[ { "id": 413890827, "name": "cve-2021-41773", "full_name": "Vulnmachines\/cve-2021-41773", "owner": { "login": "Vulnmachines", "id": 79006904, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4", "html_url": "https:\/\/github.com\/Vulnmachines" }, "html_url": "https:\/\/github.com\/Vulnmachines\/cve-2021-41773", "description": "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.", "fork": false, "created_at": "2021-10-05T16:13:38Z", "updated_at": "2023-09-28T11:32:02Z", "pushed_at": "2022-08-30T11:58:32Z", "stargazers_count": 40, "watchers_count": 40, "has_discussions": false, "forks_count": 14, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 14, "watchers": 40, "score": 0, "subscribers_count": 1 }, { "id": 413892415, "name": "CVE-2021-41773", "full_name": "numanturle\/CVE-2021-41773", "owner": { "login": "numanturle", "id": 7007951, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4", "html_url": "https:\/\/github.com\/numanturle" }, "html_url": "https:\/\/github.com\/numanturle\/CVE-2021-41773", "description": "CVE-2021-41773", "fork": false, "created_at": "2021-10-05T16:18:09Z", "updated_at": "2023-09-28T11:32:02Z", "pushed_at": "2021-10-05T16:48:27Z", "stargazers_count": 10, "watchers_count": 10, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 10, "score": 0, "subscribers_count": 2 }, { "id": 413901787, "name": "CVE-2021-41773", "full_name": "knqyf263\/CVE-2021-41773", "owner": { "login": "knqyf263", "id": 2253692, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4", "html_url": "https:\/\/github.com\/knqyf263" }, "html_url": "https:\/\/github.com\/knqyf263\/CVE-2021-41773", "description": "Path traversal in Apache HTTP Server 2.4.49 (CVE-2021-41773) ", "fork": false, "created_at": "2021-10-05T16:45:41Z", "updated_at": "2023-09-28T11:32:02Z", "pushed_at": "2021-10-06T05:40:34Z", "stargazers_count": 11, "watchers_count": 11, "has_discussions": false, "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 7, "watchers": 11, "score": 0, "subscribers_count": 3 }, { "id": 413916578, "name": "CVE-2021-41773-PoC", "full_name": "ZephrFish\/CVE-2021-41773-PoC", "owner": { "login": "ZephrFish", "id": 5783068, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4", "html_url": "https:\/\/github.com\/ZephrFish" }, "html_url": "https:\/\/github.com\/ZephrFish\/CVE-2021-41773-PoC", "description": null, "fork": false, "created_at": "2021-10-05T17:29:49Z", "updated_at": "2023-09-28T11:32:02Z", "pushed_at": "2021-10-06T09:25:38Z", "stargazers_count": 18, "watchers_count": 18, "has_discussions": false, "forks_count": 11, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 11, "watchers": 18, "score": 0, "subscribers_count": 3 }, { "id": 413916846, "name": "PoC-CVE-2021-41773", "full_name": "iilegacyyii\/PoC-CVE-2021-41773", "owner": { "login": "iilegacyyii", "id": 68760809, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68760809?v=4", "html_url": "https:\/\/github.com\/iilegacyyii" }, "html_url": "https:\/\/github.com\/iilegacyyii\/PoC-CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-10-05T17:30:43Z", "updated_at": "2023-09-28T11:32:03Z", "pushed_at": "2021-11-24T12:57:46Z", "stargazers_count": 44, "watchers_count": 44, "has_discussions": false, "forks_count": 39, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "apache", "cve", "lfi", "poc", "rce" ], "visibility": "public", "forks": 39, "watchers": 44, "score": 0, "subscribers_count": 1 }, { "id": 413943505, "name": "CVE-2021-41773", "full_name": "masahiro331\/CVE-2021-41773", "owner": { "login": "masahiro331", "id": 20438853, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20438853?v=4", "html_url": "https:\/\/github.com\/masahiro331" }, "html_url": "https:\/\/github.com\/masahiro331\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-10-05T18:56:04Z", "updated_at": "2023-09-28T11:32:03Z", "pushed_at": "2021-10-06T03:43:42Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 3 }, { "id": 413969845, "name": "CVE-2021-41773", "full_name": "j4k0m\/CVE-2021-41773", "owner": { "login": "j4k0m", "id": 48088579, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48088579?v=4", "html_url": "https:\/\/github.com\/j4k0m" }, "html_url": "https:\/\/github.com\/j4k0m\/CVE-2021-41773", "description": "Exploitation of CVE-2021-41773 a Directory Traversal in Apache 2.4.49.", "fork": false, "created_at": "2021-10-05T20:30:01Z", "updated_at": "2023-09-28T11:32:03Z", "pushed_at": "2021-10-05T22:06:50Z", "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 7, "watchers": 13, "score": 0, "subscribers_count": 2 }, { "id": 413972926, "name": "POC-CVE-2021-41773", "full_name": "TishcaTpx\/POC-CVE-2021-41773", "owner": { "login": "TishcaTpx", "id": 91351013, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91351013?v=4", "html_url": "https:\/\/github.com\/TishcaTpx" }, "html_url": "https:\/\/github.com\/TishcaTpx\/POC-CVE-2021-41773", "description": "Poc.py ", "fork": false, "created_at": "2021-10-05T20:41:34Z", "updated_at": "2023-09-28T11:32:03Z", "pushed_at": "2021-10-05T21:29:59Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 7, "score": 0, "subscribers_count": 2 }, { "id": 414013246, "name": "CVE-2021-41773-PoC", "full_name": "lorddemon\/CVE-2021-41773-PoC", "owner": { "login": "lorddemon", "id": 6675738, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6675738?v=4", "html_url": "https:\/\/github.com\/lorddemon" }, "html_url": "https:\/\/github.com\/lorddemon\/CVE-2021-41773-PoC", "description": null, "fork": false, "created_at": "2021-10-05T23:53:48Z", "updated_at": "2023-09-28T11:32:04Z", "pushed_at": "2021-10-06T15:37:23Z", "stargazers_count": 39, "watchers_count": 39, "has_discussions": false, "forks_count": 23, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 23, "watchers": 39, "score": 0, "subscribers_count": 1 }, { "id": 414043746, "name": "CVE-2021-41773_CVE-2021-42013", "full_name": "Ls4ss\/CVE-2021-41773_CVE-2021-42013", "owner": { "login": "Ls4ss", "id": 25537761, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25537761?v=4", "html_url": "https:\/\/github.com\/Ls4ss" }, "html_url": "https:\/\/github.com\/Ls4ss\/CVE-2021-41773_CVE-2021-42013", "description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE", "fork": false, "created_at": "2021-10-06T02:28:41Z", "updated_at": "2023-09-28T11:32:04Z", "pushed_at": "2022-09-09T16:09:11Z", "stargazers_count": 22, "watchers_count": 22, "has_discussions": false, "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "apache", "cve", "exploit", "payload", "pentest", "rce" ], "visibility": "public", "forks": 9, "watchers": 22, "score": 0, "subscribers_count": 2 }, { "id": 414044140, "name": "CVE-2021-41773", "full_name": "itsecurityco\/CVE-2021-41773", "owner": { "login": "itsecurityco", "id": 1725054, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1725054?v=4", "html_url": "https:\/\/github.com\/itsecurityco" }, "html_url": "https:\/\/github.com\/itsecurityco\/CVE-2021-41773", "description": "CVE-2021-41773 POC with Docker", "fork": false, "created_at": "2021-10-06T02:30:40Z", "updated_at": "2023-09-28T11:32:04Z", "pushed_at": "2022-10-07T23:37:10Z", "stargazers_count": 10, "watchers_count": 10, "has_discussions": false, "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 9, "watchers": 10, "score": 0, "subscribers_count": 2 }, { "id": 414050354, "name": "CVE-2021-41773-PoC", "full_name": "habibiefaried\/CVE-2021-41773-PoC", "owner": { "login": "habibiefaried", "id": 4345690, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4345690?v=4", "html_url": "https:\/\/github.com\/habibiefaried" }, "html_url": "https:\/\/github.com\/habibiefaried\/CVE-2021-41773-PoC", "description": "PoC for CVE-2021-41773 with docker to demonstrate", "fork": false, "created_at": "2021-10-06T03:01:41Z", "updated_at": "2023-09-28T11:32:04Z", "pushed_at": "2021-10-06T05:39:24Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 5, "score": 0, "subscribers_count": 2 }, { "id": 414082287, "name": "CVE-2021-41773-POC", "full_name": "creadpag\/CVE-2021-41773-POC", "owner": { "login": "creadpag", "id": 15526083, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15526083?v=4", "html_url": "https:\/\/github.com\/creadpag" }, "html_url": "https:\/\/github.com\/creadpag\/CVE-2021-41773-POC", "description": "CVE-2021-41773", "fork": false, "created_at": "2021-10-06T05:34:48Z", "updated_at": "2023-09-28T11:32:04Z", "pushed_at": "2022-12-28T17:49:24Z", "stargazers_count": 9, "watchers_count": 9, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 9, "score": 0, "subscribers_count": 2 }, { "id": 414082633, "name": "cve-2021-41773-nse", "full_name": "TAI-REx\/cve-2021-41773-nse", "owner": { "login": "TAI-REx", "id": 