Eval injection vulnerability in the configure script in TWiki 4.0.0 through 4.0.4 allows remote attackers to execute arbitrary Perl code via an HTTP POST request containing a parameter name starting with "TYPEOF".
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 00:14
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://secunia.com/advisories/21235 - | |
| References | () http://securitytracker.com/id?1016603 - | |
| References | () http://twiki.org/cgi-bin/view/Codev/SecurityAlertCmdExecWithConfigure - Exploit, Patch | |
| References | () http://www.osvdb.org/displayvuln.php?osvdb_id=27556 - | |
| References | () http://www.securityfocus.com/bid/19188 - | |
| References | () http://www.vupen.com/english/advisories/2006/2995 - | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/28049 - | 
Information
                Published : 2006-07-27 01:04
Updated : 2025-04-03 01:03
NVD link : CVE-2006-3819
Mitre link : CVE-2006-3819
CVE.ORG link : CVE-2006-3819
JSON object : View
Products Affected
                twiki
- twiki
CWE
                