CVE-2008-5931

Net Guys ASPired2Blog - Info Disclosure

Title source: llm
STIX 2.1

Description

The Net Guys ASPired2Blog stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file containing usernames and passwords via a direct request for admin/blog.mdb. NOTE: some of these details are obtained from third party information.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Pouya_Server · textwebappsasp
https://www.exploit-db.com/exploits/7436

References (4)

Core 4
Core References
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/4931
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/47294
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/7436
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/33134

Scores

EPSS 0.0590
EPSS Percentile 90.6%

Details

CWE
CWE-264
Status published
Products (1)
the_net_guys/aspired2blog
Published Jan 21, 2009
Tracked Since Feb 18, 2026