moinmo MoinMoin 1.9.8

CPE Details

moinmo MoinMoin 1.9.8
1.9.8
2016-11-17
12h58 +00:00
2016-11-17
12h58 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:moinmo:moinmoin:1.9.8:*:*:*:*:*:*:*

Informations

Vendor

moinmo

Product

moinmoin

Version

1.9.8

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2020-15275 2020-11-11 14h45 +00:00 MoinMoin is a wiki engine. In MoinMoin before version 1.9.11, an attacker with write permissions can upload an SVG file that contains malicious javascript. This javascript will be executed in a user's browser when the user is viewing that SVG file on the wiki. Users are strongly advised to upgrade to a patched version. MoinMoin Wiki 1.9.11 has the necessary fixes and also contains other important fixes.
8.7
Haute
CVE-2020-25074 2020-11-10 15h48 +00:00 The cache action in action/cache.py in MoinMoin through 1.9.10 allows directory traversal through a crafted HTTP request. An attacker who can upload attachments to the wiki can use this to achieve remote code execution.
9.8
Critique
CVE-2017-5934 2018-10-15 17h00 +00:00 Cross-site scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin before 1.9.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
6.1
Moyen
CVE-2016-7146 2016-11-10 16h00 +00:00 MoinMoin 1.9.8 allows remote attackers to conduct "JavaScript injection" attacks by using the "page creation or crafted URL" approach, related to a "Cross Site Scripting (XSS)" issue affecting the action=fckdialog&dialog=attachment (via page name) component.
6.1
Moyen
CVE-2016-7148 2016-11-10 16h00 +00:00 MoinMoin 1.9.8 allows remote attackers to conduct "JavaScript injection" attacks by using the "page creation" approach, related to a "Cross Site Scripting (XSS)" issue affecting the action=AttachFile (via page name) component.
6.1
Moyen