### [CVE-2009-2335](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2335) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description WordPress and WordPress MU before 2.8.1 exhibit different behavior for a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames. NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for "user convenience." ### POC #### Reference - http://www.exploit-db.com/exploits/9110 - http://www.exploit-db.com/exploits/9110 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Austin-Jacobs/Code_Path - https://github.com/OmarG13/Raven1-Pen-Test - https://github.com/jguerrero12/WordPress-Pentesting - https://github.com/preritpathak/Pentesting-live-targets-2 - https://github.com/shaharsigal/Final-Project-Cyber-Security