968
published_at 2026-04-01T12:55:00Z
2
value 0.06385
scoring_system epss
scoring_elements 0.90973
published_at 2026-04-02T12:55:00Z
3
value 0.06385
scoring_system epss
scoring_elements 0.90983
published_at 2026-04-04T12:55:00Z
4
value 0.06385
scoring_system epss
scoring_elements 0.90993
published_at 2026-04-07T12:55:00Z
5
value 0.06385
scoring_system epss
scoring_elements 0.91005
published_at 2026-04-08T12:55:00Z
6
value 0.06385
scoring_system epss
scoring_elements 0.91011
published_at 2026-04-09T12:55:00Z
7
value 0.06385
scoring_system epss
scoring_elements 0.91019
published_at 2026-04-13T12:55:00Z
8
value 0.06385
scoring_system epss
scoring_elements 0.91044
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6815
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6814
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6815
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6816
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6817
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857026
reference_id 857026
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857026
6
reference_url https://security.archlinux.org/ASA-201703-14
reference_id ASA-201703-14
reference_type
scores
url https://security.archlinux.org/ASA-201703-14
7
reference_url https://security.archlinux.org/AVG-202
reference_id AVG-202
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-202
fixed_packages
0
url pkg:deb/debian/wordpress@4.7.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.7.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.7.3%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-6815
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vywc-p4tw-8yd2
302
url VCID-w7r4-c8yh-hkbc
vulnerability_id VCID-w7r4-c8yh-hkbc
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9061
reference_id
reference_type
scores
0
value 0.03308
scoring_system epss
scoring_elements 0.87193
published_at 2026-04-01T12:55:00Z
1
value 0.03308
scoring_system epss
scoring_elements 0.87203
published_at 2026-04-02T12:55:00Z
2
value 0.03308
scoring_system epss
scoring_elements 0.87219
published_at 2026-04-04T12:55:00Z
3
value 0.03308
scoring_system epss
scoring_elements 0.87216
published_at 2026-04-07T12:55:00Z
4
value 0.03308
scoring_system epss
scoring_elements 0.87236
published_at 2026-04-08T12:55:00Z
5
value 0.03308
scoring_system epss
scoring_elements 0.87243
published_at 2026-04-09T12:55:00Z
6
value 0.03308
scoring_system epss
scoring_elements 0.87256
published_at 2026-04-11T12:55:00Z
7
value 0.03308
scoring_system epss
scoring_elements 0.8725
published_at 2026-04-12T12:55:00Z
8
value 0.03308
scoring_system epss
scoring_elements 0.87245
published_at 2026-04-13T12:55:00Z
9
value 0.03308
scoring_system epss
scoring_elements 0.87261
published_at 2026-04-16T12:55:00Z
10
value 0.03308
scoring_system epss
scoring_elements 0.87265
published_at 2026-04-18T12:55:00Z
11
value 0.03308
scoring_system epss
scoring_elements 0.87259
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9061
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8295
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9061
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9062
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9062
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9063
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9064
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9065
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862816
reference_id 862816
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862816
fixed_packages
0
url pkg:deb/debian/wordpress@4.7.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.7.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.7.5%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-9061
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w7r4-c8yh-hkbc
303
url VCID-w8w1-e5zu-ffgx
vulnerability_id VCID-w8w1-e5zu-ffgx
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-11026
reference_id
reference_type
scores
0
value 0.0441
scoring_system epss
scoring_elements 0.88962
published_at 2026-04-01T12:55:00Z
1
value 0.0441
scoring_system epss
scoring_elements 0.8897
published_at 2026-04-02T12:55:00Z
2
value 0.0441
scoring_system epss
scoring_elements 0.88986
published_at 2026-04-04T12:55:00Z
3
value 0.0441
scoring_system epss
scoring_elements 0.88989
published_at 2026-04-07T12:55:00Z
4
value 0.0441
scoring_system epss
scoring_elements 0.89007
published_at 2026-04-08T12:55:00Z
5
value 0.0441
scoring_system epss
scoring_elements 0.89012
published_at 2026-04-09T12:55:00Z
6
value 0.0441
scoring_system epss
scoring_elements 0.89024
published_at 2026-04-21T12:55:00Z
7
value 0.0441
scoring_system epss
scoring_elements 0.89019
published_at 2026-04-12T12:55:00Z
8
value 0.0441
scoring_system epss
scoring_elements 0.89017
published_at 2026-04-13T12:55:00Z
9
value 0.0441
scoring_system epss
scoring_elements 0.8903
published_at 2026-04-16T12:55:00Z
10
value 0.0441
scoring_system epss
scoring_elements 0.89029
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-11026
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11025
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11026
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11027
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11027
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11028
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11029
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959391
reference_id 959391
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959391
fixed_packages
0
url pkg:deb/debian/wordpress@5.4.1%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.4.1%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.4.1%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2020-11026
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w8w1-e5zu-ffgx
304
url VCID-wenb-bpws-mkar
vulnerability_id VCID-wenb-bpws-mkar
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-11028
reference_id
reference_type
scores
0
value 0.00949
scoring_system epss
scoring_elements 0.76293
published_at 2026-04-01T12:55:00Z
1
value 0.00949
scoring_system epss
scoring_elements 0.76296
published_at 2026-04-02T12:55:00Z
2
value 0.00949
scoring_system epss
scoring_elements 0.76327
published_at 2026-04-04T12:55:00Z
3
value 0.00949
scoring_system epss
scoring_elements 0.76306
published_at 2026-04-07T12:55:00Z
4
value 0.00949
scoring_system epss
scoring_elements 0.76339
published_at 2026-04-08T12:55:00Z
5
value 0.00949
scoring_system epss
scoring_elements 0.76352
published_at 2026-04-13T12:55:00Z
6
value 0.00949
scoring_system epss
scoring_elements 0.76379
published_at 2026-04-11T12:55:00Z
7
value 0.00949
scoring_system epss
scoring_elements 0.76357
published_at 2026-04-12T12:55:00Z
8
value 0.00949
scoring_system epss
scoring_elements 0.76392
published_at 2026-04-16T12:55:00Z
9
value 0.00949
scoring_system epss
scoring_elements 0.76399
published_at 2026-04-18T12:55:00Z
10
value 0.00949
scoring_system epss
scoring_elements 0.76383
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-11028
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11025
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11026
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11027
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11027
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11028
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11029
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959391
reference_id 959391
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959391
fixed_packages
0
url pkg:deb/debian/wordpress@5.4.1%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.4.1%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.4.1%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2020-11028
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wenb-bpws-mkar
305
url VCID-wsez-144m-hkd4
vulnerability_id VCID-wsez-144m-hkd4
summary Cross-site scripting (XSS) vulnerability in wp-register.php in WordPress 2.0 and 2.0.1 allows remote attackers to inject arbitrary web script or HTML via the user_email parameter.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5105
reference_id
reference_type
scores
0
value 0.01681
scoring_system epss
scoring_elements 0.82112
published_at 2026-04-01T12:55:00Z
1
value 0.01681
scoring_system epss
scoring_elements 0.82126
published_at 2026-04-02T12:55:00Z
2
value 0.01681
scoring_system epss
scoring_elements 0.82147
published_at 2026-04-04T12:55:00Z
3
value 0.01681
scoring_system epss
scoring_elements 0.82144
published_at 2026-04-07T12:55:00Z
4
value 0.01681
scoring_system epss
scoring_elements 0.8217
published_at 2026-04-08T12:55:00Z
5
value 0.01681
scoring_system epss
scoring_elements 0.82177
published_at 2026-04-09T12:55:00Z
6
value 0.01681
scoring_system epss
scoring_elements 0.82196
published_at 2026-04-11T12:55:00Z
7
value 0.01681
scoring_system epss
scoring_elements 0.82188
published_at 2026-04-12T12:55:00Z
8
value 0.01681
scoring_system epss
scoring_elements 0.82182
published_at 2026-04-13T12:55:00Z
9
value 0.01681
scoring_system epss
scoring_elements 0.82218
published_at 2026-04-18T12:55:00Z
10
value 0.01681
scoring_system epss
scoring_elements 0.8222
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5105
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5105
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5105
2
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/30602.html
reference_id CVE-2007-5105;OSVDB-38577
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/30602.html
3
reference_url https://www.securityfocus.com/bid/25769/info
reference_id CVE-2007-5105;OSVDB-38577
reference_type exploit
scores
url https://www.securityfocus.com/bid/25769/info
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.4-1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.4-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-5105
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wsez-144m-hkd4
306
url VCID-wtuc-n99m-fyby
vulnerability_id VCID-wtuc-n99m-fyby
summary xmlrpc (xmlrpc.php) in WordPress 2.1.2, and probably earlier, allows remote authenticated users with the contributor role to bypass intended access restrictions and invoke the publish_posts functionality, which can be used to "publish a previously saved post."
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1893
reference_id
reference_type
scores
0
value 0.00189
scoring_system epss
scoring_elements 0.40674
published_at 2026-04-21T12:55:00Z
1
value 0.00189
scoring_system epss
scoring_elements 0.40678
published_at 2026-04-01T12:55:00Z
2
value 0.00189
scoring_system epss
scoring_elements 0.40762
published_at 2026-04-02T12:55:00Z
3
value 0.00189
scoring_system epss
scoring_elements 0.40789
published_at 2026-04-11T12:55:00Z
4
value 0.00189
scoring_system epss
scoring_elements 0.40714
published_at 2026-04-07T12:55:00Z
5
value 0.00189
scoring_system epss
scoring_elements 0.40763
published_at 2026-04-08T12:55:00Z
6
value 0.00189
scoring_system epss
scoring_elements 0.4077
published_at 2026-04-09T12:55:00Z
7
value 0.00189
scoring_system epss
scoring_elements 0.40755
published_at 2026-04-12T12:55:00Z
8
value 0.00189
scoring_system epss
scoring_elements 0.40736
published_at 2026-04-13T12:55:00Z
9
value 0.00189
scoring_system epss
scoring_elements 0.40781
published_at 2026-04-16T12:55:00Z
10
value 0.00189
scoring_system epss
scoring_elements 0.40751
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1893
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1893
2
reference_url http://secunia.com/advisories/24751
reference_id
reference_type
scores
url http://secunia.com/advisories/24751
3
reference_url http://secunia.com/advisories/25108
reference_id
reference_type
scores
url http://secunia.com/advisories/25108
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/33470
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/33470
5
reference_url http://trac.wordpress.org/ticket/4091
reference_id
reference_type
scores
url http://trac.wordpress.org/ticket/4091
6
reference_url http://www.debian.org/security/2007/dsa-1285
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1285
7
reference_url http://www.notsosecure.com/folder2/2007/04/03/wordpress-212-xmlrpc-security-issues/
reference_id
reference_type
scores
url http://www.notsosecure.com/folder2/2007/04/03/wordpress-212-xmlrpc-security-issues/
8
reference_url http://www.vupen.com/english/advisories/2007/1245
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1245
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1893
reference_id CVE-2007-1893
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-1893
fixed_packages
0
url pkg:deb/debian/wordpress@2.1.3-1?distro=trixie
purl pkg:deb/debian/wordpress@2.1.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.1.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-1893
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wtuc-n99m-fyby
307
url VCID-wzb1-au3p-uuas
vulnerability_id VCID-wzb1-au3p-uuas
summary Unrestricted file upload vulnerability in (1) wp-app.php and (2) app.php in WordPress 2.2.1 and WordPress MU 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code via unspecified vectors, possibly related to the wp_postmeta table and the use of custom fields in normal (non-attachment) posts. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-3543.
references
0
reference_url http://osvdb.org/37294
reference_id
reference_type
scores
url http://osvdb.org/37294
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3544
reference_id
reference_type
scores
0
value 0.01234
scoring_system epss
scoring_elements 0.79216
published_at 2026-04-18T12:55:00Z
1
value 0.01234
scoring_system epss
scoring_elements 0.79143
published_at 2026-04-01T12:55:00Z
2
value 0.01234
scoring_system epss
scoring_elements 0.79149
published_at 2026-04-02T12:55:00Z
3
value 0.01234
scoring_system epss
scoring_elements 0.79174
published_at 2026-04-04T12:55:00Z
4
value 0.01234
scoring_system epss
scoring_elements 0.7916
published_at 2026-04-07T12:55:00Z
5
value 0.01234
scoring_system epss
scoring_elements 0.79185
published_at 2026-04-08T12:55:00Z
6
value 0.01234
scoring_system epss
scoring_elements 0.79193
published_at 2026-04-13T12:55:00Z
7
value 0.01234
scoring_system epss
scoring_elements 0.79217
published_at 2026-04-21T12:55:00Z
8
value 0.01234
scoring_system epss
scoring_elements 0.79202
published_at 2026-04-12T12:55:00Z
9
value 0.01234
scoring_system epss
scoring_elements 0.79219
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3544
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3544
3
reference_url http://www.buayacorp.com/files/wordpress/wordpress-advisory.html
reference_id
reference_type
scores
url http://www.buayacorp.com/files/wordpress/wordpress-advisory.html
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3544
reference_id CVE-2007-3544
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-3544
fixed_packages
0
url pkg:deb/debian/wordpress@2.2.2-1?distro=trixie
purl pkg:deb/debian/wordpress@2.2.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.2.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-3544
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wzb1-au3p-uuas
308
url VCID-x5g3-2yvt-xkfm
vulnerability_id VCID-x5g3-2yvt-xkfm
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9062
reference_id
reference_type
scores
0
value 0.01674
scoring_system epss
scoring_elements 0.82072
published_at 2026-04-01T12:55:00Z
1
value 0.01674
scoring_system epss
scoring_elements 0.82084
published_at 2026-04-02T12:55:00Z
2
value 0.01674
scoring_system epss
scoring_elements 0.82105
published_at 2026-04-04T12:55:00Z
3
value 0.01674
scoring_system epss
scoring_elements 0.82101
published_at 2026-04-07T12:55:00Z
4
value 0.01674
scoring_system epss
scoring_elements 0.82127
published_at 2026-04-08T12:55:00Z
5
value 0.01674
scoring_system epss
scoring_elements 0.82135
published_at 2026-04-09T12:55:00Z
6
value 0.01674
scoring_system epss
scoring_elements 0.82153
published_at 2026-04-11T12:55:00Z
7
value 0.01674
scoring_system epss
scoring_elements 0.82145
published_at 2026-04-12T12:55:00Z
8
value 0.01674
scoring_system epss
scoring_elements 0.82138
published_at 2026-04-13T12:55:00Z
9
value 0.01674
scoring_system epss
scoring_elements 0.82176
published_at 2026-04-18T12:55:00Z
10
value 0.01674
scoring_system epss
scoring_elements 0.82179
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9062
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8295
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9061
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9062
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9062
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9063
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9064
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9065
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862816
reference_id 862816
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862816
fixed_packages
0
url pkg:deb/debian/wordpress@4.7.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.7.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.7.5%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-9062
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x5g3-2yvt-xkfm
309
url VCID-x733-wwnx-c7fv
vulnerability_id VCID-x733-wwnx-c7fv
summary WordPress version <4.9 contains a CWE-20 Input Validation vulnerability in thumbnail processing that can result in remote code execution. This attack appears to be exploitable via thumbnail upload by an authenticated user and may require additional plugins in order to be exploited however this has not been confirmed at this time. This issue appears to have been partially, but not completely fixed in WordPress 4.9
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000600
reference_id
reference_type
scores
0
value 0.19822
scoring_system epss
scoring_elements 0.95412
published_at 2026-04-01T12:55:00Z
1
value 0.19822
scoring_system epss
scoring_elements 0.95421
published_at 2026-04-02T12:55:00Z
2
value 0.19822
scoring_system epss
scoring_elements 0.95427
published_at 2026-04-04T12:55:00Z
3
value 0.19822
scoring_system epss
scoring_elements 0.95431
published_at 2026-04-07T12:55:00Z
4
value 0.19822
scoring_system epss
scoring_elements 0.95438
published_at 2026-04-08T12:55:00Z
5
value 0.19822
scoring_system epss
scoring_elements 0.9544
published_at 2026-04-09T12:55:00Z
6
value 0.19822
scoring_system epss
scoring_elements 0.95445
published_at 2026-04-11T12:55:00Z
7
value 0.19822
scoring_system epss
scoring_elements 0.95444
published_at 2026-04-12T12:55:00Z
8
value 0.19822
scoring_system epss
scoring_elements 0.95446
published_at 2026-04-13T12:55:00Z
9
value 0.19822
scoring_system epss
scoring_elements 0.95455
published_at 2026-04-16T12:55:00Z
10
value 0.19822
scoring_system epss
scoring_elements 0.95459
published_at 2026-04-18T12:55:00Z
11
value 0.19822
scoring_system epss
scoring_elements 0.95463
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000600
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000600
fixed_packages
0
url pkg:deb/debian/wordpress@4.9.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.9.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.9.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-1000600
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x733-wwnx-c7fv
310
url VCID-x7aj-4qxd-rkcu
vulnerability_id VCID-x7aj-4qxd-rkcu
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14726
reference_id
reference_type
scores
0
value 0.05803
scoring_system epss
scoring_elements 0.90529
published_at 2026-04-21T12:55:00Z
1
value 0.05803
scoring_system epss
scoring_elements 0.90531
published_at 2026-04-18T12:55:00Z
2
value 0.05803
scoring_system epss
scoring_elements 0.90471
published_at 2026-04-01T12:55:00Z
3
value 0.05803
scoring_system epss
scoring_elements 0.90475
published_at 2026-04-02T12:55:00Z
4
value 0.05803
scoring_system epss
scoring_elements 0.90486
published_at 2026-04-04T12:55:00Z
5
value 0.05803
scoring_system epss
scoring_elements 0.90492
published_at 2026-04-07T12:55:00Z
6
value 0.05803
scoring_system epss
scoring_elements 0.90505
published_at 2026-04-08T12:55:00Z
7
value 0.05803
scoring_system epss
scoring_elements 0.90511
published_at 2026-04-09T12:55:00Z
8
value 0.05803
scoring_system epss
scoring_elements 0.9052
published_at 2026-04-11T12:55:00Z
9
value 0.05803
scoring_system epss
scoring_elements 0.90519
published_at 2026-04-12T12:55:00Z
10
value 0.05803
scoring_system epss
scoring_elements 0.90513
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14726
1
reference_url https://core.trac.wordpress.org/changeset/41395
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/41395
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14718
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14720
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14721
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14722
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14723
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14726
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14726
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14990
11
reference_url https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
12
reference_url https://wpvulndb.com/vulnerabilities/8914
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8914
13
reference_url https://www.debian.org/security/2017/dsa-3997
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3997
14
reference_url http://www.securityfocus.com/bid/100912
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100912
15
reference_url http://www.securitytracker.com/id/1039553
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039553
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876274
reference_id 876274
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876274
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-14726
reference_id CVE-2017-14726
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-14726
fixed_packages
0
url pkg:deb/debian/wordpress@4.8.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.8.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.8.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-14726
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x7aj-4qxd-rkcu
311
url VCID-x89y-av45-ufgh
vulnerability_id VCID-x89y-av45-ufgh
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0165
reference_id
reference_type
scores
0
value 0.00521
scoring_system epss
scoring_elements 0.66765
published_at 2026-04-01T12:55:00Z
1
value 0.00521
scoring_system epss
scoring_elements 0.66804
published_at 2026-04-02T12:55:00Z
2
value 0.00521
scoring_system epss
scoring_elements 0.66828
published_at 2026-04-04T12:55:00Z
3
value 0.00521
scoring_system epss
scoring_elements 0.66801
published_at 2026-04-07T12:55:00Z
4
value 0.00521
scoring_system epss
scoring_elements 0.6685
published_at 2026-04-08T12:55:00Z
5
value 0.00521
scoring_system epss
scoring_elements 0.66864
published_at 2026-04-09T12:55:00Z
6
value 0.00521
scoring_system epss
scoring_elements 0.66884
published_at 2026-04-11T12:55:00Z
7
value 0.00521
scoring_system epss
scoring_elements 0.6687
published_at 2026-04-12T12:55:00Z
8
value 0.00521
scoring_system epss
scoring_elements 0.66838
published_at 2026-04-13T12:55:00Z
9
value 0.00521
scoring_system epss
scoring_elements 0.66871
published_at 2026-04-16T12:55:00Z
10
value 0.00521
scoring_system epss
scoring_elements 0.66885
published_at 2026-04-18T12:55:00Z
11
value 0.00521
scoring_system epss
scoring_elements 0.66868
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0165
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0165
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0165
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0166
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744018
reference_id 744018
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744018
fixed_packages
0
url pkg:deb/debian/wordpress@3.8.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.8.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.8.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2014-0165
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x89y-av45-ufgh
312
url VCID-x8zt-cvau-xbeb
vulnerability_id VCID-x8zt-cvau-xbeb
summary
A flaw in WordPress allows registered WordPress users to elevate
    privileges.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4028
reference_id
reference_type
scores
0
value 0.05593
scoring_system epss
scoring_elements 0.90266
published_at 2026-04-01T12:55:00Z
1
value 0.05593
scoring_system epss
scoring_elements 0.90268
published_at 2026-04-02T12:55:00Z
2
value 0.05593
scoring_system epss
scoring_elements 0.90282
published_at 2026-04-04T12:55:00Z
3
value 0.05593
scoring_system epss
scoring_elements 0.90286
published_at 2026-04-07T12:55:00Z
4
value 0.05593
scoring_system epss
scoring_elements 0.90301
published_at 2026-04-08T12:55:00Z
5
value 0.05593
scoring_system epss
scoring_elements 0.90308
published_at 2026-04-09T12:55:00Z
6
value 0.05593
scoring_system epss
scoring_elements 0.90316
published_at 2026-04-11T12:55:00Z
7
value 0.05593
scoring_system epss
scoring_elements 0.90315
published_at 2026-04-12T12:55:00Z
8
value 0.05593
scoring_system epss
scoring_elements 0.9031
published_at 2026-04-13T12:55:00Z
9
value 0.05593
scoring_system epss
scoring_elements 0.90326
published_at 2026-04-18T12:55:00Z
10
value 0.05593
scoring_system epss
scoring_elements 0.90323
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4028
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4028
2
reference_url https://security.gentoo.org/glsa/200608-19
reference_id GLSA-200608-19
reference_type
scores
url https://security.gentoo.org/glsa/200608-19
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.4-1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.4-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2006-4028
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x8zt-cvau-xbeb
313
url VCID-xd4w-ak3v-dybq
vulnerability_id VCID-xd4w-ak3v-dybq
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20151
reference_id
reference_type
scores
0
value 0.06796
scoring_system epss
scoring_elements 0.91272
published_at 2026-04-01T12:55:00Z
1
value 0.06796
scoring_system epss
scoring_elements 0.91277
published_at 2026-04-02T12:55:00Z
2
value 0.06796
scoring_system epss
scoring_elements 0.91287
published_at 2026-04-04T12:55:00Z
3
value 0.06796
scoring_system epss
scoring_elements 0.91293
published_at 2026-04-07T12:55:00Z
4
value 0.06796
scoring_system epss
scoring_elements 0.91306
published_at 2026-04-08T12:55:00Z
5
value 0.06796
scoring_system epss
scoring_elements 0.91312
published_at 2026-04-09T12:55:00Z
6
value 0.06796
scoring_system epss
scoring_elements 0.91319
published_at 2026-04-11T12:55:00Z
7
value 0.06796
scoring_system epss
scoring_elements 0.91321
published_at 2026-04-12T12:55:00Z
8
value 0.06796
scoring_system epss
scoring_elements 0.9132
published_at 2026-04-13T12:55:00Z
9
value 0.06796
scoring_system epss
scoring_elements 0.91345
published_at 2026-04-21T12:55:00Z
10
value 0.06796
scoring_system epss
scoring_elements 0.91344
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20151
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20148
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20149
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20150
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20151
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20152
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20153
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8942
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916403
reference_id 916403
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916403
fixed_packages
0
url pkg:deb/debian/wordpress@5.0.1%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.0.1%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.0.1%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2018-20151
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xd4w-ak3v-dybq
314
url VCID-xezj-tz9b-t7d3
vulnerability_id VCID-xezj-tz9b-t7d3
summary
WordPress contains HTTP response splitting and cross-site scripting
    vulnerabilities.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-1584
reference_id
reference_type
scores
0
value 0.16
scoring_system epss
scoring_elements 0.94736
published_at 2026-04-01T12:55:00Z
1
value 0.16
scoring_system epss
scoring_elements 0.94746
published_at 2026-04-02T12:55:00Z
2
value 0.16
scoring_system epss
scoring_elements 0.94749
published_at 2026-04-04T12:55:00Z
3
value 0.16
scoring_system epss
scoring_elements 0.9475
published_at 2026-04-07T12:55:00Z
4
value 0.16
scoring_system epss
scoring_elements 0.9476
published_at 2026-04-08T12:55:00Z
5
value 0.16
scoring_system epss
scoring_elements 0.94764
published_at 2026-04-09T12:55:00Z
6
value 0.16
scoring_system epss
scoring_elements 0.94768
published_at 2026-04-11T12:55:00Z
7
value 0.16
scoring_system epss
scoring_elements 0.94771
published_at 2026-04-12T12:55:00Z
8
value 0.16
scoring_system epss
scoring_elements 0.94772
published_at 2026-04-13T12:55:00Z
9
value 0.16
scoring_system epss
scoring_elements 0.94779
published_at 2026-04-16T12:55:00Z
10
value 0.16
scoring_system epss
scoring_elements 0.94782
published_at 2026-04-18T12:55:00Z
11
value 0.16
scoring_system epss
scoring_elements 0.94785
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-1584
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1584
2
reference_url https://security.gentoo.org/glsa/200410-12
reference_id GLSA-200410-12
reference_type
scores
url https://security.gentoo.org/glsa/200410-12
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/570.txt
reference_id OSVDB-10595;CVE-2004-1584
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/570.txt
fixed_packages
0
url pkg:deb/debian/wordpress@1.2.1-1.1?distro=trixie
purl pkg:deb/debian/wordpress@1.2.1-1.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@1.2.1-1.1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2004-1584
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xezj-tz9b-t7d3
315
url VCID-xfxs-pjex-3bh3
vulnerability_id VCID-xfxs-pjex-3bh3
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39999
reference_id
reference_type
scores
0
value 0.00895
scoring_system epss
scoring_elements 0.75544
published_at 2026-04-02T12:55:00Z
1
value 0.00895
scoring_system epss
scoring_elements 0.75574
published_at 2026-04-04T12:55:00Z
2
value 0.00895
scoring_system epss
scoring_elements 0.75553
published_at 2026-04-07T12:55:00Z
3
value 0.00895
scoring_system epss
scoring_elements 0.75587
published_at 2026-04-08T12:55:00Z
4
value 0.00895
scoring_system epss
scoring_elements 0.75598
published_at 2026-04-13T12:55:00Z
5
value 0.00895
scoring_system epss
scoring_elements 0.75623
published_at 2026-04-11T12:55:00Z
6
value 0.00895
scoring_system epss
scoring_elements 0.75604
published_at 2026-04-12T12:55:00Z
7
value 0.00895
scoring_system epss
scoring_elements 0.75635
published_at 2026-04-16T12:55:00Z
8
value 0.00895
scoring_system epss
scoring_elements 0.75639
published_at 2026-04-18T12:55:00Z
9
value 0.00895
scoring_system epss
scoring_elements 0.75624
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39999
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39999
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5561
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31210
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31210
fixed_packages
0
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@6.1.6%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.6%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.6%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.3.2%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.3.2%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.3.2%252Bdfsg1-1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2023-39999
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xfxs-pjex-3bh3
316
url VCID-xg1e-yjwb-r3h4
vulnerability_id VCID-xg1e-yjwb-r3h4
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5714
reference_id
reference_type
scores
0
value 0.30646
scoring_system epss
scoring_elements 0.9673
published_at 2026-04-21T12:55:00Z
1
value 0.30646
scoring_system epss
scoring_elements 0.96727
published_at 2026-04-18T12:55:00Z
2
value 0.30646
scoring_system epss
scoring_elements 0.96685
published_at 2026-04-01T12:55:00Z
3
value 0.30646
scoring_system epss
scoring_elements 0.96695
published_at 2026-04-02T12:55:00Z
4
value 0.30646
scoring_system epss
scoring_elements 0.96697
published_at 2026-04-04T12:55:00Z
5
value 0.30646
scoring_system epss
scoring_elements 0.96702
published_at 2026-04-07T12:55:00Z
6
value 0.30646
scoring_system epss
scoring_elements 0.96709
published_at 2026-04-08T12:55:00Z
7
value 0.30646
scoring_system epss
scoring_elements 0.96711
published_at 2026-04-09T12:55:00Z
8
value 0.30646
scoring_system epss
scoring_elements 0.96714
published_at 2026-04-12T12:55:00Z
9
value 0.30646
scoring_system epss
scoring_elements 0.96717
published_at 2026-04-13T12:55:00Z
10
value 0.30646
scoring_system epss
scoring_elements 0.96723
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5714
1
reference_url https://codex.wordpress.org/Version_4.3.1
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.3.1
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2213
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5622
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5714
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5715
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5731
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5732
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5734
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7989
10
reference_url https://github.com/WordPress/WordPress/commit/f72b21af23da6b6d54208e5c1d65ececdaa109c8
reference_id
reference_type
scores
url https://github.com/WordPress/WordPress/commit/f72b21af23da6b6d54208e5c1d65ececdaa109c8
11
reference_url https://security-tracker.debian.org/tracker/CVE-2015-5714
reference_id
reference_type
scores
url https://security-tracker.debian.org/tracker/CVE-2015-5714
12
reference_url https://wordpress.org/news/2015/09/wordpress-4-3-1/
reference_id
reference_type
scores
url https://wordpress.org/news/2015/09/wordpress-4-3-1/
13
reference_url https://wpvulndb.com/vulnerabilities/8186
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8186
14
reference_url http://www.debian.org/security/2015/dsa-3375
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3375
15
reference_url http://www.debian.org/security/2015/dsa-3383
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3383
16
reference_url http://www.securityfocus.com/bid/76745
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/76745
17
reference_url http://www.securitytracker.com/id/1033979
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033979
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799140
reference_id 799140
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799140
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5714
reference_id CVE-2015-5714
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-5714
fixed_packages
0
url pkg:deb/debian/wordpress@4.3.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.3.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.3.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2015-5714
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xg1e-yjwb-r3h4
317
url VCID-xj9y-sb3e-vkac
vulnerability_id VCID-xj9y-sb3e-vkac
summary WordPress allows remote attackers to cause a denial of service (bandwidth or thread consumption) via pingback service calls with a source URI that corresponds to a file with a binary content type, which is downloaded even though it cannot contain usable pingback data.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0540
reference_id
reference_type
scores
0
value 0.0776
scoring_system epss
scoring_elements 0.91962
published_at 2026-04-21T12:55:00Z
1
value 0.0776
scoring_system epss
scoring_elements 0.91909
published_at 2026-04-01T12:55:00Z
2
value 0.0776
scoring_system epss
scoring_elements 0.91917
published_at 2026-04-02T12:55:00Z
3
value 0.0776
scoring_system epss
scoring_elements 0.91925
published_at 2026-04-04T12:55:00Z
4
value 0.0776
scoring_system epss
scoring_elements 0.91932
published_at 2026-04-07T12:55:00Z
5
value 0.0776
scoring_system epss
scoring_elements 0.91944
published_at 2026-04-08T12:55:00Z
6
value 0.0776
scoring_system epss
scoring_elements 0.9195
published_at 2026-04-09T12:55:00Z
7
value 0.0776
scoring_system epss
scoring_elements 0.91953
published_at 2026-04-11T12:55:00Z
8
value 0.0776
scoring_system epss
scoring_elements 0.91952
published_at 2026-04-12T12:55:00Z
9
value 0.0776
scoring_system epss
scoring_elements 0.91948
published_at 2026-04-13T12:55:00Z
10
value 0.0776
scoring_system epss
scoring_elements 0.91968
published_at 2026-04-16T12:55:00Z
11
value 0.0776
scoring_system epss
scoring_elements 0.91965
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0540
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0540
2
reference_url http://secunia.com/advisories/30013
reference_id
reference_type
scores
url http://secunia.com/advisories/30013
3
reference_url http://securityreason.com/securityalert/2191
reference_id
reference_type
scores
url http://securityreason.com/securityalert/2191
4
reference_url http://www.debian.org/security/2008/dsa-1564
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1564
5
reference_url http://www.securityfocus.com/archive/1/457996/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/457996/100/0/threaded
