[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:701038
moin: Collaborative hypertext environment Several security issues were fixed in MoinMoin.

oval:org.secpod.oval:def:701123
moin: Collaborative hypertext environment MoinMoin could be made to run programs and overwrite files.

oval:org.secpod.oval:def:600674
A cross-site scriping vulnerability was discovered in the rst parser of Moin, a Python clone of WikiWiki.

oval:org.secpod.oval:def:600937
It was discovered that missing input validation in the twikidraw and anywikidraw actions can result in the execution of arbitrary code. This security issue in being actively exploited. This update also addresses path traversal in AttachFile.

oval:org.secpod.oval:def:600878
It was discovered that Moin, a Python clone of WikiWiki, incorrectly evaluates ACLs when virtual groups are involved. This may allow certain users to have additional permissions or lack expected permissions.

oval:org.secpod.oval:def:701744
python-moinmoin is installed

oval:org.secpod.oval:def:70257
moin: Collaborative hypertext environment Several security issues were fixed in MoinMoin.

oval:org.secpod.oval:def:1902000
Cross-site scripting vulnerability in the link dialogue in GUI editor in MoinMoin before 1.9.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

oval:org.secpod.oval:def:703366
moin: Collaborative hypertext environment Several security issues were fixed in MoinMoin.

oval:org.secpod.oval:def:51674
moin: Collaborative hypertext environment Several security issues were fixed in MoinMoin.

oval:org.secpod.oval:def:602672
Several cross-site scripting vulnerabilities were discovered in moin, a Python clone of WikiWiki. A remote attacker can conduct cross-site scripting attacks via the GUI editor"s attachment dialogue , the AttachFile view and the GUI editor"s link dialogue .

oval:org.secpod.oval:def:603547
Nitin Venkatesh discovered a cross-site scripting vulnerability in moin, a Python clone of WikiWiki. A remote attacker can conduct cross-site scripting attacks via the GUI editor"s link dialogue. This only affects installations which have set up fckeditor .

oval:org.secpod.oval:def:704351
moin: Collaborative hypertext environment MoinMoin could be made to expose sensitive information if it received a specially crafted input.

oval:org.secpod.oval:def:53441
Nitin Venkatesh discovered a cross-site scripting vulnerability in moin, a Python clone of WikiWiki. A remote attacker can conduct cross-site scripting attacks via the GUI editor"s link dialogue. This only affects installations which have set up fckeditor .

oval:org.secpod.oval:def:51147
moin: Collaborative hypertext environment MoinMoin could be made to expose sensitive information if it received a specially crafted input.

CVE    2
CVE-2020-15275
CVE-2020-25074
*CPE
cpe:/a:moinmo:moinmoin

© SecPod Technologies