Description
paFileDB 3.1 and earlier allows remote attackers to obtain sensitive information via (1) an invalid str parameter to pafiledb.php, or a direct request to (2) viewall.php, (3) stats.php, (4) search.php, (5) rate.php, (6) main.php, (7) license.php, (8) category.php, (9) download.php, (10) file.php, (11) email.php, or (12) admin.php, which reveals the path in a PHP error message.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2005-0725 | paFileDB 3.1 and earlier allows remote attackers to obtain sensitive information via (1) an invalid str parameter to pafiledb.php, or a direct request to (2) viewall.php, (3) stats.php, (4) search.php, (5) rate.php, (6) main.php, (7) license.php, (8) category.php, (9) download.php, (10) file.php, (11) email.php, or (12) admin.php, which reveals the path in a PHP error message. |
References
| Link | Providers |
|---|---|
| http://marc.info/?l=bugtraq&m=111031801802851&w=2 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T21:21:06.608Z
Reserved: 2005-03-12T00:00:00.000Z
Link: CVE-2005-0724
No data.
Status : Modified
Published: 2005-05-02T04:00:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2005-0724
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD