header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

IBM AIX ipl_varyon elevated privileges exploit

This exploit is used to gain elevated privileges on IBM AIX systems. It uses a buffer overflow vulnerability in the ipl_varyon command to execute arbitrary code. The exploit sets up an environment variable containing the shellcode, and then calls the ipl_varyon command with the environment variable. This causes the shellcode to be executed with elevated privileges.

WebHints Software hints.cgi Remote Command Execution Vulnerability

A remote command execution vulnerability exists in WebHints Software hints.cgi, which is a web-based application. The vulnerability allows an attacker to execute arbitrary commands on the vulnerable system. The vulnerability is due to insufficient input validation of user-supplied data. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious code to the vulnerable system. The malicious code will be executed on the vulnerable system, allowing the attacker to gain access to the system.

Sun Solaris AnswerBook2 Multiple Cross-Site Scripting Vulnerabilities

Sun Solaris AnswerBook2 is reported prone to multiple cross-site scripting vulnerabilities because the software fails to properly sanitize user-supplied data. Exploits will allow arbitrary HTML and script code to run in a victim's browser, allowing the attacker to steal cookie-based credentials and launch other attacks.

TCP Dump Infinite Loop

A vulnerability in the tcpdump utility allows an attacker to cause an infinite loop in the program, resulting in a denial of service. This vulnerability is caused by a lack of proper bounds checking when processing BGP UPDATE messages. By sending a specially crafted BGP UPDATE message, an attacker can cause tcpdump to enter an infinite loop, resulting in a denial of service.

Invision Power Board <= 1.3.1 Final Remote Password Hash Retrieval

This exploit allows an attacker to retrieve the password hash of a user on a vulnerable version of Invision Power Board. The exploit works by sending a crafted cookie to the server, which contains a malicious SQL query. The query is designed to return the password hash of the target user, which can then be used to gain access to the account.

IpSwitch IMAP Server LOGON stack overflow

A stack-based buffer overflow vulnerability exists in IpSwitch IMAP Server when processing LOGON commands. An attacker can exploit this vulnerability by sending a specially crafted LOGON command with an overly long username to the IMAP server. This can result in arbitrary code execution in the context of the IMAP service.

Recent Exploits: