The Net Guys ASPired2Protect stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing the username and password via a direct request to ASPired2Protect.mdb.Referenceshttp://secunia.com/advisories/33130https://www.exploit-db.com/exploits/7428