PoC-in-GitHub/2020/CVE-2020-7247.json

48 lines
1.8 KiB
JSON
Raw Normal View History

2021-01-31 12:09:38 +09:00
[
2021-02-02 00:10:08 +09:00
{
"id": 334951447,
"name": "CVE-2020-7247",
"full_name": "jopraveen\/CVE-2020-7247",
"owner": {
"login": "jopraveen",
"id": 56404692,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56404692?v=4",
"html_url": "https:\/\/github.com\/jopraveen"
},
"html_url": "https:\/\/github.com\/jopraveen\/CVE-2020-7247",
"description": "This vulnerability exists in OpenBSDs mail server OpenSMTPDs “smtp_mailaddr()” function, and affects OpenBSD version 6.6. This allows an attacker to execute arbitrary shell commands like “sleep 66” as root user",
"fork": false,
"created_at": "2021-02-01T13:01:21Z",
"updated_at": "2021-02-01T13:20:48Z",
"pushed_at": "2021-02-01T13:20:06Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
2021-02-13 18:09:17 +09:00
},
{
"id": 338516393,
"name": "CVE-2020-7247-exploit",
"full_name": "QTranspose\/CVE-2020-7247-exploit",
"owner": {
"login": "QTranspose",
"id": 54239699,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54239699?v=4",
"html_url": "https:\/\/github.com\/QTranspose"
},
"html_url": "https:\/\/github.com\/QTranspose\/CVE-2020-7247-exploit",
"description": "OpenSMTPD 6.4.0 - 6.6.1 Remote Code Execution PoC exploit",
"fork": false,
"created_at": "2021-02-13T06:57:47Z",
2021-03-04 18:09:22 +09:00
"updated_at": "2021-03-04T07:03:23Z",
2021-02-18 00:09:10 +09:00
"pushed_at": "2021-02-17T09:23:57Z",
2021-03-04 18:09:22 +09:00
"stargazers_count": 1,
"watchers_count": 1,
2021-02-19 00:09:07 +09:00
"forks_count": 1,
"forks": 1,
2021-03-04 18:09:22 +09:00
"watchers": 1,
2021-02-13 18:09:17 +09:00
"score": 0
2021-01-31 12:09:38 +09:00
}
]