Vulnerabilities > Moinmo > Moinmoin > 1.8.8
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-11-11 | CVE-2020-15275 | Cross-site Scripting vulnerability in Moinmo Moinmoin MoinMoin is a wiki engine. | 5.4 |
2020-11-10 | CVE-2020-25074 | Path Traversal vulnerability in multiple products The cache action in action/cache.py in MoinMoin through 1.9.10 allows directory traversal through a crafted HTTP request. | 7.5 |
2018-10-15 | CVE-2017-5934 | Cross-site Scripting vulnerability in multiple products Cross-site scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin before 1.9.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | 4.3 |
2017-01-30 | CVE-2016-9119 | Cross-site Scripting vulnerability in multiple products Cross-site scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin before 1.9.8 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | 4.3 |
2013-01-03 | CVE-2012-6495 | Path Traversal vulnerability in Moinmo Moinmoin Multiple directory traversal vulnerabilities in the (1) twikidraw (action/twikidraw.py) and (2) anywikidraw (action/anywikidraw.py) actions in MoinMoin before 1.9.6 allow remote authenticated users with write permissions to overwrite arbitrary files via unspecified vectors. | 6.0 |
2013-01-03 | CVE-2012-6081 | Arbitrary Code Execution vulnerability in MoinMoin Multiple unrestricted file upload vulnerabilities in the (1) twikidraw (action/twikidraw.py) and (2) anywikidraw (action/anywikidraw.py) actions in MoinMoin before 1.9.6 allow remote authenticated users with write permissions to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory, as exploited in the wild in July 2012. network moinmo | 6.0 |
2011-02-22 | CVE-2011-1058 | Cross-Site Scripting vulnerability in Moinmo Moinmoin Cross-site scripting (XSS) vulnerability in the reStructuredText (rst) parser in parser/text_rst.py in MoinMoin before 1.9.3, when docutils is installed or when "format rst" is set, allows remote attackers to inject arbitrary web script or HTML via a javascript: URL in the refuri attribute. | 2.6 |