mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-19 14:22:21 +01:00
71 lines
No EOL
2.6 KiB
JSON
71 lines
No EOL
2.6 KiB
JSON
[
|
||
{
|
||
"id": 334951447,
|
||
"name": "CVE-2020-7247",
|
||
"full_name": "jopraveen\/CVE-2020-7247",
|
||
"owner": {
|
||
"login": "jopraveen",
|
||
"id": 56404692,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56404692?v=4",
|
||
"html_url": "https:\/\/github.com\/jopraveen"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jopraveen\/CVE-2020-7247",
|
||
"description": "This vulnerability exists in OpenBSD’s mail server OpenSMTPD’s “smtp_mailaddr()” function, and affects OpenBSD version 6.6. This allows an attacker to execute arbitrary shell commands like “sleep 66” as root user",
|
||
"fork": false,
|
||
"created_at": "2021-02-01T13:01:21Z",
|
||
"updated_at": "2021-02-01T13:20:48Z",
|
||
"pushed_at": "2021-02-01T13:20:06Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 2,
|
||
"forks": 2,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 338516393,
|
||
"name": "CVE-2020-7247-exploit",
|
||
"full_name": "QTranspose\/CVE-2020-7247-exploit",
|
||
"owner": {
|
||
"login": "QTranspose",
|
||
"id": 54239699,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54239699?v=4",
|
||
"html_url": "https:\/\/github.com\/QTranspose"
|
||
},
|
||
"html_url": "https:\/\/github.com\/QTranspose\/CVE-2020-7247-exploit",
|
||
"description": "OpenSMTPD 6.4.0 - 6.6.1 Remote Code Execution PoC exploit",
|
||
"fork": false,
|
||
"created_at": "2021-02-13T06:57:47Z",
|
||
"updated_at": "2021-08-25T12:23:41Z",
|
||
"pushed_at": "2021-02-17T09:23:57Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 4,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 378352740,
|
||
"name": "CVE-2020-7247",
|
||
"full_name": "f4T1H21\/CVE-2020-7247",
|
||
"owner": {
|
||
"login": "f4T1H21",
|
||
"id": 83399767,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83399767?v=4",
|
||
"html_url": "https:\/\/github.com\/f4T1H21"
|
||
},
|
||
"html_url": "https:\/\/github.com\/f4T1H21\/CVE-2020-7247",
|
||
"description": "PoC exploit for CVE-2020-7247 OpenSMTPD 6.4.0 < 6.6.1 Remote Code Execution",
|
||
"fork": false,
|
||
"created_at": "2021-06-19T07:34:42Z",
|
||
"updated_at": "2021-07-10T11:26:09Z",
|
||
"pushed_at": "2021-07-10T11:26:06Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
}
|
||
] |