Page 28 of 157 results (0.007 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

D-Link DSL-G624T firmware 3.00B01T01.YA-C.20060616 allows remote attackers to list contents of the cgi-bin directory via unspecified vectors, probably a direct request. Firmware 3.00B01T01.YA-C.20060616 de D-Link DSL-G624T permite a atacantes remotos listar contenidos del directorio cgi-bin mediante vectores sin especificar, probablemente en una petición directa. • http://www.eazel.es/advisory005-D-Link-DSL-G624T-directoy-transversal-xss-cross-site-scripting-directory-listing-vulnerabilities.html http://www.securityfocus.com/archive/1/449486/100/0/threaded •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 4

Directory traversal vulnerability in cgi-bin/webcm in D-Link DSL-G624T firmware 3.00B01T01.YA-C.20060616 allows remote attackers to read arbitrary files via a .. (dot dot) in the getpage parameter. Vulnerabilidad de cruce de directorios en cgi-bin/webcm de D-Link DSL-G624T en el firmware 3.00B01T01.YA-C.20060616 permite a atacantes remotos leer ficheros de su elección mediante .. (punto punto) en el parámetro getpage. • https://www.exploit-db.com/exploits/28847 http://secunia.com/advisories/22524 http://securityreason.com/securityalert/1781 http://www.eazel.es/advisory005-D-Link-DSL-G624T-directoy-transversal-xss-cross-site-scripting-directory-listing-vulnerabilities.html http://www.securityfocus.com/archive/1/449486/100/0/threaded http://www.securityfocus.com/bid/20689 http://www.vupen.com/english/advisories/2006/4191 •

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 2

Multiple cross-site scripting (XSS) vulnerabilities in cgi-bin/webcm in D-Link DSL-G624T firmware 3.00B01T01.YA-C.20060616 allow remote attackers to inject arbitrary web script or HTML via the (1) upnp:settings/state or (2) upnp:settings/connection parameters. Vulnerabilidades múltiples de cruce de sitios en scripts (XSS) en cgi-bin/webcm de D-Link DSL-G624T en el firmware 3.00B01T01.YA-C.20060616 permiten a atacantes remotos inyectar scripts WEB o HTML de su elección mediante los parámetros 1) upnp:settings/state ó (2) upnp:settings/connection • http://secunia.com/advisories/22524 http://securityreason.com/securityalert/1781 http://www.eazel.es/advisory005-D-Link-DSL-G624T-directoy-transversal-xss-cross-site-scripting-directory-listing-vulnerabilities.html http://www.securityfocus.com/archive/1/449486/100/0/threaded http://www.vupen.com/english/advisories/2006/4191 •

CVSS: 7.5EPSS: 36%CPEs: 7EXPL: 1

Stack-based buffer overflow in the Universal Plug and Play (UPnP) service in D-Link DI-524, DI-604 Broadband Router, DI-624, D-Link DI-784, WBR-1310 Wireless G Router, WBR-2310 RangeBooster G Router, and EBR-2310 Ethernet Broadband Router allows remote attackers to execute arbitrary code via a long M-SEARCH request to UDP port 1900. Desbordamiento de búfer basado en pila en el servicio Universal Plug and Play (UPnP) de D-Link DI-524, DI-604 Broadband Router, DI-624, D-Link DI-784, WBR-1310 Wireless G Router, WBR-2310 RangeBooster G Router, and EBR-2310 Ethernet Broadband Router permite a atacantes remotos ejecutar código de su elección mediante una petición M-SEARCH larga al puerto UDP 1900. • https://www.exploit-db.com/exploits/28230 http://archives.neohapsis.com/archives/fulldisclosure/2006-07/0363.html http://secunia.com/advisories/21081 http://securitytracker.com/id?1016511 http://www.eeye.com/html/research/advisories/AD20060714.html http://www.kb.cert.org/vuls/id/971705 http://www.osvdb.org/27333 http://www.securityfocus.com/archive/1/440298/100/0/threaded http://www.securityfocus.com/archive/1/440852/100/100/threaded http://www.securityfocus.com/bid/19 •

CVSS: 5.0EPSS: 7%CPEs: 1EXPL: 2

The web server for D-Link Wireless Access-Point (DWL-2100ap) firmware 2.10na and earlier allows remote attackers to obtain sensitive system information via a request to an arbitrary .cfg file, which returns configuration information including passwords. • https://www.exploit-db.com/exploits/1889 http://secunia.com/advisories/20474 http://securityreason.com/securityalert/1064 http://securitytracker.com/id?1016234 http://www.gnucitizen.org/projects/router-hacking-challenge http://www.intruders.com.br/adv0206en.html http://www.intruders.org.br/adv0206en.html http://www.securityfocus.com/archive/1/436281/100/0/threaded http://www.securityfocus.com/archive/1/489009/100/0/threaded http://www.securityfocus.com/bid/18299 http://www. •