{"url":"http://public2.vulnerablecode.io/api/packages/942991?format=json","purl":"pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie","type":"deb","namespace":"debian","name":"wordpress","version":"4.0.1+dfsg-1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"4.1+dfsg-1","latest_non_vulnerable_version":"6.9.4+dfsg1-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58499?format=json","vulnerability_id":"VCID-2hh2-akug-byew","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0493.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0493.html"},{"reference_url":"http://core.trac.wordpress.org/changeset/30431","reference_id":"","reference_type":"","scores":[],"url":"http://core.trac.wordpress.org/changeset/30431"},{"reference_url":"http://openwall.com/lists/oss-security/2014/11/25/12","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2014/11/25/12"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9039","reference_id":"","reference_type":"","scores":[{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82376","published_at":"2026-05-16T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.8211","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82122","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82144","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.8214","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82166","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82174","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82192","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82184","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82178","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82216","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82217","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.8224","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82251","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82253","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82269","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82292","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82314","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.8231","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82327","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82367","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82373","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039"},{"reference_url":"https://wordpress.org/news/2014/11/wordpress-4-0-1/","reference_id":"","reference_type":"","scores":[],"url":"https://wordpress.org/news/2014/11/wordpress-4-0-1/"},{"reference_url":"http://www.debian.org/security/2014/dsa-3085","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3085"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:233","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:233"},{"reference_url":"http://www.securitytracker.com/id/1031243","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031243"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425","reference_id":"770425","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9039","reference_id":"CVE-2014-9039","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9039"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/942991?format=json","purl":"pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.0.1%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942927?format=json","purl":"pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-gyaq-8pvh-p7gg"},{"vulnerability":"VCID-jghn-eujf-zbdn"},{"vulnerability":"VCID-yqam-kpce-dfg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942925?format=json","purl":"pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-gyaq-8pvh-p7gg"},{"vulnerability":"VCID-jghn-eujf-zbdn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942929?format=json","purl":"pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942928?format=json","purl":"pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"}],"aliases":["CVE-2014-9039"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2hh2-akug-byew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58490?format=json","vulnerability_id":"VCID-fykj-9gba-rqgn","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0493.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0493.html"},{"reference_url":"http://openwall.com/lists/oss-security/2014/11/25/12","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2014/11/25/12"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9036","reference_id":"","reference_type":"","scores":[{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69289","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69007","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69024","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69044","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69025","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69075","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69095","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69118","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69103","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69073","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69113","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69121","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69101","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69151","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69159","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69167","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69147","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.6919","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69223","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69214","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69263","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69275","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039"},{"reference_url":"https://wordpress.org/news/2014/11/wordpress-4-0-1/","reference_id":"","reference_type":"","scores":[],"url":"https://wordpress.org/news/2014/11/wordpress-4-0-1/"},{"reference_url":"http://www.debian.org/security/2014/dsa-3085","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3085"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:233","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:233"},{"reference_url":"http://www.securityfocus.com/bid/71236","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71236"},{"reference_url":"http://www.securitytracker.com/id/1031243","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031243"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425","reference_id":"770425","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9036","reference_id":"CVE-2014-9036","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9036"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/942991?format=json","purl":"pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.0.1%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942927?format=json","purl":"pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-gyaq-8pvh-p7gg"},{"vulnerability":"VCID-jghn-eujf-zbdn"},{"vulnerability":"VCID-yqam-kpce-dfg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942925?format=json","purl":"pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-gyaq-8pvh-p7gg"},{"vulnerability":"VCID-jghn-eujf-zbdn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942929?format=json","purl":"pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942928?format=json","purl":"pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"}],"aliases":["CVE-2014-9036"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fykj-9gba-rqgn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58483?format=json","vulnerability_id":"VCID-j45z-kwz2-b7hn","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0493.