Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2003-0264 PoC — SLMail安全漏洞

Source
Associated Vulnerability
Title:SLMail安全漏洞 (CVE-2003-0264)
Description:Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execute arbitrary code via (1) a long EHLO argument to slmail.exe, (2) a long XTRN argument to slmail.exe, (3) a long string to POPPASSWD, or (4) a long password to the POP3 server.
Description
A POC remote buffer overflow for CVE-2003-0264 - SLMail 5.5
Readme
# CVE-2003-0264 - Seattle Lab Mail 5.5 POP3 Buffer Overflow

## References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0264

## Vulnerability
SLMail has no bounds checking when submitting a POP3 password.
As a result, you can execute arbitrary code by submitting a long, malformed POP3 PASS to the SLMail server.
File Snapshot

[4.0K] /data/pocs/6274a0839e9bc6e16e5fa569f2e65e36706ad40d ├── [ 324] README.md ├── [5.0K] slmail.py └── [4.0K] Software └── [8.8M] SLMail55_4433.exe 1 directory, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →