MoinMoin version 1.5.x MOIND_ID exploit that takes advantage of a cookie related bug.
fe773a0bf462d87ccfe3e1c437fb451b09fd1248b5893eb4c7b52717ab7143e1
MoinMoin version 1.9.8 suffers from cross site scripting vulnerabilities.
807d401e79d629f871dda62fa80f8ff1b98894e57637524b21c3634e05083794
This Metasploit module exploits a vulnerability in MoinMoin 1.9.5. The vulnerability exists on the manage of the twikidraw actions, where a traversal path can be used in order to upload arbitrary files. Exploitation is achieved on Apached/mod_wsgi configurations by overwriting moin.wsgi, which allows to execute arbitrary python code, as exploited in the wild on July, 2012.
357506b05f75972b93ef4f53d7935e38c58ae9d6c3dc89990bc79b7b56e9d911
Proof of concept information that demonstrates how Moinmoin versions prior to 1.9.3 suffer from a cross site scripting vulnerability.
5ff8dc4d53fbbfeb7a7303704850d58baa20fc56ac9148136f6824b553a93bd9
The MoinMoin Wiki engine suffers from a cross site scripting vulnerability.
71612f0939dd02312ba6da7b58038a198f21ab2976cca17dfa45b396d4d849db
MoinMoin version 1.5.9 suffers from denial of service and path disclosure vulnerabilities.
69551d639e909c8105507593eda4f7945172f4e91bf44a580a6c4db9f7308eaf