Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/wordpress@2.0.5-0.1?distro=trixie
Typedeb
Namespacedebian
Namewordpress
Version2.0.5-0.1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.0.6-1
Latest_non_vulnerable_version6.9.4+dfsg1-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1tvf-ywk8-5yh5
vulnerability_id VCID-1tvf-ywk8-5yh5
summary wp-admin/user-edit.php in WordPress before 2.0.5 allows remote authenticated users to read the metadata of an arbitrary user via a modified user_id parameter.
references
0
reference_url http://bugs.gentoo.org/show_bug.cgi?id=153303
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T16:01:20Z/
url http://bugs.gentoo.org/show_bug.cgi?id=153303
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-6016
reference_id
reference_type
scores
0
value 0.00749
scoring_system epss
scoring_elements 0.73073
published_at 2026-04-02T12:55:00Z
1
value 0.00749
scoring_system epss
scoring_elements 0.7316
published_at 2026-04-21T12:55:00Z
2
value 0.00749
scoring_system epss
scoring_elements 0.73063
published_at 2026-04-01T12:55:00Z
3
value 0.00749
scoring_system epss
scoring_elements 0.73117
published_at 2026-04-09T12:55:00Z
4
value 0.00749
scoring_system epss
scoring_elements 0.73142
published_at 2026-04-11T12:55:00Z
5
value 0.00749
scoring_system epss
scoring_elements 0.73122
published_at 2026-04-12T12:55:00Z
6
value 0.00749
scoring_system epss
scoring_elements 0.73115
published_at 2026-04-13T12:55:00Z
7
value 0.00749
scoring_system epss
scoring_elements 0.73158
published_at 2026-04-16T12:55:00Z
8
value 0.00749
scoring_system epss
scoring_elements 0.73168
published_at 2026-04-18T12:55:00Z
9
value 0.00749
scoring_system epss
scoring_elements 0.73093
published_at 2026-04-04T12:55:00Z
10
value 0.00749
scoring_system epss
scoring_elements 0.73067
published_at 2026-04-07T12:55:00Z
11
value 0.00749
scoring_system epss
scoring_elements 0.73104
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-6016
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6016
3
reference_url http://trac.wordpress.org/ticket/3142
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T16:01:20Z/
url http://trac.wordpress.org/ticket/3142
4
reference_url http://www.gentoo.org/security/en/glsa/glsa-200611-10.xml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T16:01:20Z/
url http://www.gentoo.org/security/en/glsa/glsa-200611-10.xml
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-6016
reference_id CVE-2006-6016
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2006-6016
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.5-0.1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.5-0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.5-0.1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2006-6016
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1tvf-ywk8-5yh5
1
url VCID-6xna-bhaz-bbcm
vulnerability_id VCID-6xna-bhaz-bbcm
summary WordPress 2.0.2 through 2.0.5 allows remote attackers to obtain sensitive information via a direct request for (1) 404.php, (2) akismet.php, (3) archive.php, (4) archives.php, (5) attachment.php, (6) blogger.php, (7) comments.php, (8) comments-popup.php, (9) dotclear.php, (10) footer.php, (11) functions.php, (12) header.php, (13) hello.php, (14) wp-content/themes/default/index.php, (15) links.php, (16) livejournal.php, (17) mt.php, (18) page.php, (19) rss.php, (20) searchform.php, (21) search.php, (22) sidebar.php, (23) single.php, (24) textpattern.php, (25) upgrade-functions.php, (26) upgrade-schema.php, or (27) wp-db-backup.php, which reveal the path in various error messages. NOTE: another researcher has disputed the details of this report, stating that version 2.0.5 does not exist. NOTE: the admin-footer.php, admin-functions.php, default-filters.php, edit-form-advanced.php, edit-link-form.php, edit-page-form.php, kses.php, locale.php, rss-functions.php, template-loader.php, and wp-db.php vectors are already covered by CVE-2006-0986. The edit-form-comment.php, vars.php, and wp-settings.php vectors are already covered by CVE-2005-4463. The menu-header.php vector is already covered by CVE-2005-2110.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4743
reference_id
reference_type
scores
0
value 0.00856
scoring_system epss
scoring_elements 0.74925
published_at 2026-04-01T12:55:00Z
1
value 0.00856
scoring_system epss
