CVE-2006-6852

Source
https://nvd.nist.gov/vuln/detail/CVE-2006-6852
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2006-6852.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2006-6852
Published
2006-12-31T05:00:00Z
Modified
2024-11-21T00:23:48Z
Summary
[none]
Details

Eval injection vulnerability in tDiary 2.0.3 and 2.1.4.200 61127 allows remote authenticated users to execute arbitrary Ruby code via unspecified vectors, possibly related to incorrect input validation by (1) conf.rhtml and (2) i.conf.rhtml. NOTE: some of these details are obtained from third party information.

References

Affected packages

Debian:11 / tdiary

Package

Name
tdiary
Purl
pkg:deb/debian/tdiary?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.2+20060303-5

Ecosystem specific

{
    "urgency": "medium"
}

Debian:12 / tdiary

Package

Name
tdiary
Purl
pkg:deb/debian/tdiary?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.2+20060303-5

Ecosystem specific

{
    "urgency": "medium"
}

Debian:13 / tdiary

Package

Name
tdiary
Purl
pkg:deb/debian/tdiary?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.2+20060303-5

Ecosystem specific

{
    "urgency": "medium"
}