The host is running ASP-Dev XM Events Diary and prone to multiple vulnerabilities. Vulnerabilities Insight: - Input passed to the 'cat' parameter in 'default.asp' and 'diary_viewC.asp' are not properly sanitised before being used in SQL queries. - Insufficient access control to the database file 'diary.mdb' which is being used for Events Diary web application.
Successful exploitation will let the attacker execute arbitrary codes in the in the context of the web application or can execute sql injection attack to gain sensitive information about the database engine and table structures. Impact Level: Application
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
ASP-Dev XM Event Diary Multiple Vulnerabilities
Updated on 2015-03-25