This exploit is used to gain elevated privileges on IBM AIX systems. It uses a buffer overflow vulnerability in the ipl_varyon command to execute arbitrary code. The exploit sets up an environment variable containing the shellcode, and then calls the ipl_varyon command with the environment variable. This causes the shellcode to be executed with elevated privileges.
This exploit is used to gain elevated privileges on IBM AIX systems. It uses a buffer overflow vulnerability in the netpmon program to inject a malicious payload into the environment variables. The payload contains a shellcode which is used to execute arbitrary code on the system.
A remote command execution vulnerability exists in WebHints Software hints.cgi, which is a web-based application. The vulnerability allows an attacker to execute arbitrary commands on the vulnerable system. The vulnerability is due to insufficient input validation of user-supplied data. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious code to the vulnerable system. The malicious code will be executed on the vulnerable system, allowing the attacker to gain access to the system.
This exploit allows an attacker to upload a malicious file to a vulnerable directory on the target system. The attacker can then execute arbitrary commands on the target system.
Sun Solaris AnswerBook2 is reported prone to multiple cross-site scripting vulnerabilities because the software fails to properly sanitize user-supplied data. Exploits will allow arbitrary HTML and script code to run in a victim's browser, allowing the attacker to steal cookie-based credentials and launch other attacks.
A vulnerability in the tcpdump utility allows an attacker to cause an infinite loop in the program, resulting in a denial of service. This vulnerability is caused by a lack of proper bounds checking when processing BGP UPDATE messages. By sending a specially crafted BGP UPDATE message, an attacker can cause tcpdump to enter an infinite loop, resulting in a denial of service.
This exploit allows an attacker to retrieve the password hash of a user on a vulnerable version of Invision Power Board. The exploit works by sending a crafted cookie to the server, which contains a malicious SQL query. The query is designed to return the password hash of the target user, which can then be used to gain access to the account.
A stack-based buffer overflow vulnerability exists in IpSwitch IMAP Server when processing LOGON commands. An attacker can exploit this vulnerability by sending a specially crafted LOGON command with an overly long username to the IMAP server. This can result in arbitrary code execution in the context of the IMAP service.
This exploit shows the username of the administrator of the blog and his password crypted in MD5, you must only choose the correct version of the target.
This exploit allows an attacker to gain access to the admin account of a PostNuke website by exploiting a SQL injection vulnerability. The exploit sends a specially crafted HTTP request to the vulnerable server, which then returns the admin username and MD5 password.