header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Novell iPrint Client ActiveX Control ExecuteRequest debug Buffer Overflow

This module exploits a stack-based buffer overflow in Novell iPrint Client 5.40. When sending an overly long string to the 'debug' parameter in ExecuteRequest() parsed by the ienipp.ocx ActiveX control, an attacker may be able to execute arbitrary code.

UltraVNC 1.0.1 Client Buffer Overflow

This module exploits a buffer overflow in UltraVNC Win32 Viewer 1.0.1 Release. It sends 980 bytes of payload encoded with 'Requires Ultr@VNC Authentication' followed by the return address and 'PASSWORD' string. The return address is followed by a negative offset of 997 bytes.

RealVNC 3.3.7 Client Buffer Overflow

This module exploits a buffer overflow in RealVNC 3.3.7 (vncviewer.exe). It sends a specially crafted packet to the VNCServer daemon port (5900) which contains a payload that is used to overwrite the return address of the stack frame and execute arbitrary code.

Ipswitch IMail IMAP SEARCH Buffer Overflow

This module exploits a stack buffer overflow in Ipswitch IMail Server 2006.1 IMAP SEARCH verb. By sending an overly long string, an attacker can overwrite the buffer and control program execution. In order for this module to be successful, the IMAP user must have at least one message.

Novell NetMail <=3.52d IMAP AUTHENTICATE Buffer Overflow

This module exploits a stack buffer overflow in Novell's NetMail 3.52 IMAP AUTHENTICATE GSSAPI command. By sending an overly long string, an attacker can overwrite the buffer and control program execution. Using the PAYLOAD of windows/shell_bind_tcp or windows/shell_reverse_tcp allows for the most reliable results.

MailEnable IMAPD (1.54) STATUS Request Buffer Overflow

MailEnable's IMAP server contains a buffer overflow vulnerability in the STATUS command. With proper credentials, this could allow for the execution of arbitrary code.

Recent Exploits: