Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/wordpress@1.5.1.3-1?distro=trixie
Typedeb
Namespacedebian
Namewordpress
Version1.5.1.3-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.5.2-1
Latest_non_vulnerable_version6.9.4+dfsg1-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-3cqk-swz6-dqez
vulnerability_id VCID-3cqk-swz6-dqez
summary WordPress 1.5.1.2 and earlier allows remote attackers to obtain sensitive information via (1) a direct request to menu-header.php or a "1" value in the feed parameter to (2) wp-atom.php, (3) wp-rss.php, or (4) wp-rss2.php, which reveal the path in an error message. NOTE: vector [1] was later reported to also affect WordPress 2.0.1.
references
0
reference_url http://marc.info/?l=bugtraq&m=112006967221438&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=112006967221438&w=2
1
reference_url http://NeoSecurityTeam.net/advisories/Advisory-17.txt
reference_id
reference_type
scores
url http://NeoSecurityTeam.net/advisories/Advisory-17.txt
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-2110
reference_id
reference_type
scores
0
value 0.01227
scoring_system epss
scoring_elements 0.79162
published_at 2026-04-21T12:55:00Z
1
value 0.01227
scoring_system epss
scoring_elements 0.79088
published_at 2026-04-01T12:55:00Z
2
value 0.01227
scoring_system epss
scoring_elements 0.79095
published_at 2026-04-02T12:55:00Z
3
value 0.01227
scoring_system epss
scoring_elements 0.79121
published_at 2026-04-04T12:55:00Z
4
value 0.01227
scoring_system epss
scoring_elements 0.79107
published_at 2026-04-07T12:55:00Z
5
value 0.01227
scoring_system epss
scoring_elements 0.79131
published_at 2026-04-08T12:55:00Z
6
value 0.01227
scoring_system epss
scoring_elements 0.79139
published_at 2026-04-13T12:55:00Z
7
value 0.01227
scoring_system epss
scoring_elements 0.79164
published_at 2026-04-11T12:55:00Z
8
value 0.01227
scoring_system epss
scoring_elements 0.79149
published_at 2026-04-12T12:55:00Z
9
value 0.01227
scoring_system epss
scoring_elements 0.79166
published_at 2026-04-16T12:55:00Z
10
value 0.01227
scoring_system epss
scoring_elements 0.79163
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-2110
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2110
4
reference_url http://secunia.com/advisories/15831
reference_id
reference_type
scores
url http://secunia.com/advisories/15831
5
reference_url http://www.gulftech.org/?node=research&article_id=00085-06282005
reference_id
reference_type
scores
url http://www.gulftech.org/?node=research&article_id=00085-06282005
6
reference_url http://www.securityfocus.com/archive/1/426304/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/426304/100/0/threaded
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=316402
reference_id 316402
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=316402
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-2110
reference_id CVE-2005-2110
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2005-2110
fixed_packages
0
url pkg:deb/debian/wordpress@1.5.1.3-1?distro=trixie
purl pkg:deb/debian/wordpress@1.5.1.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@1.5.1.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2005-2110
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3cqk-swz6-dqez
1
url VCID-bjrn-fyux-wyh3
vulnerability_id VCID-bjrn-fyux-wyh3
summary wp-login.php in WordPress 1.5.1.2 and earlier allows remote attackers to change the content of the forgotten password e-mail message via the message variable, which is not initialized before use.
references
0
reference_url http://marc.info/?l=bugtraq&m=112006967221438&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=112006967221438&w=2
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-2109
reference_id
reference_type
scores
0
value 0.01077
scoring_system epss
scoring_elements 0.77838
published_at 2026-04-21T12:55:00Z
1
value 0.01077
scoring_system epss
scoring_elements 0.7775
published_at 2026-04-01T12:55:00Z
2
value 0.01077
scoring_system epss
scoring_elements 0.77756
published_at 2026-04-02T12:55:00Z
3
value 0.01077
scoring_system epss
scoring_elements 0.77783
published_at 2026-04-04T12:55:00Z
4
value 0.01077
scoring_system epss
scoring_elements 0.77767
published_at 2026-04-07T12:55:00Z
5
value 0.01077
scoring_system epss
scoring_elements 0.77794
published_at 2026-04-08T12:55:00Z
6
value 0.01077
scoring_system epss
scoring_elements 0.778
published_at 2026-04-09T12:55:00Z
7
value 0.01077
scoring_system epss
scoring_elements 0.77826
published_at 2026-04-11T12:55:00Z
8
value 0.01077
scoring_system epss
scoring_elements 0.7781
published_at 2026-04-12T12:55:00Z
9
value 0.01077
scoring_system epss
scoring_elements 0.77809
published_at 2026-04-13T12:55:00Z
10
value 0.01077
scoring_system epss
scoring_elements 0.77845
published_at 2026-04-16T12:55:00Z
11
value 0.01077
scoring_system epss
scoring_elements 0.77844
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-2109
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2109
3
reference_url http://secunia.com/advisories/15831
reference_id
reference_type
scores
url http://secunia.com/advisories/15831
4
reference_url http://www.gulftech.org/?node=research&article_id=00085-06282005
reference_id
reference_type
scores
url http://www.gulftech.org/?node=research&article_id=00085-06282005
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=316402
reference_id 316402
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=316402
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-2109
reference_id CVE-2005-2109
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2005-2109
fixed_packages
0
url pkg:deb/debian/wordpress@1.5.1.3-1?distro=trixie
purl pkg:deb/debian/wordpress@1.5.1.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@1.5.1.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2005-2109
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bjrn-fyux-wyh3
2
url VCID-cnz9-cwwa-23d1
vulnerability_id VCID-cnz9-cwwa-23d1
summary Multiple cross-site scripting (XSS) vulnerabilities in post.php in WordPress 1.5.1.2 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) p or (2) comment parameter.
