2024-11-28 19:31:51 +01:00
[
2024-12-23 19:31:43 +01:00
{
"id" : 237289178 ,
"name" : "cve-2020-7247-exploit" ,
"full_name" : "FiroSolutions\/cve-2020-7247-exploit" ,
"owner" : {
"login" : "FiroSolutions" ,
"id" : 43434507 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/43434507?v=4" ,
"html_url" : "https:\/\/github.com\/FiroSolutions" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/FiroSolutions\/cve-2020-7247-exploit" ,
"description" : "Python exploit of cve-2020-7247" ,
"fork" : false ,
"created_at" : "2020-01-30T19:29:27Z" ,
"updated_at" : "2024-08-12T19:57:12Z" ,
"pushed_at" : "2020-02-19T10:55:15Z" ,
"stargazers_count" : 25 ,
"watchers_count" : 25 ,
"has_discussions" : false ,
"forks_count" : 14 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 14 ,
"watchers" : 25 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 241011451 ,
"name" : "cve-2020-7247" ,
"full_name" : "superzerosec\/cve-2020-7247" ,
"owner" : {
"login" : "superzerosec" ,
"id" : 57648217 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4" ,
"html_url" : "https:\/\/github.com\/superzerosec" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/superzerosec\/cve-2020-7247" ,
"description" : "OpenSMTPD version 6.6.2 remote code execution exploit" ,
"fork" : false ,
"created_at" : "2020-02-17T03:28:09Z" ,
"updated_at" : "2024-08-12T19:57:48Z" ,
"pushed_at" : "2022-01-15T19:37:31Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"has_discussions" : false ,
"forks_count" : 7 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 7 ,
"watchers" : 4 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 241337606 ,
"name" : "CVE-2020-7247" ,
"full_name" : "r0lh\/CVE-2020-7247" ,
"owner" : {
"login" : "r0lh" ,
"id" : 51697374 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/51697374?v=4" ,
"html_url" : "https:\/\/github.com\/r0lh" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/r0lh\/CVE-2020-7247" ,
"description" : "Proof Of Concept Exploit for CVE-2020-7247 (Remote Execution on OpenSMTPD < 6.6.2" ,
"fork" : false ,
"created_at" : "2020-02-18T10:52:38Z" ,
"updated_at" : "2024-08-12T19:57:52Z" ,
"pushed_at" : "2020-02-18T11:08:38Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
2024-11-28 19:31:51 +01:00
{
"id" : 338516393 ,
"name" : "CVE-2020-7247-exploit" ,
"full_name" : "QTranspose\/CVE-2020-7247-exploit" ,
"owner" : {
"login" : "QTranspose" ,
"id" : 54239699 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/54239699?v=4" ,
"html_url" : "https:\/\/github.com\/QTranspose" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/QTranspose\/CVE-2020-7247-exploit" ,
"description" : "OpenSMTPD 6.4.0 - 6.6.1 Remote Code Execution PoC exploit" ,
"fork" : false ,
"created_at" : "2021-02-13T06:57:47Z" ,
"updated_at" : "2024-06-27T13:38:27Z" ,
"pushed_at" : "2021-02-17T09:23:57Z" ,
"stargazers_count" : 11 ,
"watchers_count" : 11 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 11 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 373152472 ,
"name" : "CVE-2020-7247" ,
"full_name" : "bytescrappers\/CVE-2020-7247" ,
"owner" : {
"login" : "bytescrappers" ,
"id" : 85182327 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/85182327?v=4" ,
"html_url" : "https:\/\/github.com\/bytescrappers" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/bytescrappers\/CVE-2020-7247" ,
"description" : "This vulnerability exists in OpenBSD’ s mail server OpenSMTPD’ s “smtp_mailaddr()” function, and affects OpenBSD version 6.6. This allows an attacker to execute arbitrary shell commands like “sleep 66” as root user" ,
"fork" : false ,
"created_at" : "2021-06-02T12:02:33Z" ,
"updated_at" : "2021-06-02T12:02:34Z" ,
"pushed_at" : "2021-02-01T13:20:06Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 0
} ,
{
"id" : 378352740 ,
"name" : "CVE-2020-7247" ,
"full_name" : "f4T1H21\/CVE-2020-7247" ,
"owner" : {
"login" : "f4T1H21" ,
"id" : 83399767 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/83399767?v=4" ,
"html_url" : "https:\/\/github.com\/f4T1H21" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/f4T1H21\/CVE-2020-7247" ,
"description" : "PoC exploit for CVE-2020-7247 OpenSMTPD 6.4.0 < 6.6.1 Remote Code Execution" ,
"fork" : false ,
"created_at" : "2021-06-19T07:34:42Z" ,
"updated_at" : "2024-10-27T13:18:14Z" ,
"pushed_at" : "2021-07-10T11:26:06Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve" ,
"cve-2020-7247" ,
"exploit" ,
"poc"
] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 432255271 ,
"name" : "CVE-2020-7247-POC" ,
"full_name" : "SimonSchoeni\/CVE-2020-7247-POC" ,
"owner" : {
"login" : "SimonSchoeni" ,
"id" : 62761108 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/62761108?v=4" ,
"html_url" : "https:\/\/github.com\/SimonSchoeni" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/SimonSchoeni\/CVE-2020-7247-POC" ,
"description" : "Proof of concept for CVE-2020-7247 for educational purposes." ,
"fork" : false ,
"created_at" : "2021-11-26T17:28:56Z" ,
"updated_at" : "2023-08-17T02:58:27Z" ,
"pushed_at" : "2022-01-20T18:36:05Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 456468236 ,
"name" : "shai_hulud" ,
"full_name" : "presentdaypresenttime\/shai_hulud" ,
"owner" : {
"login" : "presentdaypresenttime" ,
"id" : 92856309 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/92856309?v=4" ,
"html_url" : "https:\/\/github.com\/presentdaypresenttime" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/presentdaypresenttime\/shai_hulud" ,
"description" : "Worm written in python, abuses CVE-2020-7247" ,
"fork" : false ,
"created_at" : "2022-02-07T10:59:36Z" ,
"updated_at" : "2023-08-25T03:12:05Z" ,
"pushed_at" : "2022-05-17T20:03:56Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 1
}
]