mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2021/02/19 12:08:48
This commit is contained in:
parent
c477f27dae
commit
d07e557a75
20 changed files with 209 additions and 104 deletions
25
2003/CVE-2003-0222.json
Normal file
25
2003/CVE-2003-0222.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 164414012,
|
||||
"name": "CVE-2003-0222",
|
||||
"full_name": "phamthanhsang280477\/CVE-2003-0222",
|
||||
"owner": {
|
||||
"login": "phamthanhsang280477",
|
||||
"id": 45278781,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45278781?v=4",
|
||||
"html_url": "https:\/\/github.com\/phamthanhsang280477"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/phamthanhsang280477\/CVE-2003-0222",
|
||||
"description": "CVE-2003-0222",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-07T10:09:07Z",
|
||||
"updated_at": "2019-01-07T10:09:07Z",
|
||||
"pushed_at": "2019-01-07T10:09:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -44,5 +44,97 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 162499093,
|
||||
"name": "CVE-2003-0264",
|
||||
"full_name": "war4uthor\/CVE-2003-0264",
|
||||
"owner": {
|
||||
"login": "war4uthor",
|
||||
"id": 45926018,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926018?v=4",
|
||||
"html_url": "https:\/\/github.com\/war4uthor"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/war4uthor\/CVE-2003-0264",
|
||||
"description": "CVE-2003-0264 - SLMail 5.5 POP3 'PASS' Remote Buffer Overflow Vulnerability. Tested on Windows XP Professional SP3.",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-19T22:49:13Z",
|
||||
"updated_at": "2018-12-19T22:50:49Z",
|
||||
"pushed_at": "2018-12-19T22:50:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 247077498,
|
||||
"name": "CVE-2003-0264-SLmail-5.5",
|
||||
"full_name": "pwncone\/CVE-2003-0264-SLmail-5.5",
|
||||
"owner": {
|
||||
"login": "pwncone",
|
||||
"id": 57570315,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57570315?v=4",
|
||||
"html_url": "https:\/\/github.com\/pwncone"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pwncone\/CVE-2003-0264-SLmail-5.5",
|
||||
"description": "A POC remote buffer overflow for CVE-2003-0264 - SLMail 5.5",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-13T13:27:56Z",
|
||||
"updated_at": "2020-03-13T13:31:38Z",
|
||||
"pushed_at": "2020-03-13T13:31:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 323381650,
|
||||
"name": "CVE-2003-0264",
|
||||
"full_name": "PepeTheRital\/CVE-2003-0264",
|
||||
"owner": {
|
||||
"login": "PepeTheRital",
|
||||
"id": 65770864,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65770864?v=4",
|
||||
"html_url": "https:\/\/github.com\/PepeTheRital"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PepeTheRital\/CVE-2003-0264",
|
||||
"description": "Exploit CVE-2003-0264 ",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-21T15:52:32Z",
|
||||
"updated_at": "2021-01-12T20:46:38Z",
|
||||
"pushed_at": "2020-12-21T15:58:46Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 326101078,
|
||||
"name": "pop3_SLmail-exploit",
|
||||
"full_name": "medn1c\/pop3_SLmail-exploit",
|
||||
"owner": {
|
||||
"login": "medn1c",
|
||||
"id": 74918589,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74918589?v=4",
|
||||
"html_url": "https:\/\/github.com\/medn1c"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/medn1c\/pop3_SLmail-exploit",
|
||||
"description": "Um exploit de buffer overflow para SLmail-5.5 pop3 service CVE-2003-0264 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-02T03:30:54Z",
