Описание
Eval injection vulnerability in the configure script in TWiki 4.0.0 through 4.0.4 allows remote attackers to execute arbitrary Perl code via an HTTP POST request containing a parameter name starting with "TYPEOF".
Eval injection vulnerability in the configure script in TWiki 4.0.0 through 4.0.4 allows remote attackers to execute arbitrary Perl code via an HTTP POST request containing a parameter name starting with "TYPEOF".
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-3819
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28049
- http://secunia.com/advisories/21235
- http://securitytracker.com/id?1016603
- http://twiki.org/cgi-bin/view/Codev/SecurityAlertCmdExecWithConfigure
- http://www.osvdb.org/displayvuln.php?osvdb_id=27556
- http://www.securityfocus.com/bid/19188
- http://www.vupen.com/english/advisories/2006/2995
EPSS
CVE ID
Связанные уязвимости
Eval injection vulnerability in the configure script in TWiki 4.0.0 through 4.0.4 allows remote attackers to execute arbitrary Perl code via an HTTP POST request containing a parameter name starting with "TYPEOF".
Eval injection vulnerability in the configure script in TWiki 4.0.0 through 4.0.4 allows remote attackers to execute arbitrary Perl code via an HTTP POST request containing a parameter name starting with "TYPEOF".
Eval injection vulnerability in the configure script in TWiki 4.0.0 th ...
EPSS