CVE-2006-1491

Eval injection vulnerability in Horde Application Framework versions 3.0 before 3.0.10 and 3.1 before 3.1.1 allows remote attackers to execute arbitrary code via the help viewer.
References
Link Resource
http://cvs.horde.org/diff.php?f=horde%2Fservices%2Fhelp%2Findex.php&r1=2.85&r2=2.86
http://lists.horde.org/archives/announce/2006/000271.html Patch
http://lists.horde.org/archives/announce/2006/000272.html
http://secunia.com/advisories/19485 Vendor Advisory
http://secunia.com/advisories/19504 Vendor Advisory
http://secunia.com/advisories/19528 Vendor Advisory
http://secunia.com/advisories/19619 Vendor Advisory
http://secunia.com/advisories/19692 Vendor Advisory
http://securitytracker.com/id?1015841 Patch
http://www.attrition.org/pipermail/vim/2006-March/000671.html
http://www.debian.org/security/2006/dsa-1033
http://www.debian.org/security/2006/dsa-1034
http://www.gentoo.org/security/en/glsa/glsa-200604-02.xml
http://www.novell.com/linux/security/advisories/2006_07_sr.html
http://www.securityfocus.com/bid/17292 Patch
http://www.vupen.com/english/advisories/2006/1154 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/25516
http://cvs.horde.org/diff.php?f=horde%2Fservices%2Fhelp%2Findex.php&r1=2.85&r2=2.86
http://lists.horde.org/archives/announce/2006/000271.html Patch
http://lists.horde.org/archives/announce/2006/000272.html
http://secunia.com/advisories/19485 Vendor Advisory
http://secunia.com/advisories/19504 Vendor Advisory
http://secunia.com/advisories/19528 Vendor Advisory
http://secunia.com/advisories/19619 Vendor Advisory
http://secunia.com/advisories/19692 Vendor Advisory
http://securitytracker.com/id?1015841 Patch
http://www.attrition.org/pipermail/vim/2006-March/000671.html
http://www.debian.org/security/2006/dsa-1033
http://www.debian.org/security/2006/dsa-1034
http://www.gentoo.org/security/en/glsa/glsa-200604-02.xml
http://www.novell.com/linux/security/advisories/2006_07_sr.html
http://www.securityfocus.com/bid/17292 Patch
http://www.vupen.com/english/advisories/2006/1154 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/25516
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:horde:application_framework:3.0:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.0.4_rc1:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.0.4_rc2:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.0.7:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.0.8:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.0.9:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:09

Type Values Removed Values Added
References () http://cvs.horde.org/diff.php?f=horde%2Fservices%2Fhelp%2Findex.php&r1=2.85&r2=2.86 - () http://cvs.horde.org/diff.php?f=horde%2Fservices%2Fhelp%2Findex.php&r1=2.85&r2=2.86 -
References () http://lists.horde.org/archives/announce/2006/000271.html - Patch () http://lists.horde.org/archives/announce/2006/000271.html - Patch
References () http://lists.horde.org/archives/announce/2006/000272.html - () http://lists.horde.org/archives/announce/2006/000272.html -
References () http://secunia.com/advisories/19485 - Vendor Advisory () http://secunia.com/advisories/19485 - Vendor Advisory
References () http://secunia.com/advisories/19504 - Vendor Advisory () http://secunia.com/advisories/19504 - Vendor Advisory
References () http://secunia.com/advisories/19528 - Vendor Advisory () http://secunia.com/advisories/19528 - Vendor Advisory
References () http://secunia.com/advisories/19619 - Vendor Advisory () http://secunia.com/advisories/19619 - Vendor Advisory
References () http://secunia.com/advisories/19692 - Vendor Advisory () http://secunia.com/advisories/19692 - Vendor Advisory
References () http://securitytracker.com/id?1015841 - Patch () http://securitytracker.com/id?1015841 - Patch
References () http://www.attrition.org/pipermail/vim/2006-March/000671.html - () http://www.attrition.org/pipermail/vim/2006-March/000671.html -
References () http://www.debian.org/security/2006/dsa-1033 - () http://www.debian.org/security/2006/dsa-1033 -
References () http://www.debian.org/security/2006/dsa-1034 - () http://www.debian.org/security/2006/dsa-1034 -
References () http://www.gentoo.org/security/en/glsa/glsa-200604-02.xml - () http://www.gentoo.org/security/en/glsa/glsa-200604-02.xml -
References () http://www.novell.com/linux/security/advisories/2006_07_sr.html - () http://www.novell.com/linux/security/advisories/2006_07_sr.html -
References () http://www.securityfocus.com/bid/17292 - Patch () http://www.securityfocus.com/bid/17292 - Patch
References () http://www.vupen.com/english/advisories/2006/1154 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/1154 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/25516 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/25516 -

Information

Published : 2006-03-29 22:02

Updated : 2024-11-21 00:09


NVD link : CVE-2006-1491

Mitre link : CVE-2006-1491

CVE.ORG link : CVE-2006-1491


JSON object : View

Products Affected

horde

  • application_framework
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')