Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/wordpress@3.0.2-1?distro=trixie
Typedeb
Namespacedebian
Namewordpress
Version3.0.2-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.0.3-1
Latest_non_vulnerable_version6.9.4+dfsg1-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-6d1g-aj3f-3kav
vulnerability_id VCID-6d1g-aj3f-3kav
summary Multiple cross-site scripting (XSS) vulnerabilities in the request_filesystem_credentials function in wp-admin/includes/file.php in WordPress before 3.0.2 allow remote servers to inject arbitrary web script or HTML by providing a crafted error message for a (1) FTP or (2) SSH connection attempt.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-5294
reference_id
reference_type
scores
0
value 0.00713
scoring_system epss
scoring_elements 0.72269
published_at 2026-04-01T12:55:00Z
1
value 0.00713
scoring_system epss
scoring_elements 0.72275
published_at 2026-04-02T12:55:00Z
2
value 0.00713
scoring_system epss
scoring_elements 0.72294
published_at 2026-04-04T12:55:00Z
3
value 0.00713
scoring_system epss
scoring_elements 0.7227
published_at 2026-04-07T12:55:00Z
4
value 0.00713
scoring_system epss
scoring_elements 0.72309
published_at 2026-04-08T12:55:00Z
5
value 0.00713
scoring_system epss
scoring_elements 0.72321
published_at 2026-04-09T12:55:00Z
6
value 0.00713
scoring_system epss
scoring_elements 0.72344
published_at 2026-04-11T12:55:00Z
7
value 0.00713
scoring_system epss
scoring_elements 0.72327
published_at 2026-04-12T12:55:00Z
8
value 0.00713
scoring_system epss
scoring_elements 0.72313
published_at 2026-04-13T12:55:00Z
9
value 0.00713
scoring_system epss
scoring_elements 0.72355
published_at 2026-04-16T12:55:00Z
10
value 0.00713
scoring_system epss
scoring_elements 0.72365
published_at 2026-04-18T12:55:00Z
11
value 0.00713
scoring_system epss
scoring_elements 0.72352
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-5294
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5294
fixed_packages
0
url pkg:deb/debian/wordpress@3.0.2-1?distro=trixie
purl pkg:deb/debian/wordpress@3.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.0.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2010-5294
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6d1g-aj3f-3kav
1
url VCID-9dcr-4f3a-myfs
vulnerability_id VCID-9dcr-4f3a-myfs
summary wp-includes/capabilities.php in WordPress before 3.0.2, when a Multisite configuration is used, does not require the Super Admin role for the delete_users capability, which allows remote authenticated administrators to bypass intended access restrictions via a delete action.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-5296
reference_id
reference_type
scores
0
value 0.00404
scoring_system epss
scoring_elements 0.6082
published_at 2026-04-01T12:55:00Z
1
value 0.00404
scoring_system epss
scoring_elements 0.60892
published_at 2026-04-02T12:55:00Z
2
value 0.00404
scoring_system epss
scoring_elements 0.60921
published_at 2026-04-04T12:55:00Z
3
value 0.00404
scoring_system epss
scoring_elements 0.60886
published_at 2026-04-07T12:55:00Z
4
value 0.00404
scoring_system epss
scoring_elements 0.60935
published_at 2026-04-08T12:55:00Z
5
value 0.00404
scoring_system epss
scoring_elements 0.60951
published_at 2026-04-09T12:55:00Z
6
value 0.00404
scoring_system epss
scoring_elements 0.60972
published_at 2026-04-21T12:55:00Z
7
value 0.00404
scoring_system epss
scoring_elements 0.60958
published_at 2026-04-12T12:55:00Z
8
value 0.00404
scoring_system epss
scoring_elements 0.6094
published_at 2026-04-13T12:55:00Z
9
value 0.00404
scoring_system epss
scoring_elements 0.60982
published_at 2026-04-16T12:55:00Z
10
value 0.00404
scoring_system epss
scoring_elements 0.60987
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-5296
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5296
fixed_packages
0
url pkg:deb/debian/wordpress@3.0.2-1?distro=trixie
purl pkg:deb/debian/wordpress@3.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.0.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2010-5296
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9dcr-4f3a-myfs
2
url VCID-dg97-fkvm-rqh2
vulnerability_id VCID-dg97-fkvm-rqh2
summary SQL injection vulnerability in the do_trackbacks function in wp-includes/comment.php in WordPress before 3.0.2 allows remote authenticated users to execute arbitrary SQL commands via the Send Trackbacks field.
