[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3715-1 moin -- moin

ID: oval:org.secpod.oval:def:602672Date: (C)2016-11-18   (M)2023-12-20
Class: PATCHFamily: unix




Several cross-site scripting vulnerabilities were discovered in moin, a Python clone of WikiWiki. A remote attacker can conduct cross-site scripting attacks via the GUI editor"s attachment dialogue , the AttachFile view and the GUI editor"s link dialogue .

Platform:
Debian 8.x
Product:
python-moinmoin
Reference:
DSA-3715-1
CVE-2016-7146
CVE-2016-7148
CVE-2016-9119
CVE    3
CVE-2016-7148
CVE-2016-7146
CVE-2016-9119
CPE    3
cpe:/a:moinmo:moinmoin
cpe:/o:debian:debian_linux:8.x
cpe:/a:moinmo:moinmoin:1.9.8

© SecPod Technologies