Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.60273
Kategorie:Gentoo Local Security Checks
Titel:Gentoo Security Advisory GLSA 200801-10 (tikiwiki)
Zusammenfassung:The remote host is missing updates announced in;advisory GLSA 200801-10.
Beschreibung:Summary:
The remote host is missing updates announced in
advisory GLSA 200801-10.

Vulnerability Insight:
Multiple vulnerabilities have been discovered in TikiWiki, some of them
having unknown impact.

Solution:
All TikiWiki users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose '>=www-apps/tikiwiki-1.9.9'

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2007-6526
BugTraq ID: 27004
http://www.securityfocus.com/bid/27004
Bugtraq: 20071224 Tikiwiki 1.9.8.3 tiki-special_chars.php XSS Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/485483/100/0/threaded
http://security.gentoo.org/glsa/glsa-200801-10.xml
http://www.h-labs.org/blog/2007/12/24/tikiwiki_1_9_8_3_tiki_special_chars_php_xss_vulnerability.html
http://osvdb.org/41179
http://secunia.com/advisories/28225
http://secunia.com/advisories/28602
http://securityreason.com/securityalert/3483
Common Vulnerability Exposure (CVE) ID: CVE-2007-6528
BugTraq ID: 27008
http://www.securityfocus.com/bid/27008
Bugtraq: 20071224 [ISecAuditors Security Advisories] Tikiwiki CMS is vulnerable to path traversal attack (Google Search)
http://www.securityfocus.com/archive/1/485482/100/0/threaded
https://www.exploit-db.com/exploits/4942
http://osvdb.org/41178
http://securityreason.com/securityalert/3484
Common Vulnerability Exposure (CVE) ID: CVE-2007-6529
http://osvdb.org/41175
http://osvdb.org/41176
http://osvdb.org/41177
CopyrightCopyright (C) 2008 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.