
Google Search Dork: intitle:AnswerBook2 inurl:ab2/ (inurl:8888 | inurl:8889)
First of all this search indicates solaris machines and second the webservice is vulnerable to a format string attack.Sun's AnswerBook 2 utilizes a third-party web server daemon (dwhttpd) that suffers from a format string vulnerability. The vulnerability can be exploited to cause the web server process to execute arbitrary code. The web server runs as user and group 'daemon' who, under recent installations of Solaris, owns no critical fileshttp://www.securiteam.com/unixfocus/5SP081F80K.htm
intitle:AnswerBook2 inurl:ab2/ (inurl:8888 | inurl:8889) Google Dork Source : intitle:AnswerBook2 inurl:ab2/ (inurl:8888 | inurl:8889)