Search for vulnerabilities
| Vulnerability ID | VCID-b4h4-1gys-uqcc |
| Aliases |
CVE-2008-6767
|
| Summary | wp-admin/upgrade.php in WordPress, probably 2.6.x, allows remote attackers to upgrade the application, and possibly cause a denial of service (application outage), via a direct request. |
| Status | Published |
| Exploitability | 0.5 |
| Weighted Severity | 0.0 |
| Risk | None |
| Affected and Fixed Packages | Package Details |
| There are no known CWE. |
| System | Score | Found at |
|---|---|---|
| epss | 0.0074 | https://api.first.org/data/v1/epss?cve=CVE-2008-6767 |
| epss | 0.0074 | https://api.first.org/data/v1/epss?cve=CVE-2008-6767 |
| epss | 0.0074 | https://api.first.org/data/v1/epss?cve=CVE-2008-6767 |
| epss | 0.0074 | https://api.first.org/data/v1/epss?cve=CVE-2008-6767 |
| epss | 0.0074 | https://api.first.org/data/v1/epss?cve=CVE-2008-6767 |
| epss | 0.0074 | https://api.first.org/data/v1/epss?cve=CVE-2008-6767 |
| epss | 0.0074 | https://api.first.org/data/v1/epss?cve=CVE-2008-6767 |
| epss | 0.0074 | https://api.first.org/data/v1/epss?cve=CVE-2008-6767 |
| epss | 0.0074 | https://api.first.org/data/v1/epss?cve=CVE-2008-6767 |
| Percentile | 0.72855 |
| EPSS Score | 0.0074 |
| Published At | April 1, 2026, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2026-04-01T16:30:31.747600+00:00 | Debian Oval Importer | Import | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 38.0.0 |