references
0
reference_url http://blog.sjinks.pro/wordpress/858-information-disclosure-via-sql-injection-attack/
reference_id
reference_type
scores
url http://blog.sjinks.pro/wordpress/858-information-disclosure-via-sql-injection-attack/
1
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605603
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605603
2
reference_url http://codex.wordpress.org/Version_3.0.2
reference_id
reference_type
scores
url http://codex.wordpress.org/Version_3.0.2
3
reference_url http://core.trac.wordpress.org/changeset/16625
reference_id
reference_type
scores
url http://core.trac.wordpress.org/changeset/16625
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052879.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052879.html
5
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052892.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052892.html
6
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052917.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052917.html
7
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052932.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052932.html
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4257
reference_id
reference_type
scores
0
value 0.03296
scoring_system epss
scoring_elements 0.87237
published_at 2026-04-21T12:55:00Z
1
value 0.03296
scoring_system epss
scoring_elements 0.8717
published_at 2026-04-01T12:55:00Z
2
value 0.03296
scoring_system epss
scoring_elements 0.8718
published_at 2026-04-02T12:55:00Z
3
value 0.03296
scoring_system epss
scoring_elements 0.87197
published_at 2026-04-04T12:55:00Z
4
value 0.03296
scoring_system epss
scoring_elements 0.87194
published_at 2026-04-07T12:55:00Z
5
value 0.03296
scoring_system epss
scoring_elements 0.87215
published_at 2026-04-08T12:55:00Z
6
value 0.03296
scoring_system epss
scoring_elements 0.87222
published_at 2026-04-09T12:55:00Z
7
value 0.03296
scoring_system epss
scoring_elements 0.87235
published_at 2026-04-11T12:55:00Z
8
value 0.03296
scoring_system epss
scoring_elements 0.87228
published_at 2026-04-12T12:55:00Z
9
value 0.03296
scoring_system epss
scoring_elements 0.87224
published_at 2026-04-13T12:55:00Z
10
value 0.03296
scoring_system epss
scoring_elements 0.87239
published_at 2026-04-16T12:55:00Z
11
value 0.03296
scoring_system epss
scoring_elements 0.87244
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4257
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=659265
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=659265
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4257
11
reference_url http://secunia.com/advisories/42431
reference_id
reference_type
scores
url http://secunia.com/advisories/42431
12
reference_url http://secunia.com/advisories/42753
reference_id
reference_type
scores
url http://secunia.com/advisories/42753
13
reference_url http://secunia.com/advisories/42844
reference_id
reference_type
scores
url http://secunia.com/advisories/42844
14
reference_url http://secunia.com/advisories/42871
reference_id
reference_type
scores
url http://secunia.com/advisories/42871
15
reference_url http://wordpress.org/news/2010/11/wordpress-3-0-2/
reference_id
reference_type
scores
url http://wordpress.org/news/2010/11/wordpress-3-0-2/
16
reference_url http://www.debian.org/security/2010/dsa-2138
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2138
17
reference_url http://www.securityfocus.com/bid/45131
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45131
18
reference_url http://www.vupen.com/english/advisories/2010/3337
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3337
19
reference_url http://www.vupen.com/english/advisories/2011/0042
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0042
20
reference_url http://www.vupen.com/english/advisories/2011/0057
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0057
21
reference_url http://www.xakep.ru/magazine/xa/124/052/1.asp
reference_id
reference_type
scores
url http://www.xakep.ru/magazine/xa/124/052/1.asp
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605603
reference_id 605603
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605603
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4257
reference_id CVE-2010-4257
reference_type
scores
0
value 6.0
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-4257
fixed_packages
0
url pkg:deb/debian/wordpress@3.0.2-1?distro=trixie
purl pkg:deb/debian/wordpress@3.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.0.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2010-4257
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dg97-fkvm-rqh2
3
url VCID-h2mz-4fad-9qdj
vulnerability_id VCID-h2mz-4fad-9qdj
summary Cross-site scripting (XSS) vulnerability in wp-admin/plugins.php in WordPress before 3.0.2 might allow remote attackers to inject arbitrary web script or HTML via a plugin's author field, which is not properly handled during a Delete Plugin action.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-5295
reference_id
reference_type
scores
0
value 0.005
scoring_system epss
scoring_elements 0.6589
published_at 2026-04-01T12:55:00Z
1
value 0.005
scoring_system epss
scoring_elements 0.65931
published_at 2026-04-02T12:55:00Z
2
value 0.005
scoring_system epss
scoring_elements 0.65961
published_at 2026-04-04T12:55:00Z
3
value 0.005
scoring_system epss
scoring_elements 0.65928
published_at 2026-04-07T12:55:00Z
4
value 0.005
scoring_system epss
scoring_elements 0.65979
published_at 2026-04-08T12:55:00Z
5
value 0.005
scoring_system epss
scoring_elements 0.65991
published_at 2026-04-09T12:55:00Z
6
value 0.005
scoring_system epss
scoring_elements 0.6601
published_at 2026-04-11T12:55:00Z
7
value 0.005
scoring_system epss
scoring_elements 0.65996
published_at 2026-04-12T12:55:00Z
8
value 0.005
scoring_system epss
scoring_elements 0.65966
published_at 2026-04-13T12:55:00Z
9
value 0.005
scoring_system epss
scoring_elements 0.66001
published_at 2026-04-16T12:55:00Z
10
value 0.005
scoring_system epss
scoring_elements 0.66015
published_at 2026-04-18T12:55:00Z
11
value 0.005
scoring_system epss
scoring_elements 0.66003
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-5295
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5295
fixed_packages
0
url pkg:deb/debian/wordpress@3.0.2-1?distro=trixie
purl pkg:deb/debian/wordpress@3.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.0.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2010-5295
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h2mz-4fad-9qdj
4
url VCID-vhnc-k9yw-cuar
vulnerability_id VCID-vhnc-k9yw-cuar
summary wp-includes/comment.php in WordPress before 3.0.2 does not properly whitelist trackbacks and pingbacks in the blogroll, which allows remote attackers to bypass intended spam restrictions via a crafted URL, as demonstrated by a URL that triggers a substring match.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-5293
reference_id
reference_type
scores
0
value 0.00387
scoring_system epss
scoring_elements 0.59697
published_at 2026-04-01T12:55:00Z
1
value 0.00387
scoring_system epss
scoring_elements 0.5977
published_at 2026-04-02T12:55:00Z
2
value 0.00387
scoring_system epss
scoring_elements 0.59795
published_at 2026-04-04T12:55:00Z
3
value 0.00387
scoring_system epss
scoring_elements 0.59764
published_at 2026-04-07T12:55:00Z
4
value 0.00387
scoring_system epss
scoring_elements 0.59815
published_at 2026-04-13T12:55:00Z
5
value 0.00387
scoring_system epss
scoring_elements 0.59829
published_at 2026-04-09T12:55:00Z
6
value 0.00387
scoring_system epss
scoring_elements 0.59849
published_at 2026-04-11T12:55:00Z
7
value 0.00387
scoring_system epss
scoring_elements 0.59833
published_at 2026-04-12T12:55:00Z
8
value 0.00387
scoring_system epss
scoring_elements 0.59852
published_at 2026-04-16T12:55:00Z
9
value 0.00387
scoring_system epss
scoring_elements 0.59859
published_at 2026-04-18T12:55:00Z
10
value 0.00387
scoring_system epss
scoring_elements 0.59842
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-5293
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5293
fixed_packages
0
url pkg:deb/debian/wordpress@3.0.2-1?distro=trixie
purl pkg:deb/debian/wordpress@3.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.0.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2010-5293
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vhnc-k9yw-cuar
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@3.0.2-1%3Fdistro=trixie