Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2009-2762

Опубликовано: 13 авг. 2009
Источник: debian
EPSS Средний

Описание

wp-login.php in WordPress 2.8.3 and earlier allows remote attackers to force a password reset for the first user in the database, possibly the administrator, via a key[] array variable in a resetpass (aka rp) action, which bypasses a check that assumes that $key is not an array.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wordpressfixed2.8.3-2package
wordpressnot-affectedlennypackage
wordpressnot-affectedetchpackage

Примечания

  • not really a security issue in my opinion, just an annoying bug

EPSS

Процентиль: 99%
0.68714
Средний

Связанные уязвимости

ubuntu
почти 16 лет назад

wp-login.php in WordPress 2.8.3 and earlier allows remote attackers to force a password reset for the first user in the database, possibly the administrator, via a key[] array variable in a resetpass (aka rp) action, which bypasses a check that assumes that $key is not an array.

nvd
почти 16 лет назад

wp-login.php in WordPress 2.8.3 and earlier allows remote attackers to force a password reset for the first user in the database, possibly the administrator, via a key[] array variable in a resetpass (aka rp) action, which bypasses a check that assumes that $key is not an array.

github
больше 3 лет назад

wp-login.php in WordPress 2.8.3 and earlier allows remote attackers to force a password reset for the first user in the database, possibly the administrator, via a key[] array variable in a resetpass (aka rp) action, which bypasses a check that assumes that $key is not an array.

EPSS

Процентиль: 99%
0.68714
Средний