Show filters
23 Total Results
Displaying 1-10 of 23
Sort by:
Attacker Value
Unknown
CVE-2023-34408
Disclosure Date: June 05, 2023 (last updated October 08, 2023)
DokuWiki before 2023-04-04a allows XSS via RSS titles.
0
Attacker Value
Unknown
CVE-2022-3123
Disclosure Date: September 05, 2022 (last updated October 08, 2023)
Cross-site Scripting (XSS) - Reflected in GitHub repository splitbrain/dokuwiki prior to 2022-07-31a.
0
Attacker Value
Unknown
CVE-2022-28919
Disclosure Date: May 12, 2022 (last updated October 07, 2023)
HTMLCreator release_stable_2020-07-29 was discovered to contain a cross-site scripting (XSS) vulnerability via the function _generateFilename.
0
Attacker Value
Unknown
CVE-2018-15474
Disclosure Date: September 07, 2018 (last updated November 08, 2023)
CSV Injection (aka Excel Macro Injection or Formula Injection) in /lib/plugins/usermanager/admin.php in DokuWiki 2018-04-22a and earlier allows remote attackers to exfiltrate sensitive data and to execute arbitrary code via a value that is mishandled in a CSV export. NOTE: the vendor has stated "this is not a security problem in DokuWiki.
0
Attacker Value
Unknown
CVE-2017-18123
Disclosure Date: February 03, 2018 (last updated November 26, 2024)
The call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19e does not properly encode user input, which leads to a reflected file download vulnerability, and allows remote attackers to run arbitrary programs.
0
Attacker Value
Unknown
CVE-2017-12980
Disclosure Date: August 21, 2017 (last updated November 26, 2024)
DokuWiki through 2017-02-19c has stored XSS when rendering a malicious RSS or Atom feed, in /inc/parser/xhtml.php. An attacker can create or edit a wiki that uses RSS or Atom data from an attacker-controlled server to trigger JavaScript execution. The JavaScript can be in an author field, as demonstrated by the dc:creator element.
0
Attacker Value
Unknown
CVE-2017-12979
Disclosure Date: August 21, 2017 (last updated November 26, 2024)
DokuWiki through 2017-02-19c has stored XSS when rendering a malicious language name in a code element, in /inc/parser/xhtml.php. An attacker can create or edit a wiki with this element to trigger JavaScript execution.
0
Attacker Value
Unknown
CVE-2017-12583
Disclosure Date: August 06, 2017 (last updated November 26, 2024)
DokuWiki through 2017-02-19b has XSS in the at parameter (aka the DATE_AT variable) to doku.php.
0
Attacker Value
Unknown
CVE-2016-7965
Disclosure Date: October 31, 2016 (last updated November 25, 2024)
DokuWiki 2016-06-26a and older uses $_SERVER[HTTP_HOST] instead of the baseurl setting as part of the password-reset URL. This can lead to phishing attacks. (A remote unauthenticated attacker can change the URL's hostname via the HTTP Host header.) The vulnerability can be triggered only if the Host header is not part of the web server routing process (e.g., if several domains are served by the same web server).
0
Attacker Value
Unknown
CVE-2016-7964
Disclosure Date: October 31, 2016 (last updated November 25, 2024)
The sendRequest method in HTTPClient Class in file /inc/HTTPClient.php in DokuWiki 2016-06-26a and older, when media file fetching is enabled, has no way to restrict access to private networks. This allows users to scan ports of internal networks via SSRF, such as 10.0.0.1/8, 172.16.0.0/12, and 192.168.0.0/16.
0