Patrick Michaelis Wili-CMS allows remote attackers to obtain sensitive information via a direct request for (1) thumbnail.php, (2) functions/admin/all.php, (3) functions/admin/init_session.php, (4) functions/all.php, and (5) certain files in example-view/admin_templates/, which reveals the path in various error messages.
References
Configurations
History
21 Nov 2024, 00:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/1633 - | |
References | () http://www.securityfocus.com/archive/1/446575/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/20134 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/29100 - |
Information
Published : 2006-09-26 02:07
Updated : 2025-04-03 01:03
NVD link : CVE-2006-4989
Mitre link : CVE-2006-4989
CVE.ORG link : CVE-2006-4989
JSON object : View
Products Affected
patrick_michaelis
- wili-cms
CWE