[
    {
        "id": 414860866,
        "name": "cve-2021-42013",
        "full_name": "Vulnmachines\/cve-2021-42013",
        "owner": {
            "login": "Vulnmachines",
            "id": 79006904,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
            "html_url": "https:\/\/github.com\/Vulnmachines"
        },
        "html_url": "https:\/\/github.com\/Vulnmachines\/cve-2021-42013",
        "description": "Apache 2.4.50 Path traversal vulnerability",
        "fork": false,
        "created_at": "2021-10-08T05:44:54Z",
        "updated_at": "2022-10-19T23:15:52Z",
        "pushed_at": "2022-08-30T11:59:18Z",
        "stargazers_count": 20,
        "watchers_count": 20,
        "forks_count": 4,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 4,
        "watchers": 20,
        "score": 0
    },
    {
        "id": 417233035,
        "name": "cve-2021-42013-docker-lab",
        "full_name": "twseptian\/cve-2021-42013-docker-lab",
        "owner": {
            "login": "twseptian",
            "id": 9025301,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9025301?v=4",
            "html_url": "https:\/\/github.com\/twseptian"
        },
        "html_url": "https:\/\/github.com\/twseptian\/cve-2021-42013-docker-lab",
        "description": "Docker container lab to play\/learn with CVE-2021-42013",
        "fork": false,
        "created_at": "2021-10-14T18:00:48Z",
        "updated_at": "2022-10-16T13:50:34Z",
        "pushed_at": "2022-02-09T17:27:53Z",
        "stargazers_count": 3,
        "watchers_count": 3,
        "forks_count": 3,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [
            "cve-2021-42013",
            "dockerfile",
            "path-traversal-exploitation"
        ],
        "visibility": "public",
        "forks": 3,
        "watchers": 3,
        "score": 0
    },
    {
        "id": 421851715,
        "name": "cve-2021-42013",
        "full_name": "walnutsecurity\/cve-2021-42013",
        "owner": {
            "login": "walnutsecurity",
            "id": 92915142,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92915142?v=4",
            "html_url": "https:\/\/github.com\/walnutsecurity"
        },
        "html_url": "https:\/\/github.com\/walnutsecurity\/cve-2021-42013",
        "description": "cve-2021-42013.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.50",
        "fork": false,
        "created_at": "2021-10-27T14:29:10Z",
        "updated_at": "2022-08-29T22:56:28Z",
        "pushed_at": "2022-08-13T04:48:54Z",
        "stargazers_count": 7,
        "watchers_count": 7,
        "forks_count": 8,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 8,
        "watchers": 7,
        "score": 0
    },
    {
        "id": 441210162,
        "name": "CVE-2021-42013-Apache-RCE-Poc-Exp",
        "full_name": "asaotomo\/CVE-2021-42013-Apache-RCE-Poc-Exp",
        "owner": {
            "login": "asaotomo",
            "id": 67818638,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67818638?v=4",
            "html_url": "https:\/\/github.com\/asaotomo"
        },
        "html_url": "https:\/\/github.com\/asaotomo\/CVE-2021-42013-Apache-RCE-Poc-Exp",
        "description": "Apache 远程代码执行 (CVE-2021-42013)批量检测工具:Apache HTTP Server是美国阿帕奇(Apache)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点,发现 Apache HTTP Server 2.4.50 中针对 CVE-2021-41773 的修复不够充分。攻击者可以使用路径遍历攻击将 URL 映射到由类似别名的指令配置的目录之外的文件。如果这些目录之外的文件不受通常的默认配置“要求全部拒绝”的保护,则这些请求可能会成功。如果还为这些别名路径启用了 CGI 脚本,则这可能允许远程代码执行。此问题仅影响 Apache 2.4.49 和 Apache 2.4.50,而不影响更早版本。",
        "fork": false,
        "created_at": "2021-12-23T14:46:41Z",
        "updated_at": "2022-06-17T06:35:47Z",
        "pushed_at": "2021-12-24T07:38:39Z",
        "stargazers_count": 10,
        "watchers_count": 10,
        "forks_count": 2,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [
            "apache",
            "cve-2021-42013",
            "exp",
            "poc",
            "python3"
        ],
        "visibility": "public",
