CVE-2006-5316

registroTL - Info Disclosure

Title source: llm
STIX 2.1

Description

registroTL stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for /usuarios.dat.

Exploits (1)

exploitdb WRITEUP VERIFIED
by DarkFig · textwebappsphp
https://www.exploit-db.com/exploits/2502

References (4)

Core 4
Core References
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/1734
Exploit x_refsource_misc
http://acid-root.new.fr/poc/13061007.txt
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/448096/100/0/threaded
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/2502

Scores

EPSS 0.0558
EPSS Percentile 90.3%

Details

Status published
Products (2)
phplibre/registrotl 0.1b
phplibre/registrotl 0.5b
Published Oct 17, 2006
Tracked Since Feb 18, 2026