Origin for mac 0x 6.84/20/2023 PHPIDS 0.6.5 allows remote attackers to obtain sensitive information via a direct request to a. php file, which reveals the installation path in an error message, as demonstrated by libs/smarty/Smarty_ and certain other files. PhpLD 2-151.2.0 allows remote attackers to obtain sensitive information via a direct request to a. php file, which reveals the installation path in an error message, as demonstrated by lang/language_uk.php and certain other files. PhpMyFAQ 2.6.13 allows remote attackers to obtain sensitive information via a direct request to a. php file, which reveals the installation path in an error message, as demonstrated by themes/Odyssey/theme.php and certain other files. Published: Septem8:55:02 PM -0400įrancisco Burzi PHP-Nuke 8.0 allows remote attackers to obtain sensitive information via a direct request to a. php file, which reveals the installation path in an error message, as demonstrated by system/scaffolding/views/view.php and certain other files. PHP Point Of Sale (POS) 10.7 allows remote attackers to obtain sensitive information via a direct request to a. php file, which reveals the installation path in an error message, as demonstrated by Setup/Controllers/IndexController.php. PHProjekt 6.0.5 allows remote attackers to obtain sensitive information via a direct request to a. php file, which reveals the installation path in an error message, as demonstrated by templates/ and certain other files. PhpScheduleIt 1.2.12 allows remote attackers to obtain sensitive information via a direct request to a. php file, which reveals the installation path in an error message, as demonstrated by Test/Test_Suhosin.php and certain other files. PhpSecInfo 0.2.1 allows remote attackers to obtain sensitive information via a direct request to a. php file, which reveals the installation path in an error message, as demonstrated by template/inc_script/frontend_render/disabled/majonavi.php and certain other files. Phpwcms 1.4.7 r412 allows remote attackers to obtain sensitive information via a direct request to a. php file, which reveals the installation path in an error message, as demonstrated by tools/metadata.php and certain other files. Piwigo 2.1.5 allows remote attackers to obtain sensitive information via a direct request to a. php file, which reveals the installation path in an error message, as demonstrated by plugins/Widgetize/Widgetize.php and certain other files. Piwik 1.1 allows remote attackers to obtain sensitive information via a direct request to a. php file, which reveals the installation path in an error message, as demonstrated by includes/functions_feeds.php and certain other files. Pixelpost 1.7.3 allows remote attackers to obtain sensitive information via a direct request to a. php file, which reveals the installation path in an error message, as demonstrated by admin/modules/static.php and certain other files. Pixie 1.04 allows remote attackers to obtain sensitive information via a direct request to a. php file, which reveals the installation path in an error message, as demonstrated by widgets/statistics/init.php and certain other files. Pligg CMS 1.1.3 allows remote attackers to obtain sensitive information via a direct request to a. php file, which reveals the installation path in an error message, as demonstrated by core/themes.php and certain other files. Podcast Generator 1.3 allows remote attackers to obtain sensitive information via a direct request to a. php file, which reveals the installation path in an error message, as demonstrated by product-sort.php and certain other files. PrestaShop 1.4.0.6 allows remote attackers to obtain sensitive information via a direct request to a. php file, which reveals the installation path in an error message, as demonstrated by public/upgrade/templates/layout.php and certain other files. ProjectPier 0.8.0.3 allows remote attackers to obtain sensitive information via a direct request to a. php file, which reveals the installation path in an error message, as demonstrated by classes/pear.php and certain other files. Rapid Leech 2.3-v42-svn322 allows remote attackers to obtain sensitive information via a direct request to a.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |