exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/23947
The provided text describes multiple vulnerabilities in TikiWiki CMS, including XSS via the 'theme' parameter in tiki-switch_theme.php. However, no functional exploit code is present, only a reference to a potential XSS vector.
Classification
Writeup 80%
Target:
TikiWiki CMS (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable TikiWiki instance
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/23960
The provided text describes multiple vulnerabilities in TikiWiki CMS, including XSS via the 'galleryId' parameter in 'tiki-upload_file.php'. However, no functional exploit code is present.
Classification
Writeup 80%
Target:
TikiWiki CMS (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable TikiWiki instance
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/23962
The provided text describes multiple vulnerabilities in TikiWiki CMS, including XSS via the 'chartId' parameter in 'tiki-view_chart.php'. However, no functional exploit code is present.
Classification
Writeup 80%
Target:
TikiWiki CMS (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable TikiWiki instance
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/23959
The provided text describes multiple vulnerabilities in TikiWiki CMS, including XSS via the 'galleryId' parameter in 'tiki-list_file_gallery.php'. However, it lacks executable exploit code, making it a vulnerability writeup rather than a functional PoC.
Classification
Writeup 80%
Target:
TikiWiki CMS (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable TikiWiki instance
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/23955
The provided text describes multiple vulnerabilities in TikiWiki CMS, including XSS via the 'articleId' parameter in 'tiki-read_article.php'. However, it lacks executable exploit code, making it a vulnerability writeup rather than a functional PoC.
Classification
Writeup 80%
Target:
TikiWiki CMS (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable TikiWiki instance
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/23961
The provided text describes multiple vulnerabilities in TikiWiki, including XSS via the 'faqId' parameter in 'tiki-view_faq.php'. However, it lacks executable exploit code, making it a vulnerability writeup rather than a functional PoC.
Classification
Writeup 80%
Target:
TikiWiki (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable TikiWiki instance
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/23953
The provided text describes multiple vulnerabilities in an unspecified application, including XSS, SQL injection, and directory traversal. It includes example URLs demonstrating XSS in messu-mailbox.php but lacks executable exploit code.
Classification
Writeup 90%
Target:
Unknown (likely a web application with messu-mailbox.php)
No auth needed
Prerequisites:
Access to the vulnerable web application
exploitdb
WRITEUP
webappsphp
https://www.exploit-db.com/exploits/43809
This is a detailed technical writeup describing multiple vulnerabilities in TikiWiki CMS/Groupware, including path disclosure, XSS, SQL injection, code injection, directory traversal, and arbitrary file upload. It provides specific examples of vulnerable parameters and attack vectors.
Classification
Writeup 100%
Attack Type
Sqli | Xss | Info Leak | Auth Bypass | Other
Target:
TikiWiki CMS/Groupware <= 1.8.1
No auth needed
Prerequisites:
Access to vulnerable TikiWiki instance
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/23954
The provided text describes multiple vulnerabilities in an unspecified application, including XSS, SQL injection, and directory traversal. It lists example URLs for XSS exploitation in a 'messu-read.php' script but lacks executable exploit code.
Classification
Writeup 90%
Target:
Unspecified web application (likely a PHP-based system)
No auth needed
Prerequisites:
Access to the vulnerable web application
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/23956
The provided text describes multiple vulnerabilities in TikiWiki CMS, including XSS via the 'parentId' parameter in 'tiki-browse_categories.php'. However, it lacks executable exploit code, making it a vulnerability writeup rather than a functional PoC.
Classification
Writeup 80%
Target:
TikiWiki CMS (version unspecified)
No auth needed
Prerequisites:
Access to the vulnerable TikiWiki instance
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/23957
The provided text describes multiple vulnerabilities in TikiWiki, including XSS via the 'page' and 'comments_threshold' parameters in tiki-index.php. No actual exploit code is present, only a reference to a SecurityFocus advisory.
Classification
Writeup 80%
Target:
TikiWiki (version not specified)
No auth needed
Prerequisites:
Access to tiki-index.php with vulnerable parameters
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/23958
The provided text describes multiple vulnerabilities in TikiWiki CMS, including XSS via the 'articleId' parameter in 'tiki-print_article.php'. However, it lacks executable exploit code, making it a vulnerability writeup rather than a functional PoC.
Classification
Writeup 80%
Target:
TikiWiki CMS (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable TikiWiki instance