CVE-2006-3389
 
Severity Score
5.0
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
index.php in WordPress 2.0.3 allows remote attackers to obtain sensitive information, such as SQL table prefixes, via an invalid paged parameter, which displays the information in an SQL error message. NOTE: this issue has been disputed by a third party who states that the issue does not leak any target-specific information.
index.php en WordPress 2.0.3 permite a los atacante remotos, obtener información sensible como los prefijos de una tabla SQL, a través del parámetro inválido paged, el cual muestra la información en un mensaje de error SQL. NOTA: este asunto ha sido discutido por terceros quienes plantean que el asunto no filtra un información con un objetivo específico.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2006-07-06 CVE Reserved
- 2006-07-06 CVE Published
- 2023-09-01 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/21447 | Third Party Advisory | |
http://securityreason.com/securityalert/1187 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/438942/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/439031/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/439062/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/440127/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/18779 | Vdb Entry | |
http://www.vupen.com/english/advisories/2006/2661 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/20928 | 2018-10-18 | |
http://security.gentoo.org/glsa/glsa-200608-19.xml | 2018-10-18 |