Page 5 of 35 results (0.012 seconds)

CVSS: 4.3EPSS: 1%CPEs: 2EXPL: 3

Multiple cross-site scripting (XSS) vulnerabilities in macro/AdvancedSearch.py in moin (and MoinMoin) 1.6.3 and 1.7.0 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. Múltiples vulnerabilidades de ejecución de comandos en sitios cruzados en macro/AdvancedSearch.py en moin (y MoinMoin)1.6.3 y 1.7.0, permite a atacantes remotos inyectar secuencias de comandos web y HTML de su elección a través vectores no especificados. • http://hg.moinmo.in/moin/1.6/rev/8686a10f1f58 http://hg.moinmo.in/moin/1.7/rev/383196922b03 http://moinmo.in/SecurityFixes http://secunia.com/advisories/31135 http://www.securityfocus.com/bid/30297 http://www.vupen.com/english/advisories/2008/2147/references https://exchange.xforce.ibmcloud.com/vulnerabilities/43899 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.8EPSS: 1%CPEs: 3EXPL: 1

The user form processing (userform.py) in MoinMoin before 1.6.3, when using ACLs or a non-empty superusers list, does not properly manage users, which allows remote attackers to gain privileges. El procesamiento del formulario "user" (userform.py) en MoinMoin anterior a 1.6.3, cuando emplea ACLs o una lista de superusuarios que no está vacía, no gestiona correctamente los usuarios lo que permite a atacantes remotos obtener privilegios. • http://hg.moinmo.in/moin/1.6/rev/f405012e67af http://moinmo.in/SecurityFixes http://secunia.com/advisories/29894 http://secunia.com/advisories/30160 http://security.gentoo.org/glsa/glsa-200805-09.xml http://www.securityfocus.com/bid/28869 http://www.vupen.com/english/advisories/2008/1307/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41909 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

Multiple cross-site scripting (XSS) vulnerabilities in MoinMoin 1.5.8 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) certain input processed by formatter/text_gedit.py (aka the gui editor formatter); (2) a page name, which triggers an injection in PageEditor.py when the page is successfully deleted by a victim in a DeletePage action; or (3) the destination page name for a RenamePage action, which triggers an injection in PageEditor.py when a victim's rename attempt fails because of a duplicate name. NOTE: the AttachFile XSS issue is already covered by CVE-2008-0781, and the login XSS issue is already covered by CVE-2008-0780. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en MoinMoin 1.5.8 y anteriores permiten a atacantes remotos inyectar secuencias de comandos web o HTML de su elección a través de (1) ciertas entradas procesadas por formatter/text_gedit.py (también conocido como el gui editor formatter); (2) un nombre de página, que dispara una inyección en PageEditor.py cuando la página se borra exitosamente por una víctima en una acción DeletePage; (3) el nombre de la página destino para una acción RenamePage, lo que dispara una inyección en PageEditor.py cuando un intento de cambiar el nombre de la víctima falla debido a un nombre duplicado. • http://hg.moinmo.in/moin/1.5/rev/4ede07e792dd http://hg.moinmo.in/moin/1.5/rev/d0152eeb4499 http://moinmo.in/SecurityFixes http://secunia.com/advisories/29262 http://secunia.com/advisories/29444 http://secunia.com/advisories/30031 http://secunia.com/advisories/33755 http://www.debian.org/security/2008/dsa-1514 http://www.gentoo.org/security/en/glsa/glsa-200803-27.xml http://www.securityfocus.com/bid/28173 https://exchange.xforce.ibmcloud.com/vulnerabilities/41037 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

_macro_Getval in wikimacro.py in MoinMoin 1.5.8 and earlier does not properly enforce ACLs, which allows remote attackers to read protected pages. _macro_Getval en wikimacro.py de MoinMoin 1.5.8 y anteriores no hace cumplir correctamente ACLs, lo que permite a atacantes remotos leer páginas protegidas. • http://hg.moinmo.in/moin/1.5/rev/4a7de0173734 http://moinmo.in/SecurityFixes http://secunia.com/advisories/29262 http://secunia.com/advisories/29444 http://secunia.com/advisories/30031 http://secunia.com/advisories/33755 http://www.debian.org/security/2008/dsa-1514 http://www.gentoo.org/security/en/glsa/glsa-200803-27.xml http://www.securityfocus.com/bid/28177 https://exchange.xforce.ibmcloud.com/vulnerabilities/41038 https://usn.ubuntu.com/716-1 https://www. • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.3EPSS: 0%CPEs: 14EXPL: 0

Cross-site scripting (XSS) vulnerability in MoinMoin 1.5.x through 1.5.8 and 1.6.x before 1.6.1 allows remote attackers to inject arbitrary web script or HTML via the login action. Vulnerabilidad de secuencia de comandos en sitios cruzados en MoinMoin v1.5.x a la 1.5.8 y 1.6.x anterior a 1.6.1, permite a atacantes remotos ejecutar secuencias de comandos web o HTML a través de una acción de login. • http://hg.moinmo.in/moin/1.5/rev/2f952fa361c7 http://hg.moinmo.in/moin/1.6/rev/9f4bdc7ef80d http://secunia.com/advisories/28987 http://secunia.com/advisories/29010 http://secunia.com/advisories/29262 http://secunia.com/advisories/29444 http://secunia.com/advisories/33755 http://www.debian.org/security/2008/dsa-1514 http://www.gentoo.org/security/en/glsa/glsa-200803-27.xml http://www.securityfocus.com/bid/27904 http://www.vupen.com/english/advisories/2008/ • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •