Format string vulnerability in exim (3.22-10 in Red Hat, 3.12 in Debian and 3.16 in Conectiva) in batched SMTP mode allows a remote attacker to execute arbitrary code via format strings in SMTP mail headers.
No PoCs from references.
- https://github.com/AnyMaster/EQGRP
- https://github.com/Badbug6/EQGRP
- https://github.com/CKmaenn/EQGRP
- https://github.com/CybernetiX-S3C/EQGRP_Linux
- https://github.com/Drift-Security/Shadow_Brokers-Vs-NSA
- https://github.com/IHA114/EQGRP
- https://github.com/Mofty/EQGRP
- https://github.com/Muhammd/EQGRP
- https://github.com/Nekkidso/EQGRP
- https://github.com/Ninja-Tw1sT/EQGRP
- https://github.com/R3K1NG/ShadowBrokersFiles
- https://github.com/Soldie/EQGRP-nasa
- https://github.com/antiscammerarmy/ShadowBrokersFiles
- https://github.com/bensongithub/EQGRP
- https://github.com/bl4ck4t/Tools
- https://github.com/cipherreborn/SB--.-HACK-the-EQGRP-1
- https://github.com/cyberheartmi9/EQGRP
- https://github.com/hackcrypto/EQGRP
- https://github.com/happysmack/x0rzEQGRP
- https://github.com/kongjiexi/leaked2
- https://github.com/maxcvnd/bdhglopoj
- https://github.com/namangangwar/EQGRP
- https://github.com/r3p3r/x0rz-EQGRP
- https://github.com/readloud/EQGRP
- https://github.com/shakenetwork/shadowbrokerstuff
- https://github.com/sinloss/EQGRP
- https://github.com/thePevertedSpartan/EQ1
- https://github.com/thetrentus/EQGRP
- https://github.com/thetrentus/ShadowBrokersStuff
- https://github.com/thetrentusdev/shadowbrokerstuff
- https://github.com/wuvuw/EQGR
- https://github.com/x0rz/EQGRP