UranyumSoft Listing Service stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for database/db.mdb.Referenceshttp://www.exploit-db.com/exploits/10823http://www.osvdb.org/61396http://secunia.com/advisories/37912http://packetstormsecurity.org/0912-exploits/uranyumsoft-disclose.txthttps://exchange.xforce.ibmcloud.com/vulnerabilities/55220