6
reference_url http://www.securityfocus.com/archive/1/458003/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/458003/100/0/threaded
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0540
reference_id CVE-2007-0540
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-0540
9
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/29522.py
reference_id CVE-2007-0540;OSVDB-33006
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/29522.py
10
reference_url https://www.securityfocus.com/bid/22220/info
reference_id CVE-2007-0540;OSVDB-33006
reference_type exploit
scores
url https://www.securityfocus.com/bid/22220/info
fixed_packages
0
url pkg:deb/debian/wordpress@2.1.0-1?distro=trixie
purl pkg:deb/debian/wordpress@2.1.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.1.0-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-0540
risk_score 9.0
exploitability 2.0
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xj9y-sb3e-vkac
318
url VCID-xsz3-bme6-ubfn
vulnerability_id VCID-xsz3-bme6-ubfn
summary WordPress: XSS via unescaped HTML URLs as author comments in the admin page
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2851.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2851.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2851
reference_id
reference_type
scores
0
value 0.02987
scoring_system epss
scoring_elements 0.86477
published_at 2026-04-01T12:55:00Z
1
value 0.02987
scoring_system epss
scoring_elements 0.86487
published_at 2026-04-02T12:55:00Z
2
value 0.02987
scoring_system epss
scoring_elements 0.86506
published_at 2026-04-04T12:55:00Z
3
value 0.02987
scoring_system epss
scoring_elements 0.86505
published_at 2026-04-07T12:55:00Z
4
value 0.02987
scoring_system epss
scoring_elements 0.86525
published_at 2026-04-08T12:55:00Z
5
value 0.02987
scoring_system epss
scoring_elements 0.86535
published_at 2026-04-09T12:55:00Z
6
value 0.02987
scoring_system epss
scoring_elements 0.8655
published_at 2026-04-11T12:55:00Z
7
value 0.02987
scoring_system epss
scoring_elements 0.86547
published_at 2026-04-12T12:55:00Z
8
value 0.02987
scoring_system epss
scoring_elements 0.86541
published_at 2026-04-13T12:55:00Z
9
value 0.02987
scoring_system epss
scoring_elements 0.86556
published_at 2026-04-16T12:55:00Z
10
value 0.02987
scoring_system epss
scoring_elements 0.86561
published_at 2026-04-18T12:55:00Z
11
value 0.02987
scoring_system epss
scoring_elements 0.86554
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2851
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2851
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=512900
reference_id 512900
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=512900
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/9250.sh
reference_id CVE-2009-2851;OSVDB-56193
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/9250.sh
fixed_packages
0
url pkg:deb/debian/wordpress@2.8.3-1?distro=trixie
purl pkg:deb/debian/wordpress@2.8.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.8.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2009-2851
risk_score null
exploitability 2.0
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xsz3-bme6-ubfn
319
url VCID-xwgs-bt6t-qfbh
vulnerability_id VCID-xwgs-bt6t-qfbh
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5623
reference_id
reference_type
scores
0
value 0.48368
scoring_system epss
scoring_elements 0.9772
published_at 2026-04-01T12:55:00Z
1
value 0.48368
scoring_system epss
scoring_elements 0.97727
published_at 2026-04-02T12:55:00Z
2
value 0.48368
scoring_system epss
scoring_elements 0.97728
published_at 2026-04-07T12:55:00Z
3
value 0.48368
scoring_system epss
scoring_elements 0.97733
published_at 2026-04-08T12:55:00Z
4
value 0.48368
scoring_system epss
scoring_elements 0.97737
published_at 2026-04-09T12:55:00Z
5
value 0.48368
scoring_system epss
scoring_elements 0.97739
published_at 2026-04-11T12:55:00Z
6
value 0.48368
scoring_system epss
scoring_elements 0.97741
published_at 2026-04-12T12:55:00Z
7
value 0.48368
scoring_system epss
scoring_elements 0.97743
published_at 2026-04-13T12:55:00Z
8
value 0.48368
scoring_system epss
scoring_elements 0.97748
published_at 2026-04-16T12:55:00Z
9
value 0.48368
scoring_system epss
scoring_elements 0.97751
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5623
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3429
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5623
fixed_packages
0
url pkg:deb/debian/wordpress@4.2.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.2.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.2.3%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2015-5623
risk_score 0.2
exploitability 0.5
weighted_severity 0.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xwgs-bt6t-qfbh
320
url VCID-xzu6-fn31-43ej
vulnerability_id VCID-xzu6-fn31-43ej
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21662
reference_id
reference_type
scores
0
value 0.14241
scoring_system epss
scoring_elements 0.94363
published_at 2026-04-02T12:55:00Z
1
value 0.14241
scoring_system epss
scoring_elements 0.94373
published_at 2026-04-04T12:55:00Z
2
value 0.14241
scoring_system epss
scoring_elements 0.94374
published_at 2026-04-07T12:55:00Z
3
value 0.14241
scoring_system epss
scoring_elements 0.94384
published_at 2026-04-08T12:55:00Z
4
value 0.14241
scoring_system epss
scoring_elements 0.94388
published_at 2026-04-09T12:55:00Z
5
value 0.14241
scoring_system epss
scoring_elements 0.94391
published_at 2026-04-11T12:55:00Z
6
value 0.14241
scoring_system epss
scoring_elements 0.94392
published_at 2026-04-12T12:55:00Z
7
value 0.14241
scoring_system epss
scoring_elements 0.94393
published_at 2026-04-13T12:55:00Z
8
value 0.14241
scoring_system epss
scoring_elements 0.94408
published_at 2026-04-16T12:55:00Z
9
value 0.14241
scoring_system epss
scoring_elements 0.94413
published_at 2026-04-18T12:55:00Z
10
value 0.14241
scoring_system epss
scoring_elements 0.94416
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21662
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21661
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21662
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21663
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21664
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1003243
reference_id 1003243
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1003243
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4UNEC63UU5GEU47IIR4RMTZAHNEOJG/
reference_id CV4UNEC63UU5GEU47IIR4RMTZAHNEOJG
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:57:20Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4UNEC63UU5GEU47IIR4RMTZAHNEOJG/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DM6XPH3JN6V4NF4WBOJTOXZIVE6VKKE3/
reference_id DM6XPH3JN6V4NF4WBOJTOXZIVE6VKKE3
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:57:20Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DM6XPH3JN6V4NF4WBOJTOXZIVE6VKKE3/
8
reference_url https://www.debian.org/security/2022/dsa-5039
reference_id dsa-5039
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:57:20Z/
url https://www.debian.org/security/2022/dsa-5039
9
reference_url https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-699q-3hj9-889w
reference_id GHSA-699q-3hj9-889w
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:57:20Z/
url https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-699q-3hj9-889w
10
reference_url https://lists.debian.org/debian-lts-announce/2022/01/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:57:20Z/
url https://lists.debian.org/debian-lts-announce/2022/01/msg00019.html
11
reference_url https://wordpress.org/news/2022/01/wordpress-5-8-3-security-release/
reference_id wordpress-5-8-3-security-release
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:57:20Z/
url https://wordpress.org/news/2022/01/wordpress-5-8-3-security-release/
fixed_packages
0
url pkg:deb/debian/wordpress@5.7.5%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.5%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.5%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@5.8.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.8.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.8.3%252Bdfsg1-1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2022-21662
risk_score 3.6
exploitability 0.5
weighted_severity 7.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xzu6-fn31-43ej
321
url VCID-y1em-tppz-7qew
vulnerability_id VCID-y1em-tppz-7qew
summary Multiple cross-site scripting (XSS) vulnerabilities in KSES, as used in WordPress before 3.0.4, allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) the & (ampersand) character, (2) the case of an attribute name, (3) a padded entity, and (4) an entity that is not in normalized form.
references
0
reference_url http://core.trac.wordpress.org/changeset/17172/branches/3.0
reference_id
reference_type
scores
url http://core.trac.wordpress.org/changeset/17172/branches/3.0
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053289.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053289.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053293.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053293.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4536
reference_id
reference_type
scores
0
value 0.03881
scoring_system epss
scoring_elements 0.88258
published_at 2026-04-21T12:55:00Z
1
value 0.03881
scoring_system epss
scoring_elements 0.88187
published_at 2026-04-01T12:55:00Z
2
value 0.03881
scoring_system epss
scoring_elements 0.88195
published_at 2026-04-02T12:55:00Z
3
value 0.03881
scoring_system epss
scoring_elements 0.88211
published_at 2026-04-04T12:55:00Z
4
value 0.03881
scoring_system epss
scoring_elements 0.88217
published_at 2026-04-07T12:55:00Z
5
value 0.03881
scoring_system epss
scoring_elements 0.88236
published_at 2026-04-08T12:55:00Z
6
value 0.03881
scoring_system epss
scoring_elements 0.88242
published_at 2026-04-09T12:55:00Z
7
value 0.03881
scoring_system epss
scoring_elements 0.88254
published_at 2026-04-11T12:55:00Z
8
value 0.03881
scoring_system epss
scoring_elements 0.88246
published_at 2026-04-13T12:55:00Z
9
value 0.03881
scoring_system epss
scoring_elements 0.8826
published_at 2026-04-16T12:55:00Z
10
value 0.03881
scoring_system epss
scoring_elements 0.88259
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4536
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4536
5
reference_url http://secunia.com/advisories/42755
reference_id
reference_type
scores
url http://secunia.com/advisories/42755
6
reference_url http://secunia.com/advisories/43000
reference_id
reference_type
scores
url http://secunia.com/advisories/43000
7
reference_url http://wordpress.org/news/2010/12/3-0-4-update/
reference_id
reference_type
scores
url http://wordpress.org/news/2010/12/3-0-4-update/
8
reference_url http://www.openwall.com/lists/oss-security/2010/12/30/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/12/30/1
9
reference_url http://www.securityfocus.com/bid/45620
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45620
10
reference_url http://www.vupen.com/english/advisories/2010/3335
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3335
11
reference_url http://www.vupen.com/english/advisories/2011/0167
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0167
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4536
reference_id CVE-2010-4536
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-4536
fixed_packages
0
url pkg:deb/debian/wordpress@3.0.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.0.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.0.4%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2010-4536
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y1em-tppz-7qew
322
url VCID-y2jb-7zbk-27cg
vulnerability_id VCID-y2jb-7zbk-27cg
summary Cross-site scripting (XSS) vulnerability in swfupload.swf in SWFUpload 2.2.0.1 and earlier, as used in WordPress before 3.3.2, TinyMCE Image Manager 1.1, and other products, allows remote attackers to inject arbitrary web script or HTML via the movieName parameter, related to the "ExternalInterface.call" function.
