PoC-in-GitHub/2020/CVE-2020-7247.json

281 lines
9.6 KiB
JSON
Raw Normal View History

2021-01-31 04:09:38 +01:00
[
2021-08-29 05:12:05 +02:00
{
"id": 237289178,
"name": "cve-2020-7247-exploit",
"full_name": "FiroSolutions\/cve-2020-7247-exploit",
"owner": {
"login": "FiroSolutions",
"id": 43434507,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43434507?v=4",
"html_url": "https:\/\/github.com\/FiroSolutions"
},
"html_url": "https:\/\/github.com\/FiroSolutions\/cve-2020-7247-exploit",
"description": "Python exploit of cve-2020-7247",
"fork": false,
"created_at": "2020-01-30T19:29:27Z",
2023-04-08 14:28:22 +02:00
"updated_at": "2023-04-08T07:52:46Z",
2021-08-29 05:12:05 +02:00
"pushed_at": "2020-02-19T10:55:15Z",
2023-04-08 14:28:22 +02:00
"stargazers_count": 26,
"watchers_count": 26,
2022-11-08 07:19:29 +01:00
"has_discussions": false,
2023-04-03 14:30:10 +02:00
"forks_count": 16,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required": false,
2021-10-06 23:13:51 +02:00
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2023-04-03 14:30:10 +02:00
"forks": 16,
2023-04-08 14:28:22 +02:00
"watchers": 26,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 2
2021-08-29 05:12:05 +02:00
},
{
"id": 241011451,
"name": "cve-2020-7247",
"full_name": "superzerosec\/cve-2020-7247",
"owner": {
"login": "superzerosec",
"id": 57648217,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4",
"html_url": "https:\/\/github.com\/superzerosec"
},
"html_url": "https:\/\/github.com\/superzerosec\/cve-2020-7247",
"description": "OpenSMTPD version 6.6.2 remote code execution exploit",
"fork": false,
"created_at": "2020-02-17T03:28:09Z",
2022-04-12 20:15:47 +02:00
"updated_at": "2022-04-12T14:01:55Z",
2022-01-16 01:13:45 +01:00
"pushed_at": "2022-01-15T19:37:31Z",
2022-04-12 20:15:47 +02:00
"stargazers_count": 4,
"watchers_count": 4,
2022-11-08 01:17:44 +01:00
"has_discussions": false,
2022-02-12 19:13:55 +01:00
"forks_count": 7,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required": false,
2021-10-06 23:13:51 +02:00
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2022-02-12 19:13:55 +01:00
"forks": 7,
2022-04-12 20:15:47 +02:00
"watchers": 4,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 2
2021-08-29 05:12:05 +02:00
},
{
"id": 241337606,
"name": "CVE-2020-7247",
"full_name": "r0lh\/CVE-2020-7247",
"owner": {
"login": "r0lh",
"id": 51697374,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51697374?v=4",
"html_url": "https:\/\/github.com\/r0lh"
},
"html_url": "https:\/\/github.com\/r0lh\/CVE-2020-7247",
"description": "Proof Of Concept Exploit for CVE-2020-7247 (Remote Execution on OpenSMTPD < 6.6.2",
"fork": false,
"created_at": "2020-02-18T10:52:38Z",
2021-12-06 01:13:08 +01:00
"updated_at": "2021-12-05T21:34:44Z",
2021-08-29 05:12:05 +02:00
"pushed_at": "2020-02-18T11:08:38Z",
2021-12-06 01:13:08 +01:00
"stargazers_count": 4,
"watchers_count": 4,
2022-11-08 07:19:29 +01:00
"has_discussions": false,
2021-12-06 01:13:08 +01:00
"forks_count": 1,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required": false,
2021-10-06 23:13:51 +02:00
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-12-06 01:13:08 +01:00
"forks": 1,
"watchers": 4,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 2
2023-01-07 01:35:14 +01:00
},
{
"id": 338516393,
"name": "CVE-2020-7247-exploit",
"full_name": "QTranspose\/CVE-2020-7247-exploit",
"owner": {
"login": "QTranspose",
"id": 54239699,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54239699?v=4",
"html_url": "https:\/\/github.com\/QTranspose"
},
"html_url": "https:\/\/github.com\/QTranspose\/CVE-2020-7247-exploit",
"description": "OpenSMTPD 6.4.0 - 6.6.1 Remote Code Execution PoC exploit",
"fork": false,
"created_at": "2021-02-13T06:57:47Z",
2023-02-08 13:42:23 +01:00
"updated_at": "2023-02-08T11:50:15Z",
2023-01-07 01:35:14 +01:00
"pushed_at": "2021-02-17T09:23:57Z",
2023-02-08 13:42:23 +01:00
"stargazers_count": 10,
"watchers_count": 10,
2023-01-07 01:35:14 +01:00
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
2023-02-08 13:42:23 +01:00
"watchers": 10,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 1
2023-01-07 01:35:14 +01:00
},
{
"id": 373152472,
"name": "CVE-2020-7247",
"full_name": "bytescrappers\/CVE-2020-7247",
"owner": {
"login": "bytescrappers",
"id": 85182327,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85182327?v=4",
"html_url": "https:\/\/github.com\/bytescrappers"
},
"html_url": "https:\/\/github.com\/bytescrappers\/CVE-2020-7247",
"description": "This vulnerability exists in OpenBSDs mail server OpenSMTPDs “smtp_mailaddr()” function, and affects OpenBSD version 6.6. This allows an attacker to execute arbitrary shell commands like “sleep 66” as root user",
"fork": false,
"created_at": "2021-06-02T12:02:33Z",
"updated_at": "2021-06-02T12:02:34Z",
"pushed_at": "2021-02-01T13:20:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 0
2023-01-07 01:35:14 +01:00
},
{
"id": 378352740,
"name": "CVE-2020-7247",
"full_name": "f4T1H21\/CVE-2020-7247",
"owner": {
"login": "f4T1H21",
"id": 83399767,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83399767?v=4",
"html_url": "https:\/\/github.com\/f4T1H21"
},
"html_url": "https:\/\/github.com\/f4T1H21\/CVE-2020-7247",
"description": "PoC exploit for CVE-2020-7247 OpenSMTPD 6.4.0 < 6.6.1 Remote Code Execution",
"fork": false,
"created_at": "2021-06-19T07:34:42Z",
"updated_at": "2021-07-10T11:26:09Z",
"pushed_at": "2021-07-10T11:26:06Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2020-7247",
"exploit",
"poc"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 1
2023-01-07 01:35:14 +01:00
},
{
"id": 432255271,
"name": "CVE-2020-7247-POC",
"full_name": "SimonSchoeni\/CVE-2020-7247-POC",
"owner": {
"login": "SimonSchoeni",
"id": 62761108,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62761108?v=4",
"html_url": "https:\/\/github.com\/SimonSchoeni"
},
"html_url": "https:\/\/github.com\/SimonSchoeni\/CVE-2020-7247-POC",
"description": "Proof of concept for CVE-2020-7247 for educational purposes.",
"fork": false,
"created_at": "2021-11-26T17:28:56Z",
"updated_at": "2022-04-19T14:27:37Z",
"pushed_at": "2022-01-20T18:36:05Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 1
2023-01-07 01:35:14 +01:00
},
{
"id": 456468236,
"name": "shai_hulud",
"full_name": "presentdaypresenttime\/shai_hulud",
"owner": {
"login": "presentdaypresenttime",
"id": 92856309,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92856309?v=4",
"html_url": "https:\/\/github.com\/presentdaypresenttime"
},
"html_url": "https:\/\/github.com\/presentdaypresenttime\/shai_hulud",
"description": "Worm written in python, abuses CVE-2020-7247",
"fork": false,
"created_at": "2022-02-07T10:59:36Z",
"updated_at": "2022-05-17T07:36:24Z",
"pushed_at": "2022-05-17T20:03:56Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 1
2023-06-05 08:34:43 +02:00
},
{
"id": 609009434,
"name": "CVE-2020-7247",
"full_name": "gatariee\/CVE-2020-7247",
"owner": {
"login": "gatariee",
"id": 79693291,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79693291?v=4",
"html_url": "https:\/\/github.com\/gatariee"
},
"html_url": "https:\/\/github.com\/gatariee\/CVE-2020-7247",
"description": "CVE-2020-7247 Remote Code Execution POC",
"fork": false,
"created_at": "2023-03-03T07:21:06Z",
"updated_at": "2023-03-04T12:35:47Z",
"pushed_at": "2023-03-04T11:03:13Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"go",
"python"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 1
2021-01-31 04:09:38 +01:00
}
]