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0493.html"},{"reference_url":"http://klikki.fi/adv/wordpress.html","reference_id":"","reference_type":"","scores":[],"url":"http://klikki.fi/adv/wordpress.html"},{"reference_url":"http://openwall.com/lists/oss-security/2014/11/25/12","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2014/11/25/12"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9031","reference_id":"","reference_type":"","scores":[{"value":"0.00601","scoring_system":"epss","scoring_elements":"0.69685","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00601","scoring_system":"epss","scoring_elements":"0.69406","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00601","scoring_system":"epss","scoring_elements":"0.69417","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00601","scoring_system":"epss","scoring_elements":"0.69434","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00601","scoring_system":"epss","scoring_elements":"0.69413","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00601","scoring_system":"epss","scoring_elements":"0.69464","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00601","scoring_system":"epss","scoring_elements":"0.69479","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00601","scoring_system":"epss","scoring_elements":"0.69501","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00601","scoring_system":"epss","scoring_elements":"0.69486","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00601","scoring_system":"epss","scoring_elements":"0.69472","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00601","scoring_system":"epss","scoring_elements":"0.69512","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00601","scoring_system":"epss","scoring_elements":"0.69521","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00601","scoring_system":"epss","scoring_elements":"0.69554","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00601","scoring_system":"epss","scoring_elements":"0.69561","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00601","scoring_system":"epss","scoring_elements":"0.69565","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00601","scoring_system":"epss","scoring_elements":"0.69541","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00601","scoring_system":"epss","scoring_elements":"0.69583","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00601","scoring_system":"epss","scoring_elements":"0.69616","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00601","scoring_system":"epss","scoring_elements":"0.69588","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00601","scoring_system":"epss","scoring_elements":"0.69613","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00601","scoring_system":"epss","scoring_elements":"0.6966","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00601","scoring_system":"epss","scoring_elements":"0.69671","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039"},{"reference_url":"http://seclists.org/fulldisclosure/2014/Nov/62","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2014/Nov/62"},{"reference_url":"https://wordpress.org/news/2014/11/wordpress-4-0-1/","reference_id":"","reference_type":"","scores":[],"url":"https://wordpress.org/news/2014/11/wordpress-4-0-1/"},{"reference_url":"http://www.debian.org/security/2014/dsa-3085","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3085"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:233","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:233"},{"reference_url":"http://www.securityfocus.com/bid/71237","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71237"},{"reference_url":"http://www.securitytracker.com/id/1031243","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031243"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425","reference_id":"770425","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9031","reference_id":"CVE-2014-9031","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9031"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/942991?format=json","purl":"pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.0.1%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942927?format=json","purl":"pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-gyaq-8pvh-p7gg"},{"vulnerability":"VCID-jghn-eujf-zbdn"},{"vulnerability":"VCID-yqam-kpce-dfg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942925?format=json","purl":"pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-gyaq-8pvh-p7gg"},{"vulnerability":"VCID-jghn-eujf-zbdn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942929?format=json","purl":"pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942928?format=json","purl":"pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"}],"aliases":["CVE-2014-9031"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j45z-kwz2-b7hn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58496?format=json","vulnerability_id":"VCID-ksx9-t81e-pkb3","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0493.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0493.html"},{"reference_url":"http://openwall.com/lists/oss-security/2014/11/25/12","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2014/11/25/12"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9038","reference_id":"","reference_type":"","scores":[{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79403","published_at":"2026-05-16T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79149","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79155","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.7918","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79166","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79191","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79199","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79223","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79208","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79226","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79222","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79257","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79263","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.7928","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79293","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79314","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79331","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79333","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.7935","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79388","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79398","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9038"},{"reference_url":"https://core.trac.wordpress.org/changeset/30444","reference_id":"","reference_type":"","scores":[],"url":"https://core.trac.wordpress.org/changeset/30444"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039"},{"reference_url":"https://wordpress.org/news/2014/11/wordpress-4-0-1/","reference_id":"","reference_type":"","scores":[],"url":"https://wordpress.org/news/2014/11/wordpress-4-0-1/"},{"reference_url":"http://www.debian.org/security/2014/dsa-3085","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3085"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:233","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:233"},{"reference_url":"http://www.securitytracker.com/id/1031243","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031243"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425","reference_id":"770425","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9038","reference_id":"CVE-2014-9038","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9038"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/942991?format=json","purl":"pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.0.1%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942927?format=json","purl":"pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-gyaq-8pvh-p7gg"},{"vulnerability":"VCID-jghn-eujf-zbdn"},{"vulnerability":"VCID-yqam-kpce-dfg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942925?format=json","purl":"pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-gyaq-8pvh-p7gg"},{"vulnerability":"VCID-jghn-eujf-zbdn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942929?format=json","purl":"pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942928?format=json","purl":"pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"}],"aliases":["CVE-2014-9038"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ksx9-t81e-pkb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58486?format=json","vulnerability_id":"VCID-mfvf-n63j-cfaf","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0493.