Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Python exploit of cve-2020-7247 | https://github.com/FiroSolutions/cve-2020-7247-exploit | POC Details |
| 2 | OpenSMTPD version 6.6.2 remote code execution exploit | https://github.com/superzerosec/cve-2020-7247 | POC Details |
| 3 | Proof Of Concept Exploit for CVE-2020-7247 (Remote Execution on OpenSMTPD < 6.6.2 | https://github.com/r0lh/CVE-2020-7247 | POC Details |
| 4 | OpenSMTPD 6.4.0 - 6.6.1 Remote Code Execution PoC exploit | https://github.com/QTranspose/CVE-2020-7247-exploit | POC Details |
| 5 | This vulnerability exists in OpenBSD’s mail server OpenSMTPD’s “smtp_mailaddr()” function, and affects OpenBSD version 6.6. This allows an attacker to execute arbitrary shell commands like “sleep 66” as root user | https://github.com/bytescrappers/CVE-2020-7247 | POC Details |
| 6 | PoC exploit for CVE-2020-7247 OpenSMTPD 6.4.0 < 6.6.1 Remote Code Execution | https://github.com/f4T1H21/CVE-2020-7247 | POC Details |
| 7 | Proof of concept for CVE-2020-7247 for educational purposes. | https://github.com/SimonSchoeni/CVE-2020-7247-POC | POC Details |
| 8 | Worm written in python, abuses CVE-2020-7247 | https://github.com/presentdaypresenttime/shai_hulud | POC Details |
| 9 | CVE-2020-7247 Remote Code Execution POC | https://github.com/gatariee/CVE-2020-7247 | POC Details |
| 10 | None | https://github.com/minhluannguyen/CVE-2020-7247-reproducer | POC Details |
| 11 | OpenSMTPD versions 6.4.0 - 6.6.1 are susceptible to remote code execution. smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation. | https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/2020/CVE-2020-7247.yaml | POC Details |
| 12 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/OpenSMTPD%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2020-7247.md | POC Details |
| 13 | https://github.com/vulhub/vulhub/blob/master/opensmtpd/CVE-2020-7247/README.md | POC Details |
No public POC found.
Login to generate AI POCNo comments yet