BilboBlog 0.2.1 allows remote malicious users to obtain sensitive information via (1) an enable_cache=false query string to footer.php or (2) a direct request to pagination.php, which reveals the installation path in an error message.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
tuxplanet bilboblog 0.2.1 |