Filtered by vendor Twiki
Subscriptions
Filtered by product Twiki
Subscriptions
Total
29 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2018-20212 | 1 Twiki | 1 Twiki | 2024-11-21 | N/A |
bin/statistics in TWiki 6.0.2 allows cross-site scripting (XSS) via the webs parameter. | ||||
CVE-2014-9367 | 1 Twiki | 1 Twiki | 2024-11-21 | N/A |
Incomplete blacklist vulnerability in the urlEncode function in lib/TWiki.pm in TWiki 6.0.0 and 6.0.1 allows remote attackers to conduct cross-site scripting (XSS) attacks via a "'" (single quote) in the scope parameter to do/view/TWiki/WebSearch. | ||||
CVE-2014-9325 | 1 Twiki | 1 Twiki | 2024-11-21 | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in TWiki 6.0.1 allow remote attackers to inject arbitrary web script or HTML via the (1) QUERYSTRING variable in lib/TWiki.pm or (2) QUERYPARAMSTRING variable in lib/TWiki/UI/View.pm, as demonstrated by the QUERY_STRING to do/view/Main/TWikiPreferences. | ||||
CVE-2014-7237 | 2 Microsoft, Twiki | 2 Windows, Twiki | 2024-11-21 | N/A |
lib/TWiki/Sandbox.pm in TWiki 6.0.0 and earlier, when running on Windows, allows remote attackers to bypass intended access restrictions and upload files with restricted names via a null byte (%00) in a filename to bin/upload.cgi, as demonstrated using .htaccess to execute arbitrary code. | ||||
CVE-2014-7236 | 1 Twiki | 1 Twiki | 2024-11-21 | 9.1 Critical |
Eval injection vulnerability in lib/TWiki/Plugins.pm in TWiki before 6.0.1 allows remote attackers to execute arbitrary Perl code via the debugenableplugins parameter to do/view/Main/WebHome. | ||||
CVE-2013-1751 | 1 Twiki | 1 Twiki | 2024-11-21 | 9.8 Critical |
TWiki before 5.1.4 allows remote attackers to execute arbitrary shell commands by sending a crafted '%MAKETEXT{}%' parameter value containing Perl backtick characters. | ||||
CVE-2012-6330 | 2 Foswiki, Twiki | 2 Foswiki, Twiki | 2024-11-21 | N/A |
The localization functionality in TWiki before 5.1.3, and Foswiki 1.0.x through 1.0.10 and 1.1.x through 1.1.6, allows remote attackers to cause a denial of service (memory consumption) via a large integer in a %MAKETEXT% macro. | ||||
CVE-2012-0979 | 1 Twiki | 1 Twiki | 2024-11-21 | N/A |
Cross-site scripting (XSS) vulnerability in TWiki allows remote attackers to inject arbitrary web script or HTML via the organization field in a profile, involving (1) registration or (2) editing of the user. | ||||
CVE-2011-3010 | 1 Twiki | 1 Twiki | 2024-11-21 | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in TWiki before 5.1.0 allow remote attackers to inject arbitrary web script or HTML via (1) the newtopic parameter in a WebCreateNewTopic action, related to the TWiki.WebCreateNewTopicTemplate topic; or (2) the query string to SlideShow.pm in the SlideShowPlugin. | ||||
CVE-2011-1838 | 1 Twiki | 1 Twiki | 2024-11-21 | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in TemplateLogin.pm in TWiki before 5.0.2 allow remote attackers to inject arbitrary web script or HTML via the origurl parameter to a (1) view script or (2) login script. | ||||
CVE-2010-3841 | 1 Twiki | 1 Twiki | 2024-11-21 | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in lib/TWiki.pm in TWiki before 5.0.1 allow remote attackers to inject arbitrary web script or HTML via (1) the rev parameter to the view script or (2) the query string to the login script. | ||||
CVE-2009-4898 | 1 Twiki | 1 Twiki | 2024-11-21 | N/A |
Cross-site request forgery (CSRF) vulnerability in TWiki before 4.3.2 allows remote attackers to hijack the authentication of arbitrary users for requests that update pages, as demonstrated by a URL for a save script in the ACTION attribute of a FORM element, in conjunction with a call to the submit method in the onload attribute of a BODY element. NOTE: this issue exists because of an insufficient fix for CVE-2009-1339. | ||||
CVE-2009-1339 | 1 Twiki | 1 Twiki | 2024-11-21 | N/A |
Cross-site request forgery (CSRF) vulnerability in TWiki before 4.3.1 allows remote authenticated users to hijack the authentication of arbitrary users for requests that update pages, as demonstrated by a URL for a save script in the SRC attribute of an IMG element, a related issue to CVE-2009-1434. | ||||
CVE-2008-5305 | 1 Twiki | 1 Twiki | 2024-11-21 | N/A |
Eval injection vulnerability in TWiki before 4.2.4 allows remote attackers to execute arbitrary Perl code via the %SEARCH{}% variable. | ||||
CVE-2008-5304 | 1 Twiki | 1 Twiki | 2024-11-21 | N/A |
Cross-site scripting (XSS) vulnerability in TWiki before 4.2.4 allows remote attackers to inject arbitrary web script or HTML via the %URLPARAM{}% variable. | ||||
CVE-2008-4998 | 1 Twiki | 1 Twiki | 2024-11-21 | N/A |
postinst in twiki 4.1.2 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/twiki temporary file. NOTE: the vendor disputes this vulnerability, stating "this bug is invalid. | ||||
CVE-2008-3195 | 1 Twiki | 1 Twiki | 2024-11-21 | N/A |
Directory traversal vulnerability in bin/configure in TWiki before 4.2.3, when a certain step in the installation guide is skipped, allows remote attackers to read arbitrary files via a query string containing a .. (dot dot) in the image variable, and execute arbitrary files via unspecified vectors. | ||||
CVE-2007-5193 | 2 Debian, Twiki | 2 Debian Linux, Twiki | 2024-11-21 | N/A |
The default configuration for twiki 4.1.2 on Debian GNU/Linux, and possibly other operating systems, specifies the work area directory (cfg{RCS}{WorkAreaDir}) under the web document root, which might allow remote attackers to obtain sensitive information when .htaccess restrictions are not applied. | ||||
CVE-2007-0669 | 1 Twiki | 1 Twiki | 2024-11-21 | N/A |
Unspecified vulnerability in Twiki 4.0.0 through 4.1.0 allows local users to execute arbitrary Perl code via unknown vectors related to CGI session files. | ||||
CVE-2006-6071 | 1 Twiki | 1 Twiki | 2024-11-21 | N/A |
TWiki 4.0.5 and earlier, when running under Apache 1.3 using ApacheLogin with sessions and "ErrorDocument 401" redirects to a valid wiki topic, does not properly handle failed login attempts, which allows remote attackers to read arbitrary content by cancelling out of a failed authentication with a valid username and invalid password. |