2021-10-06 06:14:32 +09:00
[
{
"id" : 413890827 ,
"name" : "cve-2021-41773" ,
"full_name" : "Vulnmachines\/cve-2021-41773" ,
"owner" : {
"login" : "Vulnmachines" ,
"id" : 79006904 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4" ,
"html_url" : "https:\/\/github.com\/Vulnmachines"
} ,
"html_url" : "https:\/\/github.com\/Vulnmachines\/cve-2021-41773" ,
"description" : "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49." ,
"fork" : false ,
"created_at" : "2021-10-05T16:13:38Z" ,
2022-07-05 21:17:50 +09:00
"updated_at" : "2022-07-05T07:53:35Z" ,
2022-03-11 03:14:31 +09:00
"pushed_at" : "2022-03-10T14:02:09Z" ,
2022-07-05 21:17:50 +09:00
"stargazers_count" : 40 ,
"watchers_count" : 40 ,
"forks_count" : 12 ,
2021-10-06 06:14:32 +09:00
"allow_forking" : true ,
2021-10-07 06:13:51 +09:00
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2021-10-07 06:13:51 +09:00
"topics" : [ ] ,
2021-10-06 06:14:32 +09:00
"visibility" : "public" ,
2022-07-05 21:17:50 +09:00
"forks" : 12 ,
"watchers" : 40 ,
2021-10-06 06:14:32 +09:00
"score" : 0
} ,
2021-10-06 12:15:02 +09:00
{
"id" : 414043746 ,
2021-10-10 06:12:27 +09:00
"name" : "CVE-2021-41773_CVE-2021-42013" ,
"full_name" : "Ls4ss\/CVE-2021-41773_CVE-2021-42013" ,
2021-10-06 12:15:02 +09:00
"owner" : {
2021-10-07 06:13:51 +09:00
"login" : "Ls4ss" ,
2021-10-06 12:15:02 +09:00
"id" : 25537761 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/25537761?v=4" ,
2021-10-07 06:13:51 +09:00
"html_url" : "https:\/\/github.com\/Ls4ss"
2021-10-06 12:15:02 +09:00
} ,
2021-10-10 06:12:27 +09:00
"html_url" : "https:\/\/github.com\/Ls4ss\/CVE-2021-41773_CVE-2021-42013" ,
"description" : "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE" ,
2021-10-06 12:15:02 +09:00
"fork" : false ,
"created_at" : "2021-10-06T02:28:41Z" ,
2022-05-13 03:18:19 +09:00
"updated_at" : "2022-05-12T16:02:24Z" ,
2021-12-23 09:13:39 +09:00
"pushed_at" : "2021-12-22T23:54:18Z" ,
2022-04-16 15:14:52 +09:00
"stargazers_count" : 20 ,
"watchers_count" : 20 ,
2021-12-23 09:13:39 +09:00
"forks_count" : 8 ,
2021-10-06 12:15:02 +09:00
"allow_forking" : true ,
2021-10-07 06:13:51 +09:00
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2021-10-07 06:13:51 +09:00
"topics" : [
"apache" ,
"cve" ,
"exploit" ,
"payload" ,
"pentest" ,
"rce"
] ,
2021-10-06 12:15:02 +09:00
"visibility" : "public" ,
2021-12-23 09:13:39 +09:00
"forks" : 8 ,
2022-04-16 15:14:52 +09:00
"watchers" : 20 ,
2021-10-06 12:15:02 +09:00
"score" : 0
} ,
2022-06-12 03:18:18 +09:00
{
"id" : 414248192 ,
"name" : "CVE-2021-41773" ,
"full_name" : "ranggaggngntt\/CVE-2021-41773" ,
"owner" : {
"login" : "ranggaggngntt" ,
"id" : 57105391 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/57105391?v=4" ,
"html_url" : "https:\/\/github.com\/ranggaggngntt"
} ,
"html_url" : "https:\/\/github.com\/ranggaggngntt\/CVE-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-10-06T14:36:05Z" ,
"updated_at" : "2021-10-10T18:53:04Z" ,
"pushed_at" : "2022-06-11T13:34:00Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2022-06-12 03:18:18 +09:00
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 1 ,
"score" : 0
} ,
2022-05-26 21:15:45 +09:00
{
"id" : 420407065 ,
"name" : "cve-2021-41773" ,
"full_name" : "walnutsecurity\/cve-2021-41773" ,
"owner" : {
"login" : "walnutsecurity" ,
"id" : 92915142 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/92915142?v=4" ,
"html_url" : "https:\/\/github.com\/walnutsecurity"