78527947, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78527947?v=4", "html_url": "https:\/\/github.com\/TAI-REx" }, "html_url": "https:\/\/github.com\/TAI-REx\/cve-2021-41773-nse", "description": "CVE-2021-41773.nse", "fork": false, "created_at": "2021-10-06T05:36:22Z", "updated_at": "2021-11-26T18:07:10Z", "pushed_at": "2021-10-06T05:23:16Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 414108838, "name": "CVE-2021-41773", "full_name": "blasty\/CVE-2021-41773", "owner": { "login": "blasty", "id": 101374, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101374?v=4", "html_url": "https:\/\/github.com\/blasty" }, "html_url": "https:\/\/github.com\/blasty\/CVE-2021-41773", "description": "CVE-2021-41773 playground", "fork": false, "created_at": "2021-10-06T07:17:05Z", "updated_at": "2023-09-28T11:32:04Z", "pushed_at": "2021-10-07T17:56:38Z", "stargazers_count": 208, "watchers_count": 208, "has_discussions": false, "forks_count": 52, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 52, "watchers": 208, "score": 0, "subscribers_count": 6 }, { "id": 414159388, "name": "CVE-2021-41773", "full_name": "PentesterGuruji\/CVE-2021-41773", "owner": { "login": "PentesterGuruji", "id": 87645282, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87645282?v=4", "html_url": "https:\/\/github.com\/PentesterGuruji" }, "html_url": "https:\/\/github.com\/PentesterGuruji\/CVE-2021-41773", "description": "Path Traversal vulnerability in Apache 2.4.49", "fork": false, "created_at": "2021-10-06T10:04:22Z", "updated_at": "2023-09-28T11:32:04Z", "pushed_at": "2021-10-07T19:39:09Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 414227353, "name": "CVE-2021-41773", "full_name": "jbovet\/CVE-2021-41773", "owner": { "login": "jbovet", "id": 41589, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41589?v=4", "html_url": "https:\/\/github.com\/jbovet" }, "html_url": "https:\/\/github.com\/jbovet\/CVE-2021-41773", "description": "Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49 (CVE-2021-41773)", "fork": false, "created_at": "2021-10-06T13:39:57Z", "updated_at": "2023-09-28T11:32:05Z", "pushed_at": "2021-10-06T14:15:45Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 4, "score": 0, "subscribers_count": 2 }, { "id": 414239384, "name": "cve-2021-41773", "full_name": "mohwahyudi\/cve-2021-41773", "owner": { "login": "mohwahyudi", "id": 57562836, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57562836?v=4", "html_url": "https:\/\/github.com\/mohwahyudi" }, "html_url": "https:\/\/github.com\/mohwahyudi\/cve-2021-41773", "description": null, "fork": false, "created_at": "2021-10-06T14:12:07Z", "updated_at": "2023-09-28T11:32:05Z", "pushed_at": "2021-10-08T01:55:22Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 414241382, "name": "CVE-2021-41773", "full_name": "1nhann\/CVE-2021-41773", "owner": { "login": "1nhann", "id": 76624149, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76624149?v=4", "html_url": "https:\/\/github.com\/1nhann" }, "html_url": "https:\/\/github.com\/1nhann\/CVE-2021-41773", "description": "CVE-2021-41773 的复现", "fork": false, "created_at": "2021-10-06T14:17:31Z", "updated_at": "2023-09-28T11:32:05Z", "pushed_at": "2021-10-08T05:03:10Z", "stargazers_count": 10, "watchers_count": 10, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 10, "score": 0, "subscribers_count": 1 }, { "id": 414248192, "name": "CVE-2021-41773", "full_name": "ranggaggngntt\/CVE-2021-41773", "owner": { "login": "ranggaggngntt", "id": 57105391, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57105391?v=4", "html_url": "https:\/\/github.com\/ranggaggngntt" }, "html_url": "https:\/\/github.com\/ranggaggngntt\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-10-06T14:36:05Z", "updated_at": "2023-09-28T11:32:05Z", "pushed_at": "2022-06-11T13:34:00Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 414252359, "name": "CVE-2021-41773", "full_name": "BlueTeamSteve\/CVE-2021-41773", "owner": { "login": "BlueTeamSteve", "id": 550582, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/550582?v=4", "html_url": "https:\/\/github.com\/BlueTeamSteve" }, "html_url": "https:\/\/github.com\/BlueTeamSteve\/CVE-2021-41773", "description": "Vulnerable docker images for CVE-2021-41773", "fork": false, "created_at": "2021-10-06T14:47:23Z", "updated_at": "2023-11-15T07:02:44Z", "pushed_at": "2021-10-06T15:07:48Z", "stargazers_count": 20, "watchers_count": 20, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 20, "score": 0, "subscribers_count": 1 }, { "id": 414256797, "name": "apache_normalize_path", "full_name": "Zeop-CyberSec\/apache_normalize_path", "owner": { "login": "Zeop-CyberSec", "id": 68154603, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68154603?v=4", "html_url": "https:\/\/github.com\/Zeop-CyberSec" }, "html_url": "https:\/\/github.com\/Zeop-CyberSec\/apache_normalize_path", "description": "Metasploit-Framework modules (scanner and exploit) for the CVE-2021-41773 and CVE-2021-42013 (Path Traversal in Apache 2.4.49\/2.4.50)", "fork": false, "created_at": "2021-10-06T14:58:27Z", "updated_at": "2023-09-28T11:32:05Z", "pushed_at": "2021-10-21T18:51:00Z", "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 13, "score": 0, "subscribers_count": 2 }, { "id": 414284449, "name": "CVE-2021-41773", "full_name": "r00tVen0m\/CVE-2021-41773", "owner": { "login": "r00tVen0m", "id": 50659263, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50659263?v=4", "html_url": "https:\/\/github.com\/r00tVen0m" }, "html_url": "https:\/\/github.com\/r00tVen0m\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-10-06T16:15:21Z", "updated_at": "2023-09-28T11:32:05Z", "pushed_at": "2021-10-06T19:05:07Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 414347675, "name": "CVE-2021-41773", "full_name": "n3k00n3\/CVE-2021-41773", "owner": { "login": "n3k00n3", "id": 7244777, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7244777?v=4", "html_url": "https:\/\/github.com\/n3k00n3" }, "html_url": "https:\/\/github.com\/n3k00n3\/CVE-2021-41773", "description": "exploit to CVE-2021-41773", "fork": false, "created_at": "2021-10-06T19:39:25Z", "updated_at": "2023-09-28T11:32:06Z", "pushed_at": "2021-10-08T16:32:51Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 414350527, "name": "CVE-2021-41773-RCE", "full_name": "fnatalucci\/CVE-2021-41773-RCE", "owner": { "login": "fnatalucci", "id": 5574371, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5574371?v=4", "html_url": "https:\/\/github.com\/fnatalucci" }, "html_url": "https:\/\/github.com\/fnatalucci\/CVE-2021-41773-RCE", "description": null, "fork": false, "created_at": "2021-10-06T19:50:33Z", "updated_at": "2023-09-28T11:32:06Z", "pushed_at": "2021-10-06T20:14:27Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 414376599, "name": "CVE-2021-41773", "full_name": "AssassinUKG\/CVE-2021-41773", "owner": { "login": "AssassinUKG", "id": 5285547, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5285547?v=4", "html_url": "https:\/\/github.com\/AssassinUKG" }, "html_url": "https:\/\/github.com\/AssassinUKG\/CVE-2021-41773", "description": "Apache 2.4.49", "fork": false, "created_at": "2021-10-06T21:37:18Z", "updated_at": "2023-09-28T11:32:07Z", "pushed_at": "2021-10-20T23:04:06Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 2 }, { "id": 414402542, "name": "Simple-CVE-2021-41773-checker", "full_name": "jheeree\/Simple-CVE-2021-41773-checker", "owner": { "login": "jheeree", "id": 19227591, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19227591?v=4", "html_url": "https:\/\/github.com\/jheeree" }, "html_url": "https:\/\/github.com\/jheeree\/Simple-CVE-2021-41773-checker", "description": "Simple script realizado en bash, para revisión de múltiples hosts para CVE-2021-41773 (Apache)", "fork": false, "created_at": "2021-10-06T23:32:30Z", "updated_at": "2023-09-28T11:32:07Z", "pushed_at": "2021-10-12T03:28:51Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 3, "score": 0, "subscribers_count": 2 }, { "id": 414410579, "name": "CVE-2021-41773", "full_name": "orangmuda\/CVE-2021-41773", "owner": { "login": "orangmuda", "id": 91846073, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4", "html_url": "https:\/\/github.com\/orangmuda" }, "html_url": "https:\/\/github.com\/orangmuda\/CVE-2021-41773", "description": "Apache HTTPd (2.4.49) – Local File Disclosure (LFI)", "fork": false, "created_at": "2021-10-07T00:14:40Z", "updated_at": "2023-11-10T06:30:27Z", "pushed_at": "2021-10-07T00:19:26Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "httpd", "remote-code-execution" ], "visibility": "public", "forks": 2, "watchers": 4, "score": 0, "subscribers_count": 2 }, { "id": 414425270, "name": "scarce-apache2", "full_name": "HightechSec\/scarce-apache2", "owner": { "login": "HightechSec", "id": 