漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
Multiple PHP remote file inclusion vulnerabilities in WebYep 1.1.9, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via the webyep_sIncludePath in (1) files in the programm/lib/ directory including (a) WYApplication.php, (b) WYDocument.php, (c) WYEditor.php, (d) WYElement.php, (e) WYFile.php, (f) WYHTMLTag.php, (g) WYImage.php, (h) WYLanguage.php, (i) WYLink.php, (j) WYPath.php, (k) WYPopupWindowLink.php, (l) WYSelectMenu.php, and (m) WYTextArea.php; (2) files in the programm/elements/ directory including (n) WYGalleryElement.php, (o) WYGuestbookElement.php, (p) WYImageElement.php, (q) WYLogonButtonElement.php, (r) WYLongTextElement.php, (s) WYLoopElement.php, (t) WYMenuElement.php, and (u) WYShortTextElement.php; and (3) programm/webyep.php.
漏洞信息
N/A
漏洞
N/A
漏洞
WebYep 多个PHP远程文件包含漏洞
漏洞信息
MMWebYep 1.1.9中的多个PHP远程文件包含漏洞,在启用register_globals的情况下,远程攻击者可以通过(1)programm/lib/目录下的文件(其中包括(a)WYApplication.php,(b)WYDocument.php,(c)WYEditor.php,(d)WYElement.php,(e)WYFile.php,(f)WYHTMLTag.php,(g)WYImage.php,(h)WYLanguage.php,(i)WYLink.php,(j)WYPath.php,(
漏洞信息
N/A
漏洞
N/A