} ,
"html_url" : "https:\/\/github.com\/walnutsecurity\/cve-2021-41773" ,
"description" : "cve-2021-41773.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.49" ,
"fork" : false ,
"created_at" : "2021-10-23T12:31:53Z" ,
"updated_at" : "2021-11-25T09:32:45Z" ,
"pushed_at" : "2022-05-26T08:34:39Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2022-05-26 21:15:45 +09:00
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0
} ,
2022-06-30 03:20:34 +09:00
{
"id" : 438514241 ,
"name" : "MASS_CVE-2021-41773" ,
"full_name" : "i6c\/MASS_CVE-2021-41773" ,
"owner" : {
"login" : "i6c" ,
"id" : 87837042 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/87837042?v=4" ,
"html_url" : "https:\/\/github.com\/i6c"
} ,
"html_url" : "https:\/\/github.com\/i6c\/MASS_CVE-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-15T06:04:41Z" ,
"updated_at" : "2021-12-24T17:27:13Z" ,
"pushed_at" : "2021-12-15T06:06:53Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 3 ,
"score" : 0
} ,
2022-01-13 03:14:49 +09:00
{
"id" : 447314257 ,
"name" : "CVE-2021-41773-exploiter" ,
"full_name" : "norrig\/CVE-2021-41773-exploiter" ,
"owner" : {
"login" : "norrig" ,
"id" : 5526261 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5526261?v=4" ,
"html_url" : "https:\/\/github.com\/norrig"
} ,
"html_url" : "https:\/\/github.com\/norrig\/CVE-2021-41773-exploiter" ,
"description" : "School project - Please use other repos for actual testing" ,
"fork" : false ,
"created_at" : "2022-01-12T17:42:36Z" ,
2022-01-13 09:14:02 +09:00
"updated_at" : "2022-01-12T18:26:57Z" ,
2022-01-14 03:18:29 +09:00
"pushed_at" : "2022-01-13T16:18:33Z" ,
2022-01-13 03:14:49 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2022-01-13 03:14:49 +09:00
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-01-26 21:14:28 +09:00
} ,
{
"id" : 452242021 ,
"name" : "CVE-2021-41773-exercise" ,
"full_name" : "m96dg\/CVE-2021-41773-exercise" ,
"owner" : {
"login" : "m96dg" ,
"id" : 65173648 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/65173648?v=4" ,
"html_url" : "https:\/\/github.com\/m96dg"
} ,
"html_url" : "https:\/\/github.com\/m96dg\/CVE-2021-41773-exercise" ,
"description" : "A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration \"require all denied\", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and not earlier versions. Credits to: https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-41773 " ,
"fork" : false ,
"created_at" : "2022-01-26T11:02:46Z" ,
"updated_at" : "2022-01-26T11:22:13Z" ,
2022-01-31 09:15:10 +09:00
"pushed_at" : "2022-01-30T19:02:43Z" ,
2022-01-26 21:14:28 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2022-01-26 21:14:28 +09:00
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-04 09:14:21 +09:00
} ,
{
"id" : 464271089 ,
"name" : "CVE-2021-41773" ,
"full_name" : "skentagon\/CVE-2021-41773" ,
"owner" : {
"login" : "skentagon" ,
"id" : 49702576 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/49702576?v=4" ,
"html_url" : "https:\/\/github.com\/skentagon"
} ,
"html_url" : "https:\/\/github.com\/skentagon\/CVE-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-02-27T22:39:58Z" ,
"updated_at" : "2022-03-04T00:11:58Z" ,
"pushed_at" : "2022-03-04T00:05:44Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2022-03-04 09:14:21 +09:00
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-09 09:14:20 +09:00
} ,
{
"id" : 467687901 ,
"name" : "CVE-2021-41773" ,
