2021-01-31 04:09:38 +01:00
[
2021-08-29 05:12:05 +02:00
{
"id" : 237289178 ,
"name" : "cve-2020-7247-exploit" ,
"full_name" : "FiroSolutions\/cve-2020-7247-exploit" ,
"owner" : {
"login" : "FiroSolutions" ,
"id" : 43434507 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/43434507?v=4" ,
"html_url" : "https:\/\/github.com\/FiroSolutions"
} ,
"html_url" : "https:\/\/github.com\/FiroSolutions\/cve-2020-7247-exploit" ,
"description" : "Python exploit of cve-2020-7247" ,
"fork" : false ,
"created_at" : "2020-01-30T19:29:27Z" ,
2023-04-08 14:28:22 +02:00
"updated_at" : "2023-04-08T07:52:46Z" ,
2021-08-29 05:12:05 +02:00
"pushed_at" : "2020-02-19T10:55:15Z" ,
2023-04-08 14:28:22 +02:00
"stargazers_count" : 26 ,
"watchers_count" : 26 ,
2022-11-08 07:19:29 +01:00
"has_discussions" : false ,
2023-04-03 14:30:10 +02:00
"forks_count" : 16 ,
2021-09-13 23:12:57 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required" : false ,
2021-10-06 23:13:51 +02:00
"topics" : [ ] ,
2021-10-01 23:13:10 +02:00
"visibility" : "public" ,
2023-04-03 14:30:10 +02:00
"forks" : 16 ,
2023-04-08 14:28:22 +02:00
"watchers" : 26 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 2
2021-08-29 05:12:05 +02:00
} ,
{
"id" : 241011451 ,
"name" : "cve-2020-7247" ,
"full_name" : "superzerosec\/cve-2020-7247" ,
"owner" : {
"login" : "superzerosec" ,
"id" : 57648217 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4" ,
"html_url" : "https:\/\/github.com\/superzerosec"
} ,
"html_url" : "https:\/\/github.com\/superzerosec\/cve-2020-7247" ,
"description" : "OpenSMTPD version 6.6.2 remote code execution exploit" ,
"fork" : false ,
"created_at" : "2020-02-17T03:28:09Z" ,
2022-04-12 20:15:47 +02:00
"updated_at" : "2022-04-12T14:01:55Z" ,
2022-01-16 01:13:45 +01:00
"pushed_at" : "2022-01-15T19:37:31Z" ,
2022-04-12 20:15:47 +02:00
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
2022-11-08 01:17:44 +01:00
"has_discussions" : false ,
2022-02-12 19:13:55 +01:00
"forks_count" : 7 ,
2021-09-13 23:12:57 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required" : false ,
2021-10-06 23:13:51 +02:00
"topics" : [ ] ,
2021-10-01 23:13:10 +02:00
"visibility" : "public" ,
2022-02-12 19:13:55 +01:00
"forks" : 7 ,
2022-04-12 20:15:47 +02:00
"watchers" : 4 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 2
2021-08-29 05:12:05 +02:00
} ,
{
"id" : 241337606 ,
"name" : "CVE-2020-7247" ,
"full_name" : "r0lh\/CVE-2020-7247" ,
"owner" : {
"login" : "r0lh" ,
"id" : 51697374 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/51697374?v=4" ,
"html_url" : "https:\/\/github.com\/r0lh"
} ,
"html_url" : "https:\/\/github.com\/r0lh\/CVE-2020-7247" ,
"description" : "Proof Of Concept Exploit for CVE-2020-7247 (Remote Execution on OpenSMTPD < 6.6.2" ,
"fork" : false ,
"created_at" : "2020-02-18T10:52:38Z" ,
2021-12-06 01:13:08 +01:00
"updated_at" : "2021-12-05T21:34:44Z" ,
2021-08-29 05:12:05 +02:00
"pushed_at" : "2020-02-18T11:08:38Z" ,
2021-12-06 01:13:08 +01:00
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
2022-11-08 07:19:29 +01:00
"has_discussions" : false ,
2021-12-06 01:13:08 +01:00
"forks_count" : 1 ,
2021-09-13 23:12:57 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required" : false ,
2021-10-06 23:13:51 +02:00
"topics" : [ ] ,
2021-10-01 23:13:10 +02:00
"visibility" : "public" ,
2021-12-06 01:13:08 +01:00
"forks" : 1 ,
"watchers" : 4 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 2
2023-01-07 01:35:14 +01:00
} ,
{
"id" : 338516393 ,
"name" : "CVE-2020-7247-exploit" ,
"full_name" : "QTranspose\/CVE-2020-7247-exploit" ,
"owner" : {
"login" : "QTranspose" ,
"id" : 54239699 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/54239699?v=4" ,
"html_url" : "https:\/\/github.com\/QTranspose"
} ,
"html_url" : "https:\/\/github.com\/QTranspose\/CVE-2020-7247-exploit" ,
"description" : "OpenSMTPD 6.4.0 - 6.6.1 Remote Code Execution PoC exploit" ,
"fork" : false ,
