CVE-2005-0534
https://notcve.org/view.php?id=CVE-2005-0534
Multiple cross-site scripting (XSS) vulnerabilities in MediaWiki 1.3.x before 1.3.11 and 1.4 beta before 1.4 rc1 allow remote attackers to inject arbitrary web script. • http://secunia.com/advisories/14360 http://securitytracker.com/id?1013260 http://sourceforge.net/project/shownotes.php?release_id=307067 http://www.gentoo.org/security/en/glsa/glsa-200502-33.xml •
CVE-2005-0535
https://notcve.org/view.php?id=CVE-2005-0535
Cross-site request forgery (CSRF) vulnerability in MediaWiki 1.3.x before 1.3.11 and 1.4 beta before 1.4 rc1 allows remote attackers to perform unauthorized actions as authenticated MediaWiki users. • http://secunia.com/advisories/14360 http://securitytracker.com/id?1013260 http://sourceforge.net/project/shownotes.php?release_id=307067 http://www.gentoo.org/security/en/glsa/glsa-200502-33.xml •
CVE-2004-1405 – MediaWiki 1.3.x - Arbitrary Script Upload
https://notcve.org/view.php?id=CVE-2004-1405
MediaWiki 1.3.8 and earlier, when used with Apache mod_mime, does not properly handle files with two file extensions, such as .php.rar, which allows remote attackers to upload and execute arbitrary code. • https://www.exploit-db.com/exploits/24994 http://marc.info/?l=bugtraq&m=110321710420059&w=2 http://secunia.com/advisories/13478 http://wikipedia.sourceforge.net http://www.securityfocus.com/bid/11985 •
CVE-2004-2152
https://notcve.org/view.php?id=CVE-2004-2152
Cross-site scripting (XSS) vulnerability in 'raw' page output mode for MediaWiki 1.3.4 and earlier allows remote attackers to inject arbitrary web script or HTML. • http://secunia.com/advisories/12692 http://sourceforge.net/project/shownotes.php?group_id=34373&release_id=271848 http://www.osvdb.org/10454 http://www.securityfocus.com/bid/11302 https://exchange.xforce.ibmcloud.com/vulnerabilities/17578 •
CVE-2004-2185
https://notcve.org/view.php?id=CVE-2004-2185
Multiple cross-site scripting (XSS) vulnerabilities in MediaWiki 1.3.5 allow remote attackers to execute arbitrary scripts and/or SQL queries via (1) the UnicodeConverter extension, (2) raw page views, (3) SpecialIpblocklist, (4) SpecialEmailuser, (5) SpecialMaintenance, and (6) ImagePage. • http://sourceforge.net/project/shownotes.php?release_id=275099 http://www.securityfocus.com/bid/11416 •