CVE-2005-0724 in paFileDBinfo

Summary

paFileDB 3.1 and earlier allows remote attackers to obtain sensitive information via (1) an invalid str parameter to pafiledb.php, or a direct request to (2) viewall.php, (3) stats.php, (4) search.php, (5) rate.php, (6) main.php, (7) license.php, (8) category.php, (9) download.php, (10) file.php, (11) email.php, or (12) admin.php, which reveals the path in a PHP error message.

Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

Reservation

03/12/2005

Disclosure

05/02/2005

Status

Confirmed

Entries

VulDB provides additional information and datapoints for this CVE:

Sources

Do you know our Splunk app?

Download it now for free!