This module allows remote attackers to place arbitrary files on a users file system by abusing the "Comp_Download" method in the SAP KWEdit ActiveX Control (kwedit.dll 6400.1.1.41).
This module exploits a stack-based buffer overflow in Novell iPrint Client 5.40. When sending an overly long string to the 'debug' parameter in ExecuteRequest() parsed by the ienipp.ocx ActiveX control, an attacker may be able to execute arbitrary code.
This module exploits a buffer overflow in UltraVNC Win32 Viewer 1.0.1 Release. It sends 980 bytes of payload encoded with 'Requires Ultr@VNC Authentication' followed by the return address and 'PASSWORD' string. The return address is followed by a negative offset of 997 bytes.
This module exploits a buffer overflow in RealVNC 3.3.7 (vncviewer.exe). It sends a specially crafted packet to the VNCServer daemon port (5900) which contains a payload that is used to overwrite the return address of the stack frame and execute arbitrary code.
This module exploits a stack buffer overflow in Novell's Netmail 3.52 IMAP APPEND verb. By sending an overly long string, an attacker can overwrite the buffer and control program execution.
This module exploits a stack buffer overflow in Ipswitch IMail Server 2006.1 IMAP SEARCH verb. By sending an overly long string, an attacker can overwrite the buffer and control program execution. In order for this module to be successful, the IMAP user must have at least one message.
This module exploits a stack buffer overflow in Novell's NetMail 3.52 IMAP AUTHENTICATE GSSAPI command. By sending an overly long string, an attacker can overwrite the buffer and control program execution. Using the PAYLOAD of windows/shell_bind_tcp or windows/shell_reverse_tcp allows for the most reliable results.
MailEnable's IMAP server contains a buffer overflow vulnerability in the STATUS command. With proper credentials, this could allow for the execution of arbitrary code.
This module exploits a stack buffer overflow vulnerability in the Mercury/32 v.4.01a IMAP service.
This module exploits a stack buffer overflow in Novell's Netmail 3.52 IMAP STATUS verb. By sending an overly long string, an attacker can overwrite the buffer and control program execution.