Metasploit modules that can be used to exploit Mailenable » Mailenable Professional
-
MailEnable IMAPD (2.34/2.35) Login Request Buffer Overflow
Disclosure Date: 2006-12-11First seen: 2020-04-26exploit/windows/imap/mailenable_loginMailEnable's IMAP server contains a buffer overflow vulnerability in the Login command. Authors: - MC <mc@metasploit.com> -
MailEnable IMAPD W3C Logging Buffer Overflow
Disclosure Date: 2005-10-03First seen: 2020-04-26exploit/windows/imap/mailenable_w3c_selectThis module exploits a buffer overflow in the W3C logging functionality of the MailEnable IMAPD service. Logging is not enabled by default and this exploit requires a valid username and password to exploit the flaw. MailEnable Professional version 1.6 and prior and MailEnable Enterprise version 1.1 and prior are affected. Authors: - MC <mc@metasploit.com> -
MailEnable IMAPD (1.54) STATUS Request Buffer Overflow
Disclosure Date: 2005-07-13First seen: 2020-04-26exploit/windows/imap/mailenable_statusMailEnable's IMAP server contains a buffer overflow vulnerability in the STATUS command. With proper credentials, this could allow for the execution of arbitrary code. Authors: - MC <mc@metasploit.com> -
MailEnable Authorization Header Buffer Overflow
Disclosure Date: 2005-04-24First seen: 2020-04-26exploit/windows/http/mailenable_auth_headerThis module exploits a remote buffer overflow in the MailEnable web service. The vulnerability is triggered when a large value is placed into the Authorization header of the web request. MailEnable Enterprise Edition versions prior to 1.0.5 and MailEnable Professional versions prior to 1.55 are affected. Authors: - David Maciejak <david.maciejak@kyxar.fr>
4 metasploit modules found
Please note: Metasploit modules are only matched by CVE numbers.
Visit metasploit web site for more details