CVE-2004-1923 – TikiWiki Project 1.8 - 'categorize.php' Direct Request Full Path Disclosure
https://notcve.org/view.php?id=CVE-2004-1923
Tiki CMS/Groupware (TikiWiki) 1.8.1 and earlier allows remote attackers to gain sensitive information via a direct request to (1) banner_click.php, (2) categorize.php, (3) tiki-admin_include_directory.php, (4) tiki-directory_search.php, which reveal the web server path in an error message. • https://www.exploit-db.com/exploits/23952 https://www.exploit-db.com/exploits/43809 http://marc.info/?l=bugtraq&m=108180073206947&w=2 http://secunia.com/advisories/11344 http://tikiwiki.org/tiki-read_article.php?articleId=66 http://www.securityfocus.com/bid/10100 https://exchange.xforce.ibmcloud.com/vulnerabilities/15847 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2004-1927 – TikiWiki Project 1.8 - 'tiki-map.phtml' Traversal Arbitrary File / Directory Enumeration
https://notcve.org/view.php?id=CVE-2004-1927
Directory traversal vulnerability in the map feature (tiki-map.phtml) in Tiki CMS/Groupware (TikiWiki) 1.8.1 and earlier allows remote attackers to determine the existence of arbitrary files via .. (dot dot) sequences in the mapfile parameter. • https://www.exploit-db.com/exploits/23949 https://www.exploit-db.com/exploits/43809 http://marc.info/?l=bugtraq&m=108180073206947&w=2 http://secunia.com/advisories/11344 http://tikiwiki.org/tiki-read_article.php?articleId=66 http://www.securityfocus.com/bid/10100 https://exchange.xforce.ibmcloud.com/vulnerabilities/15848 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2004-1924 – TikiWiki Project 1.8 - 'messu-mailbox.php' Multiple Cross-Site Scripting Vulnerabilities
https://notcve.org/view.php?id=CVE-2004-1924
Multiple cross-site scripting (XSS) vulnerabilities in Tiki CMS/Groupware (TikiWiki) 1.8.1 and earlier allow remote attackers to inject arbitrary web script or HTML via via the (1) theme parameter to tiki-switch_theme.php, (2) find and priority parameters to messu-mailbox.php, (3) flag, priority, flagval, sort_mode, or find parameters to messu-read.php, (4) articleId parameter to tiki-read_article.php, (5) parentId parameter to tiki-browse_categories.php, (6) comments_threshold parameter to tiki-index.php (7) articleId parameter to tiki-print_article.php, (8) galleryId parameter to tiki-list_file_gallery.php, (9) galleryId parameter to tiki-upload_file.php, (10) faqId parameter to tiki-view_faq.php, (11) chartId parameter to tiki-view_chart.php, or (12) surveyId parameter to tiki-survey_stats_survey.php. • https://www.exploit-db.com/exploits/23953 https://www.exploit-db.com/exploits/23954 https://www.exploit-db.com/exploits/23957 https://www.exploit-db.com/exploits/23959 https://www.exploit-db.com/exploits/23958 https://www.exploit-db.com/exploits/23955 https://www.exploit-db.com/exploits/23947 https://www.exploit-db.com/exploits/23960 https://www.exploit-db.com/exploits/23962 https://www.exploit-db.com/exploits/23961 https://www.exploit-db.com/exploits/23956 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •