PoC-in-GitHub/2020/CVE-2020-7247.json

140 lines
5 KiB
JSON
Raw Normal View History

2021-01-31 04:09:38 +01:00
[
2021-06-29 05:11:17 +02:00
{
"id": 237289178,
"name": "cve-2020-7247-exploit",
"full_name": "FiroSolutions\/cve-2020-7247-exploit",
"owner": {
"login": "FiroSolutions",
"id": 43434507,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43434507?v=4",
"html_url": "https:\/\/github.com\/FiroSolutions"
},
"html_url": "https:\/\/github.com\/FiroSolutions\/cve-2020-7247-exploit",
"description": "Python exploit of cve-2020-7247",
"fork": false,
"created_at": "2020-01-30T19:29:27Z",
"updated_at": "2021-02-07T16:45:48Z",
"pushed_at": "2020-02-19T10:55:15Z",
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 16,
"forks": 16,
"watchers": 24,
"score": 0
},
{
"id": 241011451,
"name": "cve-2020-7247",
"full_name": "superzerosec\/cve-2020-7247",
"owner": {
"login": "superzerosec",
"id": 57648217,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4",
"html_url": "https:\/\/github.com\/superzerosec"
},
"html_url": "https:\/\/github.com\/superzerosec\/cve-2020-7247",
"description": "OpenSMTPD version 6.6.2 remote code execution exploit",
"fork": false,
"created_at": "2020-02-17T03:28:09Z",
"updated_at": "2020-05-17T23:55:06Z",
"pushed_at": "2020-02-18T06:57:20Z",
"stargazers_count": 1,
"watchers_count": 1,
2021-07-14 17:11:59 +02:00
"forks_count": 3,
"forks": 3,
2021-06-29 05:11:17 +02:00
"watchers": 1,
"score": 0
},
{
"id": 241337606,
"name": "CVE-2020-7247",
"full_name": "r0lh\/CVE-2020-7247",
"owner": {
"login": "r0lh",
"id": 51697374,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51697374?v=4",
"html_url": "https:\/\/github.com\/r0lh"
},
"html_url": "https:\/\/github.com\/r0lh\/CVE-2020-7247",
"description": "Proof Of Concept Exploit for CVE-2020-7247 (Remote Execution on OpenSMTPD < 6.6.2",
"fork": false,
"created_at": "2020-02-18T10:52:38Z",
"updated_at": "2020-03-28T19:05:22Z",
"pushed_at": "2020-02-18T11:08:38Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
2021-02-01 16:10:08 +01:00
{
"id": 334951447,
"name": "CVE-2020-7247",
"full_name": "jopraveen\/CVE-2020-7247",
"owner": {
"login": "jopraveen",
"id": 56404692,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56404692?v=4",
"html_url": "https:\/\/github.com\/jopraveen"
},
"html_url": "https:\/\/github.com\/jopraveen\/CVE-2020-7247",
"description": "This vulnerability exists in OpenBSDs mail server OpenSMTPDs “smtp_mailaddr()” function, and affects OpenBSD version 6.6. This allows an attacker to execute arbitrary shell commands like “sleep 66” as root user",
"fork": false,
"created_at": "2021-02-01T13:01:21Z",
"updated_at": "2021-02-01T13:20:48Z",
"pushed_at": "2021-02-01T13:20:06Z",
"stargazers_count": 1,
"watchers_count": 1,
2021-06-18 23:13:55 +02:00
"forks_count": 1,
"forks": 1,
2021-02-01 16:10:08 +01:00
"watchers": 1,
"score": 0
2021-02-13 10:09:17 +01:00
},
{
"id": 338516393,
"name": "CVE-2020-7247-exploit",
"full_name": "QTranspose\/CVE-2020-7247-exploit",
"owner": {
"login": "QTranspose",
"id": 54239699,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54239699?v=4",
"html_url": "https:\/\/github.com\/QTranspose"
},
"html_url": "https:\/\/github.com\/QTranspose\/CVE-2020-7247-exploit",
"description": "OpenSMTPD 6.4.0 - 6.6.1 Remote Code Execution PoC exploit",
"fork": false,
"created_at": "2021-02-13T06:57:47Z",
2021-06-20 11:11:40 +02:00
"updated_at": "2021-06-20T07:49:14Z",
2021-02-17 16:09:10 +01:00
"pushed_at": "2021-02-17T09:23:57Z",
2021-06-20 11:11:40 +02:00
"stargazers_count": 5,
"watchers_count": 5,
2021-02-18 16:09:07 +01:00
"forks_count": 1,
"forks": 1,
2021-06-20 11:11:40 +02:00
"watchers": 5,
2021-02-13 10:09:17 +01:00
"score": 0
2021-06-19 11:12:28 +02:00
},
{
"id": 378352740,
"name": "CVE-2020-7247",
"full_name": "f4T1H21\/CVE-2020-7247",
"owner": {
"login": "f4T1H21",
"id": 83399767,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83399767?v=4",
"html_url": "https:\/\/github.com\/f4T1H21"
},
"html_url": "https:\/\/github.com\/f4T1H21\/CVE-2020-7247",
"description": "PoC exploit for CVE-2020-7247 OpenSMTPD 6.4.0 < 6.6.1 Remote Code Execution",
"fork": false,
"created_at": "2021-06-19T07:34:42Z",
2021-07-10 17:11:29 +02:00
"updated_at": "2021-07-10T11:26:09Z",
"pushed_at": "2021-07-10T11:26:06Z",
2021-06-19 11:12:28 +02:00
"stargazers_count": 1,
"watchers_count": 1,
2021-06-19 23:12:25 +02:00
"forks_count": 1,
"forks": 1,
2021-06-19 11:12:28 +02:00
"watchers": 1,
"score": 0
2021-01-31 04:09:38 +01:00
}
]