TikiWiki CMS/Groupware 8.3 and previous versions allows remote malicious users to obtain the installation path via a direct request to (1) admin/include_calendar.php, (2) tiki-rss_error.php, or (3) tiki-watershed_service.php.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
tiki tikiwiki cms\\/groupware 7.2 |
||
tiki tikiwiki cms\\/groupware 7.0 |
||
tiki tikiwiki cms\\/groupware 5.0 |
||
tiki tikiwiki cms\\/groupware 4.1 |
||
tiki tikiwiki cms\\/groupware 3.3 |
||
tiki tikiwiki cms\\/groupware 3.5 |
||
tiki tikiwiki cms\\/groupware 6.1 |
||
tiki tikiwiki cms\\/groupware 6.0 |
||
tiki tikiwiki cms\\/groupware 5.3 |
||
tiki tikiwiki cms\\/groupware 5.2 |
||
tiki tikiwiki cms\\/groupware 2.2 |
||
tiki tikiwiki cms\\/groupware |
||
tiki tikiwiki cms\\/groupware 8.1 |
||
tiki tikiwiki cms\\/groupware 8.0 |
||
tiki tikiwiki cms\\/groupware 4.0 |
||
tiki tikiwiki cms\\/groupware 4 |
||
tiki tikiwiki cms\\/groupware 3.1 |
||
tiki tikiwiki cms\\/groupware 3.0 |
||
tiki tikiwiki cms\\/groupware 7.1 |
||
tiki tikiwiki cms\\/groupware 6.2 |
||
tiki tikiwiki cms\\/groupware 5.1 |
||
tiki tikiwiki cms\\/groupware 4.2 |
||
tiki tikiwiki cms\\/groupware 3.2 |
||
tiki tikiwiki cms\\/groupware 3.4 |