[ { "id": 115953667, "name": "CVE-2003-0264", "full_name": "adenkiewicz\/CVE-2003-0264", "owner": { "login": "adenkiewicz", "id": 1060275, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1060275?v=4", "html_url": "https:\/\/github.com\/adenkiewicz" }, "html_url": "https:\/\/github.com\/adenkiewicz\/CVE-2003-0264", "description": "Exploit for CVE-2003-0264 based on pwntools and metasploit's windows\/reverse_tcp", "fork": false, "created_at": "2018-01-01T22:49:13Z", "updated_at": "2018-02-17T13:35:42Z", "pushed_at": "2018-01-01T22:58:27Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 149023804, "name": "slmail-exploit", "full_name": "fyoderxx\/slmail-exploit", "owner": { "login": "fyoderxx", "id": 31161670, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/31161670?v=4", "html_url": "https:\/\/github.com\/fyoderxx" }, "html_url": "https:\/\/github.com\/fyoderxx\/slmail-exploit", "description": "Exploit SLmail Buffer Overflow CVE-2003-0264", "fork": false, "created_at": "2018-09-16T18:27:16Z", "updated_at": "2018-10-02T13:56:19Z", "pushed_at": "2018-10-01T18:03:48Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 162499093, "name": "CVE-2003-0264", "full_name": "war4uthor\/CVE-2003-0264", "owner": { "login": "war4uthor", "id": 45926018, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/45926018?v=4", "html_url": "https:\/\/github.com\/war4uthor" }, "html_url": "https:\/\/github.com\/war4uthor\/CVE-2003-0264", "description": "CVE-2003-0264 - SLMail 5.5 POP3 'PASS' Remote Buffer Overflow Vulnerability. Tested on Windows XP Professional SP3.", "fork": false, "created_at": "2018-12-19T22:49:13Z", "updated_at": "2018-12-19T22:50:49Z", "pushed_at": "2018-12-19T22:50:48Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 } ]