Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c88g-cp9r-j36m

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Patrick Michaelis Wili-CMS allows remote attackers to obtain sensitive information via a direct request for (1) thumbnail.php, (2) functions/admin/all.php, (3) functions/admin/init_session.php, (4) functions/all.php, and (5) certain files in example-view/admin_templates/, which reveals the path in various error messages.

Patrick Michaelis Wili-CMS allows remote attackers to obtain sensitive information via a direct request for (1) thumbnail.php, (2) functions/admin/all.php, (3) functions/admin/init_session.php, (4) functions/all.php, and (5) certain files in example-view/admin_templates/, which reveals the path in various error messages.

EPSS

Процентиль: 88%
0.03806
Низкий

Связанные уязвимости

nvd
больше 19 лет назад

Patrick Michaelis Wili-CMS allows remote attackers to obtain sensitive information via a direct request for (1) thumbnail.php, (2) functions/admin/all.php, (3) functions/admin/init_session.php, (4) functions/all.php, and (5) certain files in example-view/admin_templates/, which reveals the path in various error messages.

EPSS

Процентиль: 88%
0.03806
Низкий