X.Org X Window System Xserver is prone to a denial-of-service vulnerabilty because the software fails to properly handle exceptional conditions. Attackers who can connect to a vulnerable X server may exploit this issue to crash the targeted server, denying further service to legitimate users.
E-Annu is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
In older versions of MyBB, it was possible to execute PHP code by injecting the code into a template file. This bug has been fixed in the latest version, but there is a little bug in the language editor section. By exploiting this bug, an attacker with admin privileges can write PHP code in the language file and execute it. The exploit takes advantage of the fact that MyBB treats the language variable as an integer, allowing the execution of PHP functions.
The Gazi Download Portal is vulnerable to SQL injection due to lack of proper input sanitization. An attacker can exploit this vulnerability by injecting malicious SQL code into user-supplied data, which can lead to unauthorized access, data manipulation, and exploitation of other vulnerabilities in the database.
Red Hat Directory Server is prone to multiple cross-site scripting vulnerabilities because the application fails to sufficiently sanitize user-supplied input.An attacker can exploit these issues to steal cookie-based authentication credentials and launch other attacks.
An attacker can gain unauthorized access to the application's database with administrative privileges, leading to a complete compromise of vulnerable applications.
The Apache AXIS web application framework is prone to a vulnerability that allows remote attackers to disclose sensitive path information. This vulnerability occurs when an attacker sends a specially crafted request to the affected server, which results in the disclosure of directory paths on the webserver.
The Burak Yilmaz Blog is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
You can easily change the default user's (admin) password by the default router page listening on tcp/ip port 80. In here you the $_GET will change the password for you and the $_POST request method is not needed for changing the router pass.
This script creates a .wps file which exploits the vulnerability described in CVE-2013-3934 and bypasses SafeSEH protection.