Total vulnerabilities in the database
In WordPress before 4.9.9 and 5.x before 5.0.1, the user-activation page could be read by a search engine's web crawler if an unusual configuration were chosen. The search engine could then index and display a user's e-mail address and (rarely) the password that was generated by default.
Software | From | Fixed in |
---|---|---|
WordPress / wordpress | 5.0 | 5.0.1 |
WordPress / wordpress | - | 4.9.9 |
debian / debian_linux | 8.0 | 8.0.x |
debian / debian_linux | 9.0 | 9.0.x |