PoC-in-GitHub/2021/CVE-2021-41773.json

749 lines
26 KiB
JSON
Raw Normal View History

2021-10-05 23:14:32 +02:00
[
{
"id": 413890827,
"name": "cve-2021-41773",
"full_name": "Vulnmachines\/cve-2021-41773",
"owner": {
"login": "Vulnmachines",
"id": 79006904,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
"html_url": "https:\/\/github.com\/Vulnmachines"
},
"html_url": "https:\/\/github.com\/Vulnmachines\/cve-2021-41773",
"description": "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.",
"fork": false,
"created_at": "2021-10-05T16:13:38Z",
2022-03-23 19:17:33 +01:00
"updated_at": "2022-03-23T16:50:30Z",
2022-03-10 19:14:31 +01:00
"pushed_at": "2022-03-10T14:02:09Z",
2022-03-23 19:17:33 +01:00
"stargazers_count": 38,
"watchers_count": 38,
2022-01-13 19:18:29 +01:00
"forks_count": 11,
2021-10-05 23:14:32 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-05 23:14:32 +02:00
"visibility": "public",
2022-01-13 19:18:29 +01:00
"forks": 11,
2022-03-23 19:17:33 +01:00
"watchers": 38,
2021-10-05 23:14:32 +02:00
"score": 0
},
{
"id": 413916846,
"name": "PoC-CVE-2021-41773",
"full_name": "iilegacyyii\/PoC-CVE-2021-41773",
"owner": {
"login": "iilegacyyii",
"id": 68760809,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68760809?v=4",
"html_url": "https:\/\/github.com\/iilegacyyii"
},
"html_url": "https:\/\/github.com\/iilegacyyii\/PoC-CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-05T17:30:43Z",
2022-03-16 13:17:06 +01:00
"updated_at": "2022-03-16T11:34:06Z",
2021-11-24 19:13:10 +01:00
"pushed_at": "2021-11-24T12:57:46Z",
2022-03-16 13:17:06 +01:00
"stargazers_count": 40,
"watchers_count": 40,
2022-02-01 13:14:29 +01:00
"forks_count": 37,
2021-10-05 23:14:32 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
2021-11-24 19:13:10 +01:00
"topics": [
"apache",
"cve",
"lfi",
"poc",
"rce"
],
2021-10-05 23:14:32 +02:00
"visibility": "public",
2022-02-01 13:14:29 +01:00
"forks": 37,
2022-03-16 13:17:06 +01:00
"watchers": 40,
2021-10-05 23:14:32 +02:00
"score": 0
},
2021-10-06 05:15:02 +02:00
{
"id": 414043746,
2021-10-09 23:12:27 +02:00
"name": "CVE-2021-41773_CVE-2021-42013",
"full_name": "Ls4ss\/CVE-2021-41773_CVE-2021-42013",
2021-10-06 05:15:02 +02:00
"owner": {
2021-10-06 23:13:51 +02:00
"login": "Ls4ss",
2021-10-06 05:15:02 +02:00
"id": 25537761,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25537761?v=4",
2021-10-06 23:13:51 +02:00
"html_url": "https:\/\/github.com\/Ls4ss"
2021-10-06 05:15:02 +02:00
},
2021-10-09 23:12:27 +02:00
"html_url": "https:\/\/github.com\/Ls4ss\/CVE-2021-41773_CVE-2021-42013",
"description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE",
2021-10-06 05:15:02 +02:00
"fork": false,
"created_at": "2021-10-06T02:28:41Z",
2022-03-14 19:14:44 +01:00
"updated_at": "2022-03-14T15:59:57Z",
2021-12-23 01:13:39 +01:00
"pushed_at": "2021-12-22T23:54:18Z",
2022-03-14 19:14:44 +01:00
"stargazers_count": 19,
"watchers_count": 19,
2021-12-23 01:13:39 +01:00
"forks_count": 8,
2021-10-06 05:15:02 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [
"apache",
"cve",
"exploit",
"payload",
"pentest",
"rce"
],
2021-10-06 05:15:02 +02:00
"visibility": "public",
2021-12-23 01:13:39 +01:00
"forks": 8,
2022-03-14 19:14:44 +01:00
"watchers": 19,
2021-10-06 05:15:02 +02:00
"score": 0
},
2021-10-08 05:12:49 +02:00
{
"id": 414804962,
"name": "CVE-2021-41773",
"full_name": "shellreaper\/CVE-2021-41773",
"owner": {
