exploit-db-mirror/exploits/windows/dos/24103.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

15 lines
No EOL
567 B
Text

source: https://www.securityfocus.com/bid/10312/info
MailEnable is a commercially available POP3 and SMTP server for the Windows platform.
The 'Professional' and 'Enterprise' editions of MailEnable are reported to be prone to a remote heap buffer overflow. The overflow allows the attacker to control the EAX and ECX registers, allowing arbitrary code execution as SYSTEM.
All versions up to and including 1.18 are reported to be affected.
If logging is enabled, the request could contain:
GET /{4032 x A} HTTP/1.1
or, without logging:
GET /{8501 x A} HTTP/1.1