references
0
reference_url http://marc.info/?l=bugtraq&m=112006967221438&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=112006967221438&w=2
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-2107
reference_id
reference_type
scores
0
value 0.00912
scoring_system epss
scoring_elements 0.75877
published_at 2026-04-21T12:55:00Z
1
value 0.00912
scoring_system epss
scoring_elements 0.75794
published_at 2026-04-01T12:55:00Z
2
value 0.00912
scoring_system epss
scoring_elements 0.75798
published_at 2026-04-02T12:55:00Z
3
value 0.00912
scoring_system epss
scoring_elements 0.7583
published_at 2026-04-04T12:55:00Z
4
value 0.00912
scoring_system epss
scoring_elements 0.75808
published_at 2026-04-07T12:55:00Z
5
value 0.00912
scoring_system epss
scoring_elements 0.75841
published_at 2026-04-08T12:55:00Z
6
value 0.00912
scoring_system epss
scoring_elements 0.75853
published_at 2026-04-09T12:55:00Z
7
value 0.00912
scoring_system epss
scoring_elements 0.75876
published_at 2026-04-11T12:55:00Z
8
value 0.00912
scoring_system epss
scoring_elements 0.75858
published_at 2026-04-12T12:55:00Z
9
value 0.00912
scoring_system epss
scoring_elements 0.75851
published_at 2026-04-13T12:55:00Z
10
value 0.00912
scoring_system epss
scoring_elements 0.75888
published_at 2026-04-16T12:55:00Z
11
value 0.00912
scoring_system epss
scoring_elements 0.75892
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-2107
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2107
3
reference_url http://secunia.com/advisories/15831
reference_id
reference_type
scores
url http://secunia.com/advisories/15831
4
reference_url http://www.gulftech.org/?node=research&article_id=00085-06282005
reference_id
reference_type
scores
url http://www.gulftech.org/?node=research&article_id=00085-06282005
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=316402
reference_id 316402
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=316402
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-2107
reference_id CVE-2005-2107
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2005-2107
fixed_packages
0
url pkg:deb/debian/wordpress@1.5.1.3-1?distro=trixie
purl pkg:deb/debian/wordpress@1.5.1.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@1.5.1.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2005-2107
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cnz9-cwwa-23d1
3
url VCID-h3ab-qy7a-r3ea
vulnerability_id VCID-h3ab-qy7a-r3ea
summary SQL injection vulnerability in XMLRPC server in WordPress 1.5.1.2 and earlier allows remote attackers to execute arbitrary SQL commands via input that is not filtered in the HTTP_RAW_POST_DATA variable, which stores the data in an XML file.
references
0
reference_url http://marc.info/?l=bugtraq&m=112006967221438&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=112006967221438&w=2
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-2108
reference_id
reference_type
scores
0
value 0.01061
scoring_system epss
scoring_elements 0.77674
published_at 2026-04-21T12:55:00Z
1
value 0.01061
scoring_system epss
scoring_elements 0.77587
published_at 2026-04-01T12:55:00Z
2
value 0.01061
scoring_system epss
scoring_elements 0.77594
published_at 2026-04-02T12:55:00Z
3
value 0.01061
scoring_system epss
scoring_elements 0.7762
published_at 2026-04-04T12:55:00Z
4
value 0.01061
scoring_system epss
scoring_elements 0.77602
published_at 2026-04-07T12:55:00Z
5
value 0.01061
scoring_system epss
scoring_elements 0.7763
published_at 2026-04-08T12:55:00Z
6
value 0.01061
scoring_system epss
scoring_elements 0.77637
published_at 2026-04-09T12:55:00Z
7
value 0.01061
scoring_system epss
scoring_elements 0.77663
published_at 2026-04-11T12:55:00Z
8
value 0.01061
scoring_system epss
scoring_elements 0.77647
published_at 2026-04-12T12:55:00Z
9
value 0.01061
scoring_system epss
scoring_elements 0.77645
published_at 2026-04-13T12:55:00Z
10
value 0.01061
scoring_system epss
scoring_elements 0.77683
published_at 2026-04-16T12:55:00Z
11
value 0.01061
scoring_system epss
scoring_elements 0.77681
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-2108
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2108
3
reference_url http://secunia.com/advisories/15831
reference_id
reference_type
scores
url http://secunia.com/advisories/15831
4
reference_url http://www.gulftech.org/?node=research&article_id=00085-06282005
reference_id
reference_type
scores
url http://www.gulftech.org/?node=research&article_id=00085-06282005
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=316402
reference_id 316402
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=316402
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-2108
reference_id CVE-2005-2108
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-2108
14
reference_url http://gulftech.org/advisories/WordPress%20Multiple%20Vulnerabilities/78
reference_id OSVDB-17637;CVE-2005-2108;GTSA-00078
reference_type exploit
scores
url http://gulftech.org/advisories/WordPress%20Multiple%20Vulnerabilities/78
15
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/1077.pl
reference_id OSVDB-17637;CVE-2005-2108;GTSA-00078
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/1077.pl
fixed_packages
0
url pkg:deb/debian/wordpress@1.5.1.3-1?distro=trixie
purl pkg:deb/debian/wordpress@1.5.1.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@1.5.1.3-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2005-2108
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h3ab-qy7a-r3ea
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@1.5.1.3-1%3Fdistro=trixie