"login": "shellreaper",
"id": 76930483,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76930483?v=4",
"html_url": "https:\/\/github.com\/shellreaper"
},
"html_url": "https:\/\/github.com\/shellreaper\/CVE-2021-41773",
2021-11-12 01:13:05 +01:00
"description": "This is a simple POC for Apache\/2.4.49 Path Traversal Vulnerability",
2021-10-08 05:12:49 +02:00
"fork": false,
"created_at": "2021-10-08T01:13:33Z",
2021-11-12 01:13:05 +01:00
"updated_at": "2021-11-12T00:05:10Z",
"pushed_at": "2021-11-12T00:03:34Z",
2021-10-10 23:13:34 +02:00
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
2021-10-08 11:13:11 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-10-10 23:13:34 +02:00
"forks": 2,
"watchers": 4,
2021-10-08 11:13:11 +02:00
"score": 0
},
2021-10-24 17:12:31 +02:00
{
"id": 420407065,
"name": "cve-2021-41773",
"full_name": "walnutsecurity\/cve-2021-41773",
"owner": {
"login": "walnutsecurity",
"id": 92915142,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92915142?v=4",
"html_url": "https:\/\/github.com\/walnutsecurity"
},
"html_url": "https:\/\/github.com\/walnutsecurity\/cve-2021-41773",
2021-10-27 17:14:12 +02:00
"description": "cve-2021-41773.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.49",
2021-10-24 17:12:31 +02:00
"fork": false,
"created_at": "2021-10-23T12:31:53Z",
2021-11-25 13:13:16 +01:00
"updated_at": "2021-11-25T09:32:45Z",
"pushed_at": "2021-11-25T09:32:43Z",
2021-10-24 17:12:31 +02:00
"stargazers_count": 0,
"watchers_count": 0,
2021-10-26 05:14:05 +02:00
"forks_count": 1,
2021-10-24 17:12:31 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-10-26 05:14:05 +02:00
"forks": 1,
2021-10-24 17:12:31 +02:00
"watchers": 0,
"score": 0
},
2021-10-26 23:16:55 +02:00
{
"id": 421553366,
"name": "CVE-2021-41773",
"full_name": "Balgogan\/CVE-2021-41773",
"owner": {
"login": "Balgogan",
"id": 88535377,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
"html_url": "https:\/\/github.com\/Balgogan"
},
"html_url": "https:\/\/github.com\/Balgogan\/CVE-2021-41773",
"description": "Ce programme permet de détecter une faille RCE sur les serveurs Apache 2.4.49 et Apache 2.4.50",
"fork": false,
"created_at": "2021-10-26T19:11:28Z",
2022-03-15 01:14:36 +01:00
"updated_at": "2022-03-14T21:33:30Z",
2021-11-11 07:14:53 +01:00
"pushed_at": "2021-11-11T00:48:37Z",
2022-03-15 01:14:36 +01:00
"stargazers_count": 12,
"watchers_count": 12,
2021-11-20 01:13:28 +01:00
"forks_count": 4,
2021-10-26 23:16:55 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-11-20 01:13:28 +01:00
"forks": 4,
2022-03-15 01:14:36 +01:00
"watchers": 12,
2021-10-26 23:16:55 +02:00
"score": 0
2021-10-29 11:15:04 +02:00
},
2021-11-05 01:13:01 +01:00
{
"id": 424762276,
"name": "CVE-2021-41773-Playground",
"full_name": "Hydragyrum\/CVE-2021-41773-Playground",
"owner": {
"login": "Hydragyrum",
"id": 4928181,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4928181?v=4",
"html_url": "https:\/\/github.com\/Hydragyrum"
},
"html_url": "https:\/\/github.com\/Hydragyrum\/CVE-2021-41773-Playground",
"description": "Some docker images to play with CVE-2021-41773 and CVE-2021-42013",
"fork": false,
"created_at": "2021-11-04T22:52:44Z",
2022-01-11 13:16:14 +01:00
"updated_at": "2022-01-11T09:06:38Z",
2021-11-05 01:13:01 +01:00
"pushed_at": "2021-11-04T22:56:14Z",
2022-01-11 13:16:14 +01:00
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
