2021-01-31 04:09:38 +01:00
[
2021-06-29 05:11:17 +02:00
{
"id" : 237289178 ,
"name" : "cve-2020-7247-exploit" ,
"full_name" : "FiroSolutions\/cve-2020-7247-exploit" ,
"owner" : {
"login" : "FiroSolutions" ,
"id" : 43434507 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/43434507?v=4" ,
"html_url" : "https:\/\/github.com\/FiroSolutions"
} ,
"html_url" : "https:\/\/github.com\/FiroSolutions\/cve-2020-7247-exploit" ,
"description" : "Python exploit of cve-2020-7247" ,
"fork" : false ,
"created_at" : "2020-01-30T19:29:27Z" ,
"updated_at" : "2021-02-07T16:45:48Z" ,
"pushed_at" : "2020-02-19T10:55:15Z" ,
"stargazers_count" : 24 ,
"watchers_count" : 24 ,
"forks_count" : 16 ,
"forks" : 16 ,
"watchers" : 24 ,
"score" : 0
} ,
{
"id" : 241011451 ,
"name" : "cve-2020-7247" ,
"full_name" : "superzerosec\/cve-2020-7247" ,
"owner" : {
"login" : "superzerosec" ,
"id" : 57648217 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4" ,
"html_url" : "https:\/\/github.com\/superzerosec"
} ,
"html_url" : "https:\/\/github.com\/superzerosec\/cve-2020-7247" ,
"description" : "OpenSMTPD version 6.6.2 remote code execution exploit" ,
"fork" : false ,
"created_at" : "2020-02-17T03:28:09Z" ,
"updated_at" : "2020-05-17T23:55:06Z" ,
"pushed_at" : "2020-02-18T06:57:20Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2021-07-14 17:11:59 +02:00
"forks_count" : 3 ,
"forks" : 3 ,
2021-06-29 05:11:17 +02:00
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 241337606 ,
"name" : "CVE-2020-7247" ,
"full_name" : "r0lh\/CVE-2020-7247" ,
"owner" : {
"login" : "r0lh" ,
"id" : 51697374 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/51697374?v=4" ,
"html_url" : "https:\/\/github.com\/r0lh"
} ,
"html_url" : "https:\/\/github.com\/r0lh\/CVE-2020-7247" ,
"description" : "Proof Of Concept Exploit for CVE-2020-7247 (Remote Execution on OpenSMTPD < 6.6.2" ,
"fork" : false ,
"created_at" : "2020-02-18T10:52:38Z" ,
"updated_at" : "2020-03-28T19:05:22Z" ,
"pushed_at" : "2020-02-18T11:08:38Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 2 ,
"score" : 0
} ,
2021-02-01 16:10:08 +01:00
{
"id" : 334951447 ,
"name" : "CVE-2020-7247" ,
"full_name" : "jopraveen\/CVE-2020-7247" ,
"owner" : {
"login" : "jopraveen" ,
"id" : 56404692 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/56404692?v=4" ,
"html_url" : "https:\/\/github.com\/jopraveen"
} ,
"html_url" : "https:\/\/github.com\/jopraveen\/CVE-2020-7247" ,
"description" : "This vulnerability exists in OpenBSD’ s mail server OpenSMTPD’ s “smtp_mailaddr()” function, and affects OpenBSD version 6.6. This allows an attacker to execute arbitrary shell commands like “sleep 66” as root user" ,
"fork" : false ,
"created_at" : "2021-02-01T13:01:21Z" ,
"updated_at" : "2021-02-01T13:20:48Z" ,
"pushed_at" : "2021-02-01T13:20:06Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2021-06-18 23:13:55 +02:00
"forks_count" : 1 ,
"forks" : 1 ,
2021-02-01 16:10:08 +01:00
"watchers" : 1 ,
"score" : 0
2021-02-13 10:09:17 +01:00
} ,
{
"id" : 338516393 ,
"name" : "CVE-2020-7247-exploit" ,
"full_name" : "QTranspose\/CVE-2020-7247-exploit" ,
"owner" : {
"login" : "QTranspose" ,
"id" : 54239699 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/54239699?v=4" ,
"html_url" : "https:\/\/github.com\/QTranspose"
} ,
"html_url" : "https:\/\/github.com\/QTranspose\/CVE-2020-7247-exploit" ,
"description" : "OpenSMTPD 6.4.0 - 6.6.1 Remote Code Execution PoC exploit" ,
"fork" : false ,
"created_at" : "2021-02-13T06:57:47Z" ,
2021-06-20 11:11:40 +02:00
"updated_at" : "2021-06-20T07:49:14Z" ,
2021-02-17 16:09:10 +01:00
"pushed_at" : "2021-02-17T09:23:57Z" ,
2021-06-20 11:11:40 +02:00
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
2021-02-18 16:09:07 +01:00
"forks_count" : 1 ,
"forks" : 1 ,
2021-06-20 11:11:40 +02:00
"watchers" : 5 ,
2021-02-13 10:09:17 +01:00
"score" : 0
2021-06-19 11:12:28 +02:00
} ,
{
"id" : 378352740 ,
"name" : "CVE-2020-7247" ,
"full_name" : "f4T1H21\/CVE-2020-7247" ,
"owner" : {
"login" : "f4T1H21" ,
"id" : 83399767 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/83399767?v=4" ,
"html_url" : "https:\/\/github.com\/f4T1H21"
} ,
"html_url" : "https:\/\/github.com\/f4T1H21\/CVE-2020-7247" ,
"description" : "PoC exploit for CVE-2020-7247 OpenSMTPD 6.4.0 < 6.6.1 Remote Code Execution" ,
"fork" : false ,
"created_at" : "2021-06-19T07:34:42Z" ,
2021-07-10 17:11:29 +02:00
"updated_at" : "2021-07-10T11:26:09Z" ,
"pushed_at" : "2021-07-10T11:26:06Z" ,
2021-06-19 11:12:28 +02:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2021-06-19 23:12:25 +02:00
"forks_count" : 1 ,
"forks" : 1 ,
2021-06-19 11:12:28 +02:00
"watchers" : 1 ,
"score" : 0
2021-01-31 04:09:38 +01:00
}
]