Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-11395 PoC — Taps Lab MailCarrier 缓冲区错误漏洞

Source
Associated Vulnerability
Title:Taps Lab MailCarrier 缓冲区错误漏洞 (CVE-2019-11395)
Description:A buffer overflow in MailCarrier 2.51 allows remote attackers to execute arbitrary code via a long string, as demonstrated by SMTP RCPT TO, POP3 USER, POP3 LIST, POP3 TOP, or POP3 RETR.
Description
MailCarrier 2.51 - POP3 'USER' Buffer Overflow
Readme
https://www.exploit-db.com/exploits/47554

기존에 있던, Python2 버전의 코드를 Python3 형식에 맞게 수정한 버전입니다
Bad Character는 동일하게 사용하시되, Payload는 각자 환경에 맞게, msfvenom을 통해서 작성하면 됩니다 ! 
File Snapshot

[4.0K] /data/pocs/86822f3f05ab7a2b2fcad26274d968cbb360da4c ├── [2.6K] mailserver_bof_최종본.py └── [ 271] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →