Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-2762

Опубликовано: 13 авг. 2009
Источник: ubuntu
Приоритет: medium
EPSS Высокий
CVSS2: 7.5

Описание

wp-login.php in WordPress 2.8.3 and earlier allows remote attackers to force a password reset for the first user in the database, possibly the administrator, via a key[] array variable in a resetpass (aka rp) action, which bypasses a check that assumes that $key is not an array.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

2.8.4-1ubuntu1
hardy

ignored

end of life
intrepid

ignored

end of life, was needed
jaunty

ignored

end of life
karmic

not-affected

2.8.4-1ubuntu1
lucid

not-affected

2.8.4-1ubuntu1
maverick

not-affected

2.8.4-1ubuntu1
natty

not-affected

2.8.4-1ubuntu1
oneiric

not-affected

2.8.4-1ubuntu1

Показывать по

Ссылки на источники

EPSS

Процентиль: 99%
0.74127
Высокий

7.5 High

CVSS2

Связанные уязвимости

nvd
почти 16 лет назад

wp-login.php in WordPress 2.8.3 and earlier allows remote attackers to force a password reset for the first user in the database, possibly the administrator, via a key[] array variable in a resetpass (aka rp) action, which bypasses a check that assumes that $key is not an array.

debian
почти 16 лет назад

wp-login.php in WordPress 2.8.3 and earlier allows remote attackers to ...

github
больше 3 лет назад

wp-login.php in WordPress 2.8.3 and earlier allows remote attackers to force a password reset for the first user in the database, possibly the administrator, via a key[] array variable in a resetpass (aka rp) action, which bypasses a check that assumes that $key is not an array.

EPSS

Процентиль: 99%
0.74127
Высокий

7.5 High

CVSS2