### [CVE-2003-0264](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0264) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execute arbitrary code via (1) a long EHLO argument to slmail.exe, (2) a long XTRN argument to slmail.exe, (3) a long string to POPPASSWD, or (4) a long password to the POP3 server. ### POC #### Reference - http://packetstormsecurity.com/files/161526/SLMail-5.1.0.4420-Remote-Code-Execution.html #### Github - https://github.com/0x4D5352/rekall-penetration-test - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/SxNade/CVE-2003-0264_EXPLOIT - https://github.com/adenkiewicz/CVE-2003-0264 - https://github.com/cytopia/fuzza - https://github.com/fyoderxx/slmail-exploit - https://github.com/mednic/slmail-exploit - https://github.com/mussar0x4D5352/rekall-penetration-test - https://github.com/nobodyatall648/CVE-2003-0264 - https://github.com/pwncone/CVE-2003-0264-SLmail-5.5 - https://github.com/rosonsec/Exploits - https://github.com/vrikodar/CVE-2003-0264_EXPLOIT - https://github.com/war4uthor/CVE-2003-0264