PoC-in-GitHub/2021/CVE-2021-31630.json
2024-03-31 03:27:18 +09:00

127 lines
No EOL
4.4 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 391818469,
"name": "CVE-2021-31630-OpenPLC_RCE",
"full_name": "hev0x\/CVE-2021-31630-OpenPLC_RCE",
"owner": {
"login": "hev0x",
"id": 6265911,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6265911?v=4",
"html_url": "https:\/\/github.com\/hev0x"
},
"html_url": "https:\/\/github.com\/hev0x\/CVE-2021-31630-OpenPLC_RCE",
"description": "Exploit for Authenticated Remote Code Execution on OpenPLC v3 Webserver",
"fork": false,
"created_at": "2021-08-02T04:48:24Z",
"updated_at": "2023-09-28T11:30:04Z",
"pushed_at": "2021-08-02T04:48:25Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 2
},
{
"id": 775165945,
"name": "CVE-2021-31630-HTB",
"full_name": "Hunt3r0x\/CVE-2021-31630-HTB",
"owner": {
"login": "Hunt3r0x",
"id": 106396603,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106396603?v=4",
"html_url": "https:\/\/github.com\/Hunt3r0x"
},
"html_url": "https:\/\/github.com\/Hunt3r0x\/CVE-2021-31630-HTB",
"description": "proof of Concept (PoC) exploit for CVE-2021-31630, targeting the OpenPLC service running on the WifineticTwo box on the Hack The Box platform.",
"fork": false,
"created_at": "2024-03-20T22:02:53Z",
"updated_at": "2024-03-29T06:47:34Z",
"pushed_at": "2024-03-21T15:50:45Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 779013491,
"name": "cve-2021-31630",
"full_name": "thewhiteh4t\/cve-2021-31630",
"owner": {
"login": "thewhiteh4t",
"id": 36354846,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36354846?v=4",
"html_url": "https:\/\/github.com\/thewhiteh4t"
},
"html_url": "https:\/\/github.com\/thewhiteh4t\/cve-2021-31630",
"description": "Python script for exploiting command injection in Open PLC Webserver v3",
"fork": false,
"created_at": "2024-03-28T21:31:45Z",
"updated_at": "2024-03-29T19:41:59Z",
"pushed_at": "2024-03-28T22:14:23Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"exploit",
"openplc",
"rce"
],
"visibility": "public",
"forks": 0,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
{
"id": 779718133,
"name": "CVE-2021-31630",
"full_name": "UserB1ank\/CVE-2021-31630",
"owner": {
"login": "UserB1ank",
"id": 105202277,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105202277?v=4",
"html_url": "https:\/\/github.com\/UserB1ank"
},
"html_url": "https:\/\/github.com\/UserB1ank\/CVE-2021-31630",
"description": "打HTB的机器时候碰到的cveexploit-db的exp有些错误于是给出手工利用方式以及exp",
"fork": false,
"created_at": "2024-03-30T15:30:33Z",
"updated_at": "2024-03-30T15:30:34Z",
"pushed_at": "2024-03-30T15:30:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]