• IpSwitch WhatsUp Gold TFTP Directory Traversal
    Disclosure Date: 2011-12-12
    First seen: 2020-04-26
    auxiliary/scanner/tftp/ipswitch_whatsupgold_tftp
    This modules exploits a directory traversal vulnerability in IpSwitch WhatsUp Gold's TFTP service. Authors: - Prabhu S Angadi - sinn3r <sinn3r@metasploit.com> - juan vazquez <juan.vazquez@metasploit.com>
  • Ipswitch IMail IMAP SEARCH Buffer Overflow
    Disclosure Date: 2007-07-18
    First seen: 2020-04-26
    exploit/windows/imap/ipswitch_search
    This module exploits a stack buffer overflow in Ipswitch IMail Server 2006.1 IMAP SEARCH verb. By sending an overly long string, an attacker can overwrite the buffer and control program execution. In order for this module to be successful, the IMAP user must have at least one message. Authors: - MC <mc@metasploit.com>
  • Ipswitch WS_FTP Server 5.05 XMD5 Overflow
    Disclosure Date: 2006-09-14
    First seen: 2020-04-26
    exploit/windows/ftp/wsftp_server_505_xmd5
    This module exploits a buffer overflow in the XMD5 verb in IPSWITCH WS_FTP Server 5.05. Authors: - MC <mc@metasploit.com>
  • WS-FTP Server 5.03 MKD Overflow
    Disclosure Date: 2004-11-29
    First seen: 2020-04-26
    exploit/windows/ftp/wsftp_server_503_mkd
    This module exploits the buffer overflow found in the MKD command in IPSWITCH WS_FTP Server 5.03 discovered by Reed Arvin. Authors: - et <et@metasploit.com> - Reed Arvin <reedarvin@gmail.com>
  • Mdaemon 8.0.3 IMAPD CRAM-MD5 Authentication Overflow
    Disclosure Date: 2004-11-12
    First seen: 2020-04-26
    exploit/windows/imap/mdaemon_cram_md5
    This module exploits a buffer overflow in the CRAM-MD5 authentication of the MDaemon IMAP service. This vulnerability was discovered by Muts. Authors: - Unknown
  • IMail IMAP4D Delete Overflow
    Disclosure Date: 2004-11-12
    First seen: 2020-04-26
    exploit/windows/imap/imail_delete
    This module exploits a buffer overflow in the 'DELETE' command of the IMail IMAP4D service. This vulnerability can only be exploited with a valid username and password. This flaw was patched in version 8.14. Authors: - spoonm <spoonm@no$email.com>
  • Ipswitch WhatsUp Gold 8.03 Buffer Overflow
    Disclosure Date: 2004-08-25
    First seen: 2020-04-26
    exploit/windows/http/ipswitch_wug_maincfgret
    This module exploits a buffer overflow in IPswitch WhatsUp Gold 8.03. By posting a long string for the value of 'instancename' in the _maincfgret.cgi script an attacker can overflow a buffer and execute arbitrary code on the system. Authors: - MC <mc@metasploit.com>
  • IMail LDAP Service Buffer Overflow
    Disclosure Date: 2004-02-17
    First seen: 2020-04-26
    exploit/windows/ldap/imail_thc
    This exploits a buffer overflow in the LDAP service that is part of the IMail product. This module was tested against version 7.10 and 8.5, both running on Windows 2000. Authors: - hdm <x@hdm.io>
8 metasploit modules found
Please note: Metasploit modules are only matched by CVE numbers. Visit metasploit web site for more details
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!