The debugenableplugins request parameter in Twiki versions 4.x, 5.x, and 6.0.0 allows arbitrary Perl code execution.
7e6bafc3f4e27a15de8ac1ae847247abec86cca045f3b86848aeae7d24f79d02
Twiki versions 4.x, 5.x, and 6.0.0 suffer from a file upload bypass vulnerability.
e814ba5eee65de4bc58fee28adad2d2fa3cac065ea836323e7b984104a372fa8
The %MAKETEXT{}% TWiki variable allows arbitrary shell command execution using tilde (~) characters. Only TWiki server with localization enabled are affected. Versions 5.1.0 through 5.1.3 suffer from this issue.
69ce1acdadc0b5a8985e3a80c2665154f577c3e6ce713f2e81c2207d4226efd5
Remote attackers are able to execute arbitrary commands in the context of the TWiki process for TWiki versions 20030201 and possibly in other versions as well. This flaw is due to a lack of proper sanitization of user input.
ac52112bc5ecb5d1c0b1b78be42869a3a5320137a2621f2fc66722fa6a94c04c