24645706, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24645706?v=4", "html_url": "https:\/\/github.com\/HightechSec" }, "html_url": "https:\/\/github.com\/HightechSec\/scarce-apache2", "description": "A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public ", "fork": false, "created_at": "2021-10-07T01:31:13Z", "updated_at": "2023-10-30T16:08:10Z", "pushed_at": "2021-10-07T08:25:26Z", "stargazers_count": 59, "watchers_count": 59, "has_discussions": false, "forks_count": 17, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "bash-script", "bug-hunting", "cve-2021-41773", "hacktoberfest", "pentesting" ], "visibility": "public", "forks": 17, "watchers": 59, "score": 0, "subscribers_count": 2 }, { "id": 414514606, "name": "CVE-2021-41773-exploit", "full_name": "vinhjaxt\/CVE-2021-41773-exploit", "owner": { "login": "vinhjaxt", "id": 8877695, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8877695?v=4", "html_url": "https:\/\/github.com\/vinhjaxt" }, "html_url": "https:\/\/github.com\/vinhjaxt\/CVE-2021-41773-exploit", "description": "CVE-2021-41773, poc, exploit", "fork": false, "created_at": "2021-10-07T08:10:00Z", "updated_at": "2023-09-28T11:32:08Z", "pushed_at": "2021-10-08T04:55:32Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 414536267, "name": "CVE-2021-41773", "full_name": "sixpacksecurity\/CVE-2021-41773", "owner": { "login": "sixpacksecurity", "id": 91971692, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91971692?v=4", "html_url": "https:\/\/github.com\/sixpacksecurity" }, "html_url": "https:\/\/github.com\/sixpacksecurity\/CVE-2021-41773", "description": "CVE-2021-41773 exploit PoC with Docker setup.", "fork": false, "created_at": "2021-10-07T09:21:29Z", "updated_at": "2021-10-07T13:00:21Z", "pushed_at": "2021-10-07T13:00:18Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 414574168, "name": "POC-CVE-2021-41773", "full_name": "Hattan515\/POC-CVE-2021-41773", "owner": { "login": "Hattan515", "id": 92092916, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92092916?v=4", "html_url": "https:\/\/github.com\/Hattan515" }, "html_url": "https:\/\/github.com\/Hattan515\/POC-CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-10-07T11:31:03Z", "updated_at": "2021-10-07T11:52:41Z", "pushed_at": "2021-10-07T11:42:08Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 414581409, "name": "cve-2021-41773", "full_name": "twseptian\/cve-2021-41773", "owner": { "login": "twseptian", "id": 9025301, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9025301?v=4", "html_url": "https:\/\/github.com\/twseptian" }, "html_url": "https:\/\/github.com\/twseptian\/cve-2021-41773", "description": "CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited", "fork": false, "created_at": "2021-10-07T11:55:10Z", "updated_at": "2023-09-28T11:32:08Z", "pushed_at": "2021-10-10T05:19:29Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "apache", "cve-2021-41773", "path-traversal", "shodan", "shodan-cli", "vulnerability" ], "visibility": "public", "forks": 3, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 414592683, "name": "CVE-2021-41773", "full_name": "noflowpls\/CVE-2021-41773", "owner": { "login": "noflowpls", "id": 84136529, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84136529?v=4", "html_url": "https:\/\/github.com\/noflowpls" }, "html_url": "https:\/\/github.com\/noflowpls\/CVE-2021-41773", "description": "CVE-2021-41773", "fork": false, "created_at": "2021-10-07T12:30:13Z", "updated_at": "2023-09-28T11:32:08Z", "pushed_at": "2022-11-15T08:51:33Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 6, "score": 0, "subscribers_count": 1 }, { "id": 414639113, "name": "CVE-2021-41773", "full_name": "McSl0vv\/CVE-2021-41773", "owner": { "login": "McSl0vv", "id": 36660195, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36660195?v=4", "html_url": "https:\/\/github.com\/McSl0vv" }, "html_url": "https:\/\/github.com\/McSl0vv\/CVE-2021-41773", "description": "Apache 2.4.49 Exploit", "fork": false, "created_at": "2021-10-07T14:41:05Z", "updated_at": "2021-10-07T14:46:05Z", "pushed_at": "2021-10-07T14:46:01Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 414646379, "name": "CVE-2021-41773", "full_name": "shiomiyan\/CVE-2021-41773", "owner": { "login": "shiomiyan", "id": 35842766, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35842766?v=4", "html_url": "https:\/\/github.com\/shiomiyan" }, "html_url": "https:\/\/github.com\/shiomiyan\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-10-07T15:00:55Z", "updated_at": "2021-10-15T19:28:33Z", "pushed_at": "2021-10-15T19:28:30Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 414650983, "name": "mass_cve-2021-41773", "full_name": "justakazh\/mass_cve-2021-41773", "owner": { "login": "justakazh", "id": 36891477, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36891477?v=4", "html_url": "https:\/\/github.com\/justakazh" }, "html_url": "https:\/\/github.com\/justakazh\/mass_cve-2021-41773", "description": "MASS CVE-2021-41773", "fork": false, "created_at": "2021-10-07T15:13:18Z", "updated_at": "2023-09-28T11:32:09Z", "pushed_at": "2023-11-14T07:00:33Z", "stargazers_count": 26, "watchers_count": 26, "has_discussions": false, "forks_count": 23, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "automatic", "cve-2021-41773", "exploit", "scanner" ], "visibility": "public", "forks": 23, "watchers": 26, "score": 0, "subscribers_count": 3 }, { "id": 414764740, "name": "CVE-2021-41773", "full_name": "Sakura-nee\/CVE-2021-41773", "owner": { "login": "Sakura-nee", "id": 74785477, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74785477?v=4", "html_url": "https:\/\/github.com\/Sakura-nee" }, "html_url": "https:\/\/github.com\/Sakura-nee\/CVE-2021-41773", "description": "Mass exploitation CVE-2021-41773 and auto detect possible RCE", "fork": false, "created_at": "2021-10-07T21:37:50Z", "updated_at": "2023-09-28T11:32:09Z", "pushed_at": "2021-10-07T21:52:57Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 414804962, "name": "CVE-2021-41773", "full_name": "shellreaper\/CVE-2021-41773", "owner": { "login": "shellreaper", "id": 76930483, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76930483?v=4", "html_url": "https:\/\/github.com\/shellreaper" }, "html_url": "https:\/\/github.com\/shellreaper\/CVE-2021-41773", "description": "This is a simple POC for Apache\/2.4.49 Path Traversal Vulnerability", "fork": false, "created_at": "2021-10-08T01:13:33Z", "updated_at": "2023-09-28T11:32:09Z", "pushed_at": "2021-11-12T00:03:34Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 414845157, "name": "CVE-2021-41773", "full_name": "0xRar\/CVE-2021-41773", "owner": { "login": "0xRar", "id": 33517160, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33517160?v=4", "html_url": "https:\/\/github.com\/0xRar" }, "html_url": "https:\/\/github.com\/0xRar\/CVE-2021-41773", "description": "Exploit for Apache 2.4.49", "fork": false, "created_at": "2021-10-08T04:26:31Z", "updated_at": "2023-09-28T11:32:09Z", "pushed_at": "2021-10-08T05:54:25Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 12, "watchers": 7, "score": 0, "subscribers_count": 1 }, { "id": 414848372, "name": "Sigma-Rule-for-CVE-2021-41773-and-CVE-2021-42013-exploitation-attempt", "full_name": "pisut4152\/Sigma-Rule-for-CVE-2021-41773-and-CVE-2021-42013-exploitation-attempt", "owner": { "login": "pisut4152", "id": 72641661, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72641661?v=4", "html_url": "https:\/\/github.com\/pisut4152" }, "html_url": "https:\/\/github.com\/pisut4152\/Sigma-Rule-for-CVE-2021-41773-and-CVE-2021-42013-exploitation-attempt", "description": null, "fork": false, "created_at": "2021-10-08T04:43:27Z", "updated_at": "2023-09-28T11:32:09Z", "pushed_at": "2021-10-08T04:46:08Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 414878778, "name": "CVE-2021-41773", "full_name": "corelight\/CVE-2021-41773", "owner": { "login": "corelight", "id": 21672558, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4", "html_url": "https:\/\/github.com\/corelight" }, "html_url": "https:\/\/github.com\/corelight\/CVE-2021-41773", "description": "A Zeek package which raises notices for Path Traversal\/RCE in Apache HTTP Server 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013)", "fork": false, "created_at": "2021-10-08T06:54:27Z", "updated_at": "2021-10-28T05:48:41Z", "pushed_at": "2021-10-28T05:55:41Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 1, "score": 0, "subscribers_count": 7 }, { "id": 414887591, "name": "CVE-2021-41773", "full_name": "zeronine9\/CVE-2021-41773", "owner": { "login": "zeronine9", "id": 60152515, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60152515?v=4", "html_url": "https:\/\/github.com\/zeronine9" }, "html_url": "https:\/\/github.com\/zeronine9\/CVE-2021-41773", "description": "Fast