Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/wordpress@4.6.1%2Bdfsg-1?distro=trixie
Typedeb
Namespacedebian
Namewordpress
Version4.6.1+dfsg-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4.7.1+dfsg-1
Latest_non_vulnerable_version6.9.4+dfsg1-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-6cda-2819-puhp
vulnerability_id VCID-6cda-2819-puhp
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7168
reference_id
reference_type
scores
0
value 0.008
scoring_system epss
scoring_elements 0.74107
published_at 2026-04-18T12:55:00Z
1
value 0.008
scoring_system epss
scoring_elements 0.7401
published_at 2026-04-01T12:55:00Z
2
value 0.008
scoring_system epss
scoring_elements 0.74016
published_at 2026-04-02T12:55:00Z
3
value 0.008
scoring_system epss
scoring_elements 0.74043
published_at 2026-04-04T12:55:00Z
4
value 0.008
scoring_system epss
scoring_elements 0.74014
published_at 2026-04-07T12:55:00Z
5
value 0.008
scoring_system epss
scoring_elements 0.74047
published_at 2026-04-08T12:55:00Z
6
value 0.008
scoring_system epss
scoring_elements 0.74062
published_at 2026-04-09T12:55:00Z
7
value 0.008
scoring_system epss
scoring_elements 0.74084
published_at 2026-04-11T12:55:00Z
8
value 0.008
scoring_system epss
scoring_elements 0.74066
published_at 2026-04-12T12:55:00Z
9
value 0.008
scoring_system epss
scoring_elements 0.74059
published_at 2026-04-13T12:55:00Z
10
value 0.008
scoring_system epss
scoring_elements 0.74098
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7168
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4029
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6634
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6635
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7168
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7169
6
reference_url https://security.archlinux.org/ASA-201609-32
reference_id ASA-201609-32
reference_type
scores
url https://security.archlinux.org/ASA-201609-32
7
reference_url https://security.archlinux.org/AVG-39
reference_id AVG-39
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-39
fixed_packages
0
url pkg:deb/debian/wordpress@4.6.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.6.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.6.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2016-7168
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6cda-2819-puhp
1
url VCID-d6e4-71uw-xyeb
vulnerability_id VCID-d6e4-71uw-xyeb
summary The wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 makes a get_plugin_data call before checking the update_plugins capability, which allows remote authenticated users to bypass intended read-access restrictions via the plugin parameter to wp-admin/admin-ajax.php, a related issue to CVE-2016-6896.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10148
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.63538
published_at 2026-04-01T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63598
published_at 2026-04-02T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63624
published_at 2026-04-04T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.63584
published_at 2026-04-07T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.63635
published_at 2026-04-08T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63652
published_at 2026-04-09T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63666
published_at 2026-04-11T12:55:00Z
7
value 0.0045
scoring_system epss
scoring_elements 0.63651
published_at 2026-04-12T12:55:00Z
8
value 0.0045
scoring_system epss
scoring_elements 0.63618
published_at 2026-04-13T12:55:00Z
9
value 0.0045
scoring_system epss
scoring_elements 0.63655
published_at 2026-04-16T12:55:00Z
10
value 0.0045
scoring_system epss
scoring_elements 0.63664
published_at 2026-04-18T12:55:00Z
11
value 0.0045
scoring_system epss
scoring_elements 0.63648
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10148
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10148
fixed_packages
0
url pkg:deb/debian/wordpress@4.6.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.6.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.6.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2016-10148
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d6e4-71uw-xyeb
2
url VCID-rcvm-b2u5-43dc
vulnerability_id VCID-rcvm-b2u5-43dc
summary Cross-site request forgery (CSRF) vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 allows remote attackers to hijack the authentication of subscribers for /dev/random read operations by leveraging a late call to the check_ajax_referer function, a related issue to CVE-2016-6896.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6897
reference_id
reference_type
scores
0
value 0.30259
scoring_system epss
scoring_elements 0.96649
published_at 2026-04-01T12:55:00Z
1
value 0.30259
scoring_system epss
scoring_elements 0.96658
published_at 2026-04-02T12:55:00Z
2
value 0.30259
scoring_system epss
scoring_elements 0.96664
published_at 2026-04-04T12:55:00Z
3
value 0.30259
scoring_system epss
scoring_elements 0.96668
published_at 2026-04-07T12:55:00Z
4
value 0.30259
scoring_system epss
scoring_elements 0.96675
published_at 2026-04-08T12:55:00Z
5
value 0.30259
scoring_system epss
scoring_elements 0.96677
published_at 2026-04-09T12:55:00Z
6
value 0.30259
scoring_system epss
scoring_elements 0.96679
published_at 2026-04-11T12:55:00Z
7
value 0.30259
scoring_system epss
scoring_elements 0.9668
