Логотип exploitDog
bind:CVE-2006-3819
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2006-3819

Количество 4

Количество 4

ubuntu логотип

CVE-2006-3819

больше 19 лет назад

Eval injection vulnerability in the configure script in TWiki 4.0.0 through 4.0.4 allows remote attackers to execute arbitrary Perl code via an HTTP POST request containing a parameter name starting with "TYPEOF".

CVSS2: 7.5
EPSS: Низкий
nvd логотип

CVE-2006-3819

больше 19 лет назад

Eval injection vulnerability in the configure script in TWiki 4.0.0 through 4.0.4 allows remote attackers to execute arbitrary Perl code via an HTTP POST request containing a parameter name starting with "TYPEOF".

CVSS2: 7.5
EPSS: Низкий
debian логотип

CVE-2006-3819

больше 19 лет назад

Eval injection vulnerability in the configure script in TWiki 4.0.0 th ...

CVSS2: 7.5
EPSS: Низкий
github логотип

GHSA-r6jj-87vw-q776

больше 3 лет назад

Eval injection vulnerability in the configure script in TWiki 4.0.0 through 4.0.4 allows remote attackers to execute arbitrary Perl code via an HTTP POST request containing a parameter name starting with "TYPEOF".

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2006-3819

Eval injection vulnerability in the configure script in TWiki 4.0.0 through 4.0.4 allows remote attackers to execute arbitrary Perl code via an HTTP POST request containing a parameter name starting with "TYPEOF".

CVSS2: 7.5
8%
Низкий
больше 19 лет назад
nvd логотип
CVE-2006-3819

Eval injection vulnerability in the configure script in TWiki 4.0.0 through 4.0.4 allows remote attackers to execute arbitrary Perl code via an HTTP POST request containing a parameter name starting with "TYPEOF".

CVSS2: 7.5
8%
Низкий
больше 19 лет назад
debian логотип
CVE-2006-3819

Eval injection vulnerability in the configure script in TWiki 4.0.0 th ...

CVSS2: 7.5
8%
Низкий
больше 19 лет назад
github логотип
GHSA-r6jj-87vw-q776

Eval injection vulnerability in the configure script in TWiki 4.0.0 through 4.0.4 allows remote attackers to execute arbitrary Perl code via an HTTP POST request containing a parameter name starting with "TYPEOF".

8%
Низкий
больше 3 лет назад

Уязвимостей на страницу