Описание
Eval injection vulnerability in the configure script in TWiki 4.0.0 through 4.0.4 allows remote attackers to execute arbitrary Perl code via an HTTP POST request containing a parameter name starting with "TYPEOF".
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | ignored | end of life |
| devel | DNE | |
| edgy | ignored | end of life, was needed |
| feisty | released | 4.0.5-9.1ubuntu1 |
| gutsy | released | 4.0.5-9.1ubuntu1 |
| hardy | released | 4.0.5-9.1ubuntu1 |
| intrepid | released | 4.0.5-9.1ubuntu1 |
| jaunty | released | 4.0.5-9.1ubuntu1 |
| karmic | released | 4.0.5-9.1ubuntu1 |
| upstream | needs-triage |
Показывать по
Ссылки на источники
EPSS
7.5 High
CVSS2
Связанные уязвимости
Eval injection vulnerability in the configure script in TWiki 4.0.0 through 4.0.4 allows remote attackers to execute arbitrary Perl code via an HTTP POST request containing a parameter name starting with "TYPEOF".
Eval injection vulnerability in the configure script in TWiki 4.0.0 th ...
Eval injection vulnerability in the configure script in TWiki 4.0.0 through 4.0.4 allows remote attackers to execute arbitrary Perl code via an HTTP POST request containing a parameter name starting with "TYPEOF".
EPSS
7.5 High
CVSS2