"full_name" : "mauricelambert\/CVE-2021-41773" ,
"owner" : {
"login" : "mauricelambert" ,
"id" : 50479118 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4" ,
"html_url" : "https:\/\/github.com\/mauricelambert"
} ,
"html_url" : "https:\/\/github.com\/mauricelambert\/CVE-2021-41773" ,
2022-03-14 21:14:45 +09:00
"description" : "These Metasploit, Nmap, Python and Ruby scripts detects and exploits CVE-2021-41773 with RCE and local file disclosure." ,
2022-03-09 09:14:20 +09:00
"fork" : false ,
"created_at" : "2022-03-08T21:55:53Z" ,
2022-03-24 03:17:33 +09:00
"updated_at" : "2022-03-23T16:56:34Z" ,
2022-03-14 21:14:45 +09:00
"pushed_at" : "2022-03-14T07:34:49Z" ,
2022-03-24 03:17:33 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2022-04-23 03:17:58 +09:00
"forks_count" : 2 ,
2022-03-09 09:14:20 +09:00
"allow_forking" : true ,
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2022-03-09 09:14:20 +09:00
"topics" : [
2022-03-10 21:14:35 +09:00
"cve" ,
2022-03-09 09:14:20 +09:00
"cve-2021-41773" ,
"detection" ,
"exploit" ,
2022-03-14 21:14:45 +09:00
"metasploit" ,
2022-03-10 21:14:35 +09:00
"nmap" ,
2022-03-09 09:14:20 +09:00
"python3" ,
"rce" ,
2022-03-10 21:14:35 +09:00
"ruby" ,
2022-03-09 09:14:20 +09:00
"scanner" ,
"vulnerability"
] ,
"visibility" : "public" ,
2022-04-23 03:17:58 +09:00
"forks" : 2 ,
2022-03-24 03:17:33 +09:00
"watchers" : 1 ,
2022-03-09 09:14:20 +09:00
"score" : 0
2022-03-12 09:16:08 +09:00
} ,
{
"id" : 468909402 ,
"name" : "CVE-2021-41773" ,
"full_name" : "the29a\/CVE-2021-41773" ,
"owner" : {
"login" : "the29a" ,
"id" : 4436697 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4436697?v=4" ,
"html_url" : "https:\/\/github.com\/the29a"
} ,
"html_url" : "https:\/\/github.com\/the29a\/CVE-2021-41773" ,
"description" : "Small PoC of CVE-2021-41773" ,
"fork" : false ,
"created_at" : "2022-03-11T21:50:35Z" ,
"updated_at" : "2022-03-11T21:52:35Z" ,
"pushed_at" : "2022-03-11T22:10:25Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2022-03-12 09:16:08 +09:00
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-13 09:14:07 +09:00
} ,
{
"id" : 469203660 ,
"name" : "CVE-2021-41773" ,
"full_name" : "thehackersbrain\/CVE-2021-41773" ,
"owner" : {
"login" : "thehackersbrain" ,
"id" : 36809025 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/36809025?v=4" ,
"html_url" : "https:\/\/github.com\/thehackersbrain"
} ,
"html_url" : "https:\/\/github.com\/thehackersbrain\/CVE-2021-41773" ,
"description" : "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773" ,
"fork" : false ,
"created_at" : "2022-03-12T21:24:55Z" ,
2022-06-14 15:22:12 +09:00
"updated_at" : "2022-06-14T05:21:44Z" ,
2022-03-13 09:14:07 +09:00
"pushed_at" : "2022-03-12T21:30:58Z" ,
2022-06-14 15:22:12 +09:00
"stargazers_count" : 51 ,
"watchers_count" : 51 ,
2022-06-18 15:15:51 +09:00
"forks_count" : 18 ,
2022-03-13 09:14:07 +09:00
"allow_forking" : true ,
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2022-03-13 09:14:07 +09:00
"topics" : [
"apache2" ,
"cve-2021-41773" ,
"exploit" ,
"gauravraj" ,
"lfi" ,
"python" ,
"rce" ,
"thehackersbrain"
] ,
"visibility" : "public" ,
2022-06-18 15:15:51 +09:00
"forks" : 18 ,
2022-06-14 15:22:12 +09:00
"watchers" : 51 ,
2022-03-13 09:14:07 +09:00
"score" : 0
2022-03-14 15:14:28 +09:00
} ,
{
"id" : 469576020 ,
"name" : "CVE-2021-41773" ,
2022-04-21 21:15:22 +09:00
"full_name" : "honypot\/CVE-2021-41773" ,
2022-03-14 15:14:28 +09:00
