The SpeedTouch 500 series are prone to a cross-site scripting vulnerability due to a failure in the devices to properly sanitize user-supplied input. An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site.
This exploit allows an attacker to create a new user account with administrative privileges on a vulnerable iPrimal Forums installation. The attacker can then use the newly created account to gain access to the administrative panel and perform malicious activities.
This text is a license agreement for the VulnDisco Pack, which is a private property of GLEG ltd. Company. The Pack is intellectual property of the Company and is guarded by intellectual property laws. The purchaser has the rights to use the Pack only under the terms and conditions of this License to the maximum extent permitted by applicable law. The purchaser is allowed to install the Pack on unlimited number of seats and is not restricted to use the Pack to test the particular IP range. The purchaser is not allowed to disclose the Pack in whole or partly, to disclose any information concerning the Pack or any information derived from the Pack. The purchaser realizes that the Pack is provided as-is without warranty of any kind, including warranties that the Pack suits particular needs, is safe to use, or contain no issues. The purchaser realizes that the Pack contains potentially danger software and data and that the Company is not responsible for any damage caused by the Pack or any data contained in it.
Article Script versions v1.* and v1.6.3 are vulnerable to SQL injection. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable application. This can allow the attacker to access the database and gain access to sensitive information such as usernames and passwords. The vulnerable parameter is the ‘category’ parameter in the ‘rss.php’ file. An example of a malicious query is http://www.victim.com/articles/rss.php?category=-1/**/union/**/select/**/1,2,login,password/**/from/**/users/* which can be used to extract the admin username and password. The dorks used to identify vulnerable websites are “Powered by Article Script”, “:: Article Script - New User Article ::”, “intitle:”:: Article Script -” and “Last Articles::”.
Input passed to the "$_SESSION[PATH_COMPOSANT]" parameter in Mysqlfinder.php is not properly verified before being used. This can be exploited to execute arbitrary PHP code by including files from local or external resources.
A vulnerability was found in the script view.php, where the parameter '$av' was not properly verified before being used. This can be exploited to execute arbitrary PHP code by including files from local or external resources.
D-Link DWL-G700AP HTTPD is prone to a remote denial-of-service vulnerability. This issue is due to a failure in the 'httpd' service to properly handle malformed data. An attacker can exploit this issue to crash the affected webserver, effectively denying service to legitimate users. The affected device must be manually reset to restart the affected service.
A vulnerability was found in the script shared_functions.php, where the input passed to the '$_SESSION['docroot_path']' parameter is not properly verified before being used. This can be exploited to include arbitrary files from remote locations.
TheWebDrivers Forum is vulnerable to a SQL injection vulnerability. An attacker can exploit this vulnerability to gain access to the database and extract sensitive information such as usernames and passwords.
Ultimate PHP Board (UPB) is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code within the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.