Vulnerability Details : CVE-2006-3389
index.php in WordPress 2.0.3 allows remote attackers to obtain sensitive information, such as SQL table prefixes, via an invalid paged parameter, which displays the information in an SQL error message. NOTE: this issue has been disputed by a third party who states that the issue does not leak any target-specific information.
Exploit prediction scoring system (EPSS) score for CVE-2006-3389
Probability of exploitation activity in the next 30 days: 1.03%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 82 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2006-3389
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2006-3389
-
http://www.securityfocus.com/archive/1/440127/100/0/threaded
- http://www.vupen.com/english/advisories/2006/2661
- http://securityreason.com/securityalert/1187
- http://www.securityfocus.com/archive/1/439062/100/0/threaded
- http://security.gentoo.org/glsa/glsa-200608-19.xml
- http://www.securityfocus.com/archive/1/438942/100/0/threaded
- http://www.securityfocus.com/bid/18779
-
http://www.securityfocus.com/archive/1/439031/100/0/threaded
Products affected by CVE-2006-3389
- cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*