paFileDB 3.1 and earlier allows remote attackers to obtain sensitive information via (1) an invalid str parameter to pafiledb.php, or a direct request to (2) viewall.php, (3) stats.php, (4) search.php, (5) rate.php, (6) main.php, (7) license.php, (8) category.php, (9) download.php, (10) file.php, (11) email.php, or (12) admin.php, which reveals the path in a PHP error message.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
http://marc.info/?l=bugtraq&m=111031801802851&w=2 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T21:21:06.608Z
Reserved: 2005-03-12T00:00:00
Link: CVE-2005-0724

No data.

Status : Deferred
Published: 2005-05-02T04:00:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2005-0724

No data.

No data.