2021-11-05 01:13:01 +01:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-01-11 13:16:14 +01:00
"forks": 1,
"watchers": 5,
2021-11-05 01:13:01 +01:00
"score": 0
2021-11-09 07:12:55 +01:00
},
{
"id": 426066790,
"name": "Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit",
"full_name": "IcmpOff\/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit",
"owner": {
"login": "IcmpOff",
"id": 71145797,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71145797?v=4",
"html_url": "https:\/\/github.com\/IcmpOff"
},
"html_url": "https:\/\/github.com\/IcmpOff\/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit",
"description": "This Metasploit module exploits an unauthenticated remote code execution vulnerability which exists in Apache version 2.4.49 (CVE-2021-41773). If files outside of the document root are not protected by require all denied and CGI has been explicitly enabled, it can be used to execute arbitrary commands. This vulnerability has been reintroduced in the Apache 2.4.50 fix (CVE-2021-42013).",
"fork": false,
"created_at": "2021-11-09T02:38:13Z",
"updated_at": "2021-11-09T02:42:52Z",
"pushed_at": "2021-11-09T02:39:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"apache",
"exploit",
"metasploit",
"metasploit-framework",
"metasploit-modules",
"rce"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
2021-11-14 07:12:52 +01:00
{
"id": 427815832,
"name": "POC-CVE-2021-41773",
"full_name": "kubota\/POC-CVE-2021-41773",
"owner": {
"login": "kubota",
"id": 119277,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119277?v=4",
"html_url": "https:\/\/github.com\/kubota"
},
"html_url": "https:\/\/github.com\/kubota\/POC-CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-11-14T02:02:45Z",
2021-11-17 01:13:21 +01:00
"updated_at": "2021-11-16T20:42:27Z",
"pushed_at": "2021-11-16T20:42:25Z",
2021-11-14 07:12:52 +01:00
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
2021-11-14 19:14:07 +01:00
},
{
"id": 427956449,
"name": "CVE-2021-41773",
"full_name": "xMohamed0\/CVE-2021-41773",
"owner": {
"login": "xMohamed0",
"id": 94008154,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94008154?v=4",
"html_url": "https:\/\/github.com\/xMohamed0"
},
"html_url": "https:\/\/github.com\/xMohamed0\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-11-14T14:50:45Z",
"updated_at": "2021-11-14T14:55:20Z",
"pushed_at": "2021-11-14T14:55:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2021-11-26 07:12:58 +01:00
},
2021-12-15 07:15:25 +01:00
{
"id": 438514241,
"name": "MASS_CVE-2021-41773",
"full_name": "i6c\/MASS_CVE-2021-41773",
"owner": {
"login": "i6c",
"id": 87837042,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87837042?v=4",
"html_url": "https:\/\/github.com\/i6c"
},
"html_url": "https:\/\/github.com\/i6c\/MASS_CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-12-15T06:04:41Z",
2021-12-24 19:13:30 +01:00
"updated_at": "2021-12-24T17:27:13Z",
2021-12-15 07:15:25 +01:00
"pushed_at": "2021-12-15T06:06:53Z",
2021-12-24 19:13:30 +01:00
"stargazers_count": 3,
"watchers_count": 3,
2021-12-22 01:14:26 +01:00
"forks_count": 1,
2021-12-15 07:15:25 +01:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-12-22 01:14:26 +01:00
"forks": 1,
2021-12-24 19:13:30 +01:00
"watchers": 3,
2021-12-15 07:15:25 +01:00
"score": 0
2021-12-26 19:13:31 +01:00
},
2022-01-12 19:14:49 +01:00
{
"id": 447314257,
"name": "CVE-2021-41773-exploiter",
"full_name": "norrig\/CVE-2021-41773-exploiter",
"owner": {
"login": "norrig",
"id": 5526261,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5526261?v=4",
"html_url": "https:\/\/github.com\/norrig"
},
"html_url": "https:\/\/github.com\/norrig\/CVE-2021-41773-exploiter",
"description": "School project - Please use other repos for actual testing",
"fork": false,
"created_at": "2022-01-12T17:42:36Z",
2022-01-13 01:14:02 +01:00
"updated_at": "2022-01-12T18:26:57Z",
2022-01-13 19:18:29 +01:00
"pushed_at": "2022-01-13T16:18:33Z",
2022-01-12 19:14:49 +01:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-01-26 13:14:28 +01:00
},
{
"id": 452242021,
"name": "CVE-2021-41773-exercise",
"full_name": "m96dg\/CVE-2021-41773-exercise",
"owner": {
"login": "m96dg",
"id": 65173648,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65173648?v=4",
"html_url": "https:\/\/github.com\/m96dg"
},
"html_url": "https:\/\/github.com\/m96dg\/CVE-2021-41773-exercise",
"description": "A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration \"require all denied\", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and not earlier versions. Credits to: https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-41773 ",
"fork": false,
"created_at": "2022-01-26T11:02:46Z",
"updated_at": "2022-01-26T11:22:13Z",
2022-01-31 01:15:10 +01:00
"pushed_at": "2022-01-30T19:02:43Z",
2022-01-26 13:14:28 +01:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-03-04 01:14:21 +01:00
},
{
"id": 464271089,
"name": "CVE-2021-41773",
"full_name": "skentagon\/CVE-2021-41773",
"owner": {
"login": "skentagon",
"id": 49702576,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49702576?v=4",
"html_url": "https:\/\/github.com\/skentagon"
},
"html_url": "https:\/\/github.com\/skentagon\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-02-27T22:39:58Z",
"updated_at": "2022-03-04T00:11:58Z",
"pushed_at": "2022-03-04T00:05:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-03-09 01:14:20 +01:00
},
{
"id": 467687901,
"name": "CVE-2021-41773",
"full_name": "mauricelambert\/CVE-2021-41773",
"owner": {
"login": "mauricelambert",
"id": 50479118,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4",
"html_url": "https:\/\/github.com\/mauricelambert"
},
"html_url": "https:\/\/github.com\/mauricelambert\/CVE-2021-41773",
2022-03-14 13:14:45 +01:00
"description": "These Metasploit, Nmap, Python and Ruby scripts detects and exploits CVE-2021-41773 with RCE and local file disclosure.",
2022-03-09 01:14:20 +01:00
"fork": false,
"created_at": "2022-03-08T21:55:53Z",
2022-03-23 19:17:33 +01:00
"updated_at": "2022-03-23T16:56:34Z",
2022-03-14 13:14:45 +01:00
"pushed_at": "2022-03-14T07:34:49Z",
2022-03-23 19:17:33 +01:00
"stargazers_count": 1,
"watchers_count": 1,
2022-03-09 01:14:20 +01:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
2022-03-10 13:14:35 +01:00
"cve",
2022-03-09 01:14:20 +01:00
"cve-2021-41773",
"detection",
"exploit",
2022-03-14 13:14:45 +01:00
"metasploit",
2022-03-10 13:14:35 +01:00
"nmap",
2022-03-09 01:14:20 +01:00
"python3",
"rce",
2022-03-10 13:14:35 +01:00
"ruby",
2022-03-09 01:14:20 +01:00
"scanner",
"vulnerability"
],
"visibility": "public",
"forks": 0,
2022-03-23 19:17:33 +01:00
"watchers": 1,
2022-03-09 01:14:20 +01:00
"score": 0
2022-03-12 01:16:08 +01:00
},
{
"id": 468909402,
"name": "CVE-2021-41773",
"full_name": "the29a\/CVE-2021-41773",
"owner": {
"login": "the29a",
"id": 4436697,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4436697?v=4",
"html_url": "https:\/\/github.com\/the29a"
},
"html_url": "https:\/\/github.com\/the29a\/CVE-2021-41773",
"description": "Small PoC of CVE-2021-41773",
"fork": false,
"created_at": "2022-03-11T21:50:35Z",
"updated_at": "2022-03-11T21:52:35Z",
"pushed_at": "2022-03-11T22:10:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-03-13 01:14:07 +01:00
},
{
"id": 469203660,
"name": "CVE-2021-41773",
"full_name": "thehackersbrain\/CVE-2021-41773",
"owner": {
"login": "thehackersbrain",
"id": 36809025,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36809025?v=4",
"html_url": "https:\/\/github.com\/thehackersbrain"
},
"html_url": "https:\/\/github.com\/thehackersbrain\/CVE-2021-41773",
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
"fork": false,
"created_at": "2022-03-12T21:24:55Z",
2022-03-31 20:16:51 +02:00
"updated_at": "2022-03-31T12:45:37Z",
2022-03-13 01:14:07 +01:00
"pushed_at": "2022-03-12T21:30:58Z",
2022-03-31 20:16:51 +02:00
"stargazers_count": 51,
"watchers_count": 51,
2022-04-07 14:15:10 +02:00
"forks_count": 16,
2022-03-13 01:14:07 +01:00
"allow_forking": true,
"is_template": false,
"topics": [
"apache2",
"cve-2021-41773",
"exploit",
"gauravraj",
"lfi",
"python",
"rce",
"thehackersbrain"
],
"visibility": "public",
2022-04-07 14:15:10 +02:00
"forks": 16,
2022-03-31 20:16:51 +02:00
"watchers": 51,
2022-03-13 01:14:07 +01:00
"score": 0
2022-03-14 07:14:28 +01:00
},
{
"id": 469576020,
"name": "CVE-2021-41773",
"full_name": "cryst4lliz3\/CVE-2021-41773",
"owner": {
"login": "cryst4lliz3",
"id": 101309325,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101309325?v=4",
"html_url": "https:\/\/github.com\/cryst4lliz3"
},
"html_url": "https:\/\/github.com\/cryst4lliz3\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-03-14T04:08:56Z",
"updated_at": "2022-03-14T04:09:11Z",
"pushed_at": "2022-03-14T04:09:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-03-14 19:14:44 +01:00
},
{
"id": 469821841,
"name": "CVE-2021-41773",
"full_name": "Fa1c0n35\/CVE-2021-41773",
"owner": {
"login": "Fa1c0n35",
"id": 33335488,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4",
"html_url": "https:\/\/github.com\/Fa1c0n35"
},
"html_url": "https:\/\/github.com\/Fa1c0n35\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-03-14T16:43:49Z",
"updated_at": "2022-03-14T16:44:00Z",
"pushed_at": "2022-03-14T16:43:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-03-28 02:14:29 +02:00
},
{
"id": 474747864,
"name": "CVE-2021-41773-",
"full_name": "N3w-elf\/CVE-2021-41773-",
"owner": {
"login": "N3w-elf",
"id": 80478753,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80478753?v=4",
"html_url": "https:\/\/github.com\/N3w-elf"
},
"html_url": "https:\/\/github.com\/N3w-elf\/CVE-2021-41773-",
"description": null,
"fork": false,
"created_at": "2022-03-27T20:10:30Z",
"updated_at": "2022-03-27T20:10:30Z",
"pushed_at": "2022-03-27T20:10:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-03-28 14:17:37 +02:00
},
{
"id": 474963195,
"name": "CVE-2021-41773",
"full_name": "puckiestyle\/CVE-2021-41773",
"owner": {
"login": "puckiestyle",
"id": 57447087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
"html_url": "https:\/\/github.com\/puckiestyle"
},
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-03-28T11:02:46Z",
"updated_at": "2022-03-28T11:03:00Z",
