CVE-2010-0668
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2010
Last modified:
11/04/2025
Description
Unspecified vulnerability in MoinMoin 1.5.x through 1.7.x, 1.8.x before 1.8.7, and 1.9.x before 1.9.2 has unknown impact and attack vectors, related to configurations that have a non-empty superuser list, the xmlrpc action enabled, the SyncPages action enabled, or OpenID configured.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:moinmo:moinmoin:1.5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:moinmo:moinmoin:1.5.0:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:moinmo:moinmoin:1.5.0:beta2:*:*:*:*:*:* | ||
| cpe:2.3:a:moinmo:moinmoin:1.5.0:beta3:*:*:*:*:*:* | ||
| cpe:2.3:a:moinmo:moinmoin:1.5.0:beta4:*:*:*:*:*:* | ||
| cpe:2.3:a:moinmo:moinmoin:1.5.0:beta5:*:*:*:*:*:* | ||
| cpe:2.3:a:moinmo:moinmoin:1.5.0:beta6:*:*:*:*:*:* | ||
| cpe:2.3:a:moinmo:moinmoin:1.5.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:moinmo:moinmoin:1.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:moinmo:moinmoin:1.5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:moinmo:moinmoin:1.5.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:moinmo:moinmoin:1.5.3:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:moinmo:moinmoin:1.5.3:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:moinmo:moinmoin:1.5.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:moinmo:moinmoin:1.5.5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=569975
- http://hg.moinmo.in/moin/1.8/raw-file/1.8.7/docs/CHANGES
- http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035374.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035438.html
- http://marc.info/?l=oss-security&m=126625972814888&w=2
- http://marc.info/?l=oss-security&m=126676896601156&w=2
- http://moinmo.in/MoinMoinRelease1.8
- http://moinmo.in/SecurityFixes
- http://secunia.com/advisories/38444
- http://secunia.com/advisories/38709
- http://secunia.com/advisories/38903
- http://www.debian.org/security/2010/dsa-2014
- http://www.openwall.com/lists/oss-security/2010/02/15/2
- http://www.osvdb.org/62043
- http://www.securityfocus.com/bid/38023
- http://www.vupen.com/english/advisories/2010/0266
- http://www.vupen.com/english/advisories/2010/0600
- https://bugzilla.redhat.com/show_bug.cgi?id=565604
- https://exchange.xforce.ibmcloud.com/vulnerabilities/56002
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=569975
- http://hg.moinmo.in/moin/1.8/raw-file/1.8.7/docs/CHANGES
- http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035374.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035438.html
- http://marc.info/?l=oss-security&m=126625972814888&w=2
- http://marc.info/?l=oss-security&m=126676896601156&w=2
- http://moinmo.in/MoinMoinRelease1.8
- http://moinmo.in/SecurityFixes
- http://secunia.com/advisories/38444
- http://secunia.com/advisories/38709
- http://secunia.com/advisories/38903
- http://www.debian.org/security/2010/dsa-2014
- http://www.openwall.com/lists/oss-security/2010/02/15/2
- http://www.osvdb.org/62043
- http://www.securityfocus.com/bid/38023
- http://www.vupen.com/english/advisories/2010/0266
- http://www.vupen.com/english/advisories/2010/0600
- https://bugzilla.redhat.com/show_bug.cgi?id=565604
- https://exchange.xforce.ibmcloud.com/vulnerabilities/56002