"owner" : {
2022-04-21 21:15:22 +09:00
"login" : "honypot" ,
2022-03-14 15:14:28 +09:00
"id" : 101309325 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/101309325?v=4" ,
2022-04-21 21:15:22 +09:00
"html_url" : "https:\/\/github.com\/honypot"
2022-03-14 15:14:28 +09:00
} ,
2022-04-21 21:15:22 +09:00
"html_url" : "https:\/\/github.com\/honypot\/CVE-2021-41773" ,
2022-03-14 15:14:28 +09:00
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-14T04:08:56Z" ,
"updated_at" : "2022-03-14T04:09:11Z" ,
"pushed_at" : "2022-03-14T04:09:05Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2022-03-14 15:14:28 +09:00
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-15 03:14:44 +09:00
} ,
{
"id" : 469821841 ,
"name" : "CVE-2021-41773" ,
"full_name" : "Fa1c0n35\/CVE-2021-41773" ,
"owner" : {
"login" : "Fa1c0n35" ,
"id" : 33335488 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4" ,
"html_url" : "https:\/\/github.com\/Fa1c0n35"
} ,
"html_url" : "https:\/\/github.com\/Fa1c0n35\/CVE-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-14T16:43:49Z" ,
"updated_at" : "2022-03-14T16:44:00Z" ,
"pushed_at" : "2022-03-14T16:43:57Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2022-03-15 03:14:44 +09:00
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-28 09:14:29 +09:00
} ,
{
"id" : 474747864 ,
"name" : "CVE-2021-41773-" ,
"full_name" : "N3w-elf\/CVE-2021-41773-" ,
"owner" : {
"login" : "N3w-elf" ,
"id" : 80478753 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/80478753?v=4" ,
"html_url" : "https:\/\/github.com\/N3w-elf"
} ,
"html_url" : "https:\/\/github.com\/N3w-elf\/CVE-2021-41773-" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-27T20:10:30Z" ,
"updated_at" : "2022-03-27T20:10:30Z" ,
"pushed_at" : "2022-03-27T20:10:31Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2022-03-28 09:14:29 +09:00
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-28 21:17:37 +09:00
} ,
{
"id" : 474963195 ,
"name" : "CVE-2021-41773" ,
"full_name" : "puckiestyle\/CVE-2021-41773" ,
"owner" : {
"login" : "puckiestyle" ,
"id" : 57447087 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4" ,
"html_url" : "https:\/\/github.com\/puckiestyle"
} ,
"html_url" : "https:\/\/github.com\/puckiestyle\/CVE-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-28T11:02:46Z" ,
"updated_at" : "2022-03-28T11:03:00Z" ,
"pushed_at" : "2022-03-28T11:41:55Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2022-03-28 21:17:37 +09:00
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-31 03:17:23 +09:00
} ,
{
"id" : 475931011 ,
"name" : "CVE-2021-41773" ,
2022-04-15 09:15:28 +09:00
"full_name" : "WynSon\/CVE-2021-41773" ,
2022-03-31 03:17:23 +09:00
"owner" : {
2022-04-15 09:15:28 +09:00
"login" : "WynSon" ,
2022-03-31 03:17:23 +09:00
"id" : 83699106 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/83699106?v=4" ,
2022-04-15 09:15:28 +09:00
"html_url" : "https:\/\/github.com\/WynSon"
2022-03-31 03:17:23 +09:00
} ,
2022-04-15 09:15:28 +09:00
"html_url" : "https:\/\/github.com\/WynSon\/CVE-2021-41773" ,
2022-03-31 03:17:23 +09:00
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-30T15:04:27Z" ,
"updated_at" : "2022-03-30T17:46:13Z" ,
2022-04-15 09:15:28 +09:00
"pushed_at" : "2022-04-14T21:54:47Z" ,
2022-03-31 03:17:23 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2022-03-31 03:17:23 +09:00
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-31 15:15:09 +09:00
} ,
{
"id" : 476112666 ,
"name" : "Reserch-CVE-2021-41773" ,
"full_name" : "DoTuan1\/Reserch-CVE-2021-41773" ,
"owner" : {
"login" : "DoTuan1" ,
"id" : 63194321 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/63194321?v=4" ,
"html_url" : "https:\/\/github.com\/DoTuan1"
} ,
"html_url" : "https:\/\/github.com\/DoTuan1\/Reserch-CVE-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-31T01:48:33Z" ,
"updated_at" : "2022-03-31T01:54:45Z" ,
"pushed_at" : "2022-03-31T03:03:09Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2022-03-31 15:15:09 +09:00
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-04-03 21:14:34 +09:00
} ,
{
"id" : 477111512 ,
"name" : "netsec-polygon" ,
"full_name" : "bernardas\/netsec-polygon" ,
"owner" : {
"login" : "bernardas" ,
"id" : 62701131 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/62701131?v=4" ,
"html_url" : "https:\/\/github.com\/bernardas"
} ,
"html_url" : "https:\/\/github.com\/bernardas\/netsec-polygon" ,
"description" : "Environment for CVE-2021-41773 recreation." ,
"fork" : false ,
"created_at" : "2022-04-02T16:34:45Z" ,
"updated_at" : "2022-04-03T08:19:39Z" ,
2022-05-18 09:15:12 +09:00
"pushed_at" : "2022-05-17T22:16:34Z" ,
2022-04-03 21:14:34 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2022-04-03 21:14:34 +09:00
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-04-05 09:16:08 +09:00
} ,
{
"id" : 477889492 ,
"name" : "Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit" ,
"full_name" : "CalfCrusher\/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit" ,
"owner" : {
"login" : "CalfCrusher" ,
"id" : 5812023 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5812023?v=4" ,
"html_url" : "https:\/\/github.com\/CalfCrusher"
} ,
"html_url" : "https:\/\/github.com\/CalfCrusher\/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit" ,
"description" : "CVE-2021-41773 | CVE-2021-42013 Exploit Tool (Apache\/2.4.49-2.4.50)" ,
"fork" : false ,
"created_at" : "2022-04-04T22:07:21Z" ,
2022-04-05 15:14:42 +09:00
"updated_at" : "2022-04-05T05:17:33Z" ,
2022-04-08 21:15:03 +09:00
"pushed_at" : "2022-04-08T09:24:35Z" ,
2022-04-05 15:14:42 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2022-06-19 09:18:08 +09:00
"forks_count" : 1 ,
2022-04-05 09:16:08 +09:00
"allow_forking" : true ,
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2022-04-05 09:16:08 +09:00
"topics" : [
"cve-2021-41773" ,
"cve-2021-42013" ,
"exploit"
] ,
"visibility" : "public" ,
2022-06-19 09:18:08 +09:00
"forks" : 1 ,
2022-04-05 15:14:42 +09:00
"watchers" : 1 ,
2022-04-05 09:16:08 +09:00
"score" : 0
2022-04-07 03:23:30 +09:00
} ,
{
"id" : 478605535 ,
"name" : "cve-2021-41773" ,
"full_name" : "vuongnv3389-sec\/cve-2021-41773" ,
"owner" : {
"login" : "vuongnv3389-sec" ,
"id" : 64488431 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/64488431?v=4" ,
"html_url" : "https:\/\/github.com\/vuongnv3389-sec"
} ,
"html_url" : "https:\/\/github.com\/vuongnv3389-sec\/cve-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-04-06T14:53:19Z" ,
"updated_at" : "2022-04-06T14:54:12Z" ,
"pushed_at" : "2022-04-06T15:41:47Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2022-04-07 03:23:30 +09:00
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-04-13 03:15:47 +09:00
} ,
{
"id" : 480821526 ,
"name" : "CVE-2021-41773" ,
"full_name" : "Chocapikk\/CVE-2021-41773" ,
"owner" : {
"login" : "Chocapikk" ,
"id" : 88535377 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4" ,
