• MailEnable IMAPD (2.34/2.35) Login Request Buffer Overflow
    Disclosure Date: 2006-12-11
    First seen: 2020-04-26
    exploit/windows/imap/mailenable_login
    MailEnable's IMAP server contains a buffer overflow vulnerability in the Login command. Authors: - MC <mc@metasploit.com>
  • MailEnable IMAPD W3C Logging Buffer Overflow
    Disclosure Date: 2005-10-03
    First seen: 2020-04-26
    exploit/windows/imap/mailenable_w3c_select
    This module exploits a buffer overflow in the W3C logging functionality of the MailEnable IMAPD service. Logging is not enabled by default and this exploit requires a valid username and password to exploit the flaw. MailEnable Professional version 1.6 and prior and MailEnable Enterprise version 1.1 and prior are affected. Authors: - MC <mc@metasploit.com>
  • MailEnable IMAPD (1.54) STATUS Request Buffer Overflow
    Disclosure Date: 2005-07-13
    First seen: 2020-04-26
    exploit/windows/imap/mailenable_status
    MailEnable's IMAP server contains a buffer overflow vulnerability in the STATUS command. With proper credentials, this could allow for the execution of arbitrary code. Authors: - MC <mc@metasploit.com>
  • MailEnable Authorization Header Buffer Overflow
    Disclosure Date: 2005-04-24
    First seen: 2020-04-26
    exploit/windows/http/mailenable_auth_header
    This module exploits a remote buffer overflow in the MailEnable web service. The vulnerability is triggered when a large value is placed into the Authorization header of the web request. MailEnable Enterprise Edition versions prior to 1.0.5 and MailEnable Professional versions prior to 1.55 are affected. Authors: - David Maciejak <david.maciejak@kyxar.fr>
4 metasploit modules found
Please note: Metasploit modules are only matched by CVE numbers. Visit metasploit web site for more details
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!