2021-10-05 23:14:32 +02:00
[
{
"id" : 413890827 ,
"name" : "cve-2021-41773" ,
"full_name" : "Vulnmachines\/cve-2021-41773" ,
"owner" : {
"login" : "Vulnmachines" ,
"id" : 79006904 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4" ,
"html_url" : "https:\/\/github.com\/Vulnmachines"
} ,
"html_url" : "https:\/\/github.com\/Vulnmachines\/cve-2021-41773" ,
"description" : "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49." ,
"fork" : false ,
"created_at" : "2021-10-05T16:13:38Z" ,
2022-03-23 19:17:33 +01:00
"updated_at" : "2022-03-23T16:50:30Z" ,
2022-03-10 19:14:31 +01:00
"pushed_at" : "2022-03-10T14:02:09Z" ,
2022-03-23 19:17:33 +01:00
"stargazers_count" : 38 ,
"watchers_count" : 38 ,
2022-01-13 19:18:29 +01:00
"forks_count" : 11 ,
2021-10-05 23:14:32 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
"topics" : [ ] ,
2021-10-05 23:14:32 +02:00
"visibility" : "public" ,
2022-01-13 19:18:29 +01:00
"forks" : 11 ,
2022-03-23 19:17:33 +01:00
"watchers" : 38 ,
2021-10-05 23:14:32 +02:00
"score" : 0
} ,
2022-04-12 20:15:47 +02:00
{
"id" : 413916846 ,
"name" : "PoC-CVE-2021-41773" ,
"full_name" : "iilegacyyii\/PoC-CVE-2021-41773" ,
"owner" : {
"login" : "iilegacyyii" ,
"id" : 68760809 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/68760809?v=4" ,
"html_url" : "https:\/\/github.com\/iilegacyyii"
} ,
"html_url" : "https:\/\/github.com\/iilegacyyii\/PoC-CVE-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-10-05T17:30:43Z" ,
2022-04-13 14:15:21 +02:00
"updated_at" : "2022-04-13T10:10:25Z" ,
2022-04-12 20:15:47 +02:00
"pushed_at" : "2021-11-24T12:57:46Z" ,
2022-04-13 14:15:21 +02:00
"stargazers_count" : 39 ,
"watchers_count" : 39 ,
2022-04-12 20:15:47 +02:00
"forks_count" : 37 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"apache" ,
"cve" ,
"lfi" ,
"poc" ,
"rce"
] ,
"visibility" : "public" ,
"forks" : 37 ,
2022-04-13 14:15:21 +02:00
"watchers" : 39 ,
2022-04-12 20:15:47 +02:00
"score" : 0
} ,
2021-10-06 05:15:02 +02:00
{
"id" : 414043746 ,
2021-10-09 23:12:27 +02:00
"name" : "CVE-2021-41773_CVE-2021-42013" ,
"full_name" : "Ls4ss\/CVE-2021-41773_CVE-2021-42013" ,
2021-10-06 05:15:02 +02:00
"owner" : {
2021-10-06 23:13:51 +02:00
"login" : "Ls4ss" ,
2021-10-06 05:15:02 +02:00
"id" : 25537761 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/25537761?v=4" ,
2021-10-06 23:13:51 +02:00
"html_url" : "https:\/\/github.com\/Ls4ss"
2021-10-06 05:15:02 +02:00
} ,
2021-10-09 23:12:27 +02:00
"html_url" : "https:\/\/github.com\/Ls4ss\/CVE-2021-41773_CVE-2021-42013" ,
"description" : "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE" ,
2021-10-06 05:15:02 +02:00
"fork" : false ,
"created_at" : "2021-10-06T02:28:41Z" ,
2022-03-14 19:14:44 +01:00
"updated_at" : "2022-03-14T15:59:57Z" ,
2021-12-23 01:13:39 +01:00
"pushed_at" : "2021-12-22T23:54:18Z" ,
2022-03-14 19:14:44 +01:00
"stargazers_count" : 19 ,
"watchers_count" : 19 ,
2021-12-23 01:13:39 +01:00
"forks_count" : 8 ,
2021-10-06 05:15:02 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
"topics" : [
"apache" ,
"cve" ,
"exploit" ,
"payload" ,
"pentest" ,
"rce"
] ,
2021-10-06 05:15:02 +02:00
"visibility" : "public" ,
2021-12-23 01:13:39 +01:00
"forks" : 8 ,
2022-03-14 19:14:44 +01:00
"watchers" : 19 ,
2021-10-06 05:15:02 +02:00
"score" : 0
} ,
2021-10-08 05:12:49 +02:00
{
"id" : 414804962 ,
"name" : "CVE-2021-41773" ,
"full_name" : "shellreaper\/CVE-2021-41773" ,
"owner" : {
"login" : "shellreaper" ,
"id" : 76930483 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/76930483?v=4" ,
"html_url" : "https:\/\/github.com\/shellreaper"
} ,
"html_url" : "https:\/\/github.com\/shellreaper\/CVE-2021-41773" ,
2021-11-12 01:13:05 +01:00
"description" : "This is a simple POC for Apache\/2.4.49 Path Traversal Vulnerability" ,
2021-10-08 05:12:49 +02:00
"fork" : false ,
"created_at" : "2021-10-08T01:13:33Z" ,
2021-11-12 01:13:05 +01:00
"updated_at" : "2021-11-12T00:05:10Z" ,
"pushed_at" : "2021-11-12T00:03:34Z" ,
2021-10-10 23:13:34 +02:00
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"forks_count" : 2 ,
2021-10-08 11:13:11 +02:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-10-10 23:13:34 +02:00
"forks" : 2 ,
"watchers" : 4 ,
2021-10-08 11:13:11 +02:00
"score" : 0
} ,
2021-10-24 17:12:31 +02:00
{
2022-04-12 20:15:47 +02:00
"id" : 420407065 ,
"name" : "cve-2021-41773" ,
"full_name" : "walnutsecurity\/cve-2021-41773" ,
2022-04-12 14:15:32 +02:00
"owner" : {
2022-04-12 20:15:47 +02:00
"login" : "walnutsecurity" ,
"id" : 92915142 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/92915142?v=4" ,
"html_url" : "https:\/\/github.com\/walnutsecurity"
2022-04-12 14:15:32 +02:00
} ,
2022-04-12 20:15:47 +02:00
"html_url" : "https:\/\/github.com\/walnutsecurity\/cve-2021-41773" ,
"description" : "cve-2021-41773.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.49" ,
2022-04-12 14:15:32 +02:00
"fork" : false ,
2022-04-12 20:15:47 +02:00
"created_at" : "2021-10-23T12:31:53Z" ,
"updated_at" : "2021-11-25T09:32:45Z" ,
"pushed_at" : "2021-11-25T09:32:43Z" ,
2022-04-12 14:15:32 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0
} ,
2021-11-09 07:12:55 +01:00
{
"id" : 426066790 ,
"name" : "Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit" ,
"full_name" : "IcmpOff\/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit" ,
"owner" : {
"login" : "IcmpOff" ,
"id" : 71145797 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/71145797?v=4" ,
"html_url" : "https:\/\/github.com\/IcmpOff"
} ,
"html_url" : "https:\/\/github.com\/IcmpOff\/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit" ,
"description" : "This Metasploit module exploits an unauthenticated remote code execution vulnerability which exists in Apache version 2.4.49 (CVE-2021-41773). If files outside of the document root are not protected by ‘ require all denied’ and CGI has been explicitly enabled, it can be used to execute arbitrary commands. This vulnerability has been reintroduced in the Apache 2.4.50 fix (CVE-2021-42013)." ,
"fork" : false ,
"created_at" : "2021-11-09T02:38:13Z" ,
"updated_at" : "2021-11-09T02:42:52Z" ,
"pushed_at" : "2021-11-09T02:39:22Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"apache" ,
"exploit" ,
"metasploit" ,
"metasploit-framework" ,
"metasploit-modules" ,
"rce"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
2022-04-12 20:15:47 +02:00
{
"id" : 427005450 ,
"name" : "CVE-2021-41773" ,
"full_name" : "pirenga\/CVE-2021-41773" ,
"owner" : {
"login" : "pirenga" ,
"id" : 10979104 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/10979104?v=4" ,
"html_url" : "https:\/\/github.com\/pirenga"
} ,
"html_url" : "https:\/\/github.com\/pirenga\/CVE-2021-41773" ,
"description" : "Ce programme permet de détecter une faille RCE sur les serveurs Apache 2.4.49 et Apache 2.4.50" ,
"fork" : false ,
"created_at" : "2021-11-11T13:10:05Z" ,
"updated_at" : "2022-04-12T13:25:39Z" ,
"pushed_at" : "2021-11-11T00:48:37Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
2021-11-14 07:12:52 +01:00
{
"id" : 427815832 ,
"name" : "POC-CVE-2021-41773" ,
"full_name" : "kubota\/POC-CVE-2021-41773" ,
"owner" : {
"login" : "kubota" ,
"id" : 119277 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/119277?v=4" ,
"html_url" : "https:\/\/github.com\/kubota"
} ,
"html_url" : "https:\/\/github.com\/kubota\/POC-CVE-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-11-14T02:02:45Z" ,
2021-11-17 01:13:21 +01:00
"updated_at" : "2021-11-16T20:42:27Z" ,
"pushed_at" : "2021-11-16T20:42:25Z" ,
2021-11-14 07:12:52 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
2021-11-14 19:14:07 +01:00
} ,
{
"id" : 427956449 ,
"name" : "CVE-2021-41773" ,
"full_name" : "xMohamed0\/CVE-2021-41773" ,
"owner" : {
"login" : "xMohamed0" ,
"id" : 94008154 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/94008154?v=4" ,
"html_url" : "https:\/\/github.com\/xMohamed0"
} ,
"html_url" : "https:\/\/github.com\/xMohamed0\/CVE-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-11-14T14:50:45Z" ,
"updated_at" : "2021-11-14T14:55:20Z" ,
"pushed_at" : "2021-11-14T14:55:18Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-11-26 07:12:58 +01:00
} ,
2021-12-15 07:15:25 +01:00
{
"id" : 438514241 ,
"name" : "MASS_CVE-2021-41773" ,
"full_name" : "i6c\/MASS_CVE-2021-41773" ,
"owner" : {
"login" : "i6c" ,
"id" : 87837042 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/87837042?v=4" ,
"html_url" : "https:\/\/github.com\/i6c"
} ,
"html_url" : "https:\/\/github.com\/i6c\/MASS_CVE-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-15T06:04:41Z" ,
2021-12-24 19:13:30 +01:00
"updated_at" : "2021-12-24T17:27:13Z" ,
2021-12-15 07:15:25 +01:00
"pushed_at" : "2021-12-15T06:06:53Z" ,
2021-12-24 19:13:30 +01:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2021-12-22 01:14:26 +01:00
"forks_count" : 1 ,
2021-12-15 07:15:25 +01:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2021-12-22 01:14:26 +01:00
"forks" : 1 ,
2021-12-24 19:13:30 +01:00
"watchers" : 3 ,
2021-12-15 07:15:25 +01:00
"score" : 0
2021-12-26 19:13:31 +01:00
} ,
2022-01-12 19:14:49 +01:00
{
"id" : 447314257 ,
"name" : "CVE-2021-41773-exploiter" ,
"full_name" : "norrig\/CVE-2021-41773-exploiter" ,
"owner" : {
"login" : "norrig" ,
"id" : 5526261 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5526261?v=4" ,
"html_url" : "https:\/\/github.com\/norrig"
} ,
"html_url" : "https:\/\/github.com\/norrig\/CVE-2021-41773-exploiter" ,
"description" : "School project - Please use other repos for actual testing" ,
"fork" : false ,
"created_at" : "2022-01-12T17:42:36Z" ,
2022-01-13 01:14:02 +01:00
"updated_at" : "2022-01-12T18:26:57Z" ,
2022-01-13 19:18:29 +01:00
"pushed_at" : "2022-01-13T16:18:33Z" ,
2022-01-12 19:14:49 +01:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-01-26 13:14:28 +01:00
} ,
{
"id" : 452242021 ,
"name" : "CVE-2021-41773-exercise" ,
"full_name" : "m96dg\/CVE-2021-41773-exercise" ,
"owner" : {
"login" : "m96dg" ,
"id" : 65173648 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/65173648?v=4" ,
"html_url" : "https:\/\/github.com\/m96dg"
} ,
"html_url" : "https:\/\/github.com\/m96dg\/CVE-2021-41773-exercise" ,
"description" : "A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration \"require all denied\", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and not earlier versions. Credits to: https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-41773 " ,
"fork" : false ,
"created_at" : "2022-01-26T11:02:46Z" ,
"updated_at" : "2022-01-26T11:22:13Z" ,
2022-01-31 01:15:10 +01:00
"pushed_at" : "2022-01-30T19:02:43Z" ,
2022-01-26 13:14:28 +01:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-04 01:14:21 +01:00
} ,
{
"id" : 464271089 ,
"name" : "CVE-2021-41773" ,
"full_name" : "skentagon\/CVE-2021-41773" ,
"owner" : {
"login" : "skentagon" ,
"id" : 49702576 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/49702576?v=4" ,
"html_url" : "https:\/\/github.com\/skentagon"
} ,
"html_url" : "https:\/\/github.com\/skentagon\/CVE-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-02-27T22:39:58Z" ,
"updated_at" : "2022-03-04T00:11:58Z" ,
"pushed_at" : "2022-03-04T00:05:44Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-09 01:14:20 +01:00
} ,
{
"id" : 467687901 ,
"name" : "CVE-2021-41773" ,
"full_name" : "mauricelambert\/CVE-2021-41773" ,
"owner" : {
"login" : "mauricelambert" ,
"id" : 50479118 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4" ,
"html_url" : "https:\/\/github.com\/mauricelambert"
} ,
"html_url" : "https:\/\/github.com\/mauricelambert\/CVE-2021-41773" ,
2022-03-14 13:14:45 +01:00
"description" : "These Metasploit, Nmap, Python and Ruby scripts detects and exploits CVE-2021-41773 with RCE and local file disclosure." ,
2022-03-09 01:14:20 +01:00
"fork" : false ,
"created_at" : "2022-03-08T21:55:53Z" ,
2022-03-23 19:17:33 +01:00
"updated_at" : "2022-03-23T16:56:34Z" ,
2022-03-14 13:14:45 +01:00
"pushed_at" : "2022-03-14T07:34:49Z" ,
2022-03-23 19:17:33 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2022-03-09 01:14:20 +01:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
2022-03-10 13:14:35 +01:00
"cve" ,
2022-03-09 01:14:20 +01:00
"cve-2021-41773" ,
"detection" ,
"exploit" ,
2022-03-14 13:14:45 +01:00
"metasploit" ,
2022-03-10 13:14:35 +01:00
"nmap" ,
2022-03-09 01:14:20 +01:00
"python3" ,
"rce" ,
2022-03-10 13:14:35 +01:00
"ruby" ,
2022-03-09 01:14:20 +01:00
"scanner" ,
"vulnerability"
] ,
"visibility" : "public" ,
"forks" : 0 ,
2022-03-23 19:17:33 +01:00
"watchers" : 1 ,
2022-03-09 01:14:20 +01:00
"score" : 0
2022-03-12 01:16:08 +01:00
} ,
{
"id" : 468909402 ,
"name" : "CVE-2021-41773" ,
"full_name" : "the29a\/CVE-2021-41773" ,
"owner" : {
"login" : "the29a" ,
"id" : 4436697 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4436697?v=4" ,
"html_url" : "https:\/\/github.com\/the29a"
} ,
"html_url" : "https:\/\/github.com\/the29a\/CVE-2021-41773" ,
"description" : "Small PoC of CVE-2021-41773" ,
"fork" : false ,
"created_at" : "2022-03-11T21:50:35Z" ,
"updated_at" : "2022-03-11T21:52:35Z" ,
"pushed_at" : "2022-03-11T22:10:25Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-13 01:14:07 +01:00
} ,
{
"id" : 469203660 ,
"name" : "CVE-2021-41773" ,
"full_name" : "thehackersbrain\/CVE-2021-41773" ,
"owner" : {
"login" : "thehackersbrain" ,
"id" : 36809025 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/36809025?v=4" ,
"html_url" : "https:\/\/github.com\/thehackersbrain"
} ,
"html_url" : "https:\/\/github.com\/thehackersbrain\/CVE-2021-41773" ,
"description" : "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773" ,
"fork" : false ,
"created_at" : "2022-03-12T21:24:55Z" ,
