Page 44 of 227 results (0.011 seconds)

CVSS: 4.3EPSS: 0%CPEs: 50EXPL: 1

MediaWiki before 1.19.18, 1.20.x through 1.22.x before 1.22.9, and 1.23.x before 1.23.2 does not enforce an IFRAME protection mechanism for transcluded pages, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web site. MediaWiki anterior a 1.19.18, 1.20.x hasta 1.22.x anterior a 1.22.9, y 1.23.x anterior a 1.23.2 no aplica un mecanismo de protección IFRAME para páginas transcluidas, lo que facilita a atacantes remotos realizar ataques de clickjacking a través de un sitio web manipulado. • http://advisories.mageia.org/MGASA-2014-0309.html http://openwall.com/lists/oss-security/2014/08/14/5 http://secunia.com/advisories/59738 http://www.debian.org/security/2014/dsa-3011 http://www.mandriva.com/security/advisories?name=MDVSA-2014:153 https://bugzilla.wikimedia.org/show_bug.cgi?id=65778 https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-July/000157.html • CWE-20: Improper Input Validation •

CVSS: 6.8EPSS: 0%CPEs: 50EXPL: 1

The JSONP endpoint in includes/api/ApiFormatJson.php in MediaWiki before 1.19.18, 1.20.x through 1.22.x before 1.22.9, and 1.23.x before 1.23.2 accepts certain long callback values and does not restrict the initial bytes of a JSONP response, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and obtain sensitive information, via a crafted OBJECT element with SWF content consistent with a restricted character set. El endpoint JSONP en includes/api/ApiFormatJson.php en MediaWiki anterior a 1.19.18, 1.20.x hasta 1.22.x anterior a 1.22.9, y 1.23.x anterior a 1.23.2 acepta ciertos valores largos de devolución de llamada y no restringe los bytes iniciales de una respuesta JSONP, lo que permite a atacantes remotos realizar ataques de CSRF, y obtener información sensible, a través de un elemento OBJECT manipulado con contenido SWF consistente con un juego de caracteres restringido. • http://advisories.mageia.org/MGASA-2014-0309.html http://openwall.com/lists/oss-security/2014/08/14/5 http://secunia.com/advisories/59738 http://www.debian.org/security/2014/dsa-3011 http://www.mandriva.com/security/advisories?name=MDVSA-2014:153 https://bugzilla.wikimedia.org/show_bug.cgi?id=68187 https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-July/000157.html • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 4.3EPSS: 0%CPEs: 11EXPL: 1

Cross-site scripting (XSS) vulnerability in mediawiki.page.image.pagination.js in MediaWiki 1.22.x before 1.22.9 and 1.23.x before 1.23.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving the multipageimagenavbox class in conjunction with an action=raw value. Vulnerabilidad de XSS en mediawiki.page.image.pagination.js en MediaWiki 1.22.x anterior a 1.22.9 y 1.23.x anterior a 1.23.2 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de vectores involucrando la clase multipageimagenavbox en conjunto con un valor action=raw. • http://advisories.mageia.org/MGASA-2014-0309.html http://openwall.com/lists/oss-security/2014/08/14/5 http://www.mandriva.com/security/advisories?name=MDVSA-2014:153 http://www.securityfocus.com/bid/69135 https://bugzilla.wikimedia.org/show_bug.cgi?id=66608 https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-July/000157.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 2.6EPSS: 0%CPEs: 33EXPL: 0

Cross-site scripting (XSS) vulnerability in Special:PasswordReset in MediaWiki before 1.19.16, 1.21.x before 1.21.10, and 1.22.x before 1.22.7, when wgRawHtml is enabled, allows remote attackers to inject arbitrary web script or HTML via an invalid username. Vulnerabilidad de XSS en Special:PasswordReset in MediaWiki anterior a 1.19.16, 1.21.x anterior a 1.21.10 y 1.22.x anterior a 1.22.7, cuando wgRawHtml está habilitado, permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de un nombre de usuario inválido. • http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-May/000151.html http://secunia.com/advisories/58834 http://secunia.com/advisories/58896 http://www.debian.org/security/2014/dsa-2957 http://www.openwall.com/lists/oss-security/2014/06/04/15 http://www.securityfocus.com/bid/67787 http://www.securitytracker.com/id/1030364 https://bugzilla.wikimedia.org/show_bug.cgi?id=65501 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 193EXPL: 0

Cross-site scripting (XSS) vulnerability in includes/actions/InfoAction.php in MediaWiki before 1.21.9 and 1.22.x before 1.22.6 allows remote attackers to inject arbitrary web script or HTML via the sort key in an info action. Vulnerabilidad de XSS en includes/actions/InfoAction.php en MediaWiki anterior a 1.21.9 y 1.22.x anterior a 1.22.6 permite a atacantes remotos inyectar script Web o HTML arbitrarios a través de la clave "sort" en una acción "info". • http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-April/000149.html http://secunia.com/advisories/58262 http://www.securityfocus.com/bid/67068 http://www.securitytracker.com/id/1030161 https://bugzilla.redhat.com/show_bug.cgi?id=1091967 https://bugzilla.wikimedia.org/show_bug.cgi?id=63251 https://github.com/wikimedia/mediawiki-core/commit/0b695ae09aada343ab59be4a3c9963995a1143b6 https://www.mediawiki.org/wiki/Release_notes/1.21#Changes_since_1.21.8 https://www.mediawiki.org/wiki/Re • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •