Vulnerabilities > CVE-2006-0206 - Remote Command Execution vulnerability in Light Weight Calendar Light Weight Calendar 1.0
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Eval injection vulnerability in Light Weight Calendar (LWC) 1.0 (20040909) and earlier allows remote attackers to execute arbitrary PHP code via the date parameter in cal.php, which is included by index.php.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Light Weight Calendar 1.x (date) Remote Code Execution Vulnerability. CVE-2006-0206,CVE-2006-1252. Webapps exploit for php platform |
file | exploits/php/webapps/1570.pl |
id | EDB-ID:1570 |
last seen | 2016-01-31 |
modified | 2006-03-09 |
platform | php |
port | |
published | 2006-03-09 |
reporter | Hessam-x |
source | https://www.exploit-db.com/download/1570/ |
title | Light Weight Calendar 1.x - date Remote Code Execution Vulnerability |
type | webapps |
References
- http://attrition.org/pipermail/vim/2006-March/000612.html
- http://evuln.com/vulns/29/exploit.html
- http://evuln.com/vulns/29/summary.html
- http://secunia.com/advisories/18450
- http://www.osvdb.org/22376
- http://www.securityfocus.com/archive/1/421920
- http://www.securityfocus.com/bid/16229
- http://www.vupen.com/english/advisories/2006/0171
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24110