### [CVE-2003-0694](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0694) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c. ### POC #### Reference No PoCs from references. #### Github - https://github.com/AnyMaster/EQGRP - https://github.com/Badbug6/EQGRP - https://github.com/CKmaenn/EQGRP - https://github.com/CybernetiX-S3C/EQGRP_Linux - https://github.com/Drift-Security/Shadow_Brokers-Vs-NSA - https://github.com/IHA114/EQGRP - https://github.com/Mofty/EQGRP - https://github.com/MrAli-Code/EQGRP - https://github.com/Muhammd/EQGRP - https://github.com/Nekkidso/EQGRP - https://github.com/Ninja-Tw1sT/EQGRP - https://github.com/R3K1NG/ShadowBrokersFiles - https://github.com/Soldie/EQGRP-nasa - https://github.com/antiscammerarmy/ShadowBrokersFiles - https://github.com/byte-mug/cumes - https://github.com/cipherreborn/SB--.-HACK-the-EQGRP-1 - https://github.com/cyberheartmi9/EQGRP - https://github.com/hackcrypto/EQGRP - https://github.com/happysmack/x0rzEQGRP - https://github.com/kongjiexi/leaked2 - https://github.com/maxcvnd/bdhglopoj - https://github.com/namangangwar/EQGRP - https://github.com/r3p3r/x0rz-EQGRP - https://github.com/shakenetwork/shadowbrokerstuff - https://github.com/sinloss/EQGRP - https://github.com/thePevertedSpartan/EQ1 - https://github.com/thetrentus/EQGRP - https://github.com/thetrentus/ShadowBrokersStuff - https://github.com/thetrentusdev/shadowbrokerstuff - https://github.com/wuvuw/EQGR - https://github.com/x0rz/EQGRP