CVE-2011-3732
eggBlog 4.1.2 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by _lib/fckeditor/editor/dialog/fck_spellerpages/spellerpages/server-scripts/spellchecker.php and certain other files.
Date published : 2011-09-23
http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README
http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/eggblog_4.1.2