2021-01-31 12:09:38 +09:00
[
2021-04-15 12:11:04 +09:00
{
"id" : 237289178 ,
"name" : "cve-2020-7247-exploit" ,
"full_name" : "FiroSolutions\/cve-2020-7247-exploit" ,
"owner" : {
"login" : "FiroSolutions" ,
"id" : 43434507 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/43434507?v=4" ,
"html_url" : "https:\/\/github.com\/FiroSolutions"
} ,
"html_url" : "https:\/\/github.com\/FiroSolutions\/cve-2020-7247-exploit" ,
"description" : "Python exploit of cve-2020-7247" ,
"fork" : false ,
"created_at" : "2020-01-30T19:29:27Z" ,
"updated_at" : "2021-02-07T16:45:48Z" ,
"pushed_at" : "2020-02-19T10:55:15Z" ,
"stargazers_count" : 24 ,
"watchers_count" : 24 ,
"forks_count" : 16 ,
"forks" : 16 ,
"watchers" : 24 ,
"score" : 0
} ,
{
"id" : 241011451 ,
"name" : "cve-2020-7247" ,
"full_name" : "superzerosec\/cve-2020-7247" ,
"owner" : {
"login" : "superzerosec" ,
"id" : 57648217 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4" ,
"html_url" : "https:\/\/github.com\/superzerosec"
} ,
"html_url" : "https:\/\/github.com\/superzerosec\/cve-2020-7247" ,
"description" : "OpenSMTPD version 6.6.2 remote code execution exploit" ,
"fork" : false ,
"created_at" : "2020-02-17T03:28:09Z" ,
"updated_at" : "2020-05-17T23:55:06Z" ,
"pushed_at" : "2020-02-18T06:57:20Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2021-05-27 12:11:36 +09:00
"forks_count" : 2 ,
"forks" : 2 ,
2021-04-15 12:11:04 +09:00
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 241337606 ,
"name" : "CVE-2020-7247" ,
"full_name" : "r0lh\/CVE-2020-7247" ,
"owner" : {
"login" : "r0lh" ,
"id" : 51697374 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/51697374?v=4" ,
"html_url" : "https:\/\/github.com\/r0lh"
} ,
"html_url" : "https:\/\/github.com\/r0lh\/CVE-2020-7247" ,
"description" : "Proof Of Concept Exploit for CVE-2020-7247 (Remote Execution on OpenSMTPD < 6.6.2" ,
"fork" : false ,
"created_at" : "2020-02-18T10:52:38Z" ,
"updated_at" : "2020-03-28T19:05:22Z" ,
"pushed_at" : "2020-02-18T11:08:38Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 2 ,
"score" : 0
} ,
2021-02-02 00:10:08 +09:00
{
"id" : 334951447 ,
"name" : "CVE-2020-7247" ,
"full_name" : "jopraveen\/CVE-2020-7247" ,
"owner" : {
"login" : "jopraveen" ,
"id" : 56404692 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/56404692?v=4" ,
"html_url" : "https:\/\/github.com\/jopraveen"
} ,
"html_url" : "https:\/\/github.com\/jopraveen\/CVE-2020-7247" ,
"description" : "This vulnerability exists in OpenBSD’ s mail server OpenSMTPD’ s “smtp_mailaddr()” function, and affects OpenBSD version 6.6. This allows an attacker to execute arbitrary shell commands like “sleep 66” as root user" ,
"fork" : false ,
"created_at" : "2021-02-01T13:01:21Z" ,
"updated_at" : "2021-02-01T13:20:48Z" ,
"pushed_at" : "2021-02-01T13:20:06Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2021-06-18 18:11:25 +09:00
"forks_count" : 2 ,
"forks" : 2 ,
2021-02-02 00:10:08 +09:00
"watchers" : 1 ,
"score" : 0
2021-02-13 18:09:17 +09:00
} ,
{
"id" : 338516393 ,
"name" : "CVE-2020-7247-exploit" ,
"full_name" : "QTranspose\/CVE-2020-7247-exploit" ,
"owner" : {
"login" : "QTranspose" ,
"id" : 54239699 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/54239699?v=4" ,
"html_url" : "https:\/\/github.com\/QTranspose"
} ,
"html_url" : "https:\/\/github.com\/QTranspose\/CVE-2020-7247-exploit" ,
"description" : "OpenSMTPD 6.4.0 - 6.6.1 Remote Code Execution PoC exploit" ,
"fork" : false ,
"created_at" : "2021-02-13T06:57:47Z" ,
2021-06-15 06:10:59 +09:00
"updated_at" : "2021-06-14T18:22:57Z" ,
2021-02-18 00:09:10 +09:00
"pushed_at" : "2021-02-17T09:23:57Z" ,
2021-06-15 06:10:59 +09:00
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
2021-02-19 00:09:07 +09:00
"forks_count" : 1 ,
"forks" : 1 ,
2021-06-15 06:10:59 +09:00
"watchers" : 4 ,
2021-02-13 18:09:17 +09:00
"score" : 0
2021-01-31 12:09:38 +09:00
}
]