cvelist/2006/0xxx/CVE-2006-0206.json
2019-03-18 05:35:05 +00:00

102 lines
3.3 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-0206",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Eval injection vulnerability in Light Weight Calendar (LWC) 1.0 (20040909) and earlier allows remote attackers to execute arbitrary PHP code via the date parameter in cal.php, which is included by index.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://evuln.com/vulns/29/exploit.html",
"refsource": "MISC",
"url": "http://evuln.com/vulns/29/exploit.html"
},
{
"name": "18450",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18450"
},
{
"name": "16229",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16229"
},
{
"name": "20060318 Source VERIFY - Light Weight Calendar issue is eval injection",
"refsource": "VIM",
"url": "http://attrition.org/pipermail/vim/2006-March/000612.html"
},
{
"name": "lwc-cal-execute-code(24110)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24110"
},
{
"name": "22376",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22376"
},
{
"name": "http://evuln.com/vulns/29/summary.html",
"refsource": "MISC",
"url": "http://evuln.com/vulns/29/summary.html"
},
{
"name": "ADV-2006-0171",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0171"
},
{
"name": "20060113 [eVuln] Light Weight Calendar PHP Code Execution",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/421920"
}
]
}
}