scoring_elements 0.74928
published_at 2026-04-02T12:55:00Z
2
value 0.00856
scoring_system epss
scoring_elements 0.74957
published_at 2026-04-04T12:55:00Z
3
value 0.00856
scoring_system epss
scoring_elements 0.74931
published_at 2026-04-07T12:55:00Z
4
value 0.00856
scoring_system epss
scoring_elements 0.74965
published_at 2026-04-08T12:55:00Z
5
value 0.00856
scoring_system epss
scoring_elements 0.74977
published_at 2026-04-09T12:55:00Z
6
value 0.00856
scoring_system epss
scoring_elements 0.74999
published_at 2026-04-11T12:55:00Z
7
value 0.00856
scoring_system epss
scoring_elements 0.74978
published_at 2026-04-12T12:55:00Z
8
value 0.00856
scoring_system epss
scoring_elements 0.74968
published_at 2026-04-13T12:55:00Z
9
value 0.00856
scoring_system epss
scoring_elements 0.75005
published_at 2026-04-16T12:55:00Z
10
value 0.00856
scoring_system epss
scoring_elements 0.75012
published_at 2026-04-18T12:55:00Z
11
value 0.00856
scoring_system epss
scoring_elements 0.75002
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4743
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4743
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.5-0.1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.5-0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.5-0.1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2006-4743
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6xna-bhaz-bbcm
2
url VCID-82ky-v2zx-53h4
vulnerability_id VCID-82ky-v2zx-53h4
summary WordPress before 2.0.5 does not properly store a profile containing a string representation of a serialized object, which allows remote authenticated users to cause a denial of service (application crash) via a string that represents a (1) malformed or (2) large serialized object, because the object triggers automatic unserialization for display.
references
0
reference_url http://bugs.gentoo.org/show_bug.cgi?id=153303
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T15:56:09Z/
url http://bugs.gentoo.org/show_bug.cgi?id=153303
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-6017
reference_id
reference_type
scores
0
value 0.02824
scoring_system epss
scoring_elements 0.8611
published_at 2026-04-02T12:55:00Z
1
value 0.02824
scoring_system epss
scoring_elements 0.86179
published_at 2026-04-21T12:55:00Z
2
value 0.02824
scoring_system epss
scoring_elements 0.861
published_at 2026-04-01T12:55:00Z
3
value 0.02824
scoring_system epss
scoring_elements 0.86157
published_at 2026-04-09T12:55:00Z
4
value 0.02824
scoring_system epss
scoring_elements 0.8617
published_at 2026-04-11T12:55:00Z
5
value 0.02824
scoring_system epss
scoring_elements 0.86169
published_at 2026-04-12T12:55:00Z
6
value 0.02824
scoring_system epss
scoring_elements 0.86165
published_at 2026-04-13T12:55:00Z
7
value 0.02824
scoring_system epss
scoring_elements 0.86182
published_at 2026-04-16T12:55:00Z
8
value 0.02824
scoring_system epss
scoring_elements 0.86187
published_at 2026-04-18T12:55:00Z
9
value 0.02824
scoring_system epss
scoring_elements 0.86126
published_at 2026-04-04T12:55:00Z
10
value 0.02824
scoring_system epss
scoring_elements 0.86125
published_at 2026-04-07T12:55:00Z
11
value 0.02824
scoring_system epss
scoring_elements 0.86145
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-6017
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6017
3
reference_url http://trac.wordpress.org/ticket/2591
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T15:56:09Z/
url http://trac.wordpress.org/ticket/2591
4
reference_url http://www.gentoo.org/security/en/glsa/glsa-200611-10.xml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T15:56:09Z/
url http://www.gentoo.org/security/en/glsa/glsa-200611-10.xml
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-6017
reference_id CVE-2006-6017
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2006-6017
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.5-0.1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.5-0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.5-0.1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2006-6017
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-82ky-v2zx-53h4
3
url VCID-m7yz-rv7g-jbat
vulnerability_id VCID-m7yz-rv7g-jbat
summary
Flaws in WordPress allow a Denial of Service, the disclosure of user
    metadata and the overwriting of restricted files.
