Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2010-0289
Disclosure Date: February 15, 2010 (last updated October 04, 2023)
Multiple cross-site request forgery (CSRF) vulnerabilities in the ACL Manager plugin (plugins/acl/ajax.php) in DokuWiki before 2009-12-25c allow remote attackers to hijack the authentication of administrators for requests that modify access control rules, and other unspecified requests, via unknown vectors.
0
Attacker Value
Unknown
CVE-2010-0287
Disclosure Date: February 15, 2010 (last updated October 04, 2023)
Directory traversal vulnerability in the ACL Manager plugin (plugins/acl/ajax.php) in DokuWiki before 2009-12-25b allows remote attackers to list the contents of arbitrary directories via a .. (dot dot) in the ns parameter.
0
Attacker Value
Unknown
CVE-2010-0288
Disclosure Date: February 15, 2010 (last updated October 04, 2023)
A typo in the administrator permission check in the ACL Manager plugin (plugins/acl/ajax.php) in DokuWiki before 2009-12-25b allows remote attackers to gain privileges and access closed wikis by editing current ACL statements, as demonstrated in the wild in January 2010.
0
Attacker Value
Unknown
CVE-2006-6965
Disclosure Date: January 29, 2007 (last updated October 04, 2023)
CRLF injection vulnerability in lib/exe/fetch.php in DokuWiki 2006-03-09e, and possibly earlier, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the media parameter. NOTE: this issue can be leveraged for XSS attacks.
0
Attacker Value
Unknown
CVE-2006-5098
Disclosure Date: September 29, 2006 (last updated October 04, 2023)
lib/exec/fetch.php in DokuWiki before 2006-03-09e allows remote attackers to cause a denial of service (CPU consumption) via large w and h parameters, when resizing an image.
0
Attacker Value
Unknown
CVE-2006-5099
Disclosure Date: September 29, 2006 (last updated October 04, 2023)
lib/exec/fetch.php in DokuWiki before 2006-03-09e, when conf[imconvert] is configured to use ImageMagick, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) w and (2) h parameters, which are not filtered when invoking convert.
0