python tool to test apache path traversal CVE-2021-41773 in a List of url ", "fork": false, "created_at": "2021-10-08T07:24:49Z", "updated_at": "2023-09-28T11:32:10Z", "pushed_at": "2021-10-08T07:27:04Z", "stargazers_count": 12, "watchers_count": 12, "has_discussions": false, "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 7, "watchers": 12, "score": 0, "subscribers_count": 2 }, { "id": 414907601, "name": "CVE-2021-41773", "full_name": "b1tsec\/CVE-2021-41773", "owner": { "login": "b1tsec", "id": 74562513, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74562513?v=4", "html_url": "https:\/\/github.com\/b1tsec" }, "html_url": "https:\/\/github.com\/b1tsec\/CVE-2021-41773", "description": "A Python script to check if an Apache web server is vulnerable to CVE-2021-41773", "fork": false, "created_at": "2021-10-08T08:32:51Z", "updated_at": "2023-09-28T11:32:10Z", "pushed_at": "2021-10-08T12:15:50Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 415041820, "name": "CVE-2021-41773", "full_name": "superzerosec\/CVE-2021-41773", "owner": { "login": "superzerosec", "id": 57648217, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4", "html_url": "https:\/\/github.com\/superzerosec" }, "html_url": "https:\/\/github.com\/superzerosec\/CVE-2021-41773", "description": "POC", "fork": false, "created_at": "2021-10-08T15:40:41Z", "updated_at": "2023-09-28T11:32:10Z", "pushed_at": "2021-10-11T22:24:12Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 2 }, { "id": 415177333, "name": "apachrot", "full_name": "im-hanzou\/apachrot", "owner": { "login": "im-hanzou", "id": 61415393, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61415393?v=4", "html_url": "https:\/\/github.com\/im-hanzou" }, "html_url": "https:\/\/github.com\/im-hanzou\/apachrot", "description": "Apache (Linux) CVE-2021-41773\/2021-42013 Mass Vulnerability Checker", "fork": false, "created_at": "2021-10-09T02:12:39Z", "updated_at": "2023-11-09T11:55:41Z", "pushed_at": "2021-10-12T07:27:09Z", "stargazers_count": 23, "watchers_count": 23, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "apache", "checker", "cve-2021-41773", "cve-2021-42013", "vulnerability" ], "visibility": "public", "forks": 6, "watchers": 23, "score": 0, "subscribers_count": 1 }, { "id": 415191949, "name": "CVE-2021-41773_CVE-2021-42013", "full_name": "inbug-team\/CVE-2021-41773_CVE-2021-42013", "owner": { "login": "inbug-team", "id": 81735769, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81735769?v=4", "html_url": "https:\/\/github.com\/inbug-team" }, "html_url": "https:\/\/github.com\/inbug-team\/CVE-2021-41773_CVE-2021-42013", "description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具", "fork": false, "created_at": "2021-10-09T03:32:18Z", "updated_at": "2023-11-24T20:18:58Z", "pushed_at": "2021-10-09T03:49:21Z", "stargazers_count": 144, "watchers_count": 144, "has_discussions": false, "forks_count": 50, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 50, "watchers": 144, "score": 0, "subscribers_count": 3 }, { "id": 415290894, "name": "cve-2021-41773-and-cve-2021-42013", "full_name": "5gstudent\/cve-2021-41773-and-cve-2021-42013", "owner": { "login": "5gstudent", "id": 37172754, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37172754?v=4", "html_url": "https:\/\/github.com\/5gstudent" }, "html_url": "https:\/\/github.com\/5gstudent\/cve-2021-41773-and-cve-2021-42013", "description": "cve-2021-41773 即 cve-2021-42013 批量检测脚本", "fork": false, "created_at": "2021-10-09T11:33:56Z", "updated_at": "2023-09-28T11:32:12Z", "pushed_at": "2021-10-09T12:14:29Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 4, "score": 0, "subscribers_count": 1 }, { "id": 415357102, "name": "CVE-2021-41773", "full_name": "EagleTube\/CVE-2021-41773", "owner": { "login": "EagleTube", "id": 87413459, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87413459?v=4", "html_url": "https:\/\/github.com\/EagleTube" }, "html_url": "https:\/\/github.com\/EagleTube\/CVE-2021-41773", "description": "Apache 2.4.49 Path Traversal Vulnerability Checker ", "fork": false, "created_at": "2021-10-09T16:07:57Z", "updated_at": "2023-09-28T11:32:13Z", "pushed_at": "2021-10-09T16:32:08Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 415549063, "name": "CVE-2021-41773-42013", "full_name": "cgddgc\/CVE-2021-41773-42013", "owner": { "login": "cgddgc", "id": 20945826, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20945826?v=4", "html_url": "https:\/\/github.com\/cgddgc" }, "html_url": "https:\/\/github.com\/cgddgc\/CVE-2021-41773-42013", "description": null, "fork": false, "created_at": "2021-10-10T10:09:52Z", "updated_at": "2023-09-28T11:32:13Z", "pushed_at": "2021-10-10T10:20:09Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 415737041, "name": "Apachuk", "full_name": "apapedulimu\/Apachuk", "owner": { "login": "apapedulimu", "id": 16370264, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16370264?v=4", "html_url": "https:\/\/github.com\/apapedulimu" }, "html_url": "https:\/\/github.com\/apapedulimu\/Apachuk", "description": "CVE-2021-41773 Grabber", "fork": false, "created_at": "2021-10-11T00:57:27Z", "updated_at": "2023-09-28T11:32:15Z", "pushed_at": "2021-10-11T02:51:11Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 415761005, "name": "CVE-2021-41773", "full_name": "scarmandef\/CVE-2021-41773", "owner": { "login": "scarmandef", "id": 80011252, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80011252?v=4", "html_url": "https:\/\/github.com\/scarmandef" }, "html_url": "https:\/\/github.com\/scarmandef\/CVE-2021-41773", "description": " Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE", "fork": false, "created_at": "2021-10-11T03:03:08Z", "updated_at": "2021-10-14T04:59:46Z", "pushed_at": "2021-10-14T04:59:43Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 416132671, "name": "CVE-2021-41773-PoC", "full_name": "0xAlmighty\/CVE-2021-41773-PoC", "owner": { "login": "0xAlmighty", "id": 58662599, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58662599?v=4", "html_url": "https:\/\/github.com\/0xAlmighty" }, "html_url": "https:\/\/github.com\/0xAlmighty\/CVE-2021-41773-PoC", "description": "Path Traversal and RCE in Apache HTTP Server 2.4.49 ", "fork": false, "created_at": "2021-10-12T00:51:32Z", "updated_at": "2021-10-18T15:37:03Z", "pushed_at": "2021-10-12T00:52:59Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 416511119, "name": "httpd-2.4.49", "full_name": "ksanchezcld\/httpd-2.4.49", "owner": { "login": "ksanchezcld", "id": 3130599, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3130599?v=4", "html_url": "https:\/\/github.com\/ksanchezcld" }, "html_url": "https:\/\/github.com\/ksanchezcld\/httpd-2.4.49", "description": "critical: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773) (CVE-2021-42013)", "fork": false, "created_at": "2021-10-12T22:02:09Z", "updated_at": "2023-04-29T16:26:04Z", "pushed_at": "2021-10-12T22:02:19Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 416830075, "name": "SimplesApachePathTraversal", "full_name": "MrCl0wnLab\/SimplesApachePathTraversal", "owner": { "login": "MrCl0wnLab", "id": 17049332, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17049332?v=4", "html_url": "https:\/\/github.com\/MrCl0wnLab" }, "html_url": "https:\/\/github.com\/MrCl0wnLab\/SimplesApachePathTraversal", "description": "Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519", "fork": false, "created_at": "2021-10-13T17:03:56Z", "updated_at": "2023-09-28T11:32:19Z", "pushed_at": "2021-10-14T21:11:44Z", "stargazers_count": 60, "watchers_count": 60, "has_discussions": false, "forks_count": 16, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2020-17519", "cve-2021-41773", "cve-2021-42013" ], "visibility": "public", "forks": 16, "watchers": 60, "score": 0, "subscribers_count": 3 }, { "id": 417461813, "name": "apache-httpd-path-traversal-checker", "full_name": "theLSA\/apache-httpd-path-traversal-checker", "owner": { "login": "theLSA", "id": 28248956, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28248956?v=4", "html_url": "https:\/\/github.com\/theLSA" }, "html_url": "https:\/\/github.com\/theLSA\/apache-httpd-path-traversal-checker", "description": "apache httpd path traversal checker(CVE-2021-41773 \/ CVE-2021-42013)", "fork": false, "created_at": "2021-10-15T10:38:44Z", "updated_at": "2023-03-19T15:06:52Z", "pushed_at": "2021-10-16T10:28:23Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 8, "score": 0, "subscribers_count": 4 }, { "id": 417643516, "name": "CVE-2021-41773", "full_name": "LudovicPatho\/CVE-2021-41773", "owner": { "login": "LudovicPatho", "id": 26960886, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26960886?v=4", "html_url": "https:\/\/github.com\/LudovicPatho" }, "html_url": "https:\/\/github.com\/LudovicPatho\/CVE-2021-41773", "description": "The