| |
Vulnerability CVE-2006-3938
Published: 2006-07-31 Modified: 2012-02-12
Description: |
DotClear allows remote attackers to obtain sensitive information via a direct request for (1) edit_cat.php, (2) index.php, (3) edit_link.php in ecrire/tools/blogroll/; (4) syslog/index.php, (5) thememng/index.php, (6) toolsmng/index.php, (7) utf8convert/index.php in /ecrire/tools/; (8) /ecrire/inc/connexion.php and (9) /inc/session.php; (10) class.blog.php, (11) class.blogcomment.php, (12) and class.blogpost.php in /inc/classes/; (13) append.php, (14) class.xblog.php, (15) class.xblogcomment.php, and (16) class.xblogpost.php in /layout/; (17) form.php, (18) list.php, (19) post.php, or (20) template.php in /themes/default/, which reveal the installation path in error messages. |
See advisories in our WLB2 database: | Topic | Author | Date |
Low |
| Silitix gmail co... | 01.08.2006 |
Type:
CWE-Other
CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
5/10 |
2.9/10 |
10/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Low |
No required |
Confidentiality impact |
Integrity impact |
Availability impact |
Partial |
None |
None |
References: |
http://securityreason.com/securityalert/1307
http://www.securityfocus.com/archive/1/440874/100/100/threaded
http://www.securityfocus.com/archive/1/459820/100/0/threaded
http://zone14.free.fr/advisories/8/
https://exchange.xforce.ibmcloud.com/vulnerabilities/27913
|
|
|
Copyright 2024, cxsecurity.com
|
|
|