This exploit takes advantage of a buffer overflow vulnerability in the SUDO.BIN program. It overflows the buffer with a shellcode that executes a shell command. It then sets the NLSPATH environment variable to the overflowed buffer and executes the SUDO.BIN program with the 'bash' command.
There is a problem with the way IP Phones using the PA168 chipset handle authenticated sessions, allowing remote attackers to gain access to the admin web console running as superuser.
The NASA Ames Research Center BigView application is prone to a remote stack-based buffer-overflow vulnerability. This vulnerability occurs due to a failure in properly bounds-checking user-supplied data before copying it to an insufficiently sized memory buffer. An attacker can exploit this vulnerability to execute arbitrary code in the context of the application, potentially compromising the application and underlying computer. Failed exploit attempts may result in a denial of service.
The vulnerability allows an attacker to execute arbitrary SQL queries on the target system through the 'id' parameter in the 'news_detail.asp' page. By injecting SQL code, the attacker can bypass authentication, retrieve sensitive information, modify or delete data in the database.
The vulnerability allows an attacker to perform remote SQL injection by manipulating the 'user' parameter in the 'user.asp' file of ASP EDGE version 1.2b. An example of the exploit is provided in the text.
The Dr Max Virus exploit allows an attacker to include a remote file in the config.php file, leading to remote code execution. The vulnerability is present in version 1.0.2 of the Script:RPW script.
The vulnerability exists in the include/ directory of the phpXD script. It is caused by the insecure usage of the require() function to include PHP files. An attacker can exploit this vulnerability by providing a malicious code in the 'path' parameter of the affected PHP files, which can lead to remote code execution.
The vulnerability exists in the bbclone script, specifically in the lib/selectlang.php file. The vulnerability is caused by the insecure handling of the BBC_LANGUAGE_PATH parameter. An attacker can exploit this vulnerability by injecting malicious code into the BBC_LANGUAGE_PATH parameter, leading to arbitrary code execution. This vulnerability was discovered by Dr Max Virus in 2007.
The vulnerability exists in IBM Lotus Sametime due to a failure to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. An attacker can exploit this vulnerability to execute arbitrary code within the context of the affected application. Failed exploit attempts may result in a denial of service.
The server is unable to handle more than 2002 requests to non-existent files, pages, folders, etc. When the number of requests exceeds 2002, it stops answering, stops writing to the log file, and the admin will be unable to kick or ban users. The only thing you can do is to kill the process.