[ { "id": 237289178, "name": "cve-2020-7247-exploit", "full_name": "FiroSolutions\/cve-2020-7247-exploit", "owner": { "login": "FiroSolutions", "id": 43434507, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43434507?v=4", "html_url": "https:\/\/github.com\/FiroSolutions" }, "html_url": "https:\/\/github.com\/FiroSolutions\/cve-2020-7247-exploit", "description": "Python exploit of cve-2020-7247", "fork": false, "created_at": "2020-01-30T19:29:27Z", "updated_at": "2023-04-08T07:52:46Z", "pushed_at": "2020-02-19T10:55:15Z", "stargazers_count": 26, "watchers_count": 26, "has_discussions": false, "forks_count": 16, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 16, "watchers": 26, "score": 0, "subscribers_count": 3 }, { "id": 241011451, "name": "cve-2020-7247", "full_name": "superzerosec\/cve-2020-7247", "owner": { "login": "superzerosec", "id": 57648217, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4", "html_url": "https:\/\/github.com\/superzerosec" }, "html_url": "https:\/\/github.com\/superzerosec\/cve-2020-7247", "description": "OpenSMTPD version 6.6.2 remote code execution exploit", "fork": false, "created_at": "2020-02-17T03:28:09Z", "updated_at": "2022-04-12T14:01:55Z", "pushed_at": "2022-01-15T19:37:31Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 7, "watchers": 4, "score": 0, "subscribers_count": 2 }, { "id": 241337606, "name": "CVE-2020-7247", "full_name": "r0lh\/CVE-2020-7247", "owner": { "login": "r0lh", "id": 51697374, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51697374?v=4", "html_url": "https:\/\/github.com\/r0lh" }, "html_url": "https:\/\/github.com\/r0lh\/CVE-2020-7247", "description": "Proof Of Concept Exploit for CVE-2020-7247 (Remote Execution on OpenSMTPD < 6.6.2", "fork": false, "created_at": "2020-02-18T10:52:38Z", "updated_at": "2021-12-05T21:34:44Z", "pushed_at": "2020-02-18T11:08:38Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 2 }, { "id": 338516393, "name": "CVE-2020-7247-exploit", "full_name": "QTranspose\/CVE-2020-7247-exploit", "owner": { "login": "QTranspose", "id": 54239699, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54239699?v=4", "html_url": "https:\/\/github.com\/QTranspose" }, "html_url": "https:\/\/github.com\/QTranspose\/CVE-2020-7247-exploit", "description": "OpenSMTPD 6.4.0 - 6.6.1 Remote Code Execution PoC exploit", "fork": false, "created_at": "2021-02-13T06:57:47Z", "updated_at": "2023-02-08T11:50:15Z", "pushed_at": "2021-02-17T09:23:57Z", "stargazers_count": 10, "watchers_count": 10, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 10, "score": 0, "subscribers_count": 1 }, { "id": 373152472, "name": "CVE-2020-7247", "full_name": "bytescrappers\/CVE-2020-7247", "owner": { "login": "bytescrappers", "id": 85182327, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85182327?v=4", "html_url": "https:\/\/github.com\/bytescrappers" }, "html_url": "https:\/\/github.com\/bytescrappers\/CVE-2020-7247", "description": "This vulnerability exists in OpenBSD’s mail server OpenSMTPD’s “smtp_mailaddr()” function, and affects OpenBSD version 6.6. This allows an attacker to execute arbitrary shell commands like “sleep 66” as root user", "fork": false, "created_at": "2021-06-02T12:02:33Z", "updated_at": "2021-06-02T12:02:34Z", "pushed_at": "2021-02-01T13:20:06Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 378352740, "name": "CVE-2020-7247", "full_name": "f4T1H21\/CVE-2020-7247", "owner": { "login": "f4T1H21", "id": 83399767, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83399767?v=4", "html_url": "https:\/\/github.com\/f4T1H21" }, "html_url": "https:\/\/github.com\/f4T1H21\/CVE-2020-7247", "description": "PoC exploit for CVE-2020-7247 OpenSMTPD 6.4.0 < 6.6.1 Remote Code Execution", "fork": false, "created_at": "2021-06-19T07:34:42Z", "updated_at": "2021-07-10T11:26:09Z", "pushed_at": "2021-07-10T11:26:06Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "cve-2020-7247", "exploit", "poc" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 432255271, "name": "CVE-2020-7247-POC", "full_name": "SimonSchoeni\/CVE-2020-7247-POC", "owner": { "login": "SimonSchoeni", "id": 62761108, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62761108?v=4", "html_url": "https:\/\/github.com\/SimonSchoeni" }, "html_url": "https:\/\/github.com\/SimonSchoeni\/CVE-2020-7247-POC", "description": "Proof of concept for CVE-2020-7247 for educational purposes.", "fork": false, "created_at": "2021-11-26T17:28:56Z", "updated_at": "2023-08-17T02:58:27Z", "pushed_at": "2022-01-20T18:36:05Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 456468236, "name": "shai_hulud", "full_name": "presentdaypresenttime\/shai_hulud", "owner": { "login": "presentdaypresenttime", "id": 92856309, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92856309?v=4", "html_url": "https:\/\/github.com\/presentdaypresenttime" }, "html_url": "https:\/\/github.com\/presentdaypresenttime\/shai_hulud", "description": "Worm written in python, abuses CVE-2020-7247", "fork": false, "created_at": "2022-02-07T10:59:36Z", "updated_at": "2022-05-17T07:36:24Z", "pushed_at": "2022-05-17T20:03:56Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 609009434, "name": "CVE-2020-7247", "full_name": "gatariee\/CVE-2020-7247", "owner": { "login": "gatariee", "id": 79693291, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79693291?v=4", "html_url": "https:\/\/github.com\/gatariee" }, "html_url": "https:\/\/github.com\/gatariee\/CVE-2020-7247", "description": "CVE-2020-7247 Remote Code Execution POC", "fork": false, "created_at": "2023-03-03T07:21:06Z", "updated_at": "2023-03-04T12:35:47Z", "pushed_at": "2023-03-04T11:03:13Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "go", "python" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 } ]