PoC-in-GitHub/2003/CVE-2003-0264.json
2021-01-22 00:10:20 +09:00

140 lines
No EOL
4.9 KiB
JSON

[
{
"id": 115953667,
"name": "CVE-2003-0264",
"full_name": "adenkiewicz\/CVE-2003-0264",
"owner": {
"login": "adenkiewicz",
"id": 1060275,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1060275?v=4",
"html_url": "https:\/\/github.com\/adenkiewicz"
},
"html_url": "https:\/\/github.com\/adenkiewicz\/CVE-2003-0264",
"description": "Exploit for CVE-2003-0264 based on pwntools and metasploit's windows\/reverse_tcp",
"fork": false,
"created_at": "2018-01-01T22:49:13Z",
"updated_at": "2018-02-17T13:35:42Z",
"pushed_at": "2018-01-01T22:58:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 149023804,
"name": "slmail-exploit",
"full_name": "fyoderxx\/slmail-exploit",
"owner": {
"login": "fyoderxx",
"id": 31161670,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31161670?v=4",
"html_url": "https:\/\/github.com\/fyoderxx"
},
"html_url": "https:\/\/github.com\/fyoderxx\/slmail-exploit",
"description": "Exploit SLmail Buffer Overflow CVE-2003-0264",
"fork": false,
"created_at": "2018-09-16T18:27:16Z",
"updated_at": "2018-10-02T13:56:19Z",
"pushed_at": "2018-10-01T18:03:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 162499093,
"name": "CVE-2003-0264",
"full_name": "war4uthor\/CVE-2003-0264",
"owner": {
"login": "war4uthor",
"id": 45926018,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926018?v=4",
"html_url": "https:\/\/github.com\/war4uthor"
},
"html_url": "https:\/\/github.com\/war4uthor\/CVE-2003-0264",
"description": "CVE-2003-0264 - SLMail 5.5 POP3 'PASS' Remote Buffer Overflow Vulnerability. Tested on Windows XP Professional SP3.",
"fork": false,
"created_at": "2018-12-19T22:49:13Z",
"updated_at": "2018-12-19T22:50:49Z",
"pushed_at": "2018-12-19T22:50:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 247077498,
"name": "CVE-2003-0264-SLmail-5.5",
"full_name": "pwncone\/CVE-2003-0264-SLmail-5.5",
"owner": {
"login": "pwncone",
"id": 57570315,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57570315?v=4",
"html_url": "https:\/\/github.com\/pwncone"
},
"html_url": "https:\/\/github.com\/pwncone\/CVE-2003-0264-SLmail-5.5",
"description": "A POC remote buffer overflow for CVE-2003-0264 - SLMail 5.5",
"fork": false,
"created_at": "2020-03-13T13:27:56Z",
"updated_at": "2020-03-13T13:31:38Z",
"pushed_at": "2020-03-13T13:31:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 323381650,
"name": "CVE-2003-0264",
"full_name": "PepeTheRital\/CVE-2003-0264",
"owner": {
"login": "PepeTheRital",
"id": 65770864,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65770864?v=4",
"html_url": "https:\/\/github.com\/PepeTheRital"
},
"html_url": "https:\/\/github.com\/PepeTheRital\/CVE-2003-0264",
"description": "Exploit CVE-2003-0264 ",
"fork": false,
"created_at": "2020-12-21T15:52:32Z",
"updated_at": "2021-01-12T20:46:38Z",
"pushed_at": "2020-12-21T15:58:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 326101078,
"name": "pop3_SLmail-exploit",
"full_name": "medn1c\/pop3_SLmail-exploit",
"owner": {
"login": "medn1c",
"id": 74918589,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74918589?v=4",
"html_url": "https:\/\/github.com\/medn1c"
},
"html_url": "https:\/\/github.com\/medn1c\/pop3_SLmail-exploit",
"description": "Um exploit de buffer overflow para SLmail-5.5 pop3 service CVE-2003-0264 ",
"fork": false,
"created_at": "2021-01-02T03:30:54Z",
"updated_at": "2021-01-21T14:19:25Z",
"pushed_at": "2021-01-21T14:19:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]