Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-20151

Опубликовано: 14 дек. 2018
Источник: debian
EPSS Низкий

Описание

In WordPress before 4.9.9 and 5.x before 5.0.1, the user-activation page could be read by a search engine's web crawler if an unusual configuration were chosen. The search engine could then index and display a user's e-mail address and (rarely) the password that was generated by default.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wordpressfixed5.0.1+dfsg1-1package

Примечания

  • https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/

EPSS

Процентиль: 89%
0.05095
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 6 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, the user-activation page could be read by a search engine's web crawler if an unusual configuration were chosen. The search engine could then index and display a user's e-mail address and (rarely) the password that was generated by default.

CVSS3: 7.5
nvd
больше 6 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, the user-activation page could be read by a search engine's web crawler if an unusual configuration were chosen. The search engine could then index and display a user's e-mail address and (rarely) the password that was generated by default.

CVSS3: 7.5
github
около 3 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, the user-activation page could be read by a search engine's web crawler if an unusual configuration were chosen. The search engine could then index and display a user's e-mail address and (rarely) the password that was generated by default.

EPSS

Процентиль: 89%
0.05095
Низкий