PoC-in-GitHub/2020/CVE-2020-7247.json
2024-12-24 03:31:43 +09:00

255 lines
No EOL
8.9 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 237289178,
"name": "cve-2020-7247-exploit",
"full_name": "FiroSolutions\/cve-2020-7247-exploit",
"owner": {
"login": "FiroSolutions",
"id": 43434507,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43434507?v=4",
"html_url": "https:\/\/github.com\/FiroSolutions",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/FiroSolutions\/cve-2020-7247-exploit",
"description": "Python exploit of cve-2020-7247",
"fork": false,
"created_at": "2020-01-30T19:29:27Z",
"updated_at": "2024-08-12T19:57:12Z",
"pushed_at": "2020-02-19T10:55:15Z",
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 25,
"score": 0,
"subscribers_count": 3
},
{
"id": 241011451,
"name": "cve-2020-7247",
"full_name": "superzerosec\/cve-2020-7247",
"owner": {
"login": "superzerosec",
"id": 57648217,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4",
"html_url": "https:\/\/github.com\/superzerosec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/superzerosec\/cve-2020-7247",
"description": "OpenSMTPD version 6.6.2 remote code execution exploit",
"fork": false,
"created_at": "2020-02-17T03:28:09Z",
"updated_at": "2024-08-12T19:57:48Z",
"pushed_at": "2022-01-15T19:37:31Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 4,
"score": 0,
"subscribers_count": 2
},
{
"id": 241337606,
"name": "CVE-2020-7247",
"full_name": "r0lh\/CVE-2020-7247",
"owner": {
"login": "r0lh",
"id": 51697374,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51697374?v=4",
"html_url": "https:\/\/github.com\/r0lh",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/r0lh\/CVE-2020-7247",
"description": "Proof Of Concept Exploit for CVE-2020-7247 (Remote Execution on OpenSMTPD < 6.6.2",
"fork": false,
"created_at": "2020-02-18T10:52:38Z",
"updated_at": "2024-08-12T19:57:52Z",
"pushed_at": "2020-02-18T11:08:38Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 2
},
{
"id": 338516393,
"name": "CVE-2020-7247-exploit",
"full_name": "QTranspose\/CVE-2020-7247-exploit",
"owner": {
"login": "QTranspose",
"id": 54239699,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54239699?v=4",
"html_url": "https:\/\/github.com\/QTranspose",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/QTranspose\/CVE-2020-7247-exploit",
"description": "OpenSMTPD 6.4.0 - 6.6.1 Remote Code Execution PoC exploit",
"fork": false,
"created_at": "2021-02-13T06:57:47Z",
"updated_at": "2024-06-27T13:38:27Z",
"pushed_at": "2021-02-17T09:23:57Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},
{
"id": 373152472,
"name": "CVE-2020-7247",
"full_name": "bytescrappers\/CVE-2020-7247",
"owner": {
"login": "bytescrappers",
"id": 85182327,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85182327?v=4",
"html_url": "https:\/\/github.com\/bytescrappers",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/bytescrappers\/CVE-2020-7247",
"description": "This vulnerability exists in OpenBSDs mail server OpenSMTPDs “smtp_mailaddr()” function, and affects OpenBSD version 6.6. This allows an attacker to execute arbitrary shell commands like “sleep 66” as root user",
"fork": false,
"created_at": "2021-06-02T12:02:33Z",
"updated_at": "2021-06-02T12:02:34Z",
"pushed_at": "2021-02-01T13:20:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 378352740,
"name": "CVE-2020-7247",
"full_name": "f4T1H21\/CVE-2020-7247",
"owner": {
"login": "f4T1H21",
"id": 83399767,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83399767?v=4",
"html_url": "https:\/\/github.com\/f4T1H21",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/f4T1H21\/CVE-2020-7247",
"description": "PoC exploit for CVE-2020-7247 OpenSMTPD 6.4.0 < 6.6.1 Remote Code Execution",
"fork": false,
"created_at": "2021-06-19T07:34:42Z",
"updated_at": "2024-10-27T13:18:14Z",
"pushed_at": "2021-07-10T11:26:06Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2020-7247",
"exploit",
"poc"
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 432255271,
"name": "CVE-2020-7247-POC",
"full_name": "SimonSchoeni\/CVE-2020-7247-POC",
"owner": {
"login": "SimonSchoeni",
"id": 62761108,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62761108?v=4",
"html_url": "https:\/\/github.com\/SimonSchoeni",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/SimonSchoeni\/CVE-2020-7247-POC",
"description": "Proof of concept for CVE-2020-7247 for educational purposes.",
"fork": false,
"created_at": "2021-11-26T17:28:56Z",
"updated_at": "2023-08-17T02:58:27Z",
"pushed_at": "2022-01-20T18:36:05Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 456468236,
"name": "shai_hulud",
"full_name": "presentdaypresenttime\/shai_hulud",
"owner": {
"login": "presentdaypresenttime",
"id": 92856309,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92856309?v=4",
"html_url": "https:\/\/github.com\/presentdaypresenttime",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/presentdaypresenttime\/shai_hulud",
"description": "Worm written in python, abuses CVE-2020-7247",
"fork": false,
"created_at": "2022-02-07T10:59:36Z",
"updated_at": "2023-08-25T03:12:05Z",
"pushed_at": "2022-05-17T20:03:56Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]