"html_url" : "https:\/\/github.com\/Chocapikk"
} ,
"html_url" : "https:\/\/github.com\/Chocapikk\/CVE-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-04-12T13:25:58Z" ,
2022-04-20 03:17:43 +09:00
"updated_at" : "2022-04-19T17:03:53Z" ,
2022-04-13 03:15:47 +09:00
"pushed_at" : "2022-04-12T13:26:22Z" ,
2022-04-20 03:17:43 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2022-04-13 03:15:47 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2022-04-13 03:15:47 +09:00
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2022-04-20 03:17:43 +09:00
"watchers" : 1 ,
2022-04-13 03:15:47 +09:00
"score" : 0
2022-04-28 03:16:50 +09:00
} ,
{
"id" : 486245191 ,
"name" : "Apache_Penetration_Tool" ,
"full_name" : "wangfly-me\/Apache_Penetration_Tool" ,
"owner" : {
"login" : "wangfly-me" ,
"id" : 25388540 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/25388540?v=4" ,
"html_url" : "https:\/\/github.com\/wangfly-me"
} ,
"html_url" : "https:\/\/github.com\/wangfly-me\/Apache_Penetration_Tool" ,
"description" : "CVE-2021-41773&CVE-2021-42013图形化漏洞检测利用工具" ,
"fork" : false ,
"created_at" : "2022-04-27T15:17:38Z" ,
2022-05-23 15:15:29 +09:00
"updated_at" : "2022-05-23T03:30:13Z" ,
2022-04-28 03:16:50 +09:00
"pushed_at" : "2022-04-27T15:36:24Z" ,
2022-05-23 15:15:29 +09:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2022-04-28 03:16:50 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2022-04-28 03:16:50 +09:00
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2022-05-23 15:15:29 +09:00
"watchers" : 3 ,
2022-04-28 03:16:50 +09:00
"score" : 0
2022-06-07 21:18:14 +09:00
} ,
{
"id" : 500809753 ,
"name" : "CVE-2021-41773" ,
"full_name" : "hab1b0x\/CVE-2021-41773" ,
"owner" : {
"login" : "hab1b0x" ,
"id" : 24976957 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/24976957?v=4" ,
"html_url" : "https:\/\/github.com\/hab1b0x"
} ,
"html_url" : "https:\/\/github.com\/hab1b0x\/CVE-2021-41773" ,
"description" : "CVE-2021-41773 | Apache HTTP Server 2.4.49 is vulnerable to Path Traversal and Remote Code execution attacks " ,
"fork" : false ,
"created_at" : "2022-06-07T11:22:08Z" ,
2022-07-06 21:17:56 +09:00
"updated_at" : "2022-07-06T09:28:44Z" ,
2022-06-07 21:18:14 +09:00
"pushed_at" : "2022-06-07T11:23:40Z" ,
2022-07-05 15:17:02 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2022-06-07 21:18:14 +09:00
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2022-06-07 21:18:14 +09:00
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
2022-07-05 15:17:02 +09:00
"watchers" : 2 ,
2022-06-07 21:18:14 +09:00
"score" : 0
2022-06-18 03:20:46 +09:00
} ,
{
"id" : 504547542 ,
"name" : "CVE-2021-41773-Apache-RCE" ,
"full_name" : "pwn3z\/CVE-2021-41773-Apache-RCE" ,
"owner" : {
"login" : "pwn3z" ,
"id" : 71440287 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/71440287?v=4" ,
"html_url" : "https:\/\/github.com\/pwn3z"
} ,
"html_url" : "https:\/\/github.com\/pwn3z\/CVE-2021-41773-Apache-RCE" ,
"description" : "A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration \"require all denied\", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013." ,
"fork" : false ,
"created_at" : "2022-06-17T13:36:42Z" ,
"updated_at" : "2022-06-17T13:38:47Z" ,
"pushed_at" : "2022-06-17T13:39:38Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2022-06-18 03:20:46 +09:00
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-10-06 06:14:32 +09:00
}
]