references
0
reference_url http://bot24.blogspot.ca/2013/04/swfupload-object-injectioncsrf.html
reference_id
reference_type
scores
url http://bot24.blogspot.ca/2013/04/swfupload-object-injectioncsrf.html
1
reference_url http://code.google.com/p/swfupload/issues/detail?id=376
reference_id
reference_type
scores
url http://code.google.com/p/swfupload/issues/detail?id=376
2
reference_url http://make.wordpress.org/core/2013/06/21/secure-swfupload/
reference_id
reference_type
scores
url http://make.wordpress.org/core/2013/06/21/secure-swfupload/
3
reference_url http://packetstormsecurity.com/files/122399/TinyMCE-Image-Manager-1.1-Cross-Site-Scripting.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/122399/TinyMCE-Image-Manager-1.1-Cross-Site-Scripting.html
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3414
reference_id
reference_type
scores
0
value 0.06259
scoring_system epss
scoring_elements 0.90939
published_at 2026-04-21T12:55:00Z
1
value 0.06259
scoring_system epss
scoring_elements 0.90866
published_at 2026-04-01T12:55:00Z
2
value 0.06259
scoring_system epss
scoring_elements 0.90871
published_at 2026-04-02T12:55:00Z
3
value 0.06259
scoring_system epss
scoring_elements 0.9088
published_at 2026-04-04T12:55:00Z
4
value 0.06259
scoring_system epss
scoring_elements 0.90891
published_at 2026-04-07T12:55:00Z
5
value 0.06259
scoring_system epss
scoring_elements 0.90903
published_at 2026-04-08T12:55:00Z
6
value 0.06259
scoring_system epss
scoring_elements 0.90909
published_at 2026-04-09T12:55:00Z
7
value 0.06259
scoring_system epss
scoring_elements 0.90918
published_at 2026-04-12T12:55:00Z
8
value 0.06259
scoring_system epss
scoring_elements 0.90917
published_at 2026-04-13T12:55:00Z
9
value 0.06259
scoring_system epss
scoring_elements 0.90941
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3414
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3414
6
reference_url https://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupload/
reference_id
reference_type
scores
url https://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupload/
7
reference_url http://www.openwall.com/lists/oss-security/2012/07/16/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/07/16/4
8
reference_url http://www.openwall.com/lists/oss-security/2012/07/17/12
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/07/17/12
9
reference_url http://www.securityfocus.com/bid/54245
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/54245
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698934
reference_id 698934
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698934
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:swfupload_project:swfupload:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:swfupload_project:swfupload:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:swfupload_project:swfupload:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:swfupload_project:swfupload:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:swfupload_project:swfupload:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:swfupload_project:swfupload:1.0.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:swfupload_project:swfupload:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:swfupload_project:swfupload:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:swfupload_project:swfupload:2.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:swfupload_project:swfupload:2.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:swfupload_project:swfupload:2.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:swfupload_project:swfupload:2.1.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:swfupload_project:swfupload:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:swfupload_project:swfupload:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:swfupload_project:swfupload:2.2.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tinymce:image_manager:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tinymce:image_manager:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tinymce:image_manager:1.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3414
reference_id CVE-2012-3414
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-3414
35
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/37470.txt
reference_id CVE-2012-3414;OSVDB-83413
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/37470.txt
36
reference_url https://www.securityfocus.com/bid/54245/info
reference_id CVE-2012-3414;OSVDB-83413
reference_type exploit
scores
url https://www.securityfocus.com/bid/54245/info
fixed_packages
0
url pkg:deb/debian/wordpress@3.5.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.5.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.5.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2012-3414
risk_score 7.8
exploitability 2.0
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y2jb-7zbk-27cg
323
url VCID-y72f-vtf2-2fat
vulnerability_id VCID-y72f-vtf2-2fat
summary wp-login.php in WordPress 2.8.3 and earlier allows remote attackers to force a password reset for the first user in the database, possibly the administrator, via a key[] array variable in a resetpass (aka rp) action, which bypasses a check that assumes that $key is not an array.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2762
reference_id
reference_type
scores
0
value 0.74127
scoring_system epss
scoring_elements 0.98825
published_at 2026-04-02T12:55:00Z
1
value 0.74127
scoring_system epss
scoring_elements 0.98828
published_at 2026-04-04T12:55:00Z
2
value 0.74127
scoring_system epss
scoring_elements 0.9883
published_at 2026-04-07T12:55:00Z
3
value 0.74127
scoring_system epss
scoring_elements 0.98831
published_at 2026-04-09T12:55:00Z
4
value 0.74127
scoring_system epss
scoring_elements 0.98833
published_at 2026-04-11T12:55:00Z
5
value 0.74127
scoring_system epss
scoring_elements 0.98834
published_at 2026-04-13T12:55:00Z
6
value 0.74127
scoring_system epss
scoring_elements 0.98839
published_at 2026-04-16T12:55:00Z
7
value 0.74127
scoring_system epss
scoring_elements 0.9884
published_at 2026-04-18T12:55:00Z
8
value 0.74127
scoring_system epss
scoring_elements 0.98845
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2762
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2762
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=541102
reference_id 541102
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=541102
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/6397.txt
reference_id CVE-2009-2762;OSVDB-56971
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/6397.txt
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/6421.php
reference_id CVE-2009-2762;OSVDB-56971
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/6421.php
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/9410.txt
reference_id OSVDB-56971;CVE-2009-2762
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/9410.txt
fixed_packages
0
url pkg:deb/debian/wordpress@2.8.3-2?distro=trixie
purl pkg:deb/debian/wordpress@2.8.3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.8.3-2%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2009-2762
risk_score 1.4
exploitability 2.0
weighted_severity 0.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y72f-vtf2-2fat
324
url VCID-yees-gysw-d3cx
vulnerability_id VCID-yees-gysw-d3cx
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5839
reference_id
reference_type
scores
0
value 0.01122
scoring_system epss
scoring_elements 0.7828
published_at 2026-04-21T12:55:00Z
1
value 0.01122
scoring_system epss
scoring_elements 0.78283
published_at 2026-04-18T12:55:00Z
2
value 0.01122
scoring_system epss
scoring_elements 0.78198
published_at 2026-04-01T12:55:00Z
3
value 0.01122
scoring_system epss
scoring_elements 0.78206
published_at 2026-04-02T12:55:00Z
4
value 0.01122
scoring_system epss
scoring_elements 0.78236
published_at 2026-04-04T12:55:00Z
5
value 0.01122
scoring_system epss
scoring_elements 0.78219
published_at 2026-04-07T12:55:00Z
6
value 0.01122
scoring_system epss
scoring_elements 0.78245
published_at 2026-04-08T12:55:00Z
7
value 0.01122
scoring_system epss
scoring_elements 0.78251
published_at 2026-04-09T12:55:00Z
8
value 0.01122
scoring_system epss
scoring_elements 0.78276
published_at 2026-04-11T12:55:00Z
9
value 0.01122
scoring_system epss
scoring_elements 0.78259
published_at 2026-04-12T12:55:00Z
10
value 0.01122
scoring_system epss
scoring_elements 0.78255
published_at 2026-04-13T12:55:00Z
11
value 0.01122
scoring_system epss
scoring_elements 0.78286
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5839
1
reference_url https://codex.wordpress.org/Version_4.5.3
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.5.3
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8834
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5832
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5832
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5834
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5835
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5837
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5838
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5838
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5839
9
reference_url https://wordpress.org/news/2016/06/wordpress-4-5-3/
reference_id
reference_type
scores
url https://wordpress.org/news/2016/06/wordpress-4-5-3/
10
reference_url http://www.debian.org/security/2016/dsa-3639
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3639
11
reference_url http://www.securityfocus.com/bid/91364
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91364
12
reference_url http://www.securitytracker.com/id/1036163
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036163
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5839
reference_id CVE-2016-5839
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-5839
fixed_packages
0
url pkg:deb/debian/wordpress@4.5.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.5.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.5.3%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2016-5839
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yees-gysw-d3cx
325
url VCID-ymp4-217x-6ub4
vulnerability_id VCID-ymp4-217x-6ub4
summary wordpress: multiple vulnerabilities
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2432.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2432.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2432
reference_id
reference_type
scores
0
value 0.01072
scoring_system epss
scoring_elements 0.7769
published_at 2026-04-01T12:55:00Z
1
value 0.01072
scoring_system epss
scoring_elements 0.77697
published_at 2026-04-02T12:55:00Z
2
value 0.01072
scoring_system epss
scoring_elements 0.77725
published_at 2026-04-04T12:55:00Z
3
value 0.01072
scoring_system epss
scoring_elements 0.77708
published_at 2026-04-07T12:55:00Z
4
value 0.01072
scoring_system epss
scoring_elements 0.77736
published_at 2026-04-08T12:55:00Z
5
value 0.01072
scoring_system epss
scoring_elements 0.77741
published_at 2026-04-09T12:55:00Z
6
value 0.01072
scoring_system epss
scoring_elements 0.77767
published_at 2026-04-11T12:55:00Z
7
value 0.01072
scoring_system epss
scoring_elements 0.77751
published_at 2026-04-12T12:55:00Z
8
value 0.01072
scoring_system epss
scoring_elements 0.7775
published_at 2026-04-13T12:55:00Z
9
value 0.01072
scoring_system epss
scoring_elements 0.77787
published_at 2026-04-16T12:55:00Z
10
value 0.01072
scoring_system epss
scoring_elements 0.77785
published_at 2026-04-18T12:55:00Z
11
value 0.01072
scoring_system epss
scoring_elements 0.77779
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2432
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2432
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=510745
reference_id 510745
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=510745
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=537146
reference_id 537146
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=537146
fixed_packages
0
url pkg:deb/debian/wordpress@2.8.3-1?distro=trixie
purl pkg:deb/debian/wordpress@2.8.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.8.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2009-2432
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ymp4-217x-6ub4
326
url VCID-yqam-kpce-dfg7
vulnerability_id VCID-yqam-kpce-dfg7
summary WordPress before 5.8 lacks support for the Update URI plugin header. This makes it easier for remote attackers to execute arbitrary code via a supply-chain attack against WordPress installations that use any plugin for which the slug satisfies the naming constraints of the WordPress.org Plugin Directory but is not yet present in that directory.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-44223
reference_id
reference_type
scores
0
value 0.27489
scoring_system epss
scoring_elements 0.96388
published_at 2026-04-01T12:55:00Z
1
value 0.27489
scoring_system epss
scoring_elements 0.96395
published_at 2026-04-02T12:55:00Z
2
value 0.27489
scoring_system epss
scoring_elements 0.96399
published_at 2026-04-04T12:55:00Z
3
value 0.27489
scoring_system epss
scoring_elements 0.96402
published_at 2026-04-07T12:55:00Z
4
value 0.27489
scoring_system epss
scoring_elements 0.96411
published_at 2026-04-08T12:55:00Z
5
value 0.27489
scoring_system epss
scoring_elements 0.96414
published_at 2026-04-09T12:55:00Z
6
value 0.27489
scoring_system epss
scoring_elements 0.96419
published_at 2026-04-11T12:55:00Z
7
value 0.27489
scoring_system epss
scoring_elements 0.9642
published_at 2026-04-12T12:55:00Z
8
value 0.27489
scoring_system epss
scoring_elements 0.96423
published_at 2026-04-13T12:55:00Z
9
value 0.27489
scoring_system epss
scoring_elements 0.9643
published_at 2026-04-16T12:55:00Z
10
value 0.27489
scoring_system epss
scoring_elements 0.96434
published_at 2026-04-18T12:55:00Z
11
value 0.27489
scoring_system epss
scoring_elements 0.96435
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-44223
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44223
fixed_packages
0
url pkg:deb/debian/wordpress@5.8.1%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.8.1%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.8.1%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2021-44223
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yqam-kpce-dfg7
327
url VCID-yqyp-a879-nfda
vulnerability_id VCID-yqyp-a879-nfda
summary
WordPress is vulnerable to SQL injection, information disclosure, and
    cross-site scripting attacks.
references
0
reference_url http://osvdb.org/31579
reference_id
reference_type
scores
url http://osvdb.org/31579
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0107
reference_id
reference_type
scores
0
value 0.06942
scoring_system epss
scoring_elements 0.91447
published_at 2026-04-21T12:55:00Z
1
value 0.06942
scoring_system epss
scoring_elements 0.91377
published_at 2026-04-01T12:55:00Z
2
value 0.06942
scoring_system epss
scoring_elements 0.91383
published_at 2026-04-02T12:55:00Z
3
value 0.06942
scoring_system epss
scoring_elements 0.91393
published_at 2026-04-04T12:55:00Z
4
value 0.06942
scoring_system epss
scoring_elements 0.91401
published_at 2026-04-07T12:55:00Z
5
value 0.06942
scoring_system epss
scoring_elements 0.91413
published_at 2026-04-08T12:55:00Z
6
value 0.06942
scoring_system epss
scoring_elements 0.9142
published_at 2026-04-09T12:55:00Z
7
value 0.06942
scoring_system epss
scoring_elements 0.91426
published_at 2026-04-11T12:55:00Z
8
value 0.06942
scoring_system epss
scoring_elements 0.91428
published_at 2026-04-12T12:55:00Z
9
value 0.06942
scoring_system epss
scoring_elements 0.91427
published_at 2026-04-13T12:55:00Z
10
value 0.06942
scoring_system epss
scoring_elements 0.91451
published_at 2026-04-16T12:55:00Z
11
value 0.06942
scoring_system epss
scoring_elements 0.91446
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0107
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0107
3
reference_url http://secunia.com/advisories/23595
reference_id
reference_type
scores
url http://secunia.com/advisories/23595
4
reference_url http://secunia.com/advisories/23741
reference_id
reference_type
scores
url http://secunia.com/advisories/23741
5
reference_url http://security.gentoo.org/glsa/glsa-200701-10.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200701-10.xml
6
reference_url http://securityreason.com/securityalert/2112
reference_id
reference_type
scores
url http://securityreason.com/securityalert/2112
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/31297
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/31297
8
reference_url http://wordpress.org/development/2007/01/wordpress-206/
reference_id
reference_type
scores
url http://wordpress.org/development/2007/01/wordpress-206/
9
reference_url http://www.hardened-php.net/advisory_022007.141.html
reference_id
reference_type
scores
url http://www.hardened-php.net/advisory_022007.141.html
10
reference_url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.005.html
reference_id
reference_type
scores
url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.005.html
11
reference_url http://www.securityfocus.com/archive/1/456049/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/456049/100/0/threaded
12
reference_url http://www.securityfocus.com/bid/21907
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/21907
13
reference_url http://www.vupen.com/english/advisories/2007/0061
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0061
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=405691
reference_id 405691
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=405691
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
16
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/3095.py
reference_id CVE-2007-0107
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/3095.py
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0107
reference_id CVE-2007-0107
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-0107
18
reference_url https://security.gentoo.org/glsa/200701-10
reference_id GLSA-200701-10
reference_type
scores
url https://security.gentoo.org/glsa/200701-10
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.6-1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.6-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2007-0107
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yqyp-a879-nfda
328
url VCID-ys9t-dsgg-zbff
vulnerability_id VCID-ys9t-dsgg-zbff
summary Cross-site scripting (XSS) vulnerability in wp-admin/press-this.php in WordPress before 2.8.6 allows remote authenticated users to inject arbitrary web script or HTML via the s parameter (aka the selection variable).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3891
reference_id
reference_type
scores
0
value 0.01041
scoring_system epss
scoring_elements 0.77378
published_at 2026-04-01T12:55:00Z
1
value 0.01041
scoring_system epss
scoring_elements 0.77385
published_at 2026-04-02T12:55:00Z
2
value 0.01041
scoring_system epss
scoring_elements 0.77411
published_at 2026-04-04T12:55:00Z
3
value 0.01041
scoring_system epss
scoring_elements 0.77391
published_at 2026-04-07T12:55:00Z
4
value 0.01041
scoring_system epss
scoring_elements 0.77421
published_at 2026-04-08T12:55:00Z
5
value 0.01041
scoring_system epss
scoring_elements 0.77431
published_at 2026-04-09T12:55:00Z
6
value 0.01041
scoring_system epss
scoring_elements 0.77456
published_at 2026-04-11T12:55:00Z
7
value 0.01041
scoring_system epss
scoring_elements 0.77436
published_at 2026-04-12T12:55:00Z
8
value 0.01041
scoring_system epss
scoring_elements 0.77433
published_at 2026-04-13T12:55:00Z
9
value 0.01041
scoring_system epss
scoring_elements 0.77472
published_at 2026-04-16T12:55:00Z
10
value 0.01041
scoring_system epss
scoring_elements 0.7747
published_at 2026-04-18T12:55:00Z
11
value 0.01041
scoring_system epss
scoring_elements 0.77462
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3891
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3891
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3891
fixed_packages
0
url pkg:deb/debian/wordpress@2.8.6-1?distro=trixie
purl pkg:deb/debian/wordpress@2.8.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.8.6-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2009-3891
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ys9t-dsgg-zbff
329
url VCID-ysde-2c1f-r3a3
vulnerability_id VCID-ysde-2c1f-r3a3
summary wp-includes/vars.php in Wordpress before 2.2.3 does not properly extract the current path from the PATH_INFO ($PHP_SELF), which allows remote attackers to bypass intended access restrictions for certain pages.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2146
reference_id
reference_type
scores
0
value 0.00583
scoring_system epss
scoring_elements 0.68909
published_at 2026-04-01T12:55:00Z
1
value 0.00583
scoring_system epss
scoring_elements 0.68927
published_at 2026-04-07T12:55:00Z
2
value 0.00583
scoring_system epss
scoring_elements 0.68947
published_at 2026-04-04T12:55:00Z
3
value 0.00583
scoring_system epss
scoring_elements 0.68977
published_at 2026-04-08T12:55:00Z
4
value 0.00583
scoring_system epss
scoring_elements 0.68996
published_at 2026-04-09T12:55:00Z
5
value 0.00583
scoring_system epss
scoring_elements 0.69019
published_at 2026-04-11T12:55:00Z
6
value 0.00583
scoring_system epss
scoring_elements 0.69005
published_at 2026-04-12T12:55:00Z
7
value 0.00583
scoring_system epss
scoring_elements 0.68975
published_at 2026-04-13T12:55:00Z
8
value 0.00583
scoring_system epss
scoring_elements 0.69016
published_at 2026-04-16T12:55:00Z
9
value 0.00583
scoring_system epss
scoring_elements 0.69026
published_at 2026-04-18T12:55:00Z
10
value 0.00583
scoring_system epss
scoring_elements 0.69006
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2146
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2146
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2146
fixed_packages
0
url pkg:deb/debian/wordpress@2.2.3-1?distro=trixie
purl pkg:deb/debian/wordpress@2.2.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.2.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2008-2146
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ysde-2c1f-r3a3
330
url VCID-z4g5-m3kv-93e3
vulnerability_id VCID-z4g5-m3kv-93e3
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9063
reference_id
reference_type
scores
0
value 0.01449
scoring_system epss
scoring_elements 0.80707
published_at 2026-04-01T12:55:00Z
1
value 0.01449
scoring_system epss
scoring_elements 0.80717
published_at 2026-04-02T12:55:00Z
2
value 0.01449
scoring_system epss
scoring_elements 0.80738
published_at 2026-04-04T12:55:00Z
3
value 0.01449
scoring_system epss
scoring_elements 0.80734
published_at 2026-04-07T12:55:00Z
4
value 0.01449
scoring_system epss
scoring_elements 0.80762
published_at 2026-04-08T12:55:00Z
5
value 0.01449
scoring_system epss
scoring_elements 0.8077
published_at 2026-04-09T12:55:00Z
6
value 0.01449
scoring_system epss
scoring_elements 0.80787
published_at 2026-04-11T12:55:00Z
7
value 0.01449
scoring_system epss
scoring_elements 0.80771
published_at 2026-04-12T12:55:00Z
8
value 0.01449
scoring_system epss
scoring_elements 0.80763
published_at 2026-04-13T12:55:00Z
9
value 0.01449
scoring_system epss
scoring_elements 0.808
published_at 2026-04-16T12:55:00Z
10
value 0.01449
scoring_system epss
scoring_elements 0.80803
published_at 2026-04-18T12:55:00Z
11
value 0.01449
scoring_system epss
scoring_elements 0.80804
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9063
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8295
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9061
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9062
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9062
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9063
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9064
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9065
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862816
reference_id 862816
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862816
fixed_packages
0
url pkg:deb/debian/wordpress@4.7.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.7.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.7.5%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-9063
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z4g5-m3kv-93e3
331
url VCID-z8gv-sec9-xbam
vulnerability_id VCID-z8gv-sec9-xbam
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14722
reference_id
reference_type
scores
0
value 0.30547
scoring_system epss
scoring_elements 0.96723
published_at 2026-04-21T12:55:00Z
1
value 0.30547
scoring_system epss
scoring_elements 0.9672
published_at 2026-04-18T12:55:00Z
2
value 0.30547
scoring_system epss
scoring_elements 0.96678
published_at 2026-04-01T12:55:00Z
3
value 0.30547
scoring_system epss
scoring_elements 0.96688
published_at 2026-04-02T12:55:00Z
4
value 0.30547
scoring_system epss
scoring_elements 0.9669
published_at 2026-04-04T12:55:00Z
5
value 0.30547
scoring_system epss
scoring_elements 0.96694
published_at 2026-04-07T12:55:00Z
6
value 0.30547
scoring_system epss
scoring_elements 0.96702
published_at 2026-04-08T12:55:00Z
7
value 0.30547
scoring_system epss
scoring_elements 0.96704
published_at 2026-04-09T12:55:00Z
8
value 0.30547
scoring_system epss
scoring_elements 0.96706
published_at 2026-04-11T12:55:00Z
9
value 0.30547
scoring_system epss
scoring_elements 0.96707
published_at 2026-04-12T12:55:00Z
10
value 0.30547
scoring_system epss
scoring_elements 0.96709
published_at 2026-04-13T12:55:00Z
11
value 0.30547
scoring_system epss
scoring_elements 0.96715
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14722
1
reference_url https://core.trac.wordpress.org/changeset/41397
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/41397
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14718
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14720
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14721
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14722
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14723
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14726
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14726
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14990
11
reference_url https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
12
reference_url https://wpvulndb.com/vulnerabilities/8912
reference_id
reference_type
scores
url https://wpvulndb.com/vulnerabilities/8912
13
reference_url https://www.debian.org/security/2017/dsa-3997
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-3997
14
reference_url http://www.securityfocus.com/bid/100912
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100912
15
reference_url http://www.securitytracker.com/id/1039553
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039553
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876274
reference_id 876274
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876274
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7.4:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.7.5:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.8:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:4.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.8.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-14722
reference_id CVE-2017-14722
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-14722
fixed_packages
0
url pkg:deb/debian/wordpress@4.8.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.8.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.8.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-14722
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z8gv-sec9-xbam
332
url VCID-zebg-ku4f-dbgk
vulnerability_id VCID-zebg-ku4f-dbgk
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3429
reference_id
reference_type
scores
0
value 0.01531
scoring_system epss
scoring_elements 0.81253
published_at 2026-04-01T12:55:00Z
1
value 0.01531
scoring_system epss
scoring_elements 0.81262
published_at 2026-04-02T12:55:00Z
2
value 0.01531
scoring_system epss
scoring_elements 0.81284
published_at 2026-04-04T12:55:00Z
3
value 0.01531
scoring_system epss
scoring_elements 0.81283
published_at 2026-04-07T12:55:00Z
4
value 0.01531
scoring_system epss
scoring_elements 0.81311
published_at 2026-04-08T12:55:00Z
5
value 0.01531
scoring_system epss
scoring_elements 0.81316
published_at 2026-04-09T12:55:00Z
6
value 0.01531
scoring_system epss
