WordPress before 3.7.5, 3.8.x before 3.8.5, 3.9.x before 3.9.3, and 4.x before 4.0.1 might allow remote attackers to obtain access to an account idle since 2008 by leveraging an improper PHP dynamic type comparison for an MD5 hash.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 02:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://advisories.mageia.org/MGASA-2014-0493.html - | |
References | () http://openwall.com/lists/oss-security/2014/11/25/12 - | |
References | () http://www.debian.org/security/2014/dsa-3085 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2014:233 - | |
References | () http://www.securitytracker.com/id/1031243 - | |
References | () https://wordpress.org/news/2014/11/wordpress-4-0-1/ - Patch, Vendor Advisory |
Information
Published : 2014-11-25 23:59
Updated : 2024-11-21 02:20
NVD link : CVE-2014-9037
Mitre link : CVE-2014-9037
CVE.ORG link : CVE-2014-9037
JSON object : View
Products Affected
debian
- debian_linux
wordpress
- wordpress
mageia_project
- mageia
CWE
CWE-310
Cryptographic Issues