CVE-2014-6412

WordPress before 4.4 makes it easier for remote attackers to predict password-recovery tokens via a brute-force approach.
References
Link Resource
https://core.trac.wordpress.org/ticket/28633 Issue Tracking Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1192474 Issue Tracking Third Party Advisory
http://www.securitytracker.com/id/1031749 Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/72589 Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2015/Feb/53 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2015/Feb/42 Mailing List Third Party Advisory
http://packetstormsecurity.com/files/130380/WordPress-Failed-Randomness.html Third Party Advisory VDB Entry
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*

Information

Published : 2018-04-12 14:29

Updated : 2018-05-17 07:38


NVD link : CVE-2014-6412

Mitre link : CVE-2014-6412


JSON object : View

CWE
CWE-640

Weak Password Recovery Mechanism for Forgotten Password

Advertisement

dedicated server usa

Products Affected

wordpress

  • wordpress