A vulnerability in the FULLY FUNCTIONAL ASP FORUM - MtMWebForum 1.0 script allows an attacker to download the database by accessing the URL http://server/FULLY/ForumDb.mdb.
The vulnerability allows an attacker to download the database of the application by accessing the URL http://server/BaalASP/database/baalsmartform.mdb
The vulnerability allows an attacker to download the database of the vulnerable application. The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can send a specially crafted request to the vulnerable application and download the database. Successful exploitation of this vulnerability may result in unauthorized access to sensitive information.
The vulnerability allows an attacker to download the database of the htmlArea v2.03 application. The attacker can access the database by sending a request to the URL http://server/htmlArea/data/newsdata.mdb.
The vulnerability allows an attacker to download the database of the Futility Forum 1.0 Revamp application. The attacker can access the database by sending a request to the message.mdb file.
The vulnerability allows an attacker to download the database of the AspBB bulletin board. The attacker can access the database by sending a request to the URL http://server/AspBB/db/betaboard.mdb
Input passed to the 'CategoryID' parameter in prodpage.cfm, the 'SubCatID' parameter in index.cfm, the 'OrderID' parameter in shipping.cfm, and to the 'ItemID' parameter in proddetail.cfm is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Note that error messages disclose the full installation path.
The vulnerability allows an attacker to download the database of the PSnews application. The attacker can access the database by sending a request to the URL http://server/PSnews/PSnews_th3_d4t4b453.mdb.
A vulnerability in the jgbbs-3.0beta1 script allows an attacker to download the database file bbs.mdb from the server.
A vulnerability exists in Dren's PHP Uploader which allows an attacker to upload a malicious file to the server. The attacker can then access the uploaded file by accessing the URL http://localhost/path/files/shell.php