wp-includes/class-phpass.php in WordPress 3.5.1, when a password-protected post exists, allows remote attackers to cause a denial of service (CPU consumption) via a crafted value of a certain wp-postpass cookie.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "wordpress", "binary_version": "3.8.2+dfsg-1ubuntu0.1" }, { "binary_name": "wordpress-l10n", "binary_version": "3.8.2+dfsg-1ubuntu0.1" }, { "binary_name": "wordpress-theme-twentyfourteen", "binary_version": "3.8.2+dfsg-1ubuntu0.1" }, { "binary_name": "wordpress-theme-twentythirteen", "binary_version": "3.8.2+dfsg-1ubuntu0.1" }, { "binary_name": "wordpress-theme-twentytwelve", "binary_version": "3.8.2+dfsg-1ubuntu0.1" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "wordpress", "binary_version": "4.4.2+dfsg-1ubuntu1" }, { "binary_name": "wordpress-l10n", "binary_version": "4.4.2+dfsg-1ubuntu1" }, { "binary_name": "wordpress-theme-twentyfifteen", "binary_version": "4.4.2+dfsg-1ubuntu1" }, { "binary_name": "wordpress-theme-twentyfourteen", "binary_version": "4.4.2+dfsg-1ubuntu1" }, { "binary_name": "wordpress-theme-twentysixteen", "binary_version": "4.4.2+dfsg-1ubuntu1" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "wordpress", "binary_version": "4.9.5+dfsg1-1" }, { "binary_name": "wordpress-l10n", "binary_version": "4.9.5+dfsg1-1" }, { "binary_name": "wordpress-theme-twentyfifteen", "binary_version": "4.9.5+dfsg1-1" }, { "binary_name": "wordpress-theme-twentyseventeen", "binary_version": "4.9.5+dfsg1-1" }, { "binary_name": "wordpress-theme-twentysixteen", "binary_version": "4.9.5+dfsg1-1" } ] }