Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> TikiWiki multiple remote unspecified flaws


Vulnerability Assessment Details

TikiWiki multiple remote unspecified flaws

Vulnerability Assessment Summary
Checks the version of TikiWiki

Detailed Explanation for this Vulnerability Assessment

The remote host is running Tiki Wiki, a content management system written
in PHP.

The remote version of this software is vulnerable to multiple flaws which
may permit a possible hacker to execute arbitrary PHP script code on the hosting
web server.

Solution : Upgrade to latest version
Risk factor: High

Networks Security ID: 12328

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 David Maciejak

Cables, Connectors

DUAL EMC 100-809-017 1200W Standby Power Supply RCF4V Set of 2
$489.99
DUAL EMC 100-809-017 1200W Standby Power Supply RCF4V Set of 2 pictureCisco Catalyst 2975GS WS-C2975GS-48PS-L 48 Port Gigabit POE Switch Used
$92.99
Cisco Catalyst 2975GS WS-C2975GS-48PS-L 48 Port Gigabit POE Switch Used pictureCisco ASA 5505 Adaptive Security Appliance (47-18790-04) with power adapter FS
$69.99
Cisco ASA 5505 Adaptive Security Appliance (47-18790-04) with power adapter   FS pictureCisco WS-X45-SUP6L-E Supervisor Engine W/ 2 x 10GbE Ports Catalyst 4500-E 512MB
$150.0
Cisco WS-X45-SUP6L-E Supervisor Engine W/ 2 x 10GbE Ports Catalyst 4500-E 512MB picture


Discussions

No Discussions have been posted on this vulnerability.