{"uuid": "efb0dfc8-2248-41b9-b71f-185607884357", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2012-6081", "type": "exploited", "source": "https://t.me/arpsyndicate/4911", "content": "#ExploitObserverAlert\n\nCVE-2012-6081\n\nDESCRIPTION: Exploit Observer has 22 entries in 5 file formats related to CVE-2012-6081. Multiple unrestricted file upload vulnerabilities in the (1) twikidraw (action/twikidraw.py) and (2) anywikidraw (action/anywikidraw.py) actions in MoinMoin before 1.9.6 allow remote authenticated users with write permissions to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory, as exploited in the wild in July 2012.\n\nFIRST-EPSS: 0.954720000\nNVD-IS: 6.4\nNVD-ES: 6.8\nARPS-PRIORITY: 0.9741913", "creation_timestamp": "2024-05-02T22:37:05.000000Z"}