        "forks": 2,
        "watchers": 10,
        "score": 0
    },
    {
        "id": 445382835,
        "name": "CVE-2021-42013",
        "full_name": "rnsss\/CVE-2021-42013",
        "owner": {
            "login": "rnsss",
            "id": 48343279,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48343279?v=4",
            "html_url": "https:\/\/github.com\/rnsss"
        },
        "html_url": "https:\/\/github.com\/rnsss\/CVE-2021-42013",
        "description": "CVE-2021-42013-exp",
        "fork": false,
        "created_at": "2022-01-07T03:12:45Z",
        "updated_at": "2022-01-07T03:12:50Z",
        "pushed_at": "2022-01-07T03:12:48Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 455174932,
        "name": "CVE-2021-42013-LAB",
        "full_name": "jas9reet\/CVE-2021-42013-LAB",
        "owner": {
            "login": "jas9reet",
            "id": 34741406,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34741406?v=4",
            "html_url": "https:\/\/github.com\/jas9reet"
        },
        "html_url": "https:\/\/github.com\/jas9reet\/CVE-2021-42013-LAB",
        "description": "Apache HTTP Server 2.4.50 - RCE Lab",
        "fork": false,
        "created_at": "2022-02-03T13:26:05Z",
        "updated_at": "2022-02-20T23:15:08Z",
        "pushed_at": "2022-06-06T06:09:39Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 1,
        "score": 0
    },
    {
        "id": 466011549,
        "name": "CVE-2022-22947-Spring-Cloud-Gateway",
        "full_name": "tangxiaofeng7\/CVE-2022-22947-Spring-Cloud-Gateway",
        "owner": {
            "login": "tangxiaofeng7",
            "id": 45926593,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926593?v=4",
            "html_url": "https:\/\/github.com\/tangxiaofeng7"
        },
        "html_url": "https:\/\/github.com\/tangxiaofeng7\/CVE-2022-22947-Spring-Cloud-Gateway",
        "description": "CVE-2021-42013批量",
        "fork": false,
        "created_at": "2022-03-04T06:38:26Z",
        "updated_at": "2022-08-12T16:04:01Z",
        "pushed_at": "2022-03-04T10:49:00Z",
        "stargazers_count": 67,
        "watchers_count": 67,
        "forks_count": 22,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 22,
        "watchers": 67,
        "score": 0
    },
    {
        "id": 467686191,
        "name": "CVE-2021-42013",
        "full_name": "mauricelambert\/CVE-2021-42013",
        "owner": {
            "login": "mauricelambert",
            "id": 50479118,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4",
            "html_url": "https:\/\/github.com\/mauricelambert"
        },
        "html_url": "https:\/\/github.com\/mauricelambert\/CVE-2021-42013",
        "description": "These Nmap, Python and Ruby scripts detects and exploits CVE-2021-42013 with RCE and local file disclosure.",
        "fork": false,
        "created_at": "2022-03-08T21:48:40Z",
        "updated_at": "2022-03-23T16:46:10Z",
        "pushed_at": "2022-03-14T07:36:49Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "forks_count": 1,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [
            "cve",
            "cve-2021-42013",
            "detection",
            "exploit",
            "metasploit",
            "nmap",
            "python3",
            "rce",
            "ruby",
            "scanner",
            "vulnerability"
        ],
        "visibility": "public",
        "forks": 1,
        "watchers": 1,
        "score": 0
    },
    {
        "id": 469575892,
        "name": "CVE-2021-42013",
        "full_name": "honypot\/CVE-2021-42013",
        "owner": {
            "login": "honypot",
            "id": 101309325,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101309325?v=4",
            "html_url": "https:\/\/github.com\/honypot"
        },
        "html_url": "https:\/\/github.com\/honypot\/CVE-2021-42013",
        "description": null,
        "fork": false,
        "created_at": "2022-03-14T04:08:24Z",
        "updated_at": "2022-03-14T04:20:42Z",
