Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.121006
Kategorie:Gentoo Local Security Checks
Titel:Gentoo Security Advisory GLSA 201301-07
Zusammenfassung:Gentoo Linux Local Security Checks GLSA 201301-07
Beschreibung:Summary:
Gentoo Linux Local Security Checks GLSA 201301-07

Vulnerability Insight:
Multiple vulnerabilities have been discovered in DokuWiki. Please review the CVE identifiers referenced below for details.

Solution:
Update the affected packages to the latest available version.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2010-0287
11141
http://www.exploit-db.com/exploits/11141
37821
http://www.securityfocus.com/bid/37821
38183
http://secunia.com/advisories/38183
ADV-2010-0150
http://www.vupen.com/english/advisories/2010/0150
DSA-1976
http://www.debian.org/security/2010/dsa-1976
FEDORA-2010-0770
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/034729.html
FEDORA-2010-0800
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/034831.html
GLSA-201301-07
http://security.gentoo.org/glsa/glsa-201301-07.xml
dokuwiki-ajax-dir-traversal(55660)
https://exchange.xforce.ibmcloud.com/vulnerabilities/55660
http://bugs.splitbrain.org/index.php?do=details&task_id=1847
http://www.splitbrain.org/blog/2010-01/17-dokuwiki-security
Common Vulnerability Exposure (CVE) ID: CVE-2010-0288
37820
http://www.securityfocus.com/bid/37820
61710
http://osvdb.org/61710
dokuwiki-ajax-security-bypass(55661)
https://exchange.xforce.ibmcloud.com/vulnerabilities/55661
Common Vulnerability Exposure (CVE) ID: CVE-2010-0289
38205
http://secunia.com/advisories/38205
61708
http://osvdb.org/61708
http://bugs.splitbrain.org/index.php?do=details&task_id=1853
http://freshmeat.net/projects/dokuwiki/tags/security-fix
Common Vulnerability Exposure (CVE) ID: CVE-2011-2510
45009
http://secunia.com/advisories/45009
45190
http://secunia.com/advisories/45190
48364
http://www.securityfocus.com/bid/48364
DSA-2320
http://www.debian.org/security/2011/dsa-2320
FEDORA-2011-8816
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062389.html
FEDORA-2011-8831
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062380.html
[dokuwiki] 20110614 Hotfix Release "2011-05-25a Rincewind"
http://www.freelists.org/post/dokuwiki/Hotfix-Release-20110525a-Rincewind
[oss-security] 20110628 CVE Request -- DokuWiki -- XSS in DokuWiki's RSS embedding mechanism
http://www.openwall.com/lists/oss-security/2011/06/28/5
[oss-security] 20110629 Re: CVE Request -- DokuWiki -- XSS in DokuWiki's RSS embedding mechanism
http://www.openwall.com/lists/oss-security/2011/06/29/13
dokuwiki-rss-xss(68122)
https://exchange.xforce.ibmcloud.com/vulnerabilities/68122
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=631818
http://www.certa.ssi.gouv.fr/site/CERTA-2011-AVI-366/CERTA-2011-AVI-366.html
http://www.dokuwiki.org/changes
https://bugzilla.redhat.com/show_bug.cgi?id=717146
Common Vulnerability Exposure (CVE) ID: CVE-2011-3727
BugTraq ID: 56328
http://www.securityfocus.com/bid/56328
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090755.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090938.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090899.html
http://www.mandriva.com/security/advisories?name=MDVSA-2013:073
http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README
http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/dokuwiki-2009-12-25c
http://www.openwall.com/lists/oss-security/2011/06/27/6
Common Vulnerability Exposure (CVE) ID: CVE-2012-0283
BugTraq ID: 54439
http://www.securityfocus.com/bid/54439
http://secunia.com/secunia_research/2012-24/
CopyrightCopyright (C) 2015 Eero Volotinen

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.