This module exploits a buffer overflow vulnerability in the mDNSResponder service running on certain versions of Apple Mac OS X. The vulnerability is exploited remotely by sending a specially crafted UPnP Internet Gateway Device (IGD) packet and installing an agent.
This module exploits a stack-based buffer overflow in the MDaemon Email Server Server 9.64
This module exploits a buffer overflow in MDaemon IMAP server.
This module sends a 'USER' command at the service producing a heap buffer overflow and installs an agent.
The Raw Message Handler (FORM2RAW.exe) CGI, accessible by default from the WebClient interface, lets unauthenticated users inject mails in the Raw messages queue that can trigger a stack overflow in MDaemon.exe
A successful exploit of a reported security vulnerability could allow an attacker to remotely execute arbitrary code on the ePolicy Orchestrator server. The attack would require network access to the ePolicy Orchestrator server system and reverse engineering of the proprietary communications protocol.
Exploits a stack buffer overflow in the MySQL MaxDB WebTool Server.
This module exploits a buffer overflow in the status command of MailEnable and installs an agent. The status command requires an authenticated session, so valid credentials are required.
This module exploits a stack-based buffer overflow in Mailenable smtp service for Windows, allowing remote attackers to execute arbitrary code via AUTH command input.
This module exploits a buffer overflow in the W3C logging for MailEnable Enterprise 1.1 allows remote attackers to execute arbitrary code.
Pagination
- Previous page
- Page 48
- Next page