PoC-in-GitHub/2020/CVE-2020-7247.json
2021-07-11 00:11:29 +09:00

140 lines
No EOL
5 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 237289178,
"name": "cve-2020-7247-exploit",
"full_name": "FiroSolutions\/cve-2020-7247-exploit",
"owner": {
"login": "FiroSolutions",
"id": 43434507,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43434507?v=4",
"html_url": "https:\/\/github.com\/FiroSolutions"
},
"html_url": "https:\/\/github.com\/FiroSolutions\/cve-2020-7247-exploit",
"description": "Python exploit of cve-2020-7247",
"fork": false,
"created_at": "2020-01-30T19:29:27Z",
"updated_at": "2021-02-07T16:45:48Z",
"pushed_at": "2020-02-19T10:55:15Z",
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 16,
"forks": 16,
"watchers": 24,
"score": 0
},
{
"id": 241011451,
"name": "cve-2020-7247",
"full_name": "superzerosec\/cve-2020-7247",
"owner": {
"login": "superzerosec",
"id": 57648217,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4",
"html_url": "https:\/\/github.com\/superzerosec"
},
"html_url": "https:\/\/github.com\/superzerosec\/cve-2020-7247",
"description": "OpenSMTPD version 6.6.2 remote code execution exploit",
"fork": false,
"created_at": "2020-02-17T03:28:09Z",
"updated_at": "2020-05-17T23:55:06Z",
"pushed_at": "2020-02-18T06:57:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 241337606,
"name": "CVE-2020-7247",
"full_name": "r0lh\/CVE-2020-7247",
"owner": {
"login": "r0lh",
"id": 51697374,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51697374?v=4",
"html_url": "https:\/\/github.com\/r0lh"
},
"html_url": "https:\/\/github.com\/r0lh\/CVE-2020-7247",
"description": "Proof Of Concept Exploit for CVE-2020-7247 (Remote Execution on OpenSMTPD < 6.6.2",
"fork": false,
"created_at": "2020-02-18T10:52:38Z",
"updated_at": "2020-03-28T19:05:22Z",
"pushed_at": "2020-02-18T11:08:38Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 334951447,
"name": "CVE-2020-7247",
"full_name": "jopraveen\/CVE-2020-7247",
"owner": {
"login": "jopraveen",
"id": 56404692,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56404692?v=4",
"html_url": "https:\/\/github.com\/jopraveen"
},
"html_url": "https:\/\/github.com\/jopraveen\/CVE-2020-7247",
"description": "This vulnerability exists in OpenBSDs mail server OpenSMTPDs “smtp_mailaddr()” function, and affects OpenBSD version 6.6. This allows an attacker to execute arbitrary shell commands like “sleep 66” as root user",
"fork": false,
"created_at": "2021-02-01T13:01:21Z",
"updated_at": "2021-02-01T13:20:48Z",
"pushed_at": "2021-02-01T13:20:06Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 338516393,
"name": "CVE-2020-7247-exploit",
"full_name": "QTranspose\/CVE-2020-7247-exploit",
"owner": {
"login": "QTranspose",
"id": 54239699,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54239699?v=4",
"html_url": "https:\/\/github.com\/QTranspose"
},
"html_url": "https:\/\/github.com\/QTranspose\/CVE-2020-7247-exploit",
"description": "OpenSMTPD 6.4.0 - 6.6.1 Remote Code Execution PoC exploit",
"fork": false,
"created_at": "2021-02-13T06:57:47Z",
"updated_at": "2021-06-20T07:49:14Z",
"pushed_at": "2021-02-17T09:23:57Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"score": 0
},
{
"id": 378352740,
"name": "CVE-2020-7247",
"full_name": "f4T1H21\/CVE-2020-7247",
"owner": {
"login": "f4T1H21",
"id": 83399767,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83399767?v=4",
"html_url": "https:\/\/github.com\/f4T1H21"
},
"html_url": "https:\/\/github.com\/f4T1H21\/CVE-2020-7247",
"description": "PoC exploit for CVE-2020-7247 OpenSMTPD 6.4.0 < 6.6.1 Remote Code Execution",
"fork": false,
"created_at": "2021-06-19T07:34:42Z",
"updated_at": "2021-07-10T11:26:09Z",
"pushed_at": "2021-07-10T11:26:06Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]