Eval injection vulnerability in Light Weight Calendar (LWC) 1.0 (20040909) and earlier allows remote attackers to execute arbitrary PHP code via the date parameter in cal.php, which is included by index.php.
References
Configurations
History
21 Nov 2024, 00:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://attrition.org/pipermail/vim/2006-March/000612.html - | |
References | () http://evuln.com/vulns/29/exploit.html - Exploit | |
References | () http://evuln.com/vulns/29/summary.html - Exploit, Vendor Advisory | |
References | () http://secunia.com/advisories/18450 - Exploit, Vendor Advisory | |
References | () http://www.osvdb.org/22376 - | |
References | () http://www.securityfocus.com/archive/1/421920 - | |
References | () http://www.securityfocus.com/bid/16229 - Exploit | |
References | () http://www.vupen.com/english/advisories/2006/0171 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24110 - |
Information
Published : 2006-01-13 23:03
Updated : 2025-04-03 01:03
NVD link : CVE-2006-0206
Mitre link : CVE-2006-0206
CVE.ORG link : CVE-2006-0206
JSON object : View
Products Affected
light_weight_calendar
- light_weight_calendar
CWE