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0493.html"},{"reference_url":"http://core.trac.wordpress.org/changeset/30467","reference_id":"","reference_type":"","scores":[],"url":"http://core.trac.wordpress.org/changeset/30467"},{"reference_url":"http://openwall.com/lists/oss-security/2014/11/25/12","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2014/11/25/12"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9034","reference_id":"","reference_type":"","scores":[{"value":"0.72483","scoring_system":"epss","scoring_elements":"0.9879","published_at":"2026-05-16T12:55:00Z"},{"value":"0.72483","scoring_system":"epss","scoring_elements":"0.98755","published_at":"2026-04-02T12:55:00Z"},{"value":"0.72483","scoring_system":"epss","scoring_elements":"0.98759","published_at":"2026-04-04T12:55:00Z"},{"value":"0.72483","scoring_system":"epss","scoring_elements":"0.98761","published_at":"2026-04-07T12:55:00Z"},{"value":"0.72483","scoring_system":"epss","scoring_elements":"0.98762","published_at":"2026-04-09T12:55:00Z"},{"value":"0.72483","scoring_system":"epss","scoring_elements":"0.98764","published_at":"2026-04-11T12:55:00Z"},{"value":"0.72483","scoring_system":"epss","scoring_elements":"0.98765","published_at":"2026-04-12T12:55:00Z"},{"value":"0.72483","scoring_system":"epss","scoring_elements":"0.98766","published_at":"2026-04-13T12:55:00Z"},{"value":"0.72483","scoring_system":"epss","scoring_elements":"0.98769","published_at":"2026-04-16T12:55:00Z"},{"value":"0.72483","scoring_system":"epss","scoring_elements":"0.9877","published_at":"2026-04-18T12:55:00Z"},{"value":"0.72483","scoring_system":"epss","scoring_elements":"0.98771","published_at":"2026-04-21T12:55:00Z"},{"value":"0.72483","scoring_system":"epss","scoring_elements":"0.98775","published_at":"2026-04-24T12:55:00Z"},{"value":"0.72483","scoring_system":"epss","scoring_elements":"0.98776","published_at":"2026-04-26T12:55:00Z"},{"value":"0.72483","scoring_system":"epss","scoring_elements":"0.98777","published_at":"2026-04-29T12:55:00Z"},{"value":"0.72483","scoring_system":"epss","scoring_elements":"0.98782","published_at":"2026-05-05T12:55:00Z"},{"value":"0.72483","scoring_system":"epss","scoring_elements":"0.98783","published_at":"2026-05-07T12:55:00Z"},{"value":"0.72483","scoring_system":"epss","scoring_elements":"0.98786","published_at":"2026-05-09T12:55:00Z"},{"value":"0.72483","scoring_system":"epss","scoring_elements":"0.98787","published_at":"2026-05-11T12:55:00Z"},{"value":"0.72483","scoring_system":"epss","scoring_elements":"0.98789","published_at":"2026-05-12T12:55:00Z"},{"value":"0.72483","scoring_system":"epss","scoring_elements":"0.98792","published_at":"2026-05-14T12:55:00Z"},{"value":"0.72483","scoring_system":"epss","scoring_elements":"0.98793","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039"},{"reference_url":"https://wordpress.org/news/2014/11/wordpress-4-0-1/","reference_id":"","reference_type":"","scores":[],"url":"https://wordpress.org/news/2014/11/wordpress-4-0-1/"},{"reference_url":"http://www.debian.org/security/2014/dsa-3085","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3085"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:233","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:233"},{"reference_url":"http://www.securitytracker.com/id/1031243","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031243"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425","reference_id":"770425","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9034","reference_id":"CVE-2014-9034","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9034"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/35413.php","reference_id":"CVE-2014-9034;OSVDB-114857","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/35413.php"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/35414.txt","reference_id":"CVE-2014-9034;OSVDB-114857","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/35414.txt"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/942991?format=json","purl":"pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.0.1%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942927?format=json","purl":"pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-gyaq-8pvh-p7gg"},{"vulnerability":"VCID-jghn-eujf-zbdn"},{"vulnerability":"VCID-yqam-kpce-dfg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942925?format=json","purl":"pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-gyaq-8pvh-p7gg"},{"vulnerability":"VCID-jghn-eujf-zbdn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942929?format=json","purl":"pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942928?format=json","purl":"pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"}],"aliases":["CVE-2014-9034"],"risk_score":9.0,"exploitability":"2.0","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mfvf-n63j-cfaf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58488?format=json","vulnerability_id":"VCID-pd4w-3ttq-9yfs","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0493.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0493.html"},{"reference_url":"http://openwall.com/lists/oss-security/2014/11/25/12","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2014/11/25/12"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9035","reference_id":"","reference_type":"","scores":[{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69289","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69007","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69024","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69044","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69025","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69075","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69095","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69118","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69103","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69073","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69113","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69121","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69101","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69151","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69159","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69167","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69147","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.6919","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69223","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69214","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69263","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00586","scoring_system":"epss","scoring_elements":"0.69275","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039"},{"reference_url":"https://wordpress.org/news/2014/11/wordpress-4-0-1/","reference_id":"","reference_type":"","scores":[],"url":"https://wordpress.org/news/2014/11/wordpress-4-0-1/"},{"reference_url":"http://www.debian.org/security/2014/dsa-3085","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3085"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:233","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:233"},{"reference_url":"http://www.securityfocus.com/bid/71236","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71236"},{"reference_url":"http://www.securitytracker.com/id/1031243","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031243"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425","reference_id":"770425","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9035","reference_id":"CVE-2014-9035","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9035"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/942991?format=json","purl":"pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.0.1%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942927?format=json","purl":"pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-gyaq-8pvh-p7gg"},{"vulnerability":"VCID-jghn-eujf-zbdn"},{"vulnerability":"VCID-yqam-kpce-dfg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942925?format=json","purl":"pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-gyaq-8pvh-p7gg"},{"vulnerability":"VCID-jghn-eujf-zbdn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942929?format=json","purl":"pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942928?format=json","purl":"pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"}],"aliases":["CVE-2014-9035"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pd4w-3ttq-9yfs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58494?format=json","vulnerability_id":"VCID-re92-3yew-1bft","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0493.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0493.html"},{"reference_url":"http://openwall.com/lists/oss-security/2014/11/25/12","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2014/11/25/12"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9037","reference_id":"","reference_type":"","scores":[{"value":"0.02617","scoring_system":"epss","scoring_elements":"0.8582","published_at":"2026-05-16T12:55:00Z"},{"value":"0.02617","scoring_system":"epss","scoring_elements":"0.85579","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02617","scoring_system":"epss","scoring_elements":"0.8559","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02617","scoring_system":"epss","scoring_elements":"0.85608","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02617","scoring_system":"epss","scoring_elements":"0.85614","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02617","scoring_system":"epss","scoring_elements":"0.85634","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02617","scoring_system":"epss","scoring_elements":"0.85645","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02617","scoring_system":"epss","scoring_elements":"0.8566","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02617","scoring_system":"epss","scoring_elements":"0.85656","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02617","scoring_system":"epss","scoring_elements":"0.85652","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02617","scoring_system":"epss","scoring_elements":"0.85675","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02617","scoring_system":"epss","scoring_elements":"0.8568","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02617","scoring_system":"epss","scoring_elements":"0.85676","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02617","scoring_system":"epss","scoring_elements":"0.85697","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02617","scoring_system":"epss","scoring_elements":"0.85709","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02617","scoring_system":"epss","scoring_elements":"0.85711","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02617","scoring_system":"epss","scoring_elements":"0.85727","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02617","scoring_system":"epss","scoring_elements":"0.85748","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02617","scoring_system":"epss","scoring_elements":"0.85765","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02617","scoring_system":"epss","scoring_elements":"0.85761","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02617","scoring_system":"epss","scoring_elements":"0.85774","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02617","scoring_system":"epss","scoring_elements":"0.85809","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02617","scoring_system":"epss","scoring_elements":"0.85818","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9037"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039"},{"reference_url":"https://wordpress.org/news/2014/11/wordpress-4-0-1/","reference_id":"","reference_type":"","scores":[],"url":"https://wordpress.org/news/2014/11/wordpress-4-0-1/"},{"reference_url":"http://www.debian.org/security/2014/dsa-3085","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3085"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:233","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:233"},{"reference_url":"http://www.securitytracker.com/id/1031243","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031243"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425","reference_id":"770425","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9037","reference_id":"CVE-2014-9037","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9037"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/942991?format=json","purl":"pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.0.1%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942927?format=json","purl":"pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-gyaq-8pvh-p7gg"},{"vulnerability":"VCID-jghn-eujf-zbdn"},{"vulnerability":"VCID-yqam-kpce-dfg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942925?format=json","purl":"pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-gyaq-8pvh-p7gg"},{"vulnerability":"VCID-jghn-eujf-zbdn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942929?format=json","purl":"pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942928?format=json","purl":"pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"}],"aliases":["CVE-2014-9037"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-re92-3yew-1bft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58485?format=json","vulnerability_id":"VCID-rz89-bchd-zqge","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0493.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0493.html"},{"reference_url":"http://core.trac.wordpress.org/changeset/30418","reference_id":"","reference_type":"","scores":[],"url":"http://core.trac.wordpress.org/changeset/30418"},{"reference_url":"http://openwall.com/lists/oss-security/2014/11/25/12","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2014/11/25/12"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9033","reference_id":"","reference_type":"","scores":[{"value":"0.00804","scoring_system":"epss","scoring_elements":"0.743","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00804","scoring_system":"epss","scoring_elements":"0.7407","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00804","scoring_system":"epss","scoring_elements":"0.74076","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00804","scoring_system":"epss","scoring_elements":"0.74102","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00804","scoring_system":"epss","scoring_elements":"0.74074","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00804","scoring_system":"epss","scoring_elements":"0.74107","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00804","scoring_system":"epss","scoring_elements":"0.74122","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00804","scoring_system":"epss","scoring_elements":"0.74143","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00804","scoring_system":"epss","scoring_elements":"0.74125","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00804","scoring_system":"epss","scoring_elements":"0.74119","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00804","scoring_system":"epss","scoring_elements":"0.74157","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00804","scoring_system":"epss","scoring_elements":"0.74166","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00804","scoring_system":"epss","scoring_elements":"0.74156","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00804","scoring_system":"epss","scoring_elements":"0.74192","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00804","scoring_system":"epss","scoring_elements":"0.74201","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00804","scoring_system":"epss","scoring_elements":"0.742","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00804","scoring_system":"epss","scoring_elements":"0.74193","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00804","scoring_system":"epss","scoring_elements":"0.74221","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00804","scoring_system":"epss","scoring_elements":"0.74244","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00804","scoring_system":"epss","scoring_elements":"0.74207","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00804","scoring_system":"epss","scoring_elements":"0.7423","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00804","scoring_system":"epss","scoring_elements":"0.74286","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00804","scoring_system":"epss","scoring_elements":"0.74292","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9033"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9033"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9037"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9039"},{"reference_url":"https://wordpress.org/news/2014/11/wordpress-4-0-1/","reference_id":"","reference_type":"","scores":[],"url":"https://wordpress.org/news/2014/11/wordpress-4-0-1/"},{"reference_url":"http://www.debian.org/security/2014/dsa-3085","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3085"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:233","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:233"},{"reference_url":"http://www.securitytracker.com/id/1031243","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031243"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425","reference_id":"770425","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9033","reference_id":"CVE-2014-9033","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9033"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/942991?format=json","purl":"pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.0.1%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942927?format=json","purl":"pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-gyaq-8pvh-p7gg"},{"vulnerability":"VCID-jghn-eujf-zbdn"},{"vulnerability":"VCID-yqam-kpce-dfg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942925?format=json","purl":"pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-gyaq-8pvh-p7gg"},{"vulnerability":"VCID-jghn-eujf-zbdn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942929?format=json","purl":"pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942928?format=json","purl":"pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"}],"aliases":["CVE-2014-9033"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rz89-bchd-zqge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92646?format=json","vulnerability_id":"VCID-tcbf-ura1-mbfv","summary":"Cross-site scripting (XSS) vulnerability in the media-playlists feature in WordPress before 3.9.x before 3.9.3 and 4.x before 4.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0493.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0493.html"},{"reference_url":"http://openwall.com/lists/oss-security/2014/11/25/12","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2014/11/25/12"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9032","reference_id":"","reference_type":"","scores":[{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.62078","published_at":"2026-05-16T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61796","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.6187","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.619","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61871","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.6192","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61937","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61959","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61947","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61927","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.6197","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61974","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61954","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61952","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61969","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61962","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61907","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61955","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.62015","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61996","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.62049","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.62063","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9032"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9032","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9032"},{"reference_url":"https://wordpress.org/news/2014/11/wordpress-4-0-1/","reference_id":"","reference_type":"","scores":[],"url":"https://wordpress.org/news/2014/11/wordpress-4-0-1/"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:233","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:233"},{"reference_url":"http://www.securityfocus.com/bid/71236","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71236"},{"reference_url":"http://www.securitytracker.com/id/1031243","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1031243"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425","reference_id":"770425","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770425"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9032","reference_id":"CVE-2014-9032","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9032"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/942991?format=json","purl":"pkg:deb/debian/wordpress@4.0.1%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.0.1%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942927?format=json","purl":"pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-gyaq-8pvh-p7gg"},{"vulnerability":"VCID-jghn-eujf-zbdn"},{"vulnerability":"VCID-yqam-kpce-dfg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942925?format=json","purl":"pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-gyaq-8pvh-p7gg"},{"vulnerability":"VCID-jghn-eujf-zbdn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942929?format=json","purl":"pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942928?format=json","purl":"pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"}],"aliases":["CVE-2014-9032"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tcbf-ura1-mbfv"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@4.0.1%252Bdfsg-1%3Fdistro=trixie"}