"created_at" : "2021-02-13T06:57:47Z" ,
2023-02-08 13:42:23 +01:00
"updated_at" : "2023-02-08T11:50:15Z" ,
2023-01-07 01:35:14 +01:00
"pushed_at" : "2021-02-17T09:23:57Z" ,
2023-02-08 13:42:23 +01:00
"stargazers_count" : 10 ,
"watchers_count" : 10 ,
2023-01-07 01:35:14 +01:00
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
2023-02-08 13:42:23 +01:00
"watchers" : 10 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-01-07 01:35:14 +01:00
} ,
{
"id" : 373152472 ,
"name" : "CVE-2020-7247" ,
"full_name" : "bytescrappers\/CVE-2020-7247" ,
"owner" : {
"login" : "bytescrappers" ,
"id" : 85182327 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/85182327?v=4" ,
"html_url" : "https:\/\/github.com\/bytescrappers"
} ,
"html_url" : "https:\/\/github.com\/bytescrappers\/CVE-2020-7247" ,
"description" : "This vulnerability exists in OpenBSD’ s mail server OpenSMTPD’ s “smtp_mailaddr()” function, and affects OpenBSD version 6.6. This allows an attacker to execute arbitrary shell commands like “sleep 66” as root user" ,
"fork" : false ,
"created_at" : "2021-06-02T12:02:33Z" ,
"updated_at" : "2021-06-02T12:02:34Z" ,
"pushed_at" : "2021-02-01T13:20:06Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 0
2023-01-07 01:35:14 +01:00
} ,
{
"id" : 378352740 ,
"name" : "CVE-2020-7247" ,
"full_name" : "f4T1H21\/CVE-2020-7247" ,
"owner" : {
"login" : "f4T1H21" ,
"id" : 83399767 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/83399767?v=4" ,
"html_url" : "https:\/\/github.com\/f4T1H21"
} ,
"html_url" : "https:\/\/github.com\/f4T1H21\/CVE-2020-7247" ,
"description" : "PoC exploit for CVE-2020-7247 OpenSMTPD 6.4.0 < 6.6.1 Remote Code Execution" ,
"fork" : false ,
"created_at" : "2021-06-19T07:34:42Z" ,
"updated_at" : "2021-07-10T11:26:09Z" ,
"pushed_at" : "2021-07-10T11:26:06Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve" ,
"cve-2020-7247" ,
"exploit" ,
"poc"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-01-07 01:35:14 +01:00
} ,
{
"id" : 432255271 ,
"name" : "CVE-2020-7247-POC" ,
"full_name" : "SimonSchoeni\/CVE-2020-7247-POC" ,
"owner" : {
"login" : "SimonSchoeni" ,
"id" : 62761108 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/62761108?v=4" ,
"html_url" : "https:\/\/github.com\/SimonSchoeni"
} ,
"html_url" : "https:\/\/github.com\/SimonSchoeni\/CVE-2020-7247-POC" ,
"description" : "Proof of concept for CVE-2020-7247 for educational purposes." ,
"fork" : false ,
"created_at" : "2021-11-26T17:28:56Z" ,
"updated_at" : "2022-04-19T14:27:37Z" ,
"pushed_at" : "2022-01-20T18:36:05Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-01-07 01:35:14 +01:00
} ,
{
"id" : 456468236 ,
"name" : "shai_hulud" ,
"full_name" : "presentdaypresenttime\/shai_hulud" ,
"owner" : {
"login" : "presentdaypresenttime" ,
"id" : 92856309 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/92856309?v=4" ,
"html_url" : "https:\/\/github.com\/presentdaypresenttime"
} ,
"html_url" : "https:\/\/github.com\/presentdaypresenttime\/shai_hulud" ,
"description" : "Worm written in python, abuses CVE-2020-7247" ,
"fork" : false ,
"created_at" : "2022-02-07T10:59:36Z" ,
"updated_at" : "2022-05-17T07:36:24Z" ,
"pushed_at" : "2022-05-17T20:03:56Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-06-05 08:34:43 +02:00
} ,
{
"id" : 609009434 ,
"name" : "CVE-2020-7247" ,
"full_name" : "gatariee\/CVE-2020-7247" ,
"owner" : {
"login" : "gatariee" ,
"id" : 79693291 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/79693291?v=4" ,
"html_url" : "https:\/\/github.com\/gatariee"
} ,
"html_url" : "https:\/\/github.com\/gatariee\/CVE-2020-7247" ,
"description" : "CVE-2020-7247 Remote Code Execution POC" ,
"fork" : false ,
"created_at" : "2023-03-03T07:21:06Z" ,
"updated_at" : "2023-03-04T12:35:47Z" ,
"pushed_at" : "2023-03-04T11:03:13Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve" ,
"go" ,
"python"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2021-01-31 04:09:38 +01:00
}
]