        "pushed_at": "2022-03-14T04:08:32Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 479265759,
        "name": "CVE-2021-42013",
        "full_name": "Adashz\/CVE-2021-42013",
        "owner": {
            "login": "Adashz",
            "id": 70690472,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70690472?v=4",
            "html_url": "https:\/\/github.com\/Adashz"
        },
        "html_url": "https:\/\/github.com\/Adashz\/CVE-2021-42013",
        "description": null,
        "fork": false,
        "created_at": "2022-04-08T06:07:37Z",
        "updated_at": "2022-04-08T06:08:55Z",
        "pushed_at": "2022-04-08T07:07:51Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 498173029,
        "name": "cve-2021-42013",
        "full_name": "viliuspovilaika\/cve-2021-42013",
        "owner": {
            "login": "viliuspovilaika",
            "id": 10381655,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10381655?v=4",
            "html_url": "https:\/\/github.com\/viliuspovilaika"
        },
        "html_url": "https:\/\/github.com\/viliuspovilaika\/cve-2021-42013",
        "description": "Exploit for Apache 2.4.50 (CVE-2021-42013)",
        "fork": false,
        "created_at": "2022-05-31T03:28:20Z",
        "updated_at": "2022-05-31T03:29:22Z",
        "pushed_at": "2022-05-31T04:37:35Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 518780226,
        "name": "CVE-2021-42013",
        "full_name": "theykillmeslowly\/CVE-2021-42013",
        "owner": {
            "login": "theykillmeslowly",
            "id": 108249965,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108249965?v=4",
            "html_url": "https:\/\/github.com\/theykillmeslowly"
        },
        "html_url": "https:\/\/github.com\/theykillmeslowly\/CVE-2021-42013",
        "description": "Apache 2.4.49-50 Remote Code Execution Exploit",
        "fork": false,
        "created_at": "2022-07-28T09:21:50Z",
        "updated_at": "2022-07-28T09:24:11Z",
        "pushed_at": "2022-07-28T09:53:55Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 536994874,
        "name": "cve-2021-42013",
        "full_name": "mightysai1997\/cve-2021-42013",
        "owner": {
            "login": "mightysai1997",
            "id": 110396758,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
            "html_url": "https:\/\/github.com\/mightysai1997"
        },
        "html_url": "https:\/\/github.com\/mightysai1997\/cve-2021-42013",
        "description": null,
        "fork": false,
        "created_at": "2022-09-15T11:28:39Z",
        "updated_at": "2022-09-15T11:28:51Z",
        "pushed_at": "2022-09-15T11:28:47Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 536997164,
        "name": "cve-2021-42013L",
        "full_name": "mightysai1997\/cve-2021-42013L",
        "owner": {
            "login": "mightysai1997",
            "id": 110396758,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
            "html_url": "https:\/\/github.com\/mightysai1997"
        },
        "html_url": "https:\/\/github.com\/mightysai1997\/cve-2021-42013L",
        "description": null,
        "fork": false,
        "created_at": "2022-09-15T11:35:00Z",
        "updated_at": "2022-09-15T11:35:00Z",
        "pushed_at": "2022-09-15T11:35:11Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 537011231,
        "name": "cve-2021-42013.get",
        "full_name": "mightysai1997\/cve-2021-42013.get",
        "owner": {
            "login": "mightysai1997",
            "id": 110396758,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
            "html_url": "https:\/\/github.com\/mightysai1997"
        },
        "html_url": "https:\/\/github.com\/mightysai1997\/cve-2021-42013.get",
        "description": null,
        "fork": false,
        "created_at": "2022-09-15T12:15:00Z",
        "updated_at": "2022-09-15T12:15:18Z",
        "pushed_at": "2022-09-15T12:15:14Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 0,
        "score": 0
    }
]