Количество 4
Количество 4
CVE-2017-18123
The call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19e does not properly encode user input, which leads to a reflected file download vulnerability, and allows remote attackers to run arbitrary programs.
CVE-2017-18123
The call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19e does not properly encode user input, which leads to a reflected file download vulnerability, and allows remote attackers to run arbitrary programs.
CVE-2017-18123
The call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19 ...
GHSA-9v2g-x5vw-rfgc
The call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19e does not properly encode user input, which leads to a reflected file download vulnerability, and allows remote attackers to run arbitrary programs.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2017-18123 The call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19e does not properly encode user input, which leads to a reflected file download vulnerability, and allows remote attackers to run arbitrary programs. | CVSS3: 8.6 | 1% Низкий | около 8 лет назад | |
CVE-2017-18123 The call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19e does not properly encode user input, which leads to a reflected file download vulnerability, and allows remote attackers to run arbitrary programs. | CVSS3: 8.6 | 1% Низкий | около 8 лет назад | |
CVE-2017-18123 The call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19 ... | CVSS3: 8.6 | 1% Низкий | около 8 лет назад | |
GHSA-9v2g-x5vw-rfgc The call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19e does not properly encode user input, which leads to a reflected file download vulnerability, and allows remote attackers to run arbitrary programs. | CVSS3: 8.6 | 1% Низкий | больше 3 лет назад |
Уязвимостей на страницу