published_at 2026-04-12T12:55:00Z
8
value 0.30259
scoring_system epss
scoring_elements 0.96682
published_at 2026-04-13T12:55:00Z
9
value 0.30259
scoring_system epss
scoring_elements 0.96689
published_at 2026-04-16T12:55:00Z
10
value 0.30259
scoring_system epss
scoring_elements 0.96693
published_at 2026-04-18T12:55:00Z
11
value 0.30259
scoring_system epss
scoring_elements 0.96697
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6897
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6897
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6897
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837090
reference_id 837090
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837090
fixed_packages
0
url pkg:deb/debian/wordpress@4.6.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.6.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.6.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2016-6897
risk_score 0.6
exploitability 2.0
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rcvm-b2u5-43dc
3
url VCID-ujms-xfg5-77e8
vulnerability_id VCID-ujms-xfg5-77e8
summary Directory traversal vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress 4.5.3 allows remote authenticated users to cause a denial of service or read certain text files via a .. (dot dot) in the plugin parameter to wp-admin/admin-ajax.php, as demonstrated by /dev/random read operations that deplete the entropy pool.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6896
reference_id
reference_type
scores
0
value 0.35182
scoring_system epss
scoring_elements 0.97006
published_at 2026-04-01T12:55:00Z
1
value 0.35182
scoring_system epss
scoring_elements 0.97014
published_at 2026-04-02T12:55:00Z
2
value 0.35182
scoring_system epss
scoring_elements 0.97018
published_at 2026-04-04T12:55:00Z
3
value 0.35182
scoring_system epss
scoring_elements 0.97019
published_at 2026-04-07T12:55:00Z
4
value 0.35182
scoring_system epss
scoring_elements 0.97028
published_at 2026-04-08T12:55:00Z
5
value 0.35182
scoring_system epss
scoring_elements 0.97029
published_at 2026-04-09T12:55:00Z
6
value 0.35182
scoring_system epss
scoring_elements 0.97032
published_at 2026-04-11T12:55:00Z
7
value 0.35182
scoring_system epss
scoring_elements 0.97033
published_at 2026-04-13T12:55:00Z
8
value 0.35182
scoring_system epss
scoring_elements 0.97043
published_at 2026-04-16T12:55:00Z
9
value 0.35182
scoring_system epss
scoring_elements 0.97047
published_at 2026-04-18T12:55:00Z
10
value 0.35182
scoring_system epss
scoring_elements 0.97051
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6896
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6896
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6896
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837090
reference_id 837090
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837090
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/40288.txt
reference_id CVE-2016-6897;CVE-2016-6896
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/40288.txt
fixed_packages
0
url pkg:deb/debian/wordpress@4.6.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.6.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.6.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2016-6896
risk_score 0.6
exploitability 2.0
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ujms-xfg5-77e8
4
url VCID-zyqs-75ad-8kcd
vulnerability_id VCID-zyqs-75ad-8kcd
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7169
reference_id
reference_type
scores
0
value 0.03015
scoring_system epss
scoring_elements 0.86623
published_at 2026-04-18T12:55:00Z
1
value 0.03015
scoring_system epss
scoring_elements 0.86544
published_at 2026-04-01T12:55:00Z
2
value 0.03015
scoring_system epss
scoring_elements 0.86554
published_at 2026-04-02T12:55:00Z
3
value 0.03015
scoring_system epss
scoring_elements 0.86573
published_at 2026-04-07T12:55:00Z
4
value 0.03015
scoring_system epss
scoring_elements 0.86592
published_at 2026-04-08T12:55:00Z
5
value 0.03015
scoring_system epss
scoring_elements 0.86602
published_at 2026-04-09T12:55:00Z
6
value 0.03015
scoring_system epss
scoring_elements 0.86616
published_at 2026-04-21T12:55:00Z
7
value 0.03015
scoring_system epss
scoring_elements 0.86612
published_at 2026-04-12T12:55:00Z
8
value 0.03015
scoring_system epss
scoring_elements 0.86605
published_at 2026-04-13T12:55:00Z
9
value 0.03015
scoring_system epss
scoring_elements 0.86619
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7169
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4029
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6634
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6635
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7168
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7169
6
reference_url https://security.archlinux.org/ASA-201609-32
reference_id ASA-201609-32
reference_type
scores
url https://security.archlinux.org/ASA-201609-32
7
reference_url https://security.archlinux.org/AVG-39
reference_id AVG-39
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-39
fixed_packages
0
url pkg:deb/debian/wordpress@4.6.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wordpress@4.6.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.6.1%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
aliases CVE-2016-7169
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zyqs-75ad-8kcd
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.6.1%252Bdfsg-1%3Fdistro=trixie