Page 56 of 279 results (0.010 seconds)

CVSS: 4.3EPSS: 0%CPEs: 17EXPL: 0

Cross-site scripting (XSS) vulnerability in MediaWiki before 1.4.2, when using HTML Tidy ($wgUseTidy), allows remote attackers to inject arbitrary web script or HTML via unknown vectors. • http://secunia.com/advisories/14993 http://sourceforge.net/project/shownotes.php?release_id=322146 http://www.osvdb.org/15719 http://www.securityfocus.com/bid/13301 https://exchange.xforce.ibmcloud.com/vulnerabilities/20210 •

CVSS: 5.0EPSS: 1%CPEs: 17EXPL: 0

Directory traversal vulnerability in MediaWiki 1.3.x before 1.3.11 and 1.4 beta before 1.4 rc1 allows remote attackers to delete arbitrary files or determine file existence via a parameter related to image deletion. • http://secunia.com/advisories/14360 http://securitytracker.com/id?1013260 http://sourceforge.net/project/shownotes.php?release_id=307067 http://www.gentoo.org/security/en/glsa/glsa-200502-33.xml •

CVSS: 4.3EPSS: 0%CPEs: 17EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in MediaWiki 1.3.x before 1.3.11 and 1.4 beta before 1.4 rc1 allow remote attackers to inject arbitrary web script. • http://secunia.com/advisories/14360 http://securitytracker.com/id?1013260 http://sourceforge.net/project/shownotes.php?release_id=307067 http://www.gentoo.org/security/en/glsa/glsa-200502-33.xml •

CVSS: 7.5EPSS: 6%CPEs: 12EXPL: 2

MediaWiki 1.3.8 and earlier, when used with Apache mod_mime, does not properly handle files with two file extensions, such as .php.rar, which allows remote attackers to upload and execute arbitrary code. • https://www.exploit-db.com/exploits/24994 http://marc.info/?l=bugtraq&m=110321710420059&w=2 http://secunia.com/advisories/13478 http://wikipedia.sourceforge.net http://www.securityfocus.com/bid/11985 •