mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
112 lines
4.0 KiB
JSON
112 lines
4.0 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2006-6690",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "rtehtmlarea/pi1/class.tx_rtehtmlarea_pi1.php in Typo3 4.0.0 through 4.0.3, 3.7 and 3.8 with the rtehtmlarea extension, and 4.1 beta allows remote authenticated users to execute arbitrary commands via shell metacharacters in the userUid parameter to rtehtmlarea/htmlarea/plugins/SpellChecker/spell-check-logic.php, and possibly another vector."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "20061220 SEC Consult SA-20061220-0 :: Typo3 Command Execution Vulnerability",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/454944/100/0/threaded"
|
|
},
|
|
{
|
|
"name": "23466",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/23466"
|
|
},
|
|
{
|
|
"name": "http://www.sec-consult.com/272.html",
|
|
"refsource": "MISC",
|
|
"url": "http://www.sec-consult.com/272.html"
|
|
},
|
|
{
|
|
"name": "[TYPO3-announce] 20061219 Pre-announcement for important security update",
|
|
"refsource": "MLIST",
|
|
"url": "http://lists.netfielders.de/pipermail/typo3-announce/2006/000045.html"
|
|
},
|
|
{
|
|
"name": "1017428",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://securitytracker.com/id?1017428"
|
|
},
|
|
{
|
|
"name": "2056",
|
|
"refsource": "SREASON",
|
|
"url": "http://securityreason.com/securityalert/2056"
|
|
},
|
|
{
|
|
"name": "[TYPO3-announce] 20061220 TYPO3 Security Bulletin TYPO3-20061220-1: Remote Command Execution in TYPO3",
|
|
"refsource": "MLIST",
|
|
"url": "http://lists.netfielders.de/pipermail/typo3-announce/2006/000046.html"
|
|
},
|
|
{
|
|
"name": "23446",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/23446"
|
|
},
|
|
{
|
|
"name": "http://typo3.org/news-single-view/?tx_newsimporter_pi1%5BshowItem%5D=0&cHash=e4a40a11a9",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://typo3.org/news-single-view/?tx_newsimporter_pi1%5BshowItem%5D=0&cHash=e4a40a11a9"
|
|
},
|
|
{
|
|
"name": "ADV-2006-5094",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2006/5094"
|
|
},
|
|
{
|
|
"name": "21680",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/21680"
|
|
}
|
|
]
|
|
}
|
|
} |