|
||||
"updated_at": "2021-02-11T18:07:18Z",
|
||||
"pushed_at": "2021-02-11T18:07:15Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "海康威视未授权访问检测poc及口令爆破",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-12T09:02:10Z",
|
||||
"updated_at": "2021-01-08T07:10:54Z",
|
||||
"updated_at": "2021-02-19T02:51:44Z",
|
||||
"pushed_at": "2020-11-19T08:58:04Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Test CVE-2018-0296 and extract usernames",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-21T08:36:34Z",
|
||||
"updated_at": "2020-11-13T03:19:23Z",
|
||||
"updated_at": "2021-02-19T00:12:27Z",
|
||||
"pushed_at": "2018-12-09T11:57:20Z",
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 105,
|
||||
"watchers": 106,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2018-15133 (Laravel unserialize vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-14T18:51:50Z",
|
||||
"updated_at": "2021-02-18T11:32:01Z",
|
||||
"updated_at": "2021-02-18T21:55:28Z",
|
||||
"pushed_at": "2018-09-27T07:32:19Z",
|
||||
"stargazers_count": 215,
|
||||
"watchers_count": 215,
|
||||
"stargazers_count": 216,
|
||||
"watchers_count": 216,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 215,
|
||||
"watchers": 216,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -473,8 +473,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-18T14:01:59Z",
|
||||
"updated_at": "2021-02-18T15:18:54Z",
|
||||
"pushed_at": "2021-02-18T15:18:52Z",
|
||||
"updated_at": "2021-02-19T02:55:48Z",
|
||||
"pushed_at": "2021-02-19T02:55:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -67,5 +67,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 340239658,
|
||||
"name": "CVE-2019-1458",
|
||||
"full_name": "Eternit7\/CVE-2019-1458",
|
||||
"owner": {
|
||||
"login": "Eternit7",
|
||||
"id": 30485227,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30485227?v=4",
|
||||
"html_url": "https:\/\/github.com\/Eternit7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Eternit7\/CVE-2019-1458",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-19T02:44:27Z",
|
||||
"updated_at": "2021-02-19T02:44:27Z",
|
||||
"pushed_at": "2021-02-19T02:44:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 172401532,
|
||||
"name": "CVE-2019-7238",
|
||||
"full_name": "mpgn\/CVE-2019-7238",
|
||||
"owner": {
|
||||
"login": "mpgn",
|
||||
"id": 5891788,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5891788?v=4",
|
||||
"html_url": "https:\/\/github.com\/mpgn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mpgn\/CVE-2019-7238",
|
||||
"description": "🐱💻 Poc of CVE-2019-7238 - Nexus Repository Manager 3 Remote Code Execution 🐱💻",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-24T23:09:43Z",
|
||||
"updated_at": "2020-12-30T11:55:07Z",
|
||||
"pushed_at": "2019-02-25T07:37:07Z",
|
||||
"stargazers_count": 137,
|
||||
"watchers_count": 137,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"watchers": 137,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 187840869,
|
||||
"name": "CVE-2019-7238",
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-12T06:02:06Z",
|
||||
"updated_at": "2021-01-26T14:22:10Z",
|
||||
"updated_at": "2021-02-19T00:40:16Z",
|
||||
"pushed_at": "2019-05-09T21:34:26Z",
|
||||
"stargazers_count": 532,
|
||||
"watchers_count": 532,
|
||||
"stargazers_count": 533,
|
||||
"watchers_count": 533,
|
||||
"forks_count": 112,
|
||||
"forks": 112,
|
||||
"watchers": 532,
|
||||
"watchers": 533,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-03-23T09:10:54Z",
|
||||
"updated_at": "2021-02-16T13:52:27Z",
|
||||
"pushed_at": "2020-03-24T13:22:30Z",
|
||||
"pushed_at": "2021-02-18T21:29:07Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 4,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-29T19:02:29Z",
|
||||
"updated_at": "2021-02-18T13:48:46Z",
|
||||
"updated_at": "2021-02-19T01:21:41Z",
|
||||
"pushed_at": "2020-11-11T19:48:38Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-05-25T08:33:24Z",
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 88,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-09-25T20:55:17Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-36179~82 Jackson-databind SSRF&RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-10T06:47:49Z",
|
||||
"updated_at": "2021-01-28T11:16:56Z",
|
||||
"updated_at": "2021-02-19T01:20:44Z",
|
||||
"pushed_at": "2021-01-10T06:48:53Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 58,
|
||||
"watchers": 59,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -83,7 +83,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-02-24T14:32:24Z",
|
||||
"updated_at": "2020-05-31T05:18:22Z",
|
||||
"pushed_at": "2020-02-28T09:12:59Z",
|
||||
"pushed_at": "2021-02-18T21:26:56Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-15T14:41:25Z",
|
||||
"updated_at": "2021-02-17T23:54:48Z",
|
||||
"updated_at": "2021-02-18T22:36:00Z",
|
||||
"pushed_at": "2021-02-15T15:11:00Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -90,28 +90,5 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 340008922,
|
||||
"name": "apache_druid_rce_CVE-2021-25646",
|
||||
"full_name": "hoanx4\/apache_druid_rce_CVE-2021-25646",
|
||||
"owner": {
|
||||
"login": "hoanx4",
|
||||
"id": 54475792,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54475792?v=4",
|
||||
"html_url": "https:\/\/github.com\/hoanx4"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hoanx4\/apache_druid_rce_CVE-2021-25646",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-18T10:08:55Z",
|
||||
"updated_at": "2021-02-18T17:09:34Z",
|
||||
"pushed_at": "2021-02-18T17:09:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -151,13 +151,13 @@
|
|||
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-18T05:42:13Z",
|
||||
"updated_at": "2021-02-18T19:01:33Z",
|
||||
"updated_at": "2021-02-19T00:36:59Z",
|
||||
"pushed_at": "2021-02-18T08:30:23Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -335,13 +335,13 @@
|
|||
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T03:22:04Z",
|
||||
"updated_at": "2021-02-18T08:27:40Z",
|
||||
"updated_at": "2021-02-18T23:13:15Z",
|
||||
"pushed_at": "2021-02-08T03:42:50Z",
|
||||
"stargazers_count": 340,
|
||||
"watchers_count": 340,
|
||||
"stargazers_count": 341,
|
||||
"watchers_count": 341,
|
||||
"forks_count": 91,
|
||||
"forks": 91,
|
||||
"watchers": 340,
|
||||
"watchers": 341,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -381,13 +381,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2021-02-18T09:18:47Z",
|
||||
"updated_at": "2021-02-18T23:16:33Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 590,
|
||||
"watchers_count": 590,
|
||||
"stargazers_count": 591,
|
||||
"watchers_count": 591,
|
||||
"forks_count": 165,
|
||||
"forks": 165,
|
||||
"watchers": 590,
|
||||
"watchers": 591,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -749,13 +749,13 @@
|
|||
"description": "Exploit for Sudo heap overflow (CVE-2021-3156) on Debain 10",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-08T18:21:58Z",
|
||||
"updated_at": "2021-02-18T02:53:22Z",
|
||||
