CVE-2014-6412

WordPress before 4.4 makes it easier for remote attackers to predict password-recovery tokens via a brute-force approach.
References
Link Resource
http://packetstormsecurity.com/files/130380/WordPress-Failed-Randomness.html Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2015/Feb/42 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2015/Feb/53 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/72589 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1031749 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1192474 Issue Tracking Third Party Advisory
https://core.trac.wordpress.org/ticket/28633 Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-04-12 21:29

Updated : 2023-12-10 12:30


NVD link : CVE-2014-6412

Mitre link : CVE-2014-6412

CVE.ORG link : CVE-2014-6412


JSON object : View

Products Affected

wordpress

  • wordpress
CWE
CWE-640

Weak Password Recovery Mechanism for Forgotten Password