{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T05:56:26.991","vulnerabilities":[{"cve":{"id":"CVE-2005-2319","sourceIdentifier":"cve@mitre.org","published":"2005-07-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"PHP remote file include vulnerability in Yawp library 1.0.6 and earlier, as used in YaWiki and possibly other products, allows remote attackers to include arbitrary files via the _Yawp[conf_path] parameter."},{"lang":"es","value":"Vulnerabilidad de inclusión de fichero PHP en Yawp library 1.0.6 y anteriores, usado en YaWiki y posiblmente otros productos permite que atacantes remotos incluyan ficheros arbitrarios  mediante el parámetro \"_Yawp\"."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:yawp:yawp:1.0.0:*:*:*:*:*:*:*","matchCriteriaId":"009BF752-A979-4848-AC14-00EA4CCD7EFC"},{"vulnerable":true,"criteria":"cpe:2.3:a:yawp:yawp:1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"1D30FB58-3081-4976-A549-FC0710E04CF7"},{"vulnerable":true,"criteria":"cpe:2.3:a:yawp:yawp:1.0.2:*:*:*:*:*:*:*","matchCriteriaId":"4A7E5AC1-49B0-4FDE-B709-311EF5A71B0F"},{"vulnerable":true,"criteria":"cpe:2.3:a:yawp:yawp:1.0.3:*:*:*:*:*:*:*","matchCriteriaId":"681CC1AA-6CFA-4B30-9A06-CAF8EA2AF65D"},{"vulnerable":true,"criteria":"cpe:2.3:a:yawp:yawp:1.0.4:*:*:*:*:*:*:*","matchCriteriaId":"D94115A6-38F8-4C60-AB31-3BA0F5F0A74F"},{"vulnerable":true,"criteria":"cpe:2.3:a:yawp:yawp:1.0.5:*:*:*:*:*:*:*","matchCriteriaId":"C5B35787-7B3E-4FFF-9B7A-7693F4EFA7CF"},{"vulnerable":true,"criteria":"cpe:2.3:a:yawp:yawp:1.0.6:*:*:*:*:*:*:*","matchCriteriaId":"2363BA40-E459-4E82-8A37-A5FBE7D48E4F"}]}]}],"references":[{"url":"http://phpyawp.com/yawiki/index.php?page=ChangeLog","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/16049","source":"cve@mitre.org"},{"url":"http://www.hardened-php.net/advisory-102005.php","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/404948","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/14237","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://phpyawp.com/yawiki/index.php?page=ChangeLog","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/16049","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.hardened-php.net/advisory-102005.php","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/404948","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/14237","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]}]}}]}