CVE-2018-20151
14.12.2018, 20:29
In WordPress before 4.9.9 and 5.x before 5.0.1, the user-activation page could be read by a search engine's web crawler if an unusual configuration were chosen. The search engine could then index and display a user's e-mail address and (rarely) the password that was generated by default.Enginsight
Vendor | Product | Version |
---|---|---|
wordpress | wordpress | 𝑥 < 4.9.9 |
wordpress | wordpress | 5.0 ≤ 𝑥 < 5.0.1 |
debian | debian_linux | 8.0 |
debian | debian_linux | 9.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References