"updated_at": "2021-02-19T01:41:44Z",
|
||||
"pushed_at": "2021-02-10T10:15:53Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -818,13 +818,13 @@
|
|||
"description": "CVE-2021-3156非交互式执行命令",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-09T19:25:18Z",
|
||||
"updated_at": "2021-02-18T16:47:35Z",
|
||||
"updated_at": "2021-02-19T01:18:02Z",
|
||||
"pushed_at": "2021-02-09T19:31:33Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 106,
|
||||
"watchers": 107,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
15
README.md
15
README.md
|
@ -199,7 +199,6 @@ Apache Druid includes the ability to execute user-provided JavaScript code embed
|
|||
- [lp008/CVE-2021-25646](https://github.com/lp008/CVE-2021-25646)
|
||||
- [AirEvan/CVE-2021-25646-GUI](https://github.com/AirEvan/CVE-2021-25646-GUI)
|
||||
- [Vulnmachines/Apache-Druid-CVE-2021-25646](https://github.com/Vulnmachines/Apache-Druid-CVE-2021-25646)
|
||||
- [hoanx4/apache_druid_rce_CVE-2021-25646](https://github.com/hoanx4/apache_druid_rce_CVE-2021-25646)
|
||||
|
||||
### CVE-2021-26121
|
||||
- [sourceincite/CVE-2021-26121](https://github.com/sourceincite/CVE-2021-26121)
|
||||
|
@ -4564,6 +4563,7 @@ An elevation of privilege vulnerability exists in Windows when the Win32k compon
|
|||
- [piotrflorczyk/cve-2019-1458_POC](https://github.com/piotrflorczyk/cve-2019-1458_POC)
|
||||
- [unamer/CVE-2019-1458](https://github.com/unamer/CVE-2019-1458)
|
||||
- [DreamoneOnly/CVE-2019-1458-malware](https://github.com/DreamoneOnly/CVE-2019-1458-malware)
|
||||
- [Eternit7/CVE-2019-1458](https://github.com/Eternit7/CVE-2019-1458)
|
||||
|
||||
### CVE-2019-1476 (2019-12-10)
|
||||
|
||||
|
@ -5177,7 +5177,6 @@ Unauthenticated reflected cross-site scripting (XSS) exists in Zarafa Webapp 2.0
|
|||
Sonatype Nexus Repository Manager before 3.15.0 has Incorrect Access Control.
|
||||
</code>
|
||||
|
||||
- [mpgn/CVE-2019-7238](https://github.com/mpgn/CVE-2019-7238)
|
||||
- [jas502n/CVE-2019-7238](https://github.com/jas502n/CVE-2019-7238)
|
||||
- [verctor/nexus_rce_CVE-2019-7238](https://github.com/verctor/nexus_rce_CVE-2019-7238)
|
||||
- [magicming200/CVE-2019-7238_Nexus_RCE_Tool](https://github.com/magicming200/CVE-2019-7238_Nexus_RCE_Tool)
|
||||
|
@ -17130,6 +17129,14 @@ Nortel Wireless LAN (WLAN) Access Point (AP) 2220, 2221, and 2225 allow remote a
|
|||
|
||||
|
||||
## 2003
|
||||
### CVE-2003-0222 (2003-04-30)
|
||||
|
||||
<code>
|
||||
Stack-based buffer overflow in Oracle Net Services for Oracle Database Server 9i release 2 and earlier allows attackers to execute arbitrary code via a "CREATE DATABASE LINK" query containing a connect string with a long USING parameter.
|
||||
</code>
|
||||
|
||||
- [phamthanhsang280477/CVE-2003-0222](https://github.com/phamthanhsang280477/CVE-2003-0222)
|
||||
|
||||
### CVE-2003-0264 (2003-05-08)
|
||||
|
||||
<code>
|
||||
|
@ -17138,6 +17145,10 @@ Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execut
|
|||
|
||||
- [adenkiewicz/CVE-2003-0264](https://github.com/adenkiewicz/CVE-2003-0264)
|
||||
- [fyoderxx/slmail-exploit](https://github.com/fyoderxx/slmail-exploit)
|
||||
- [war4uthor/CVE-2003-0264](https://github.com/war4uthor/CVE-2003-0264)
|
||||
- [pwncone/CVE-2003-0264-SLmail-5.5](https://github.com/pwncone/CVE-2003-0264-SLmail-5.5)
|
||||
- [PepeTheRital/CVE-2003-0264](https://github.com/PepeTheRital/CVE-2003-0264)
|
||||
- [medn1c/pop3_SLmail-exploit](https://github.com/medn1c/pop3_SLmail-exploit)
|
||||
|
||||
### CVE-2003-0282 (2003-05-14)
|
||||
|
||||
|
|
Loading…
Reference in a new issue