mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-09 11:05:39 +02:00
50 lines
1.9 KiB
Markdown
50 lines
1.9 KiB
Markdown
### [CVE-2001-0690](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0690)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
Format string vulnerability in exim (3.22-10 in Red Hat, 3.12 in Debian and 3.16 in Conectiva) in batched SMTP mode allows a remote attacker to execute arbitrary code via format strings in SMTP mail headers.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
No PoCs from references.
|
|
|
|
#### Github
|
|
- https://github.com/AnyMaster/EQGRP
|
|
- https://github.com/Badbug6/EQGRP
|
|
- https://github.com/CKmaenn/EQGRP
|
|
- https://github.com/CybernetiX-S3C/EQGRP_Linux
|
|
- https://github.com/Drift-Security/Shadow_Brokers-Vs-NSA
|
|
- https://github.com/IHA114/EQGRP
|
|
- https://github.com/Mofty/EQGRP
|
|
- https://github.com/MrAli-Code/EQGRP
|
|
- https://github.com/Muhammd/EQGRP
|
|
- https://github.com/Nekkidso/EQGRP
|
|
- https://github.com/Ninja-Tw1sT/EQGRP
|
|
- https://github.com/R3K1NG/ShadowBrokersFiles
|
|
- https://github.com/Soldie/EQGRP-nasa
|
|
- https://github.com/antiscammerarmy/ShadowBrokersFiles
|
|
- https://github.com/bensongithub/EQGRP
|
|
- https://github.com/bl4ck4t/Tools
|
|
- https://github.com/cipherreborn/SB--.-HACK-the-EQGRP-1
|
|
- https://github.com/cyberheartmi9/EQGRP
|
|
- https://github.com/hackcrypto/EQGRP
|
|
- https://github.com/happysmack/x0rzEQGRP
|
|
- https://github.com/kongjiexi/leaked2
|
|
- https://github.com/maxcvnd/bdhglopoj
|
|
- https://github.com/namangangwar/EQGRP
|
|
- https://github.com/r3p3r/x0rz-EQGRP
|
|
- https://github.com/readloud/EQGRP
|
|
- https://github.com/shakenetwork/shadowbrokerstuff
|
|
- https://github.com/sinloss/EQGRP
|
|
- https://github.com/thePevertedSpartan/EQ1
|
|
- https://github.com/thetrentus/EQGRP
|
|
- https://github.com/thetrentus/ShadowBrokersStuff
|
|
- https://github.com/thetrentusdev/shadowbrokerstuff
|
|
- https://github.com/wuvuw/EQGR
|
|
- https://github.com/x0rz/EQGRP
|
|
|