Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-2336

Опубликовано: 10 июл. 2009
Источник: ubuntu
Приоритет: low
CVSS2: 5

Описание

The forgotten mail interface in WordPress and WordPress MU before 2.8.1 exhibits different behavior for a password request depending on whether the user account exists, which allows remote attackers to enumerate valid usernames. NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for "user convenience."

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

2.8.3-2ubuntu1
hardy

ignored

end of life
intrepid

ignored

end of life, was needs-triage
jaunty

ignored

end of life
karmic

not-affected

2.8.3-2ubuntu1
lucid

not-affected

2.8.3-2ubuntu1
maverick

not-affected

2.8.3-2ubuntu1
natty

not-affected

2.8.3-2ubuntu1
oneiric

not-affected

2.8.3-2ubuntu1

Показывать по

Ссылки на источники

5 Medium

CVSS2

Связанные уязвимости

redhat
почти 16 лет назад

The forgotten mail interface in WordPress and WordPress MU before 2.8.1 exhibits different behavior for a password request depending on whether the user account exists, which allows remote attackers to enumerate valid usernames. NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for "user convenience."

nvd
почти 16 лет назад

The forgotten mail interface in WordPress and WordPress MU before 2.8.1 exhibits different behavior for a password request depending on whether the user account exists, which allows remote attackers to enumerate valid usernames. NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for "user convenience."

debian
почти 16 лет назад

The forgotten mail interface in WordPress and WordPress MU before 2.8. ...

github
около 3 лет назад

The forgotten mail interface in WordPress and WordPress MU before 2.8.1 exhibits different behavior for a password request depending on whether the user account exists, which allows remote attackers to enumerate valid usernames. NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for "user convenience."

5 Medium

CVSS2