Exploiting Apache James Server 2.3.2
>> ARCHIVE: 2016-07
Exploiting Apache James Server 2.3.2
NewsP Free News Script 1.4.7 – User Credentials Disclosure
newsp.eu PHP Calendar Script 1.0 – User Credentials Disclosure
Axis Communications MPQT/PACS 5.20.x – Server Side Include (SSI) Daemon Remote Format String Exploit
vBulletin 5.x/4.x – Persistent XSS in AdminCP/ApiLog via xmlrpc API (Post-Auth)
Internet Explorer 11 (on Windows 10) – VBScript Memory Corruption Proof-of-Concept Exploit (MS16-051)
DropBearSSHD <= 2015.71 – Command Injection
vBulletin 4.x – SQLi in breadcrumbs via xmlrpc API (Post-Auth)
OpenSSHD <= 7.2p2 – User Enumeration
http://provisgis.ntwo.moph.go.th/hunter.html notified by HUNT3RXM