first vulnerability with the CVE identifier CVE-2021-41773 is a path traversal flaw that exists in Apache HTTP Server 2.4.49.", "fork": false, "created_at": "2021-10-15T21:38:48Z", "updated_at": "2023-02-28T09:00:21Z", "pushed_at": "2022-10-26T18:01:44Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 2, "score": 0, "subscribers_count": 3 }, { "id": 417869261, "name": "CVE-2021-41773_Honeypot", "full_name": "lopqto\/CVE-2021-41773_Honeypot", "owner": { "login": "lopqto", "id": 30213943, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30213943?v=4", "html_url": "https:\/\/github.com\/lopqto" }, "html_url": "https:\/\/github.com\/lopqto\/CVE-2021-41773_Honeypot", "description": "Simple honeypot for CVE-2021-41773 vulnerability", "fork": false, "created_at": "2021-10-16T15:30:34Z", "updated_at": "2023-06-19T20:02:27Z", "pushed_at": "2021-10-17T08:13:08Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 418481558, "name": "CVE-2021-41773_42013", "full_name": "zerodaywolf\/CVE-2021-41773_42013", "owner": { "login": "zerodaywolf", "id": 37404408, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37404408?v=4", "html_url": "https:\/\/github.com\/zerodaywolf" }, "html_url": "https:\/\/github.com\/zerodaywolf\/CVE-2021-41773_42013", "description": "Lab setup for CVE-2021-41773 (Apache httpd 2.4.49) and CVE-2021-42013 (Apache httpd 2.4.50).", "fork": false, "created_at": "2021-10-18T12:01:58Z", "updated_at": "2021-12-10T06:09:44Z", "pushed_at": "2021-10-18T12:47:56Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "apache", "cve", "cve-2021-41773", "cve-2021-42013", "httpd", "lfi", "penetration-testing", "rce", "security", "vulnerable", "web" ], "visibility": "public", "forks": 2, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 419301010, "name": "CVE-2021-41773", "full_name": "qwutony\/CVE-2021-41773", "owner": { "login": "qwutony", "id": 45024645, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45024645?v=4", "html_url": "https:\/\/github.com\/qwutony" }, "html_url": "https:\/\/github.com\/qwutony\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-10-20T11:27:12Z", "updated_at": "2021-10-20T12:26:59Z", "pushed_at": "2021-10-20T12:26:56Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 419369252, "name": "CVE-2021-41773", "full_name": "LayarKacaSiber\/CVE-2021-41773", "owner": { "login": "LayarKacaSiber", "id": 92864439, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92864439?v=4", "html_url": "https:\/\/github.com\/LayarKacaSiber" }, "html_url": "https:\/\/github.com\/LayarKacaSiber\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-10-20T14:41:15Z", "updated_at": "2021-10-23T13:15:51Z", "pushed_at": "2021-10-23T13:15:48Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 420144635, "name": "CVE-2021-41773", "full_name": "BabyTeam1024\/CVE-2021-41773", "owner": { "login": "BabyTeam1024", "id": 74447452, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74447452?v=4", "html_url": "https:\/\/github.com\/BabyTeam1024" }, "html_url": "https:\/\/github.com\/BabyTeam1024\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-10-22T15:12:12Z", "updated_at": "2023-09-28T11:32:33Z", "pushed_at": "2021-10-22T15:23:56Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 420407065, "name": "cve-2021-41773", "full_name": "walnutsecurity\/cve-2021-41773", "owner": { "login": "walnutsecurity", "id": 92915142, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92915142?v=4", "html_url": "https:\/\/github.com\/walnutsecurity" }, "html_url": "https:\/\/github.com\/walnutsecurity\/cve-2021-41773", "description": "cve-2021-41773.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.49", "fork": false, "created_at": "2021-10-23T12:31:53Z", "updated_at": "2021-11-25T09:32:45Z", "pushed_at": "2023-01-11T14:04:08Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 420528447, "name": "CVE-2021-41773", "full_name": "TheLastVvV\/CVE-2021-41773", "owner": { "login": "TheLastVvV", "id": 71128830, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71128830?v=4", "html_url": "https:\/\/github.com\/TheLastVvV" }, "html_url": "https:\/\/github.com\/TheLastVvV\/CVE-2021-41773", "description": "Poc CVE-2021-41773 - Apache 2.4.49 with CGI enabled", "fork": false, "created_at": "2021-10-23T21:37:25Z", "updated_at": "2021-10-23T23:15:50Z", "pushed_at": "2021-10-23T21:50:36Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 421138366, "name": "CVE-2021-41773", "full_name": "MazX0p\/CVE-2021-41773", "owner": { "login": "MazX0p", "id": 54814433, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54814433?v=4", "html_url": "https:\/\/github.com\/MazX0p" }, "html_url": "https:\/\/github.com\/MazX0p\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-10-25T18:21:43Z", "updated_at": "2022-07-01T21:33:34Z", "pushed_at": "2021-10-25T18:39:11Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 421191229, "name": "Scanner-CVE-2021-41773", "full_name": "vida003\/Scanner-CVE-2021-41773", "owner": { "login": "vida003", "id": 77762068, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77762068?v=4", "html_url": "https:\/\/github.com\/vida003" }, "html_url": "https:\/\/github.com\/vida003\/Scanner-CVE-2021-41773", "description": "A automatic scanner to apache 2.4.49", "fork": false, "created_at": "2021-10-25T21:34:08Z", "updated_at": "2021-10-25T22:17:23Z", "pushed_at": "2021-10-25T22:17:21Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 421530564, "name": "CVE-2021-41773", "full_name": "mr-exo\/CVE-2021-41773", "owner": { "login": "mr-exo", "id": 76655540, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76655540?v=4", "html_url": "https:\/\/github.com\/mr-exo" }, "html_url": "https:\/\/github.com\/mr-exo\/CVE-2021-41773", "description": "Remote Code Execution exploit for Apache servers. Affected versions: Apache 2.4.49, Apache 2.4.50", "fork": false, "created_at": "2021-10-26T17:56:25Z", "updated_at": "2023-09-27T03:14:18Z", "pushed_at": "2021-10-26T18:04:43Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 6, "score": 0, "subscribers_count": 1 }, { "id": 422466104, "name": "CVE-2021-41773", "full_name": "wolf1892\/CVE-2021-41773", "owner": { "login": "wolf1892", "id": 24608781, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24608781?v=4", "html_url": "https:\/\/github.com\/wolf1892" }, "html_url": "https:\/\/github.com\/wolf1892\/CVE-2021-41773", "description": "Setup vulnerable enviornment", "fork": false, "created_at": "2021-10-29T06:31:57Z", "updated_at": "2021-10-29T06:33:41Z", "pushed_at": "2021-10-29T06:33:39Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 424762276, "name": "CVE-2021-41773-Playground", "full_name": "Hydragyrum\/CVE-2021-41773-Playground", "owner": { "login": "Hydragyrum", "id": 4928181, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4928181?v=4", "html_url": "https:\/\/github.com\/Hydragyrum" }, "html_url": "https:\/\/github.com\/Hydragyrum\/CVE-2021-41773-Playground", "description": "Some docker images to play with CVE-2021-41773 and CVE-2021-42013", "fork": false, "created_at": "2021-11-04T22:52:44Z", "updated_at": "2022-11-25T07:03:08Z", "pushed_at": "2021-11-04T22:56:14Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 5, "score": 0, "subscribers_count": 2 }, { "id": 426066790, "name": "Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit", "full_name": "IcmpOff\/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit", "owner": { "login": "IcmpOff", "id": 71145797, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71145797?v=4", "html_url": "https:\/\/github.com\/IcmpOff" }, "html_url": "https:\/\/github.com\/IcmpOff\/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit", "description": "This Metasploit module exploits an unauthenticated remote code execution vulnerability which exists in Apache version 2.4.49 (CVE-2021-41773). If files outside of the document root are not protected by ‘require all denied’ and CGI has been explicitly enabled, it can be used to execute arbitrary commands. This vulnerability has been reintroduced in the Apache 2.4.50 fix (CVE-2021-42013).", "fork": false, "created_at": "2021-11-09T02:38:13Z", "updated_at": "2021-11-09T02:42:52Z", "pushed_at": "2021-11-09T02:39:22Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "apache", "exploit", "metasploit", "metasploit-framework", "metasploit-modules", "rce" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 427005450, "name": "CVE-2021-41773", "full_name": "pirenga\/CVE-2021-41773", "owner": { "login": "pirenga", "id": 10979104, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10979104?v=4", "html_url": "https:\/\/github.com\/pirenga" }, "html_url": "https:\/\/github.com\/pirenga\/CVE-2021-41773", "description": "Ce programme permet