exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/23982
The provided text describes multiple vulnerabilities in various modules of an application, including SQL injection via the 'offset' parameter in 'tiki-list_faqs.php'. However, it lacks executable exploit code.
Classification
Writeup 80%
Target:
TikiWiki CMS/Groupware (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable endpoint
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/23965
The provided text describes multiple vulnerabilities in TikiWiki CMS, including SQL injection via the 'sort_mode' parameter in 'tiki-directory_ranking.php'. However, no actual exploit code is present.
Classification
Writeup 80%
Target:
TikiWiki CMS
No auth needed
Prerequisites:
Access to the vulnerable TikiWiki CMS instance
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/23977
The provided text describes multiple vulnerabilities in TikiWiki CMS, specifically highlighting a SQL injection vulnerability in the 'tiki-list_blogs.php' script via the 'sort_mode' parameter. It does not contain executable exploit code but references a known CVE.
Classification
Writeup 80%
Target:
TikiWiki CMS (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable TikiWiki instance
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/23975
The provided text describes multiple vulnerabilities in TikiWiki, including SQL injection via the 'sort_mode' parameter in 'tiki-list_faqs.php'. It lacks executable exploit code but outlines attack vectors.
Classification
Writeup 80%
Target:
TikiWiki (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable TikiWiki instance
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/23972
The provided text describes multiple vulnerabilities in TikiWiki, including SQL injection via the 'taskId' and 'offset' parameters in 'tiki-user_tasks.php'. It references a known CVE but lacks actual exploit code.
Classification
Writeup 80%
Target:
TikiWiki (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable TikiWiki instance
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/23984
The provided text describes multiple vulnerabilities in TikiWiki, including SQL injection via the 'offset' parameter in 'tiki-list_blogs.php'. However, it lacks executable exploit code, making it a vulnerability writeup rather than a functional PoC.
Classification
Writeup 80%
Target:
TikiWiki (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable TikiWiki instance
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/23974
The provided text describes multiple vulnerabilities in TikiWiki, including SQL injection via the 'sort_mode' parameter in 'tiki-file_galleries.php'. It references a SecurityFocus BID but lacks actual exploit code.
Classification
Writeup 80%
Target:
TikiWiki (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable TikiWiki instance
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/23963
The provided text describes multiple vulnerabilities in TikiWiki, including SQL injection via the 'sort_mode' parameter in tiki-usermenu.php. However, no functional exploit code is included.
Classification
Writeup 80%
Target:
TikiWiki (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable TikiWiki instance
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/23966
The provided text describes multiple vulnerabilities in TikiWiki CMS, specifically highlighting a SQL injection vulnerability in the 'tiki-browse_categories.php' file. It does not contain executable exploit code but references a parameter susceptible to SQL injection.
Classification
Writeup 90%
Target:
TikiWiki CMS (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable TikiWiki CMS instance
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/23978
The provided text describes multiple vulnerabilities in TikiWiki, including SQL injection via the 'offset' parameter in tiki-usermenu.php. It lacks executable exploit code but references a known CVE.
Classification
Writeup 80%
Target:
TikiWiki (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable TikiWiki instance
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/23976
The provided text describes multiple vulnerabilities in TikiWiki, including SQL injection via the 'sort_mode' parameter in 'tiki-list_trackers.php'. It lacks executable exploit code but outlines attack vectors.
Classification
Writeup 80%
Target:
TikiWiki (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable TikiWiki instance
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/23983
The provided text describes multiple vulnerabilities in TikiWiki CMS, including SQL injection via the 'offset' and 'sort_mode' parameters in 'tiki-list_trackers.php'. No actual exploit code is present, only parameter descriptions.
Classification
Writeup 90%
Target:
TikiWiki CMS (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable TikiWiki instance
exploitdb
WRITEUP
webappsphp
https://www.exploit-db.com/exploits/43809
This is a detailed technical writeup describing multiple vulnerabilities in TikiWiki CMS/Groupware, including path disclosure, XSS, SQL injection, code injection, file enumeration, and arbitrary file upload. It provides specific examples of vulnerable parameters and attack vectors.
Classification
Writeup 100%
Attack Type
Info Leak | Xss | Sqli | Other
Target:
TikiWiki CMS/Groupware <= 1.8.1
No auth needed
Prerequisites:
Access to the TikiWiki web interface
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/23973
The provided text describes multiple vulnerabilities in TikiWiki CMS, including SQL injection via the 'sort_mode' parameter in 'tiki-directory_search.php'. No actual exploit code is present, only a reference to a vulnerable parameter.
Classification
Writeup 80%
Target:
TikiWiki CMS (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable TikiWiki instance
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/23971
The provided text describes multiple vulnerabilities in TikiWiki, including SQL injection via the 'comments_offset' parameter in 'tiki-index.php'. However, it lacks executable exploit code, making it a vulnerability writeup rather than a functional PoC.
Classification
Writeup 80%
Target:
TikiWiki (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable TikiWiki instance
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/23964
The provided text describes multiple vulnerabilities in TikiWiki, including SQL injection via the 'sort_mode' parameter in 'tiki-list_file_gallery.php'. No actual exploit code is present, only a description of the vulnerability.
Classification
Writeup 90%
Target:
TikiWiki (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable TikiWiki instance