This Metasploit module exploits a stack overflow in Hummingbird Connectivity 10 LPD Daemon. This Metasploit module has only been tested against Hummingbird Exceed v10 with SP5.
defa7313336e83b65e87c5e8f0502489a614709ada6f27a33e38b1f851bc4167
This Metasploit module exploits a stack overflow in the IBM Tivoli Storage Manager Express CAD Service (5.3.3). By sending an overly long GET request, it may be possible for an attacker to execute arbitrary code.
aa4c80c5e7fe58a924c7a1e241d145c06f6536a8898c31288bed7b74f5dc8b23
This Metasploit module exploits a stack overflow in IBM Access Support. When sending an overly long string to the GetXMLValue() method of IbmEgath.dll (3.20.284.0) an attacker may be able to execute arbitrary code.
ae89bc47ce4a110b625d4804e0b474e1977905e651b187e5f6987d00e50e120f
This Metasploit module exploits a stack overflow in Ipswitch IMail Server 2006.1 IMAP SEARCH verb. By sending an overly long string, an attacker can overwrite the buffer and control program execution. In order for this module to be successful, the IMAP user must have at least one message.
0757ecb74978f93cacdc4418ef7c38cab531545bd9b32a8f39f8239a920240bf
This Metasploit module exploits a buffer overflow in IPswitch WhatsUp Gold 8.03. By posting a long string for the value of 'instancename' in the _maincfgret.cgi script an attacker can overflow a buffer and execute arbitrary code on the system.
62eb863206132195a6a057fb1d894ec0ce16b0816953299778e3c89dca60d6d1
This Metasploit module exploits a stack overflow in the Altnet Download Manager ActiveX Control (amd4.dll) bundled with Kazaa Media Desktop 3.2.7. By sending a overly long string to the "Install()" method, an attacker may be able to execute arbitrary code.
5d1758e4f31cc274877c0af7ccfe4530b03057a15b64b22f74060f5ae4a1291e
This Metasploit module exploits a stack overflow in Kerio Personal Firewall administration authentication process. This Metasploit module has only been tested against Kerio Personal Firewall 2 (2.1.4).
edc1d978131e3581f43ad5e622fc1cab8073e286badc41b326604e4b3171fa04
This Metasploit module exploits a stack overflow in LANDesk Management Suite 8.7. By sending an overly long string to the Alert Service, a buffer is overwritten and arbitrary code can be executed.
712f990a9059b1a0f0767c92cadba2f532dad000c6b43637db954fb565ef2f99
This Metasploit module exploits a stack overflow in Computer Associates BrightStor ARCserve Backup for Laptops & Desktops 11.1. By sending a specially crafted request, an attacker could overflow the buffer and execute arbitrary code.
89dcdea6ef96bdeef448d96e7edf4c62c82b7760d1e36f0672ecbef437a5a680
This Metasploit module exploits a stack overflow in Computer Associates BrightStor ARCserve Backup for Laptops & Desktops 11.1. By sending a specially crafted request (rxsUseLicenseIni), an attacker could overflow the buffer and execute arbitrary code.
04d3e370cc91737108c6e8d608ebb3fcf78bcf946260e33678031f2bc2131d3d
This Metasploit module exploits a stack overflow in Computer Associates BrightStor ARCserve Backup for Laptops & Desktops 11.1. By sending a specially crafted request, an attacker could overflow the buffer and execute arbitrary code.
486a807e0edd6cfc7d817fc0b03a32b214d7c2d2f90cbffcbcf4d44c6e14eb11
This Metasploit module exploits a stack overflow in Computer Associates BrightStor ARCserve Backup 11.0. By sending a specially crafted request to the lic98rmtd.exe service, an attacker could overflow the buffer and execute arbitrary code.
f898147c81fee57073362e43dcc4cf5fc962db6fc16bd1958616572dabebacf6
This Metasploit module exploits a stack overflow in the Logitech VideoCall ActiveX Control (wcamxmp.dll 2.0.3470.448). By sending a overly long string to the "Start()" method, an attacker may be able to execute arbitrary code.
0c7b04e1f849ddc4850c9536ff8dd998900875f3fa62c18765a1cd7361e9fabc
This Metasploit module exploits a stack overflow in LPViewer ActiveX control (LPControll.dll 3.2.0.2). When sending an overly long string to the URL() property an attacker may be able to execute arbitrary code.
8b73bbe7717a92850dc76ef0bd0d73c8f530e698a6786eb3f40fa58199fc8aec
This Metasploit module exploits a stack overflow in Macrovision InstallShield Update Service(Isusweb.dll 6.0.100.54472). By passing an overly long ProductCode string to the DownloadAndExecute method, an attacker may be able to execute arbitrary code.
8fd766a299855ccac71b4bf2d08520f11d24d38e7c51849c1037d889c15caf21
This Metasploit module allows attackers to execute code via an unsafe methods in Macrovision InstallShield 2008.
4e580a205fec77ecdd48e346ed17a1dde6d1df5f7df8a18eff7102a08400ad01
MailEnable's IMAP server contains a buffer overflow vulnerability in the Login command.
a4eceb36c2639afe9fd1c656c7174c4475cb9596985d2e61b7f06f2ea8f79eea
MailEnable's IMAP server contains a buffer overflow vulnerability in the STATUS command. With proper credentials, this could allow for the execution of arbitrary code.
cf73368ca1456ebf0d123b52f99898904ccc211d943abcf2dbfe856cbeb1c9a1
This Metasploit module exploits a buffer overflow in the W3C logging functionality of the MailEnable IMAPD service. Logging is not enabled by default and this exploit requires a valid username and password to exploit the flaw. MailEnable Professional version 1.6 and prior and MailEnable Enterprise version 1.1 and prior are affected.
f9093da8a1312faacc61443924f7b363bb3f16f4dc7ce7d41e8c1a2f0e1338ae
This Metasploit module exploits a stack overflow in McAfee Remediation Agent 4.5.0.41. When sending an overly long string to the DeleteSnapshot() method of enginecom.dll (3.7.0.9) an attacker may be able to execute arbitrary code. This control is not marked safe for scripting, so choose your attack vector accordingly.
9abe850f29cf5b51dbe8ec828435c9333767d20de08835bb1df724f8f0fb5d57
This Metasploit module exploits a stack overflow in the McAfee Visual Trace 3.25 ActiveX Control (NeoTraceExplorer.dll 1.0.0.1). By sending a overly long string to the "TraceTarget()" method, an attacker may be able to execute arbitrary code.
1af505d58b6ecf4e14a93c0e01d4ebb141dd799f1e203a25a95e8968f3b52aed
This Metasploit module exploits a stack overflow in Atrium Mercur IMAP 5.0 SP3. Since the room for shellcode is small, using the reverse ordinal payloads yields the best results.
bcc9986727d1a31fd19c6ec9efeca29335e3bac2e984bdb32e707abede16b9c6
This Metasploit module exploits a stack overflow in Mercury Mail Transport System 4.51. By sending a specially crafted argument to the AUTH CRAM-MD5 command, an attacker may be able to execute arbitrary code.
b37bc5cd6705c8e20790a12b9fc47ac4078f2b49f9d0875bc28a3d33e2238c40
This Metasploit module exploits a stack overflow in Mercury/32 <= 4.01b IMAPD LOGIN verb. By sending a specially crafted login command, a buffer is corrupted, and code execution is possible. This vulnerability was discovered by (mu-b at digit-labs.org).
a60c2ea6e800b4665a534a6fa0d25415bdd4db2986f35c241060c6a2a5fd36f1
This Metasploit module exploits a stack-based buffer overflow in Mercury/32 <= v4.01b PH Server Module. This issue is due to a failure of the application to properly bounds check user-supplied data prior to copying it to a fixed size memory buffer.
e589673cea231d56221ebf93f38777c3c571ba6187848d18fb71e7da338a55b1