[ { "id": 334951447, "name": "CVE-2020-7247", "full_name": "jopraveen\/CVE-2020-7247", "owner": { "login": "jopraveen", "id": 56404692, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56404692?v=4", "html_url": "https:\/\/github.com\/jopraveen" }, "html_url": "https:\/\/github.com\/jopraveen\/CVE-2020-7247", "description": "This vulnerability exists in OpenBSD’s mail server OpenSMTPD’s “smtp_mailaddr()” function, and affects OpenBSD version 6.6. This allows an attacker to execute arbitrary shell commands like “sleep 66” as root user", "fork": false, "created_at": "2021-02-01T13:01:21Z", "updated_at": "2021-02-01T13:20:48Z", "pushed_at": "2021-02-01T13:20:06Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "forks": 0, "watchers": 1, "score": 0 }, { "id": 338516393, "name": "CVE-2020-7247-exploit", "full_name": "QTranspose\/CVE-2020-7247-exploit", "owner": { "login": "QTranspose", "id": 54239699, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54239699?v=4", "html_url": "https:\/\/github.com\/QTranspose" }, "html_url": "https:\/\/github.com\/QTranspose\/CVE-2020-7247-exploit", "description": "OpenSMTPD 6.4.0 - 6.6.1 Remote Code Execution PoC exploit", "fork": false, "created_at": "2021-02-13T06:57:47Z", "updated_at": "2021-02-13T07:15:41Z", "pushed_at": "2021-02-13T07:15:38Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 } ]