2022-03-31 20:16:51 +02:00
"updated_at" : "2022-03-31T12:45:37Z" ,
2022-03-13 01:14:07 +01:00
"pushed_at" : "2022-03-12T21:30:58Z" ,
2022-03-31 20:16:51 +02:00
"stargazers_count" : 51 ,
"watchers_count" : 51 ,
2022-04-13 02:15:08 +02:00
"forks_count" : 17 ,
2022-03-13 01:14:07 +01:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"apache2" ,
"cve-2021-41773" ,
"exploit" ,
"gauravraj" ,
"lfi" ,
"python" ,
"rce" ,
"thehackersbrain"
] ,
"visibility" : "public" ,
2022-04-13 02:15:08 +02:00
"forks" : 17 ,
2022-03-31 20:16:51 +02:00
"watchers" : 51 ,
2022-03-13 01:14:07 +01:00
"score" : 0
2022-03-14 07:14:28 +01:00
} ,
{
"id" : 469576020 ,
"name" : "CVE-2021-41773" ,
"full_name" : "cryst4lliz3\/CVE-2021-41773" ,
"owner" : {
"login" : "cryst4lliz3" ,
"id" : 101309325 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/101309325?v=4" ,
"html_url" : "https:\/\/github.com\/cryst4lliz3"
} ,
"html_url" : "https:\/\/github.com\/cryst4lliz3\/CVE-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-14T04:08:56Z" ,
"updated_at" : "2022-03-14T04:09:11Z" ,
"pushed_at" : "2022-03-14T04:09:05Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-14 19:14:44 +01:00
} ,
{
"id" : 469821841 ,
"name" : "CVE-2021-41773" ,
"full_name" : "Fa1c0n35\/CVE-2021-41773" ,
"owner" : {
"login" : "Fa1c0n35" ,
"id" : 33335488 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4" ,
"html_url" : "https:\/\/github.com\/Fa1c0n35"
} ,
"html_url" : "https:\/\/github.com\/Fa1c0n35\/CVE-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-14T16:43:49Z" ,
"updated_at" : "2022-03-14T16:44:00Z" ,
"pushed_at" : "2022-03-14T16:43:57Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-28 02:14:29 +02:00
} ,
{
"id" : 474747864 ,
"name" : "CVE-2021-41773-" ,
"full_name" : "N3w-elf\/CVE-2021-41773-" ,
"owner" : {
"login" : "N3w-elf" ,
"id" : 80478753 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/80478753?v=4" ,
"html_url" : "https:\/\/github.com\/N3w-elf"
} ,
"html_url" : "https:\/\/github.com\/N3w-elf\/CVE-2021-41773-" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-27T20:10:30Z" ,
"updated_at" : "2022-03-27T20:10:30Z" ,
"pushed_at" : "2022-03-27T20:10:31Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-28 14:17:37 +02:00
} ,
{
"id" : 474963195 ,
"name" : "CVE-2021-41773" ,
"full_name" : "puckiestyle\/CVE-2021-41773" ,
"owner" : {
"login" : "puckiestyle" ,
"id" : 57447087 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4" ,
"html_url" : "https:\/\/github.com\/puckiestyle"
} ,
"html_url" : "https:\/\/github.com\/puckiestyle\/CVE-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-28T11:02:46Z" ,
"updated_at" : "2022-03-28T11:03:00Z" ,
"pushed_at" : "2022-03-28T11:41:55Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-30 20:17:23 +02:00
} ,
{
"id" : 475931011 ,
"name" : "CVE-2021-41773" ,
"full_name" : "spiderz0ne\/CVE-2021-41773" ,
"owner" : {
"login" : "spiderz0ne" ,
"id" : 83699106 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/83699106?v=4" ,
"html_url" : "https:\/\/github.com\/spiderz0ne"
} ,
"html_url" : "https:\/\/github.com\/spiderz0ne\/CVE-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-30T15:04:27Z" ,
"updated_at" : "2022-03-30T17:46:13Z" ,
2022-03-31 14:15:14 +02:00
"pushed_at" : "2022-03-31T10:06:20Z" ,
2022-03-30 20:17:23 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-31 08:15:09 +02:00
} ,
{
"id" : 476112666 ,
