UBUNTU-CVE-2016-9119

Source
https://ubuntu.com/security/CVE-2016-9119
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-9119.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2016-9119
Upstream
  • CVE-2016-9119
Downstream
Related
Published
2016-11-14T00:00:00Z
Modified
2025-07-16T07:35:14.916971Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

Cross-site scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin before 1.9.8 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

References

Affected packages

Ubuntu:14.04:LTS / moin

Package

Name
moin
Purl
pkg:deb/ubuntu/moin@1.9.7-1ubuntu2.1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.7-1ubuntu2.1

Affected versions

1.*

1.9.5-5ubuntu1
1.9.7-1ubuntu1
1.9.7-1ubuntu2

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "1.9.7-1ubuntu2.1",
            "binary_name": "python-moinmoin"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-9119.json"

Ubuntu:16.04:LTS / moin

Package

Name
moin
Purl
pkg:deb/ubuntu/moin@1.9.8-1ubuntu1.16.04.1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.8-1ubuntu1.16.04.1

Affected versions

1.*

1.9.7-2ubuntu3
1.9.8-1ubuntu1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "1.9.8-1ubuntu1.16.04.1",
            "binary_name": "python-moinmoin"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-9119.json"