Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-20151

Опубликовано: 14 дек. 2018
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5
CVSS3: 7.5

Описание

In WordPress before 4.9.9 and 5.x before 5.0.1, the user-activation page could be read by a search engine's web crawler if an unusual configuration were chosen. The search engine could then index and display a user's e-mail address and (rarely) the password that was generated by default.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
cosmic

ignored

end of life
devel

not-affected

CVE-2018-20151
disco

not-affected

CVE-2018-20151
eoan

not-affected

CVE-2018-20151
esm-apps/bionic

needed

esm-apps/focal

not-affected

CVE-2018-20151
esm-apps/jammy

not-affected

CVE-2018-20151
esm-apps/noble

not-affected

CVE-2018-20151
esm-apps/xenial

needed

Показывать по

EPSS

Процентиль: 89%
0.05095
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
больше 6 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, the user-activation page could be read by a search engine's web crawler if an unusual configuration were chosen. The search engine could then index and display a user's e-mail address and (rarely) the password that was generated by default.

CVSS3: 7.5
debian
больше 6 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, the user-activation pa ...

CVSS3: 7.5
github
около 3 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, the user-activation page could be read by a search engine's web crawler if an unusual configuration were chosen. The search engine could then index and display a user's e-mail address and (rarely) the password that was generated by default.

EPSS

Процентиль: 89%
0.05095
Низкий

5 Medium

CVSS2

7.5 High

CVSS3