{ "schema_version": "1.4.0", "id": "GHSA-q7hg-969x-2w2v", "modified": "2022-05-01T02:04:32Z", "published": "2022-05-01T02:04:32Z", "aliases": [ "CVE-2005-2053" ], "details": "Just another flat file (JAF) CMS before 3.0 Final allows remote attackers to obtain sensitive information via (1) an * (asterisk) in the id parameter, (2) a blank id parameter, or (3) an * (asterisk) in the disp parameter to index.php, which reveals the path in an error message. NOTE: a followup suggests that this may be a directory traversal or file inclusion vulnerability.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2053" }, { "type": "WEB", "url": "http://echo.or.id/adv/adv20-theday-2005.txt" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq&m=111954840611126&w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq&m=111990004028512&w=2" } ], "database_specific": { "cwe_ids": [], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-06-28T04:00:00Z" } }