mirror of
https://github.com/0xMarcio/cve.git
synced 2025-06-19 17:30:12 +00:00
31 lines
1.3 KiB
Markdown
31 lines
1.3 KiB
Markdown
![]() |
### [CVE-2003-0264](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0264)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execute arbitrary code via (1) a long EHLO argument to slmail.exe, (2) a long XTRN argument to slmail.exe, (3) a long string to POPPASSWD, or (4) a long password to the POP3 server.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://packetstormsecurity.com/files/161526/SLMail-5.1.0.4420-Remote-Code-Execution.html
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0x4D5352/rekall-penetration-test
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/CVEDB/PoC-List
|
||
|
- https://github.com/SxNade/CVE-2003-0264_EXPLOIT
|
||
|
- https://github.com/adenkiewicz/CVE-2003-0264
|
||
|
- https://github.com/cytopia/fuzza
|
||
|
- https://github.com/fyoderxx/slmail-exploit
|
||
|
- https://github.com/mednic/slmail-exploit
|
||
|
- https://github.com/mussar0x4D5352/rekall-penetration-test
|
||
|
- https://github.com/nobodyatall648/CVE-2003-0264
|
||
|
- https://github.com/pwncone/CVE-2003-0264-SLmail-5.5
|
||
|
- https://github.com/rosonsec/Exploits
|
||
|
- https://github.com/vrikodar/CVE-2003-0264_EXPLOIT
|
||
|
- https://github.com/war4uthor/CVE-2003-0264
|
||
|
|