Metasploit modules that can be used to exploit Ipswitch products
-
IpSwitch WhatsUp Gold TFTP Directory Traversal
Disclosure Date: 2011-12-12First seen: 2020-04-26auxiliary/scanner/tftp/ipswitch_whatsupgold_tftpThis modules exploits a directory traversal vulnerability in IpSwitch WhatsUp Gold's TFTP service. Authors: - Prabhu S Angadi - sinn3r <sinn3r@metasploit.com> - juan vazquez <juan.vazquez@metasploit.com> -
Ipswitch IMail IMAP SEARCH Buffer Overflow
Disclosure Date: 2007-07-18First seen: 2020-04-26exploit/windows/imap/ipswitch_searchThis module exploits a stack buffer overflow in Ipswitch IMail Server 2006.1 IMAP SEARCH verb. By sending an overly long string, an attacker can overwrite the buffer and control program execution. In order for this module to be successful, the IMAP user must have at least one message. Authors: - MC <mc@metasploit.com> -
Ipswitch WS_FTP Server 5.05 XMD5 Overflow
Disclosure Date: 2006-09-14First seen: 2020-04-26exploit/windows/ftp/wsftp_server_505_xmd5This module exploits a buffer overflow in the XMD5 verb in IPSWITCH WS_FTP Server 5.05. Authors: - MC <mc@metasploit.com> -
WS-FTP Server 5.03 MKD Overflow
Disclosure Date: 2004-11-29First seen: 2020-04-26exploit/windows/ftp/wsftp_server_503_mkdThis module exploits the buffer overflow found in the MKD command in IPSWITCH WS_FTP Server 5.03 discovered by Reed Arvin. Authors: - et <et@metasploit.com> - Reed Arvin <reedarvin@gmail.com> -
Mdaemon 8.0.3 IMAPD CRAM-MD5 Authentication Overflow
Disclosure Date: 2004-11-12First seen: 2020-04-26exploit/windows/imap/mdaemon_cram_md5This module exploits a buffer overflow in the CRAM-MD5 authentication of the MDaemon IMAP service. This vulnerability was discovered by Muts. Authors: - Unknown -
IMail IMAP4D Delete Overflow
Disclosure Date: 2004-11-12First seen: 2020-04-26exploit/windows/imap/imail_deleteThis module exploits a buffer overflow in the 'DELETE' command of the IMail IMAP4D service. This vulnerability can only be exploited with a valid username and password. This flaw was patched in version 8.14. Authors: - spoonm <spoonm@no$email.com> -
Ipswitch WhatsUp Gold 8.03 Buffer Overflow
Disclosure Date: 2004-08-25First seen: 2020-04-26exploit/windows/http/ipswitch_wug_maincfgretThis module exploits a buffer overflow in IPswitch WhatsUp Gold 8.03. By posting a long string for the value of 'instancename' in the _maincfgret.cgi script an attacker can overflow a buffer and execute arbitrary code on the system. Authors: - MC <mc@metasploit.com> -
IMail LDAP Service Buffer Overflow
Disclosure Date: 2004-02-17First seen: 2020-04-26exploit/windows/ldap/imail_thcThis exploits a buffer overflow in the LDAP service that is part of the IMail product. This module was tested against version 7.10 and 8.5, both running on Windows 2000. Authors: - hdm <x@hdm.io>
8 metasploit modules found
Please note: Metasploit modules are only matched by CVE numbers.
Visit metasploit web site for more details