mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-28 01:04:30 +00:00
1.7 KiB
1.7 KiB
CVE-2018-6789
Description
An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely.
POC
Reference
- http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html
- http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html
- https://www.exploit-db.com/exploits/44571/
- https://www.exploit-db.com/exploits/44571/
- https://www.exploit-db.com/exploits/45671/
- https://www.exploit-db.com/exploits/45671/
Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/Stab1el/BAGUA
- https://github.com/beraphin/CVE-2018-6789
- https://github.com/c0llision/exim-vuln-poc
- https://github.com/ethan42/time-machine
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/lnick2023/nicenice
- https://github.com/martinclauss/exim-rce-cve-2018-6789
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/sereok3/buffer-overflow-writeups
- https://github.com/synacktiv/Exim-CVE-2018-6789
- https://github.com/thistehneisen/CVE-2018-6789-Python3
- https://github.com/windware1203/InfoSec_study
- https://github.com/xbl3/awesome-cve-poc_qazbnm456