de détecter une faille RCE sur les serveurs Apache 2.4.49 et Apache 2.4.50", "fork": false, "created_at": "2021-11-11T13:10:05Z", "updated_at": "2023-09-28T11:33:10Z", "pushed_at": "2021-11-11T00:48:37Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 1, "score": 0, "subscribers_count": 0 }, { "id": 427815832, "name": "POC-CVE-2021-41773", "full_name": "kubota\/POC-CVE-2021-41773", "owner": { "login": "kubota", "id": 119277, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119277?v=4", "html_url": "https:\/\/github.com\/kubota" }, "html_url": "https:\/\/github.com\/kubota\/POC-CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-11-14T02:02:45Z", "updated_at": "2021-11-16T20:42:27Z", "pushed_at": "2021-11-16T20:42:25Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 427956449, "name": "CVE-2021-41773", "full_name": "xMohamed0\/CVE-2021-41773", "owner": { "login": "xMohamed0", "id": 94008154, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94008154?v=4", "html_url": "https:\/\/github.com\/xMohamed0" }, "html_url": "https:\/\/github.com\/xMohamed0\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-11-14T14:50:45Z", "updated_at": "2021-11-14T14:55:20Z", "pushed_at": "2021-11-14T14:55:18Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 438514241, "name": "MASS_CVE-2021-41773", "full_name": "i6c\/MASS_CVE-2021-41773", "owner": { "login": "i6c", "id": 87837042, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87837042?v=4", "html_url": "https:\/\/github.com\/i6c" }, "html_url": "https:\/\/github.com\/i6c\/MASS_CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-12-15T06:04:41Z", "updated_at": "2023-09-28T11:34:08Z", "pushed_at": "2021-12-15T06:06:53Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 447314257, "name": "CVE-2021-41773-exploiter", "full_name": "norrig\/CVE-2021-41773-exploiter", "owner": { "login": "norrig", "id": 5526261, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5526261?v=4", "html_url": "https:\/\/github.com\/norrig" }, "html_url": "https:\/\/github.com\/norrig\/CVE-2021-41773-exploiter", "description": "School project - Please use other repos for actual testing", "fork": false, "created_at": "2022-01-12T17:42:36Z", "updated_at": "2022-01-12T18:26:57Z", "pushed_at": "2022-01-13T16:18:33Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 452242021, "name": "CVE-2021-41773-exercise", "full_name": "m96dg\/CVE-2021-41773-exercise", "owner": { "login": "m96dg", "id": 65173648, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65173648?v=4", "html_url": "https:\/\/github.com\/m96dg" }, "html_url": "https:\/\/github.com\/m96dg\/CVE-2021-41773-exercise", "description": "A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration \"require all denied\", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and not earlier versions. Credits to: https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-41773 ", "fork": false, "created_at": "2022-01-26T11:02:46Z", "updated_at": "2022-01-26T11:22:13Z", "pushed_at": "2022-01-30T19:02:43Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 464271089, "name": "CVE-2021-41773", "full_name": "skentagon\/CVE-2021-41773", "owner": { "login": "skentagon", "id": 49702576, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49702576?v=4", "html_url": "https:\/\/github.com\/skentagon" }, "html_url": "https:\/\/github.com\/skentagon\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2022-02-27T22:39:58Z", "updated_at": "2022-03-04T00:11:58Z", "pushed_at": "2022-03-04T00:05:44Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 467687901, "name": "CVE-2021-41773", "full_name": "mauricelambert\/CVE-2021-41773", "owner": { "login": "mauricelambert", "id": 50479118, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4", "html_url": "https:\/\/github.com\/mauricelambert" }, "html_url": "https:\/\/github.com\/mauricelambert\/CVE-2021-41773", "description": "These Metasploit, Nmap, Python and Ruby scripts detects and exploits CVE-2021-41773 with RCE and local file disclosure.", "fork": false, "created_at": "2022-03-08T21:55:53Z", "updated_at": "2022-03-23T16:56:34Z", "pushed_at": "2022-03-14T07:34:49Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "cve-2021-41773", "detection", "exploit", "metasploit", "nmap", "python3", "rce", "ruby", "scanner", "vulnerability" ], "visibility": "public", "forks": 2, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 468909402, "name": "CVE-2021-41773", "full_name": "the29a\/CVE-2021-41773", "owner": { "login": "the29a", "id": 4436697, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4436697?v=4", "html_url": "https:\/\/github.com\/the29a" }, "html_url": "https:\/\/github.com\/the29a\/CVE-2021-41773", "description": "Small PoC of CVE-2021-41773", "fork": false, "created_at": "2022-03-11T21:50:35Z", "updated_at": "2022-03-11T21:52:35Z", "pushed_at": "2022-03-11T22:10:25Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 469203660, "name": "CVE-2021-41773", "full_name": "thehackersbrain\/CVE-2021-41773", "owner": { "login": "thehackersbrain", "id": 36809025, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36809025?v=4", "html_url": "https:\/\/github.com\/thehackersbrain" }, "html_url": "https:\/\/github.com\/thehackersbrain\/CVE-2021-41773", "description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773", "fork": false, "created_at": "2022-03-12T21:24:55Z", "updated_at": "2023-11-29T09:30:49Z", "pushed_at": "2022-03-12T21:30:58Z", "stargazers_count": 78, "watchers_count": 78, "has_discussions": false, "forks_count": 31, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "apache2", "cve-2021-41773", "exploit", "gauravraj", "lfi", "python", "rce", "thehackersbrain" ], "visibility": "public", "forks": 31, "watchers": 78, "score": 0, "subscribers_count": 1 }, { "id": 469576020, "name": "CVE-2021-41773", "full_name": "honypot\/CVE-2021-41773", "owner": { "login": "honypot", "id": 101309325, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101309325?v=4", "html_url": "https:\/\/github.com\/honypot" }, "html_url": "https:\/\/github.com\/honypot\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2022-03-14T04:08:56Z", "updated_at": "2022-03-14T04:09:11Z", "pushed_at": "2022-03-14T04:09:05Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 469821841, "name": "CVE-2021-41773", "full_name": "Fa1c0n35\/CVE-2021-41773", "owner": { "login": "Fa1c0n35", "id": 33335488, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4", "html_url": "https:\/\/github.com\/Fa1c0n35" }, "html_url": "https:\/\/github.com\/Fa1c0n35\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2022-03-14T16:43:49Z", "updated_at": "2022-03-14T16:44:00Z", "pushed_at": "2022-03-14T16:43:57Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 474963195, "name": "CVE-2021-41773", "full_name": "puckiestyle\/CVE-2021-41773", "owner": { "login": "puckiestyle", "id": 57447087, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4", "html_url": "https:\/\/github.com\/puckiestyle" }, "html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2022-03-28T11:02:46Z", "updated_at": "2022-03-28T11:03:00Z", "pushed_at": "2022-03-28T11:41:55Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 475931011, "name": "CVE-2021-41773", "full_name": "zer0qs\/CVE-2021-41773", "owner": { "login": "zer0qs", "id": 83699106, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83699106?v=4", "html_url": "https:\/\/github.com\/zer0qs" }, "html_url": "https:\/\/github.com\/zer0qs\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2022-03-30T15:04:27Z", "updated_at": "2022-03-30T17:46:13Z", "pushed_at": "2022-04-14T21:54:47Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 476112666, "name": "Reserch-CVE-2021-41773", "full_name": "DoTuan1\/Reserch-CVE-2021-41773", "owner": { "login": "DoTuan1", "id": 63194321, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63194321?v=4", "html_url": "https:\/\/github.com\/DoTuan1" }, "html_url": "https:\/\/github.com\/DoTuan1\/Reserch-CVE-2021-41773", "description": null, "fork": false, "created_at": "2022-03-31T01:48:33Z", "updated_at": "2022-03-31T01:54:45Z", "pushed_at": "2022-03-31T03:03:09Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 477111512, "name": "netsec-polygon", "full_name": "bernardas\/netsec-polygon", "owner": { "login": "bernardas", "id": 62701131, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62701131?v=4", "html_url": "https:\/\/github.com\/bernardas" }, "html_url": "https:\/\/github.com\/bernardas\/netsec-polygon", "description": "Environment for CVE-2021-41773 recreation.", "fork": false, "created_at": "2022-04-02T16:34:45Z", "updated_at": "2022-04-03T08:19:39Z", "pushed_at": "2022-05-17T22:16:34Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 