CVE-2006-3938

N/A Unknown
Published: July 31, 2006 Modified: April 16, 2026
View on NVD

Description

DotClear allows remote attackers to obtain sensitive information via a direct request for (1) edit_cat.php, (2) index.php, (3) edit_link.php in ecrire/tools/blogroll/; (4) syslog/index.php, (5) thememng/index.php, (6) toolsmng/index.php, (7) utf8convert/index.php in /ecrire/tools/; (8) /ecrire/inc/connexion.php and (9) /inc/session.php; (10) class.blog.php, (11) class.blogcomment.php, (12) and class.blogpost.php in /inc/classes/; (13) append.php, (14) class.xblog.php, (15) class.xblogcomment.php, and (16) class.xblogpost.php in /layout/; (17) form.php, (18) list.php, (19) post.php, or (20) template.php in /themes/default/, which reveal the installation path in error messages.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.osvdb.org/29812
Source: cve@mitre.org
http://www.osvdb.org/29813
Source: cve@mitre.org
http://www.osvdb.org/29814
Source: cve@mitre.org
http://www.osvdb.org/29815
Source: cve@mitre.org
http://www.osvdb.org/29816
Source: cve@mitre.org
http://www.osvdb.org/29817
Source: cve@mitre.org
http://www.osvdb.org/29818
Source: cve@mitre.org
http://www.osvdb.org/29820
Source: cve@mitre.org
http://www.osvdb.org/29821
Source: cve@mitre.org
http://www.osvdb.org/29822
Source: cve@mitre.org
http://www.osvdb.org/29823
Source: cve@mitre.org
http://www.osvdb.org/29824
Source: cve@mitre.org
http://www.osvdb.org/29825
Source: cve@mitre.org
http://www.osvdb.org/29826
Source: cve@mitre.org
http://www.osvdb.org/29827
Source: cve@mitre.org
http://www.osvdb.org/29828
Source: cve@mitre.org
http://www.osvdb.org/29829
Source: cve@mitre.org
http://www.osvdb.org/29830
Source: cve@mitre.org
http://www.osvdb.org/29831
Source: cve@mitre.org
http://securityreason.com/securityalert/1307
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29812
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29813
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29814
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29815
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29816
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29817
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29818
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29820
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29821
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29822
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29823
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29824
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29825
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29826
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29827
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29828
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29829
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29830
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29831
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/440874/100/100/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/459820/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://zone14.free.fr/advisories/8/
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/27913
Source: af854a3a-2127-422b-91ae-364da2661108

48 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
1.7%
83th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

dotclear