CVE-2006-5538
https://notcve.org/view.php?id=CVE-2006-5538
D-Link DSL-G624T firmware 3.00B01T01.YA-C.20060616 allows remote attackers to list contents of the cgi-bin directory via unspecified vectors, probably a direct request. Firmware 3.00B01T01.YA-C.20060616 de D-Link DSL-G624T permite a atacantes remotos listar contenidos del directorio cgi-bin mediante vectores sin especificar, probablemente en una petición directa. • http://www.eazel.es/advisory005-D-Link-DSL-G624T-directoy-transversal-xss-cross-site-scripting-directory-listing-vulnerabilities.html http://www.securityfocus.com/archive/1/449486/100/0/threaded •
CVE-2006-5536 – D-Link DSL-G624T - Information Disclosure
https://notcve.org/view.php?id=CVE-2006-5536
Directory traversal vulnerability in cgi-bin/webcm in D-Link DSL-G624T firmware 3.00B01T01.YA-C.20060616 allows remote attackers to read arbitrary files via a .. (dot dot) in the getpage parameter. Vulnerabilidad de cruce de directorios en cgi-bin/webcm de D-Link DSL-G624T en el firmware 3.00B01T01.YA-C.20060616 permite a atacantes remotos leer ficheros de su elección mediante .. (punto punto) en el parámetro getpage. • https://www.exploit-db.com/exploits/28847 http://secunia.com/advisories/22524 http://securityreason.com/securityalert/1781 http://www.eazel.es/advisory005-D-Link-DSL-G624T-directoy-transversal-xss-cross-site-scripting-directory-listing-vulnerabilities.html http://www.securityfocus.com/archive/1/449486/100/0/threaded http://www.securityfocus.com/bid/20689 http://www.vupen.com/english/advisories/2006/4191 •
CVE-2006-5537
https://notcve.org/view.php?id=CVE-2006-5537
Multiple cross-site scripting (XSS) vulnerabilities in cgi-bin/webcm in D-Link DSL-G624T firmware 3.00B01T01.YA-C.20060616 allow remote attackers to inject arbitrary web script or HTML via the (1) upnp:settings/state or (2) upnp:settings/connection parameters. Vulnerabilidades múltiples de cruce de sitios en scripts (XSS) en cgi-bin/webcm de D-Link DSL-G624T en el firmware 3.00B01T01.YA-C.20060616 permiten a atacantes remotos inyectar scripts WEB o HTML de su elección mediante los parámetros 1) upnp:settings/state ó (2) upnp:settings/connection • http://secunia.com/advisories/22524 http://securityreason.com/securityalert/1781 http://www.eazel.es/advisory005-D-Link-DSL-G624T-directoy-transversal-xss-cross-site-scripting-directory-listing-vulnerabilities.html http://www.securityfocus.com/archive/1/449486/100/0/threaded http://www.vupen.com/english/advisories/2006/4191 •