Page 57 of 284 results (0.014 seconds)

CVSS: 7.5EPSS: 6%CPEs: 12EXPL: 2

MediaWiki 1.3.8 and earlier, when used with Apache mod_mime, does not properly handle files with two file extensions, such as .php.rar, which allows remote attackers to upload and execute arbitrary code. • https://www.exploit-db.com/exploits/24994 http://marc.info/?l=bugtraq&m=110321710420059&w=2 http://secunia.com/advisories/13478 http://wikipedia.sourceforge.net http://www.securityfocus.com/bid/11985 •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in MediaWiki 1.3.5 allow remote attackers to execute arbitrary scripts and/or SQL queries via (1) the UnicodeConverter extension, (2) raw page views, (3) SpecialIpblocklist, (4) SpecialEmailuser, (5) SpecialMaintenance, and (6) ImagePage. • http://sourceforge.net/project/shownotes.php?release_id=275099 http://www.securityfocus.com/bid/11416 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Unknown vulnerability in ImagePage for MediaWiki 1.3.5, related to "filename validation," has unknown impact and attack vectors. • http://sourceforge.net/project/shownotes.php?release_id=275099 http://www.securityfocus.com/bid/11416 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

SQL injection vulnerability in MediaWiki 1.3.5 allows remote attackers to execute arbitrary SQL commands via SpecialMaintenance. • http://sourceforge.net/project/shownotes.php?release_id=275099 http://www.securityfocus.com/bid/11416 •