@Mrwormo #TikiWiki est une solution open-source développée depuis plus de 20 ans qui permet de faire énormément de choses:
- wiki
- tables/listes/bases de données
- partage de documents
- gestion des droits aux petits oignons
- ...
Un simple hébergement web suffit.
https://tiki.org/HomePage
🇫🇷 Mise à jour de la traduction en français de la documentation de #TikiWiki.
🇬🇧 Updated the French translation of the #Tiki documentation.
---
🇫🇷 Soutenez ce travail sur mon compte #LiberaPay :
https://liberapay.com/trebmuh/
🇬🇧 Support this work on my #LiberaPay account.
🇫🇷 Mise à jour de la traduction en français de la documentation de #TikiWiki.
🇬🇧 Updated the French translation of the #Tiki documentation.
---
🇫🇷 Soutenez ce travail sur mon compte #LiberaPay :
https://liberapay.com/trebmuh/
🇬🇧 Support this work on my #LiberaPay account.
🇫🇷 Mise à jour de la traduction en français de la documentation de #TikiWiki.
🇬🇧 Updated the French translation of the #Tiki documentation.
---
🇫🇷 Soutenez ce travail sur mon compte #LiberaPay :
https://liberapay.com/trebmuh/
🇬🇧 Support this work on my #LiberaPay account.
🇫🇷 Mise à jour de la traduction en français de la documentation de #TikiWiki.
🇬🇧 Updated the French translation of the #Tiki documentation.
---
🇫🇷 Soutenez ce travail sur mon compte #LiberaPay :
https://liberapay.com/trebmuh/
🇬🇧 Support this work on my #LiberaPay account.
Referenced link: https://0day.today/exploit/description/38144
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: https://twitter.com/inj3ct0r/status/1612865328949727276#m
#0day #TikiWiki CMS Groupware 24.0 structlib.php Code Execution #Vulnerability #RCE https://0day.today/exploit/description/38144
#0day #TikiWiki #Vulnerability #RCE
Referenced link: https://0day.today/exploit/description/38143
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: https://twitter.com/inj3ct0r/status/1612865194568585216#m
#0day #TikiWiki CMS Groupware 25.0 Cross Site Request Forgery #Vulnerability #CSRF https://0day.today/exploit/description/38143
#0day #TikiWiki #Vulnerability #CSRF
Referenced link: https://0day.today/exploit/description/38145
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: https://twitter.com/inj3ct0r/status/1612865446306353190#m
#0day #TikiWiki CMS Groupware 24.0 grid.php PHP Object #Injection #Vulnerability https://0day.today/exploit/description/38145
#0day #TikiWiki #Injection #Vulnerability
Referenced link: https://0day.today/exploit/description/38142
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: https://twitter.com/inj3ct0r/status/1612864958580101121#m
#0day #TikiWiki CMS Groupware 24.1 tikiimporter_blog_wordpress.php PHP Object #Injection #Vulnerability https://0day.today/exploit/description/38142
#0day #TikiWiki #Injection #Vulnerability
La bonne trouvaille du jour: moi qui recherchais une alternative aux tables SharePoint, je pense que les formulaires Tikiwiki vont faire le job 👍
https://tiki.org/HomePage