477889492, "name": "Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit", "full_name": "CalfCrusher\/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit", "owner": { "login": "CalfCrusher", "id": 5812023, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5812023?v=4", "html_url": "https:\/\/github.com\/CalfCrusher" }, "html_url": "https:\/\/github.com\/CalfCrusher\/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit", "description": "CVE-2021-41773 | CVE-2021-42013 Exploit Tool (Apache\/2.4.49-2.4.50)", "fork": false, "created_at": "2022-04-04T22:07:21Z", "updated_at": "2023-09-19T15:26:28Z", "pushed_at": "2022-04-08T09:24:35Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-41773", "cve-2021-42013", "exploit" ], "visibility": "public", "forks": 2, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 478605535, "name": "cve-2021-41773", "full_name": "vuongnv3389-sec\/cve-2021-41773", "owner": { "login": "vuongnv3389-sec", "id": 64488431, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64488431?v=4", "html_url": "https:\/\/github.com\/vuongnv3389-sec" }, "html_url": "https:\/\/github.com\/vuongnv3389-sec\/cve-2021-41773", "description": null, "fork": false, "created_at": "2022-04-06T14:53:19Z", "updated_at": "2022-04-06T14:54:12Z", "pushed_at": "2022-04-06T15:41:47Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 480821526, "name": "CVE-2021-41773", "full_name": "Chocapikk\/CVE-2021-41773", "owner": { "login": "Chocapikk", "id": 88535377, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", "html_url": "https:\/\/github.com\/Chocapikk" }, "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2022-04-12T13:25:58Z", "updated_at": "2023-11-15T06:28:55Z", "pushed_at": "2022-04-12T13:26:22Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 486245191, "name": "Apache_Penetration_Tool", "full_name": "wangfly-me\/Apache_Penetration_Tool", "owner": { "login": "wangfly-me", "id": 25388540, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25388540?v=4", "html_url": "https:\/\/github.com\/wangfly-me" }, "html_url": "https:\/\/github.com\/wangfly-me\/Apache_Penetration_Tool", "description": "CVE-2021-41773&CVE-2021-42013图形化漏洞检测利用工具", "fork": false, "created_at": "2022-04-27T15:17:38Z", "updated_at": "2023-11-27T08:00:07Z", "pushed_at": "2023-05-22T16:00:49Z", "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-41773", "cve-2021-42013", "exp" ], "visibility": "public", "forks": 0, "watchers": 13, "score": 0, "subscribers_count": 2 }, { "id": 491353620, "name": "CVE-2021-41773-Scanner", "full_name": "anldori\/CVE-2021-41773-Scanner", "owner": { "login": "anldori", "id": 101538840, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101538840?v=4", "html_url": "https:\/\/github.com\/anldori" }, "html_url": "https:\/\/github.com\/anldori\/CVE-2021-41773-Scanner", "description": "CVE-2021-41773 Shodan scanner", "fork": false, "created_at": "2022-05-12T03:42:24Z", "updated_at": "2022-05-12T03:42:49Z", "pushed_at": "2022-05-12T03:44:49Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 491523422, "name": "ApacheRCEEssay", "full_name": "iosifache\/ApacheRCEEssay", "owner": { "login": "iosifache", "id": 11766982, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11766982?v=4", "html_url": "https:\/\/github.com\/iosifache" }, "html_url": "https:\/\/github.com\/iosifache\/ApacheRCEEssay", "description": "Essay (and PoCs) about CVE-2021-41773, a remote code execution vulnerability in Apache 2.4.49 🕸️", "fork": false, "created_at": "2022-05-12T13:23:08Z", "updated_at": "2023-02-14T06:59:33Z", "pushed_at": "2022-05-13T06:10:12Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-41773", "cve-2021-41773-poc" ], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 500809753, "name": "CVE-2021-41773", "full_name": "Habib0x0\/CVE-2021-41773", "owner": { "login": "Habib0x0", "id": 24976957, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24976957?v=4", "html_url": "https:\/\/github.com\/Habib0x0" }, "html_url": "https:\/\/github.com\/Habib0x0\/CVE-2021-41773", "description": "CVE-2021-41773 | Apache HTTP Server 2.4.49 is vulnerable to Path Traversal and Remote Code execution attacks ", "fork": false, "created_at": "2022-06-07T11:22:08Z", "updated_at": "2023-04-14T16:51:35Z", "pushed_at": "2022-12-11T16:02:11Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 504547542, "name": "CVE-2021-41773-Apache-RCE", "full_name": "pwn3z\/CVE-2021-41773-Apache-RCE", "owner": { "login": "pwn3z", "id": 71440287, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71440287?v=4", "html_url": "https:\/\/github.com\/pwn3z" }, "html_url": "https:\/\/github.com\/pwn3z\/CVE-2021-41773-Apache-RCE", "description": "A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration \"require all denied\", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.", "fork": false, "created_at": "2022-06-17T13:36:42Z", "updated_at": "2022-06-17T13:38:47Z", "pushed_at": "2022-06-17T13:39:38Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 516684881, "name": "Mitigation-Apache-CVE-2021-41773-", "full_name": "EkamSinghWalia\/Mitigation-Apache-CVE-2021-41773-", "owner": { "login": "EkamSinghWalia", "id": 106553324, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106553324?v=4", "html_url": "https:\/\/github.com\/EkamSinghWalia" }, "html_url": "https:\/\/github.com\/EkamSinghWalia\/Mitigation-Apache-CVE-2021-41773-", "description": "Mitigation\/fix of CVE-2021-41773 A Path Traversal And File Disclosure Vulnerability In Apache", "fork": false, "created_at": "2022-07-22T09:11:47Z", "updated_at": "2022-07-22T09:29:20Z", "pushed_at": "2022-07-22T14:59:37Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 521335808, "name": "CVE-2021-41773", "full_name": "Plunder283\/CVE-2021-41773", "owner": { "login": "Plunder283", "id": 87617893, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87617893?v=4", "html_url": "https:\/\/github.com\/Plunder283" }, "html_url": "https:\/\/github.com\/Plunder283\/CVE-2021-41773", "description": "CVE-2021-41773 Gaurav Raj's exploit modified by Plunder", "fork": false, "created_at": "2022-08-04T16:19:42Z", "updated_at": "2022-08-04T16:33:22Z", "pushed_at": "2022-08-04T16:34:38Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 536947281, "name": "cve-2021-41773", "full_name": "mightysai1997\/cve-2021-41773", "owner": { "login": "mightysai1997", "id": 110396758, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4", "html_url": "https:\/\/github.com\/mightysai1997" }, "html_url": "https:\/\/github.com\/mightysai1997\/cve-2021-41773", "description": null, "fork": false, "created_at": "2022-09-15T09:08:58Z", "updated_at": "2022-09-15T09:09:16Z", "pushed_at": "2022-09-15T09:09:11Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 536953912, "name": "CVE-2021-41773h", "full_name": "mightysai1997\/CVE-2021-41773h", "owner": { "login": "mightysai1997", "id": 110396758, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4", "html_url": "https:\/\/github.com\/mightysai1997" }, "html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773h", "description": null, "fork": false, "created_at": "2022-09-15T09:27:04Z", "updated_at": "2022-09-15T09:27:22Z", "pushed_at": "2023-12-02T17:16:43Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 536957144, "name": "cve-2021-41773-v-", "full_name": "mightysai1997\/cve-2021-41773-v-", "owner": { "login": "mightysai1997", "id": 110396758, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4", "html_url": "https:\/\/github.com\/mightysai1997" }, "html_url": "https:\/\/github.com\/mightysai1997\/cve-2021-41773-v-", "description": null, "fork": false, "created_at": "2022-09-15T09:36:17Z", "updated_at": "2022-09-15T09:36:35Z", "pushed_at": "2022-09-15T09:36:30Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 536957769, "name": "CVE-2021-41773-i-", "full_name": "mightysai1997\/CVE-2021-41773-i-", "owner": { "login": "mightysai1997", "id": 110396758, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4", "html_url": "https:\/\/github.com\/mightysai1997" }, "html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773-i-", "description": null, "fork": false, "created_at": "2022-09-15T09:38:04Z", "updated_at": "2022-09-15T09:38:16Z", "pushed_at": "2023-10-20T11:54:52Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 536968315, "name": "CVE-2021-41773-L-", "full_name": "mightysai1997\/CVE-2021-41773-L-", "owner": { "login": "mightysai1997", "id": 110396758, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4", "html_url": "https:\/\/github.com\/mightysai1997" }, "html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773-L-", "description": null, "fork": false, "created_at": "2022-09-15T10:08:36Z", "updated_at": "2022-09-15T10:08:51Z", "pushed_at": "2022-09-15T10:08:46Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 