PoC-in-GitHub/2021/CVE-2021-31630.json

157 lines
5.5 KiB
JSON
Raw Normal View History

2023-09-02 09:24:03 +09:00
[
{
"id": 391818469,
"name": "CVE-2021-31630-OpenPLC_RCE",
2023-12-11 15:35:15 +09:00
"full_name": "hev0x\/CVE-2021-31630-OpenPLC_RCE",
2023-09-02 09:24:03 +09:00
"owner": {
2023-12-11 15:35:15 +09:00
"login": "hev0x",
2023-09-02 09:24:03 +09:00
"id": 6265911,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6265911?v=4",
2023-12-11 15:35:15 +09:00
"html_url": "https:\/\/github.com\/hev0x"
2023-09-02 09:24:03 +09:00
},
2023-12-11 15:35:15 +09:00
"html_url": "https:\/\/github.com\/hev0x\/CVE-2021-31630-OpenPLC_RCE",
2023-09-02 09:24:03 +09:00
"description": "Exploit for Authenticated Remote Code Execution on OpenPLC v3 Webserver",
"fork": false,
"created_at": "2021-08-02T04:48:24Z",
2023-09-28 21:53:01 +09:00
"updated_at": "2023-09-28T11:30:04Z",
2023-09-02 09:24:03 +09:00
"pushed_at": "2021-08-02T04:48:25Z",
2023-09-28 21:53:01 +09:00
"stargazers_count": 3,
"watchers_count": 3,
2023-09-02 09:24:03 +09:00
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
2023-09-28 21:53:01 +09:00
"watchers": 3,
2023-09-02 09:24:03 +09:00
"score": 0,
"subscribers_count": 2
2024-03-21 09:26:53 +09:00
},
{
"id": 775165945,
"name": "CVE-2021-31630-HTB",
"full_name": "Hunt3r0x\/CVE-2021-31630-HTB",
"owner": {
"login": "Hunt3r0x",
"id": 106396603,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106396603?v=4",
"html_url": "https:\/\/github.com\/Hunt3r0x"
},
"html_url": "https:\/\/github.com\/Hunt3r0x\/CVE-2021-31630-HTB",
"description": "proof of Concept (PoC) exploit for CVE-2021-31630, targeting the OpenPLC service running on the WifineticTwo box on the Hack The Box platform.",
"fork": false,
"created_at": "2024-03-20T22:02:53Z",
2024-04-30 09:32:48 +09:00
"updated_at": "2024-04-29T20:28:31Z",
2024-03-22 03:27:15 +09:00
"pushed_at": "2024-03-21T15:50:45Z",
2024-04-30 09:32:48 +09:00
"stargazers_count": 5,
"watchers_count": 5,
2024-03-21 09:26:53 +09:00
"has_discussions": false,
2024-04-30 21:35:02 +09:00
"forks_count": 1,
2024-03-21 09:26:53 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-04-30 21:35:02 +09:00
"forks": 1,
2024-04-30 09:32:48 +09:00
"watchers": 5,
2024-03-21 09:26:53 +09:00
"score": 0,
2024-03-22 15:26:48 +09:00
"subscribers_count": 1
2024-03-29 09:26:36 +09:00
},
{
"id": 779013491,
"name": "cve-2021-31630",
"full_name": "thewhiteh4t\/cve-2021-31630",
"owner": {
"login": "thewhiteh4t",
"id": 36354846,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36354846?v=4",
"html_url": "https:\/\/github.com\/thewhiteh4t"
},
"html_url": "https:\/\/github.com\/thewhiteh4t\/cve-2021-31630",
"description": "Python script for exploiting command injection in Open PLC Webserver v3",
"fork": false,
"created_at": "2024-03-28T21:31:45Z",
2024-05-14 03:28:59 +09:00
"updated_at": "2024-05-13T15:07:00Z",
2024-03-29 09:26:36 +09:00
"pushed_at": "2024-03-28T22:14:23Z",
2024-05-14 03:28:59 +09:00
"stargazers_count": 8,
"watchers_count": 8,
2024-03-29 09:26:36 +09:00
"has_discussions": false,
2024-04-30 21:35:02 +09:00
"forks_count": 2,
2024-03-29 09:26:36 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"exploit",
"openplc",
"rce"
],
"visibility": "public",
2024-04-30 21:35:02 +09:00
"forks": 2,
2024-05-14 03:28:59 +09:00
"watchers": 8,
2024-03-31 03:27:18 +09:00
"score": 0,
2024-04-20 09:31:14 +09:00
"subscribers_count": 2
2024-04-16 03:28:06 +09:00
},
{
"id": 786978803,
"name": "CVE-2021-31630",
"full_name": "mind2hex\/CVE-2021-31630",
"owner": {
"login": "mind2hex",
"id": 51345640,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51345640?v=4",
"html_url": "https:\/\/github.com\/mind2hex"
},
"html_url": "https:\/\/github.com\/mind2hex\/CVE-2021-31630",
"description": "OpenPLC 3 WebServer Authenticated Remote Code Execution.",
"fork": false,
"created_at": "2024-04-15T16:55:30Z",
"updated_at": "2024-04-15T16:56:49Z",
"pushed_at": "2024-04-15T17:07:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-04-16 09:29:21 +09:00
"subscribers_count": 1
2024-05-14 03:28:59 +09:00
},
{
"id": 800033894,
"name": "CVE-2021-31630-PoC",
"full_name": "sealldeveloper\/CVE-2021-31630-PoC",
"owner": {
"login": "sealldeveloper",
"id": 120470330,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120470330?v=4",
"html_url": "https:\/\/github.com\/sealldeveloper"
},
"html_url": "https:\/\/github.com\/sealldeveloper\/CVE-2021-31630-PoC",
"description": "A version of the PoC for CVE-2021-31630 from https:\/\/github.com\/Hunt3r0x\/CVE-2021-31630-HTB but without the political messages, because they are unneccessary.",
"fork": false,
"created_at": "2024-05-13T15:17:38Z",
"updated_at": "2024-05-13T15:21:58Z",
"pushed_at": "2024-05-13T15:21:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
2023-09-02 09:24:03 +09:00
}
]