"name" : "Reserch-CVE-2021-41773" ,
"full_name" : "DoTuan1\/Reserch-CVE-2021-41773" ,
"owner" : {
"login" : "DoTuan1" ,
"id" : 63194321 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/63194321?v=4" ,
"html_url" : "https:\/\/github.com\/DoTuan1"
} ,
"html_url" : "https:\/\/github.com\/DoTuan1\/Reserch-CVE-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-31T01:48:33Z" ,
"updated_at" : "2022-03-31T01:54:45Z" ,
"pushed_at" : "2022-03-31T03:03:09Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-04-03 14:14:34 +02:00
} ,
{
"id" : 477111512 ,
"name" : "netsec-polygon" ,
"full_name" : "bernardas\/netsec-polygon" ,
"owner" : {
"login" : "bernardas" ,
"id" : 62701131 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/62701131?v=4" ,
"html_url" : "https:\/\/github.com\/bernardas"
} ,
"html_url" : "https:\/\/github.com\/bernardas\/netsec-polygon" ,
"description" : "Environment for CVE-2021-41773 recreation." ,
"fork" : false ,
"created_at" : "2022-04-02T16:34:45Z" ,
"updated_at" : "2022-04-03T08:19:39Z" ,
2022-04-14 14:15:53 +02:00
"pushed_at" : "2022-04-14T10:32:35Z" ,
2022-04-03 14:14:34 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-04-05 02:16:08 +02:00
} ,
{
"id" : 477889492 ,
"name" : "Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit" ,
"full_name" : "CalfCrusher\/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit" ,
"owner" : {
"login" : "CalfCrusher" ,
"id" : 5812023 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5812023?v=4" ,
"html_url" : "https:\/\/github.com\/CalfCrusher"
} ,
"html_url" : "https:\/\/github.com\/CalfCrusher\/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit" ,
"description" : "CVE-2021-41773 | CVE-2021-42013 Exploit Tool (Apache\/2.4.49-2.4.50)" ,
"fork" : false ,
"created_at" : "2022-04-04T22:07:21Z" ,
2022-04-05 08:14:42 +02:00
"updated_at" : "2022-04-05T05:17:33Z" ,
2022-04-08 14:15:03 +02:00
"pushed_at" : "2022-04-08T09:24:35Z" ,
2022-04-05 08:14:42 +02:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2022-04-05 02:16:08 +02:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"cve-2021-41773" ,
"cve-2021-42013" ,
"exploit"
] ,
"visibility" : "public" ,
"forks" : 0 ,
2022-04-05 08:14:42 +02:00
"watchers" : 1 ,
2022-04-05 02:16:08 +02:00
"score" : 0
2022-04-06 20:23:30 +02:00
} ,
{
"id" : 478605535 ,
"name" : "cve-2021-41773" ,
"full_name" : "vuongnv3389-sec\/cve-2021-41773" ,
"owner" : {
"login" : "vuongnv3389-sec" ,
"id" : 64488431 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/64488431?v=4" ,
"html_url" : "https:\/\/github.com\/vuongnv3389-sec"
} ,
"html_url" : "https:\/\/github.com\/vuongnv3389-sec\/cve-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-04-06T14:53:19Z" ,
"updated_at" : "2022-04-06T14:54:12Z" ,
"pushed_at" : "2022-04-06T15:41:47Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-04-12 20:15:47 +02:00
} ,
{
"id" : 480821526 ,
"name" : "CVE-2021-41773" ,
"full_name" : "Chocapikk\/CVE-2021-41773" ,
"owner" : {
"login" : "Chocapikk" ,
"id" : 88535377 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4" ,
"html_url" : "https:\/\/github.com\/Chocapikk"
} ,
"html_url" : "https:\/\/github.com\/Chocapikk\/CVE-2021-41773" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-04-12T13:25:58Z" ,
"updated_at" : "2022-04-12T13:26:25Z" ,
"pushed_at" : "2022-04-12T13:26:22Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-10-05 23:14:32 +02:00
}
]