scoring_elements 0.81337
published_at 2026-04-11T12:55:00Z
7
value 0.01531
scoring_system epss
scoring_elements 0.81323
published_at 2026-04-12T12:55:00Z
8
value 0.01531
scoring_system epss
scoring_elements 0.81315
published_at 2026-04-13T12:55:00Z
9
value 0.01531
scoring_system epss
scoring_elements 0.81353
published_at 2026-04-16T12:55:00Z
10
value 0.01531
scoring_system epss
scoring_elements 0.81355
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3429
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3429
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5623
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784603
reference_id 784603
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784603
fixed_packages
0
url pkg:deb/debian/wordpress@4.2.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.2.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.2.2%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2015-3429
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zebg-ku4f-dbgk
333
url VCID-zf8r-75us-nygf
vulnerability_id VCID-zf8r-75us-nygf
summary WordPress core is vulnerable to unauthorized access in versions 6.9 through 6.9.1. The Notes feature (block-level collaboration annotations) was introduced in WordPress 6.9 to allow editorial comments directly on posts in the block editor. However, the REST API `create_item_permissions_check()` method in the comments controller did not verify that the authenticated user has `edit_post` permission on the target post when creating a note. This makes it possible for authenticated attackers with Subscriber-level access to create notes on any post, including posts authored by other users, private posts, and posts in any status.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-3906
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06071
published_at 2026-04-02T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.061
published_at 2026-04-04T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06083
published_at 2026-04-07T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06123
published_at 2026-04-08T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06162
published_at 2026-04-09T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06153
published_at 2026-04-11T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07361
published_at 2026-04-21T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07318
published_at 2026-04-12T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07308
published_at 2026-04-13T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07238
published_at 2026-04-16T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07233
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-3906
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131148
reference_id 1131148
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131148
2
reference_url https://core.trac.wordpress.org/changeset/61888
reference_id 61888
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T13:18:15Z/
url https://core.trac.wordpress.org/changeset/61888
3
reference_url https://www.wordfence.com/threat-intel/vulnerabilities/id/a69782f0-aa61-4049-8339-7f27f4b6c36b?source=cve
reference_id a69782f0-aa61-4049-8339-7f27f4b6c36b?source=cve
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T13:18:15Z/
url https://www.wordfence.com/threat-intel/vulnerabilities/id/a69782f0-aa61-4049-8339-7f27f4b6c36b?source=cve
4
reference_url https://core.trac.wordpress.org/browser/trunk/src/wp-includes/rest-api/endpoints/class-wp-rest-comments-controller.php#L562
reference_id class-wp-rest-comments-controller.php#L562
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T13:18:15Z/
url https://core.trac.wordpress.org/browser/trunk/src/wp-includes/rest-api/endpoints/class-wp-rest-comments-controller.php#L562
fixed_packages
0
url pkg:deb/debian/wordpress@0?distro=trixie
purl pkg:deb/debian/wordpress@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@0%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2026-3906
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zf8r-75us-nygf
334
url VCID-zhsu-sye9-mkaz
vulnerability_id VCID-zhsu-sye9-mkaz
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9064
reference_id
reference_type
scores
0
value 0.01257
scoring_system epss
scoring_elements 0.79335
published_at 2026-04-01T12:55:00Z
1
value 0.01257
scoring_system epss
scoring_elements 0.79342
published_at 2026-04-02T12:55:00Z
2
value 0.01257
scoring_system epss
scoring_elements 0.79365
published_at 2026-04-04T12:55:00Z
3
value 0.01257
scoring_system epss
scoring_elements 0.79351
published_at 2026-04-07T12:55:00Z
4
value 0.01257
scoring_system epss
scoring_elements 0.79378
published_at 2026-04-08T12:55:00Z
5
value 0.01257
scoring_system epss
scoring_elements 0.79387
published_at 2026-04-09T12:55:00Z
6
value 0.01257
scoring_system epss
scoring_elements 0.7941
published_at 2026-04-11T12:55:00Z
7
value 0.01257
scoring_system epss
scoring_elements 0.79394
published_at 2026-04-12T12:55:00Z
8
value 0.01257
scoring_system epss
scoring_elements 0.79383
published_at 2026-04-13T12:55:00Z
9
value 0.01257
scoring_system epss
scoring_elements 0.79415
published_at 2026-04-16T12:55:00Z
10
value 0.01257
scoring_system epss
scoring_elements 0.79413
published_at 2026-04-18T12:55:00Z
11
value 0.01257
scoring_system epss
scoring_elements 0.79416
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9064
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8295
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9061
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9062
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9062
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9063
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9064
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9065
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862816
reference_id 862816
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862816
fixed_packages
0
url pkg:deb/debian/wordpress@4.7.5%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.7.5%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.7.5%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2017-9064
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zhsu-sye9-mkaz
335
url VCID-zj9a-shru-e7gs
vulnerability_id VCID-zj9a-shru-e7gs
summary Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WordPress allows Stored XSS. WordPress core security team is aware of the issue and working on a fix. This is low severity vulnerability that requires an attacker to have Author or higher user privileges to execute the attack vector.This issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-58674
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07411
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07516
published_at 2026-04-11T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07502
published_at 2026-04-12T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.0749
published_at 2026-04-13T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07412
published_at 2026-04-16T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07399
published_at 2026-04-18T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07453
published_at 2026-04-04T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07436
published_at 2026-04-07T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07493
published_at 2026-04-08T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08189
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-58674
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58674
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117047
reference_id 1117047
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117047
3
reference_url https://wordpress.org/news/2025/09/wordpress-6-8-3-release/
reference_id wordpress-6-8-3-release
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T19:15:09Z/
url https://wordpress.org/news/2025/09/wordpress-6-8-3-release/
4
reference_url https://patchstack.com/database/wordpress/wordpress/wordpress/vulnerability/wordpress-wordpress-wordpress-6-8-2-cross-site-scripting-xss-vulnerability?_s_id=cve
reference_id wordpress-wordpress-wordpress-6-8-2-cross-site-scripting-xss-vulnerability?_s_id=cve
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T19:15:09Z/
url https://patchstack.com/database/wordpress/wordpress/wordpress/vulnerability/wordpress-wordpress-wordpress-6-8-2-cross-site-scripting-xss-vulnerability?_s_id=cve
fixed_packages
0
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.14%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.14%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.14%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-1%3Fdistro=trixie
5
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2025-58674
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zj9a-shru-e7gs
336
url VCID-zmhc-4gku-13ga
vulnerability_id VCID-zmhc-4gku-13ga
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28037
reference_id
reference_type
scores
0
value 0.1273
scoring_system epss
scoring_elements 0.9402
published_at 2026-04-21T12:55:00Z
1
value 0.1273
scoring_system epss
scoring_elements 0.93961
published_at 2026-04-01T12:55:00Z
2
value 0.1273
scoring_system epss
scoring_elements 0.9397
published_at 2026-04-02T12:55:00Z
3
value 0.1273
scoring_system epss
scoring_elements 0.93979
published_at 2026-04-04T12:55:00Z
4
value 0.1273
scoring_system epss
scoring_elements 0.93982
published_at 2026-04-07T12:55:00Z
5
value 0.1273
scoring_system epss
scoring_elements 0.93991
published_at 2026-04-08T12:55:00Z
6
value 0.1273
scoring_system epss
scoring_elements 0.93994
published_at 2026-04-09T12:55:00Z
7
value 0.1273
scoring_system epss
scoring_elements 0.93999
published_at 2026-04-11T12:55:00Z
8
value 0.1273
scoring_system epss
scoring_elements 0.93998
published_at 2026-04-13T12:55:00Z
9
value 0.1273
scoring_system epss
scoring_elements 0.94014
published_at 2026-04-16T12:55:00Z
10
value 0.1273
scoring_system epss
scoring_elements 0.94019
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28037
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28032
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28033
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28034
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28035
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28036
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28037
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28038
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28039
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28040
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562
reference_id 973562
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973562
11
reference_url https://security.archlinux.org/ASA-202011-3
reference_id ASA-202011-3
reference_type
scores
url https://security.archlinux.org/ASA-202011-3
12
reference_url https://security.archlinux.org/AVG-1257
reference_id AVG-1257
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1257
fixed_packages
0
url pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.5.3%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.5.3%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2020-28037
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zmhc-4gku-13ga
337
url VCID-znav-bux7-7qd2
vulnerability_id VCID-znav-bux7-7qd2
summary wp-admin/includes/class-wp-posts-list-table.php in WordPress before 3.3.3 does not properly restrict excerpt-view access, which allows remote authenticated users to obtain sensitive information by visiting a draft.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6635
reference_id
reference_type
scores
0
value 0.00688
scoring_system epss
scoring_elements 0.71678
published_at 2026-04-01T12:55:00Z
1
value 0.00688
scoring_system epss
scoring_elements 0.71684
published_at 2026-04-02T12:55:00Z
2
value 0.00688
scoring_system epss
scoring_elements 0.71702
published_at 2026-04-04T12:55:00Z
3
value 0.00688
scoring_system epss
scoring_elements 0.71675
published_at 2026-04-07T12:55:00Z
4
value 0.00688
scoring_system epss
scoring_elements 0.71713
published_at 2026-04-08T12:55:00Z
5
value 0.00688
scoring_system epss
scoring_elements 0.71725
published_at 2026-04-09T12:55:00Z
6
value 0.00688
scoring_system epss
scoring_elements 0.71749
published_at 2026-04-11T12:55:00Z
7
value 0.00688
scoring_system epss
scoring_elements 0.71732
published_at 2026-04-12T12:55:00Z
8
value 0.00688
scoring_system epss
scoring_elements 0.71715
published_at 2026-04-13T12:55:00Z
9
value 0.00688
scoring_system epss
scoring_elements 0.71758
published_at 2026-04-16T12:55:00Z
10
value 0.00688
scoring_system epss
scoring_elements 0.71764
published_at 2026-04-18T12:55:00Z
11
value 0.00688
scoring_system epss
scoring_elements 0.71746
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6635
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6635
fixed_packages
0
url pkg:deb/debian/wordpress@3.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.4%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2012-6635
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-znav-bux7-7qd2
338
url VCID-znb5-qcr5-pqaf
vulnerability_id VCID-znb5-qcr5-pqaf
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20152
reference_id
reference_type
scores
0
value 0.11676
scoring_system epss
scoring_elements 0.93638
published_at 2026-04-01T12:55:00Z
1
value 0.11676
scoring_system epss
scoring_elements 0.93649
published_at 2026-04-02T12:55:00Z
2
value 0.11676
scoring_system epss
scoring_elements 0.93657
published_at 2026-04-04T12:55:00Z
3
value 0.11676
scoring_system epss
scoring_elements 0.9366
published_at 2026-04-07T12:55:00Z
4
value 0.11676
scoring_system epss
scoring_elements 0.93668
published_at 2026-04-08T12:55:00Z
5
value 0.11676
scoring_system epss
scoring_elements 0.9367
published_at 2026-04-09T12:55:00Z
6
value 0.11676
scoring_system epss
scoring_elements 0.93674
published_at 2026-04-11T12:55:00Z
7
value 0.11676
scoring_system epss
scoring_elements 0.93675
published_at 2026-04-12T12:55:00Z
8
value 0.11676
scoring_system epss
scoring_elements 0.93676
published_at 2026-04-13T12:55:00Z
9
value 0.11676
scoring_system epss
scoring_elements 0.93693
published_at 2026-04-16T12:55:00Z
10
value 0.11676
scoring_system epss
scoring_elements 0.937
published_at 2026-04-18T12:55:00Z
11
value 0.11676
scoring_system epss
scoring_elements 0.93702
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20152
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20148
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20149
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20150
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20151
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20152
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20153
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8942
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916403
reference_id 916403
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916403
fixed_packages
0
url pkg:deb/debian/wordpress@5.0.1%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@5.0.1%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.0.1%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2018-20152
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-znb5-qcr5-pqaf
339
url VCID-ztfv-xfxe-kket
vulnerability_id VCID-ztfv-xfxe-kket
summary wordpress: multiple vulnerabilities
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2335.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2335.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2335
reference_id
reference_type
scores
0
value 0.85338
scoring_system epss
scoring_elements 0.99356
published_at 2026-04-01T12:55:00Z
1
value 0.85338
scoring_system epss
scoring_elements 0.99357
published_at 2026-04-02T12:55:00Z
2
value 0.85338
scoring_system epss
scoring_elements 0.99359
published_at 2026-04-04T12:55:00Z
3
value 0.85338
scoring_system epss
scoring_elements 0.9936
published_at 2026-04-07T12:55:00Z
4
value 0.85338
scoring_system epss
scoring_elements 0.99362
published_at 2026-04-09T12:55:00Z
5
value 0.85338
scoring_system epss
scoring_elements 0.99363
published_at 2026-04-11T12:55:00Z
6
value 0.85338
scoring_system epss
scoring_elements 0.99364
published_at 2026-04-13T12:55:00Z
7
value 0.85338
scoring_system epss
scoring_elements 0.99367
published_at 2026-04-18T12:55:00Z
8
value 0.85338
scoring_system epss
scoring_elements 0.99366
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2335
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2335
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2335
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=510745
reference_id 510745
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=510745
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=536724
reference_id 536724
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=536724
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/17702.rb
reference_id CVE-2009-2335;OSVDB-55713
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/17702.rb
fixed_packages
0
url pkg:deb/debian/wordpress@2.8.3-1?distro=trixie
purl pkg:deb/debian/wordpress@2.8.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.8.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2009-2335
risk_score 1.6
exploitability 2.0
weighted_severity 0.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ztfv-xfxe-kket
340
url VCID-zvnm-b6n7-1kbx
vulnerability_id VCID-zvnm-b6n7-1kbx
summary wp-includes/taxonomy.php in WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 has unknown impact and attack vectors related to "Taxonomy query hardening," possibly involving SQL injection.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3130
reference_id
reference_type
scores
0
value 0.0052
scoring_system epss
scoring_elements 0.66737
published_at 2026-04-01T12:55:00Z
1
value 0.0052
scoring_system epss
scoring_elements 0.66775
published_at 2026-04-02T12:55:00Z
2
value 0.0052
scoring_system epss
scoring_elements 0.668
published_at 2026-04-04T12:55:00Z
3
value 0.0052
scoring_system epss
scoring_elements 0.66773
published_at 2026-04-07T12:55:00Z
4
value 0.0052
scoring_system epss
scoring_elements 0.66822
published_at 2026-04-08T12:55:00Z
5
value 0.0052
scoring_system epss
scoring_elements 0.66836
published_at 2026-04-09T12:55:00Z
6
value 0.0052
scoring_system epss
scoring_elements 0.66856
published_at 2026-04-11T12:55:00Z
7
value 0.0052
scoring_system epss
scoring_elements 0.66842
published_at 2026-04-12T12:55:00Z
8
value 0.0052
scoring_system epss
scoring_elements 0.6681
published_at 2026-04-13T12:55:00Z
9
value 0.0052
scoring_system epss
scoring_elements 0.66843
published_at 2026-04-16T12:55:00Z
10
value 0.0052
scoring_system epss
scoring_elements 0.66858
published_at 2026-04-18T12:55:00Z
11
value 0.0052
scoring_system epss
scoring_elements 0.66841
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3130
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3130
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3130
fixed_packages
0
url pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@3.2.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.2.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2011-3130
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zvnm-b6n7-1kbx
341
url VCID-zwpk-86cs-tqaz
vulnerability_id VCID-zwpk-86cs-tqaz
summary Wordpress contains SQL injection and XSS vulnerabilities.
references
0
reference_url http://bugs.gentoo.org/show_bug.cgi?id=94512
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=94512
1
reference_url http://marc.info/?l=bugtraq&m=111817436619067&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=111817436619067&w=2
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-1810
reference_id
reference_type
scores
0
value 0.01638
scoring_system epss
scoring_elements 0.81967
published_at 2026-04-21T12:55:00Z
1
value 0.01638
scoring_system epss
scoring_elements 0.81863
published_at 2026-04-01T12:55:00Z
2
value 0.01638
scoring_system epss
scoring_elements 0.81874
published_at 2026-04-02T12:55:00Z
3
value 0.01638
scoring_system epss
scoring_elements 0.81897
published_at 2026-04-04T12:55:00Z
4
value 0.01638
scoring_system epss
scoring_elements 0.81893
published_at 2026-04-07T12:55:00Z
5
value 0.01638
scoring_system epss
scoring_elements 0.8192
published_at 2026-04-08T12:55:00Z
6
value 0.01638
scoring_system epss
scoring_elements 0.81926
published_at 2026-04-09T12:55:00Z
7
value 0.01638
scoring_system epss
scoring_elements 0.81946
published_at 2026-04-11T12:55:00Z
8
value 0.01638
scoring_system epss
scoring_elements 0.81934
published_at 2026-04-12T12:55:00Z
9
value 0.01638
scoring_system epss
scoring_elements 0.81929
published_at 2026-04-13T12:55:00Z
10
value 0.01638
scoring_system epss
scoring_elements 0.81965
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-1810
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1810
4
reference_url http://secunia.com/advisories/15517
reference_id
reference_type
scores
url http://secunia.com/advisories/15517
5
reference_url http://security.gentoo.org/glsa/glsa-200506-04.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200506-04.xml
6
reference_url http://wordpress.org/development/2005/05/security-update/
reference_id
reference_type
scores
url http://wordpress.org/development/2005/05/security-update/
7
reference_url http://www.osvdb.org/16905
reference_id
reference_type
scores
url http://www.osvdb.org/16905
8
reference_url http://www.securityfocus.com/bid/13809
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/13809
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-1810
reference_id CVE-2005-1810
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-1810
11
reference_url https://security.gentoo.org/glsa/200506-04
reference_id GLSA-200506-04
reference_type
scores
url https://security.gentoo.org/glsa/200506-04
fixed_packages
0
url pkg:deb/debian/wordpress@1.5.1.2-1?distro=trixie
purl pkg:deb/debian/wordpress@1.5.1.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@1.5.1.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2005-1810
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zwpk-86cs-tqaz
342
url VCID-zyqs-75ad-8kcd
vulnerability_id VCID-zyqs-75ad-8kcd
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7169
reference_id
reference_type
scores
0
value 0.03015
scoring_system epss
scoring_elements 0.86623
published_at 2026-04-18T12:55:00Z
1
value 0.03015
scoring_system epss
scoring_elements 0.86544
published_at 2026-04-01T12:55:00Z
2
value 0.03015
scoring_system epss
scoring_elements 0.86554
published_at 2026-04-02T12:55:00Z
3
value 0.03015
scoring_system epss
scoring_elements 0.86573
published_at 2026-04-07T12:55:00Z
4
value 0.03015
scoring_system epss
scoring_elements 0.86592
published_at 2026-04-08T12:55:00Z
5
value 0.03015
scoring_system epss
scoring_elements 0.86602
published_at 2026-04-09T12:55:00Z
6
value 0.03015
scoring_system epss
scoring_elements 0.86616
published_at 2026-04-21T12:55:00Z
7
value 0.03015
scoring_system epss
scoring_elements 0.86612
published_at 2026-04-12T12:55:00Z
8
value 0.03015
scoring_system epss
scoring_elements 0.86605
published_at 2026-04-13T12:55:00Z
9
value 0.03015
scoring_system epss
scoring_elements 0.86619
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7169
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4029
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6634
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6635
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7168
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7169
6
reference_url https://security.archlinux.org/ASA-201609-32
reference_id ASA-201609-32
reference_type
scores
url https://security.archlinux.org/ASA-201609-32
7
reference_url https://security.archlinux.org/AVG-39
reference_id AVG-39
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-39
fixed_packages
0
url pkg:deb/debian/wordpress@4.6.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.6.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.6.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2016-7169
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zyqs-75ad-8kcd
343
url VCID-zzcw-snrs-kygh
vulnerability_id VCID-zzcw-snrs-kygh
summary security update
references
0
reference_url http://openwall.com/lists/oss-security/2015/08/04/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2015/08/04/7
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5731
reference_id
reference_type
scores
0
value 0.14757
scoring_system epss
scoring_elements 0.94517
published_at 2026-04-21T12:55:00Z
1
value 0.14757
scoring_system epss
scoring_elements 0.94459
published_at 2026-04-01T12:55:00Z
2
value 0.14757
scoring_system epss
scoring_elements 0.94466
published_at 2026-04-02T12:55:00Z
3
value 0.14757
scoring_system epss
scoring_elements 0.94474
published_at 2026-04-04T12:55:00Z
4
value 0.14757
scoring_system epss
scoring_elements 0.94475
published_at 2026-04-07T12:55:00Z
5
value 0.14757
scoring_system epss
scoring_elements 0.94485
published_at 2026-04-08T12:55:00Z
6
value 0.14757
scoring_system epss
scoring_elements 0.94489
published_at 2026-04-09T12:55:00Z
7
value 0.14757
scoring_system epss
scoring_elements 0.94492
published_at 2026-04-11T12:55:00Z
8
value 0.14757
scoring_system epss
scoring_elements 0.94494
published_at 2026-04-13T12:55:00Z
9
value 0.14757
scoring_system epss
scoring_elements 0.94508
published_at 2026-04-16T12:55:00Z
10
value 0.14757
scoring_system epss
scoring_elements 0.94512
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5731
2
reference_url https://codex.wordpress.org/Version_4.2.4
reference_id
reference_type
scores
url https://codex.wordpress.org/Version_4.2.4
3
reference_url https://core.trac.wordpress.org/changeset/33542
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/33542
4
reference_url https://core.trac.wordpress.org/changeset/33543
reference_id
reference_type
scores
url https://core.trac.wordpress.org/changeset/33543
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2213
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5622
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5714
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5715
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5730
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5731
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5732
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5734
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7989
14
reference_url https://wordpress.org/news/2015/08/wordpress-4-2-4-security-and-maintenance-release/
reference_id
reference_type
scores
url https://wordpress.org/news/2015/08/wordpress-4-2-4-security-and-maintenance-release/
15
reference_url http://www.debian.org/security/2015/dsa-3332
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3332
16
reference_url http://www.debian.org/security/2015/dsa-3383
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3383
17
reference_url http://www.securityfocus.com/bid/76160
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/76160
18
reference_url http://www.securitytracker.com/id/1033178
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033178
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794560
reference_id 794560
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794560
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5731
reference_id CVE-2015-5731
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-5731
fixed_packages
0
url pkg:deb/debian/wordpress@4.2.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.2.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.2.4%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2015-5731
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zzcw-snrs-kygh
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie