header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

The SpeedTouch 500 series are prone to a cross-site scripting vulnerability

The SpeedTouch 500 series are prone to a cross-site scripting vulnerability due to a failure in the devices to properly sanitize user-supplied input. An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site.

vd_openldap.pm

This text is a license agreement for the VulnDisco Pack, which is a private property of GLEG ltd. Company. The Pack is intellectual property of the Company and is guarded by intellectual property laws. The purchaser has the rights to use the Pack only under the terms and conditions of this License to the maximum extent permitted by applicable law. The purchaser is allowed to install the Pack on unlimited number of seats and is not restricted to use the Pack to test the particular IP range. The purchaser is not allowed to disclose the Pack in whole or partly, to disclose any information concerning the Pack or any information derived from the Pack. The purchaser realizes that the Pack is provided as-is without warranty of any kind, including warranties that the Pack suits particular needs, is safe to use, or contain no issues. The purchaser realizes that the Pack contains potentially danger software and data and that the Company is not responsible for any damage caused by the Pack or any data contained in it.

Article Script v1.*and v1.6.3 Sql injection

Article Script versions v1.* and v1.6.3 are vulnerable to SQL injection. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable application. This can allow the attacker to access the database and gain access to sensitive information such as usernames and passwords. The vulnerable parameter is the ‘category’ parameter in the ‘rss.php’ file. An example of a malicious query is http://www.victim.com/articles/rss.php?category=-1/**/union/**/select/**/1,2,login,password/**/from/**/users/* which can be used to extract the admin username and password. The dorks used to identify vulnerable websites are “Powered by Article Script”, “:: Article Script - New User Article ::”, “intitle:”:: Article Script -” and “Last Articles::”.

D-Link DWL-G700AP HTTPD Remote Denial-of-Service Vulnerability

D-Link DWL-G700AP HTTPD is prone to a remote denial-of-service vulnerability. This issue is due to a failure in the 'httpd' service to properly handle malformed data. An attacker can exploit this issue to crash the affected webserver, effectively denying service to legitimate users. The affected device must be manually reset to restart the affected service.

ECHO_ADV_57$2006

A vulnerability was found in the script shared_functions.php, where the input passed to the '$_SESSION['docroot_path']' parameter is not properly verified before being used. This can be exploited to include arbitrary files from remote locations.

Ultimate PHP Board <= 2.0 File Include Exploit

Ultimate PHP Board (UPB) is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code within the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.

Recent Exploits: