index.php in WordPress 2.0.3 allows remote attackers to obtain sensitive information, such as SQL table prefixes, via an invalid paged parameter, which displays the information in an SQL error message. NOTE: this issue has been disputed by a third party who states that the issue does not leak any target-specific information.
References
Configurations
History
21 Nov 2024, 00:13
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/20928 - Vendor Advisory | |
References | () http://secunia.com/advisories/21447 - | |
References | () http://security.gentoo.org/glsa/glsa-200608-19.xml - | |
References | () http://securityreason.com/securityalert/1187 - | |
References | () http://www.securityfocus.com/archive/1/438942/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/439031/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/439062/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/440127/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/18779 - | |
References | () http://www.vupen.com/english/advisories/2006/2661 - |
Information
Published : 2006-07-06 20:05
Updated : 2024-11-21 00:13
NVD link : CVE-2006-3389
Mitre link : CVE-2006-3389
CVE.ORG link : CVE-2006-3389
JSON object : View
Products Affected
wordpress
- wordpress
CWE