"pushed_at": "2022-03-28T11:41:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-03-30 20:17:23 +02:00
},
{
"id": 475931011,
"name": "CVE-2021-41773",
"full_name": "spiderz0ne\/CVE-2021-41773",
"owner": {
"login": "spiderz0ne",
"id": 83699106,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83699106?v=4",
"html_url": "https:\/\/github.com\/spiderz0ne"
},
"html_url": "https:\/\/github.com\/spiderz0ne\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-03-30T15:04:27Z",
"updated_at": "2022-03-30T17:46:13Z",
2022-03-31 14:15:14 +02:00
"pushed_at": "2022-03-31T10:06:20Z",
2022-03-30 20:17:23 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-03-31 08:15:09 +02:00
},
{
"id": 476112666,
"name": "Reserch-CVE-2021-41773",
"full_name": "DoTuan1\/Reserch-CVE-2021-41773",
"owner": {
"login": "DoTuan1",
"id": 63194321,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63194321?v=4",
"html_url": "https:\/\/github.com\/DoTuan1"
},
"html_url": "https:\/\/github.com\/DoTuan1\/Reserch-CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-03-31T01:48:33Z",
"updated_at": "2022-03-31T01:54:45Z",
"pushed_at": "2022-03-31T03:03:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-04-03 14:14:34 +02:00
},
{
"id": 477111512,
"name": "netsec-polygon",
"full_name": "bernardas\/netsec-polygon",
"owner": {
"login": "bernardas",
"id": 62701131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62701131?v=4",
"html_url": "https:\/\/github.com\/bernardas"
},
"html_url": "https:\/\/github.com\/bernardas\/netsec-polygon",
"description": "Environment for CVE-2021-41773 recreation.",
"fork": false,
"created_at": "2022-04-02T16:34:45Z",
"updated_at": "2022-04-03T08:19:39Z",
"pushed_at": "2022-04-02T16:42:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-04-05 02:16:08 +02:00
},
{
"id": 477889492,
"name": "Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit",
"full_name": "CalfCrusher\/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit",
"owner": {
"login": "CalfCrusher",
"id": 5812023,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5812023?v=4",
"html_url": "https:\/\/github.com\/CalfCrusher"
},
"html_url": "https:\/\/github.com\/CalfCrusher\/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit",
"description": "CVE-2021-41773 | CVE-2021-42013 Exploit Tool (Apache\/2.4.49-2.4.50)",
"fork": false,
"created_at": "2022-04-04T22:07:21Z",
2022-04-05 08:14:42 +02:00
"updated_at": "2022-04-05T05:17:33Z",
2022-04-05 02:16:08 +02:00
"pushed_at": "2022-04-04T23:14:48Z",
2022-04-05 08:14:42 +02:00
"stargazers_count": 1,
"watchers_count": 1,
2022-04-05 02:16:08 +02:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-41773",
"cve-2021-42013",
"exploit"
],
"visibility": "public",
"forks": 0,
2022-04-05 08:14:42 +02:00
"watchers": 1,
2022-04-05 02:16:08 +02:00
"score": 0
2022-04-06 20:23:30 +02:00
},
{
"id": 478605535,
"name": "cve-2021-41773",
"full_name": "vuongnv3389-sec\/cve-2021-41773",
"owner": {
"login": "vuongnv3389-sec",
"id": 64488431,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64488431?v=4",
"html_url": "https:\/\/github.com\/vuongnv3389-sec"
},
"html_url": "https:\/\/github.com\/vuongnv3389-sec\/cve-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-04-06T14:53:19Z",
"updated_at": "2022-04-06T14:54:12Z",
"pushed_at": "2022-04-06T15:41:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2021-10-05 23:14:32 +02:00
}
]