Page 11 of 56 results (0.006 seconds)

CVSS: 7.5EPSS: 3%CPEs: 2EXPL: 3

The image upload feature in Tiki CMS/Groupware (TikiWiki) 1.8.1 and earlier allows remote attackers to upload and possibly execute arbitrary files via the img/wiki_up URL. • https://www.exploit-db.com/exploits/23948 https://www.exploit-db.com/exploits/43809 http://marc.info/?l=bugtraq&m=108180073206947&w=2 http://secunia.com/advisories/11344 http://tikiwiki.org/tiki-read_article.php?articleId=66 http://www.securityfocus.com/bid/10100 https://exchange.xforce.ibmcloud.com/vulnerabilities/15849 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 18

Multiple SQL injection vulnerabilities in Tiki CMS/Groupware (TikiWiki) 1.8.1 and earlier allow remote attackers to execute arbitrary SQL commands via the sort_mode parameter in (1) tiki-usermenu.php, (2) tiki-list_file_gallery.php, (3) tiki-directory_ranking.php, (4) tiki-browse_categories.php, (5) tiki-index.php, (6) tiki-user_tasks.php, (7) tiki-directory_ranking.php, (8) tiki-directory_search.php, (9) tiki-file_galleries.php, (10) tiki-list_faqs.php, (11) tiki-list_trackers.php, (12) tiki-list_blogs.php, or via the offset parameter in (13) tiki-usermenu.php, (14) tiki-browse_categories.php, (15) tiki-index.php, (16) tiki-user_tasks.php, (17) tiki-list_faqs.php, (18) tiki-list_trackers.php, or (19) tiki-list_blogs.php. • https://www.exploit-db.com/exploits/23965 https://www.exploit-db.com/exploits/23984 https://www.exploit-db.com/exploits/23977 https://www.exploit-db.com/exploits/23982 https://www.exploit-db.com/exploits/23975 https://www.exploit-db.com/exploits/23964 https://www.exploit-db.com/exploits/23983 https://www.exploit-db.com/exploits/23976 https://www.exploit-db.com/exploits/23978 https://www.exploit-db.com/exploits/23963 https://www.exploit-db.com/exploits/23972 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 4

Tiki CMS/Groupware (TikiWiki) 1.8.1 and earlier allows remote attackers to inject arbitrary code via the (1) Theme, (2) Country, (3) Real Name, or (4) Displayed time zone fields in a User Profile, or the (5) Name, (6) Description, (7) URL, or (8) Country fields in a Directory/Add Site operation. • https://www.exploit-db.com/exploits/23951 https://www.exploit-db.com/exploits/23950 https://www.exploit-db.com/exploits/43809 http://marc.info/?l=bugtraq&m=108180073206947&w=2 http://secunia.com/advisories/11344 http://tikiwiki.org/tiki-read_article.php?articleId=66 http://www.securityfocus.com/bid/10100 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 3

Tiki CMS/Groupware (TikiWiki) 1.8.1 and earlier allows remote attackers to gain sensitive information via a direct request to (1) banner_click.php, (2) categorize.php, (3) tiki-admin_include_directory.php, (4) tiki-directory_search.php, which reveal the web server path in an error message. • https://www.exploit-db.com/exploits/23952 https://www.exploit-db.com/exploits/43809 http://marc.info/?l=bugtraq&m=108180073206947&w=2 http://secunia.com/advisories/11344 http://tikiwiki.org/tiki-read_article.php?articleId=66 http://www.securityfocus.com/bid/10100 https://exchange.xforce.ibmcloud.com/vulnerabilities/15847 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 13

Multiple cross-site scripting (XSS) vulnerabilities in Tiki CMS/Groupware (TikiWiki) 1.8.1 and earlier allow remote attackers to inject arbitrary web script or HTML via via the (1) theme parameter to tiki-switch_theme.php, (2) find and priority parameters to messu-mailbox.php, (3) flag, priority, flagval, sort_mode, or find parameters to messu-read.php, (4) articleId parameter to tiki-read_article.php, (5) parentId parameter to tiki-browse_categories.php, (6) comments_threshold parameter to tiki-index.php (7) articleId parameter to tiki-print_article.php, (8) galleryId parameter to tiki-list_file_gallery.php, (9) galleryId parameter to tiki-upload_file.php, (10) faqId parameter to tiki-view_faq.php, (11) chartId parameter to tiki-view_chart.php, or (12) surveyId parameter to tiki-survey_stats_survey.php. • https://www.exploit-db.com/exploits/23953 https://www.exploit-db.com/exploits/23954 https://www.exploit-db.com/exploits/23957 https://www.exploit-db.com/exploits/23959 https://www.exploit-db.com/exploits/23958 https://www.exploit-db.com/exploits/23955 https://www.exploit-db.com/exploits/23947 https://www.exploit-db.com/exploits/23960 https://www.exploit-db.com/exploits/23962 https://www.exploit-db.com/exploits/23961 https://www.exploit-db.com/exploits/23956 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •