Description
ASPRunner 2.4 stores the database under the web root in the db directory, which may allow remote attackers to obtain the database via a direct request to the database filename, which is predictable based on table and field names.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Ferruh Mavituna · textwebappsasp
https://www.exploit-db.com/exploits/24317
References (8)
Core 8
Core References
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=109086977330418&w=2
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1010777
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/8253
Exploit x_refsource_misc
http://ferruh.mavituna.com/article/?574
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/12164
Exploit mailing-list
x_refsource_vulnwatch
http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0011.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/10799
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/16802
Scores
EPSS
0.0919
EPSS Percentile
92.7%
Details
Status
published
Products (6)
xlinesoft/asprunner
1.0
xlinesoft/asprunner
2.0
xlinesoft/asprunner
2.1
xlinesoft/asprunner
2.2
xlinesoft/asprunner
2.3
xlinesoft/asprunner
2.4
Published
Dec 31, 2004
Tracked Since
Feb 18, 2026