references
0
reference_url http://bugs.gentoo.org/show_bug.cgi?id=153303
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=153303
1
reference_url http://markjaquith.wordpress.com/2006/10/17/changes-in-wordpress-205/
reference_id
reference_type
scores
url http://markjaquith.wordpress.com/2006/10/17/changes-in-wordpress-205/
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-5705
reference_id
reference_type
scores
0
value 0.04873
scoring_system epss
scoring_elements 0.89572
published_at 2026-04-21T12:55:00Z
1
value 0.04873
scoring_system epss
scoring_elements 0.89522
published_at 2026-04-01T12:55:00Z
2
value 0.04873
scoring_system epss
scoring_elements 0.89525
published_at 2026-04-02T12:55:00Z
3
value 0.04873
scoring_system epss
scoring_elements 0.89538
published_at 2026-04-04T12:55:00Z
4
value 0.04873
scoring_system epss
scoring_elements 0.89539
published_at 2026-04-07T12:55:00Z
5
value 0.04873
scoring_system epss
scoring_elements 0.89555
published_at 2026-04-08T12:55:00Z
6
value 0.04873
scoring_system epss
scoring_elements 0.8956
published_at 2026-04-13T12:55:00Z
7
value 0.04873
scoring_system epss
scoring_elements 0.89567
published_at 2026-04-11T12:55:00Z
8
value 0.04873
scoring_system epss
scoring_elements 0.89566
published_at 2026-04-12T12:55:00Z
9
value 0.04873
scoring_system epss
scoring_elements 0.89574
published_at 2026-04-16T12:55:00Z
10
value 0.04873
scoring_system epss
scoring_elements 0.89575
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-5705
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5705
4
reference_url http://secunia.com/advisories/22683
reference_id
reference_type
scores
url http://secunia.com/advisories/22683
5
reference_url http://secunia.com/advisories/22942
reference_id
reference_type
scores
url http://secunia.com/advisories/22942
6
reference_url http://trac.wordpress.org/changeset/4226
reference_id
reference_type
scores
url http://trac.wordpress.org/changeset/4226
7
reference_url http://wordpress.org/development/2006/10/205-ronan/
reference_id
reference_type
scores
url http://wordpress.org/development/2006/10/205-ronan/
8
reference_url http://www.gentoo.org/security/en/glsa/glsa-200611-10.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200611-10.xml
9
reference_url http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.027-wordpress.html
reference_id
reference_type
scores
url http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.027-wordpress.html
10
reference_url http://www.securityfocus.com/bid/20869
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/20869
11
reference_url http://www.vupen.com/english/advisories/2006/4307
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/4307
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-5705
reference_id CVE-2006-5705
reference_type
scores
0
value 6.0
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2006-5705
16
reference_url https://security.gentoo.org/glsa/200611-10
reference_id GLSA-200611-10
reference_type
scores
url https://security.gentoo.org/glsa/200611-10
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.5-0.1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.5-0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.5-0.1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2006-5705
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m7yz-rv7g-jbat
4
url VCID-uzm6-mwhv-xfbj
vulnerability_id VCID-uzm6-mwhv-xfbj
summary Directory traversal vulnerability in wp-db-backup.php in Skippy WP-DB-Backup plugin for WordPress 1.7 and earlier allows remote authenticated users with administrative privileges to read arbitrary files via a .. (dot dot) in the backup parameter to edit.php.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4208
reference_id
reference_type
scores
0
value 0.27172
scoring_system epss
scoring_elements 0.96352
published_at 2026-04-01T12:55:00Z
1
value 0.27172
scoring_system epss
scoring_elements 0.96359
published_at 2026-04-02T12:55:00Z
2
value 0.27172
scoring_system epss
scoring_elements 0.96363
published_at 2026-04-04T12:55:00Z
3
value 0.27172
scoring_system epss
scoring_elements 0.96367
published_at 2026-04-07T12:55:00Z
4
value 0.27172
scoring_system epss
scoring_elements 0.96376
published_at 2026-04-08T12:55:00Z
5
value 0.27172
scoring_system epss
scoring_elements 0.96379
published_at 2026-04-09T12:55:00Z
6
value 0.27172
scoring_system epss
scoring_elements 0.96383
published_at 2026-04-12T12:55:00Z
7
value 0.27172
scoring_system epss
scoring_elements 0.96386
published_at 2026-04-13T12:55:00Z
8
value 0.27172
scoring_system epss
scoring_elements 0.96393
published_at 2026-04-16T12:55:00Z
9
value 0.27172
scoring_system epss
scoring_elements 0.96398
published_at 2026-04-18T12:55:00Z
10
value 0.27172
scoring_system epss
scoring_elements 0.96399
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4208
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4208
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384800
reference_id 384800
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384800
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/28382.txt
reference_id CVE-2006-4208;OSVDB-27979
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/28382.txt
4
reference_url https://www.securityfocus.com/bid/19504/info
reference_id CVE-2006-4208;OSVDB-27979
reference_type exploit
scores
url https://www.securityfocus.com/bid/19504/info
fixed_packages
0
url pkg:deb/debian/wordpress@2.0.5-0.1?distro=trixie
purl pkg:deb/debian/wordpress@2.0.5-0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.5-0.1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2006-4208
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uzm6-mwhv-xfbj
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.0.5-0.1%3Fdistro=trixie