Lookup for vulnerable packages by Package URL.
| Purl | pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1 |
| Type | deb |
| Namespace | debian |
| Name | wordpress |
| Version | 6.8.3+dfsg1-0+deb13u1 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | null |
| Latest_non_vulnerable_version | null |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-gyaq-8pvh-p7gg |
| vulnerability_id |
VCID-gyaq-8pvh-p7gg |
| summary |
WordPress through 4.8.2 uses a weak MD5-based password hashing algorithm, which makes it easier for attackers to determine cleartext values by leveraging access to the hash values. NOTE: the approach to changing this may not be fully compatible with certain use cases, such as migration of a WordPress site from a web host that uses a recent PHP version to a different web host that uses PHP 5.2. These use cases are plausible (but very unlikely) based on statistics showing widespread deployment of WordPress with obsolete PHP versions. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-6707 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39807 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39887 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39744 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39893 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39921 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39843 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39899 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39912 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39886 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39867 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39917 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-6707 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-6707
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gyaq-8pvh-p7gg |
|
| 1 |
| url |
VCID-jghn-eujf-zbdn |
| vulnerability_id |
VCID-jghn-eujf-zbdn |
| summary |
WordPress Core is vulnerable to Sensitive Information Exposure in versions up to, and including, 6.4.3 via the redirect_guess_404_permalink function. This can allow unauthenticated attackers to expose the slug of a custom post whose 'publicly_queryable' post status has been set to 'false'. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-5692 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00855 |
| scoring_system |
epss |
| scoring_elements |
0.74935 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00855 |
| scoring_system |
epss |
| scoring_elements |
0.74907 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00855 |
| scoring_system |
epss |
| scoring_elements |
0.7499 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00855 |
| scoring_system |
epss |
| scoring_elements |
0.74983 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00855 |
| scoring_system |
epss |
| scoring_elements |
0.74946 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00855 |
| scoring_system |
epss |
| scoring_elements |
0.74956 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00855 |
| scoring_system |
epss |
| scoring_elements |
0.74977 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00855 |
| scoring_system |
epss |
| scoring_elements |
0.74954 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00855 |
| scoring_system |
epss |
| scoring_elements |
0.74942 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00855 |
| scoring_system |
epss |
| scoring_elements |
0.74908 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.01055 |
| scoring_system |
epss |
| scoring_elements |
0.77617 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-5692 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-5692
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jghn-eujf-zbdn |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1 |