CVE-2005-1925
https://notcve.org/view.php?id=CVE-2005-1925
Multiple directory traversal vulnerabilities in Tikiwiki before 1.9.1 allow remote attackers to read arbitrary files and execute commands via (1) the suck_url parameter to tiki-editpage.php or (2) language parameter to tiki-user_preferences.php. • http://securitytracker.com/id?1015190 http://www.idefense.com/application/poi/display?id=335&type=vulnerabilities http://www.idefense.com/application/poi/display?id=337&type=vulnerabilities http://www.securityfocus.com/bid/15390 http://www.securityfocus.com/bid/15392 https://exchange.xforce.ibmcloud.com/vulnerabilities/23095 https://exchange.xforce.ibmcloud.com/vulnerabilities/23099 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2005-3529
https://notcve.org/view.php?id=CVE-2005-3529
tiki-view_forum_thread.php in TikiWiki 1.9.0 through 1.9.2 allows remote attackers to obtain the installation path via an invalid topics_sort_mode parameter, possibly related to an SQL injection vulnerability. TikiWiki versions 1.9.x up to and including 1.9.2 suffer from a cross site scripting vulnerability and possible SQL injection vulnerabilities. • http://moritz-naumann.com/adv/0003/tikiw/0003.txt http://secunia.com/advisories/17521 http://securityreason.com/securityalert/165 http://www.osvdb.org/20711 http://www.securityfocus.com/archive/1/416152/30/0/threaded http://www.vupen.com/english/advisories/2005/2376 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2005-3528
https://notcve.org/view.php?id=CVE-2005-3528
Cross-site scripting (XSS) vulnerability in tiki-view_forum_thread.php in TikiWiki 1.9.0 through 1.9.2 allows remote attackers to inject arbitrary web script or HTML via the topics_offset parameter. TikiWiki versions 1.9.x up to and including 1.9.2 suffer from a cross site scripting vulnerability and possible SQL injection vulnerabilities. • http://moritz-naumann.com/adv/0003/tikiw/0003.txt http://secunia.com/advisories/17521 http://www.securityfocus.com/archive/1/416152/30/0/threaded http://www.securityfocus.com/bid/15371 http://www.vupen.com/english/advisories/2005/2376 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2005-3283
https://notcve.org/view.php?id=CVE-2005-3283
Cross-site scripting (XSS) vulnerability in TikiWiki before 1.9.1.1 allows remote attackers to inject arbitrary web script or HTML via unknown vectors. • http://bugs.gentoo.org/show_bug.cgi?id=109858 http://secunia.com/advisories/17279 http://secunia.com/advisories/17363 http://securitytracker.com/id?1015087 http://sourceforge.net/project/shownotes.php?release_id=364457 http://tikiwiki.org/art118 http://www.gentoo.org/security/en/glsa/glsa-200510-23.xml http://www.securityfocus.com/bid/15164 http://www.vupen.com/english/advisories/2005/2176 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2005-1921 – PHPXMLRPC < 1.1 - Remote Code Execution
https://notcve.org/view.php?id=CVE-2005-1921
Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement. • https://www.exploit-db.com/exploits/43829 https://www.exploit-db.com/exploits/16882 https://www.exploit-db.com/exploits/1078 https://www.exploit-db.com/exploits/1083 https://www.exploit-db.com/exploits/1084 http://marc.info/?l=bugtraq&m=112008638320145&w=2 http://marc.info/?l=bugtraq&m=112015336720867&w=2 http://marc.info/?l=bugtraq&m=112605112027335&w=2 http://pear.php.net/package/XML_RPC/download/1.3.1 http://secunia.com/advisories/15810 http: • CWE-94: Improper Control of Generation of Code ('Code Injection') •