First published: Tue Nov 25 2014(Updated: )
WordPress before 3.7.5, 3.8.x before 3.8.5, 3.9.x before 3.9.3, and 4.x before 4.0.1 might allow remote attackers to obtain access to an account idle since 2008 by leveraging an improper PHP dynamic type comparison for an MD5 hash.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mageia Project Mageia | =3 | |
Mageia Project Mageia | =4 | |
WordPress WordPress | <=3.7.4 | |
WordPress WordPress | =3.8 | |
WordPress WordPress | =3.8.1 | |
WordPress WordPress | =3.8.2 | |
WordPress WordPress | =3.8.3 | |
WordPress WordPress | =3.8.4 | |
WordPress WordPress | =3.9 | |
WordPress WordPress | =3.9.1 | |
WordPress WordPress | =3.9.2 | |
WordPress WordPress | =4.0 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.