Vulnerability Details : CVE-2006-3695
Trac before 0.9.6 does not disable the "raw" or "include" commands when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows remote attackers to read arbitrary files, perform cross-site scripting (XSS) attacks, or cause a denial of service via unspecified vectors. NOTE: this might be related to CVE-2006-3458.
Vulnerability category: Cross site scripting (XSS)Denial of service
Products affected by CVE-2006-3695
- cpe:2.3:a:edgewall_software:trac:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-3695
3.71%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 91 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-3695
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
References for CVE-2006-3695
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/27708
Trac reStructuredText denial of service CVE-2006-3695 Vulnerability Report
-
http://www.securityfocus.com/bid/18323
-
http://www.debian.org/security/2006/dsa-1152
Debian -- Security Information -- DSA-1152-1 trac
-
http://www.vupen.com/english/advisories/2006/2729
Webmail: access your OVH emails on ovhcloud.com | OVHcloudVendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/27706
Trac reStructuredText information disclosure CVE-2006-3695 Vulnerability Report
-
http://securitytracker.com/id?1016457
-
http://trac.edgewall.org/wiki/ChangeLog
ChangeLog – The Trac Project
Jump to