536985771, "name": "CVE-2021-41773-PoC", "full_name": "mightysai1997\/CVE-2021-41773-PoC", "owner": { "login": "mightysai1997", "id": 110396758, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4", "html_url": "https:\/\/github.com\/mightysai1997" }, "html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773-PoC", "description": null, "fork": false, "created_at": "2022-09-15T11:01:45Z", "updated_at": "2022-09-15T11:02:07Z", "pushed_at": "2023-10-20T13:40:59Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 537018809, "name": "CVE-2021-41773.git1", "full_name": "mightysai1997\/CVE-2021-41773.git1", "owner": { "login": "mightysai1997", "id": 110396758, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4", "html_url": "https:\/\/github.com\/mightysai1997" }, "html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773.git1", "description": null, "fork": false, "created_at": "2022-09-15T12:35:06Z", "updated_at": "2022-09-15T12:35:18Z", "pushed_at": "2022-09-15T12:35:14Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 537019898, "name": "CVE-2021-41773m", "full_name": "mightysai1997\/CVE-2021-41773m", "owner": { "login": "mightysai1997", "id": 110396758, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4", "html_url": "https:\/\/github.com\/mightysai1997" }, "html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773m", "description": null, "fork": false, "created_at": "2022-09-15T12:37:59Z", "updated_at": "2022-09-16T01:01:18Z", "pushed_at": "2022-09-15T12:38:09Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 537060189, "name": "CVE-2021-41773S", "full_name": "mightysai1997\/CVE-2021-41773S", "owner": { "login": "mightysai1997", "id": 110396758, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4", "html_url": "https:\/\/github.com\/mightysai1997" }, "html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773S", "description": null, "fork": false, "created_at": "2022-09-15T14:17:45Z", "updated_at": "2022-09-16T01:01:16Z", "pushed_at": "2023-10-21T00:04:26Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 538798099, "name": "LayarKacaSiber-CVE-2021-41773", "full_name": "dileepdkumar\/LayarKacaSiber-CVE-2021-41773", "owner": { "login": "dileepdkumar", "id": 89115244, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89115244?v=4", "html_url": "https:\/\/github.com\/dileepdkumar" }, "html_url": "https:\/\/github.com\/dileepdkumar\/LayarKacaSiber-CVE-2021-41773", "description": null, "fork": false, "created_at": "2022-09-20T03:45:24Z", "updated_at": "2022-09-20T03:45:37Z", "pushed_at": "2023-10-21T00:19:27Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 560281575, "name": "CVE-2021-41773", "full_name": "aqiao-jashell\/CVE-2021-41773", "owner": { "login": "aqiao-jashell", "id": 94209165, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94209165?v=4", "html_url": "https:\/\/github.com\/aqiao-jashell" }, "html_url": "https:\/\/github.com\/aqiao-jashell\/CVE-2021-41773", "description": "apache路径穿越漏洞poc&exp", "fork": false, "created_at": "2022-11-01T05:58:59Z", "updated_at": "2023-02-06T08:31:06Z", "pushed_at": "2023-05-25T01:03:36Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 8, "score": 0, "subscribers_count": 1 }, { "id": 560339513, "name": "py-CVE-2021-41773", "full_name": "aqiao-jashell\/py-CVE-2021-41773", "owner": { "login": "aqiao-jashell", "id": 94209165, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94209165?v=4", "html_url": "https:\/\/github.com\/aqiao-jashell" }, "html_url": "https:\/\/github.com\/aqiao-jashell\/py-CVE-2021-41773", "description": "python编写的apache路径穿越poc&exp", "fork": false, "created_at": "2022-11-01T09:17:03Z", "updated_at": "2023-02-06T08:31:07Z", "pushed_at": "2022-11-02T09:26:06Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 7, "score": 0, "subscribers_count": 1 }, { "id": 567720828, "name": "CVE-2021-41773", "full_name": "12345qwert123456\/CVE-2021-41773", "owner": { "login": "12345qwert123456", "id": 63474188, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63474188?v=4", "html_url": "https:\/\/github.com\/12345qwert123456" }, "html_url": "https:\/\/github.com\/12345qwert123456\/CVE-2021-41773", "description": "Vulnerable configuration Apache HTTP Server version 2.4.49", "fork": false, "created_at": "2022-11-18T12:23:04Z", "updated_at": "2022-11-21T16:25:14Z", "pushed_at": "2022-11-21T16:20:11Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "apache", "cve", "cve-2021-41773", "docker", "http-server", "lfi", "vulnerability" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 569296799, "name": "Apache-HTTP-Server-2.4.49-2.4.50-Path-Traversal-Remote-Code-Execution", "full_name": "blackn0te\/Apache-HTTP-Server-2.4.49-2.4.50-Path-Traversal-Remote-Code-Execution", "owner": { "login": "blackn0te", "id": 33929865, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33929865?v=4", "html_url": "https:\/\/github.com\/blackn0te" }, "html_url": "https:\/\/github.com\/blackn0te\/Apache-HTTP-Server-2.4.49-2.4.50-Path-Traversal-Remote-Code-Execution", "description": "Apache HTTP-Server 2.4.49-2.4.50 Path Traversal & Remote Code Execution PoC (CVE-2021-41773 & CVE-2021-42013)", "fork": false, "created_at": "2022-11-22T14:09:18Z", "updated_at": "2023-07-11T05:26:05Z", "pushed_at": "2022-11-22T14:42:10Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 4, "score": 0, "subscribers_count": 1 }, { "id": 574682128, "name": "exploit-apache2-cve-2021-41773", "full_name": "TheKernelPanic\/exploit-apache2-cve-2021-41773", "owner": { "login": "TheKernelPanic", "id": 78765297, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78765297?v=4", "html_url": "https:\/\/github.com\/TheKernelPanic" }, "html_url": "https:\/\/github.com\/TheKernelPanic\/exploit-apache2-cve-2021-41773", "description": "Exploit for path transversal vulnerability in apache", "fork": false, "created_at": "2022-12-05T21:11:28Z", "updated_at": "2022-12-05T21:13:31Z", "pushed_at": "2022-12-05T21:13:26Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 603146964, "name": "apache2.4.49VulnerableLabSetup", "full_name": "retrymp3\/apache2.4.49VulnerableLabSetup", "owner": { "login": "retrymp3", "id": 65720815, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65720815?v=4", "html_url": "https:\/\/github.com\/retrymp3" }, "html_url": "https:\/\/github.com\/retrymp3\/apache2.4.49VulnerableLabSetup", "description": "CVE-2021-41773 vulnerable apache version 2.4.49 lab set-up.", "fork": false, "created_at": "2023-02-17T18:03:23Z", "updated_at": "2023-02-17T18:05:53Z", "pushed_at": "2023-02-18T05:51:09Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 630673981, "name": "docker-cve-2021-41773", "full_name": "MatanelGordon\/docker-cve-2021-41773", "owner": { "login": "MatanelGordon", "id": 72258277, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72258277?v=4", "html_url": "https:\/\/github.com\/MatanelGordon" }, "html_url": "https:\/\/github.com\/MatanelGordon\/docker-cve-2021-41773", "description": "A little demonstration of cve-2021-41773 on httpd docker containers", "fork": false, "created_at": "2023-04-20T22:37:06Z", "updated_at": "2023-04-27T10:44:37Z", "pushed_at": "2023-04-21T18:36:48Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-41773", "docker" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 649140370, "name": "Apache-CVEs", "full_name": "0xGabe\/Apache-CVEs", "owner": { "login": "0xGabe", "id": 68028935, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68028935?v=4", "html_url": "https:\/\/github.com\/0xGabe" }, "html_url": "https:\/\/github.com\/0xGabe\/Apache-CVEs", "description": "Exploit created in python3 to exploit known vulnerabilities in Apache web server (CVE-2021-41773, CVE-2021-42013)", "fork": false, "created_at": "2023-06-03T22:59:20Z", "updated_at": "2023-06-04T02:56:40Z", "pushed_at": "2023-06-03T23:12:48Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 673733144, "name": "CVE-2021-41773_CVE-2021-42013_Exploits", "full_name": "OfriOuzan\/CVE-2021-41773_CVE-2021-42013_Exploits", "owner": { "login": "OfriOuzan", "id": 104366208, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104366208?v=4", "html_url": "https:\/\/github.com\/OfriOuzan" }, "html_url": "https:\/\/github.com\/OfriOuzan\/CVE-2021-41773_CVE-2021-42013_Exploits", "description": "Exploit CVE-2021-41773 and CVE-2021-42013", "fork": false, "created_at": "2023-08-02T09:50:10Z", "updated_at": "2023-11-10T19:10:30Z", "pushed_at": "2023-08-02T09:51:50Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 1 }, { "id": 677373693, "name": "CVE-2021-41773-MSF", "full_name": "belajarqywok\/CVE-2021-41773-MSF", "owner": { "login": "belajarqywok", "id": 59132829, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59132829?v=4", "html_url": "https:\/\/github.com\/belajarqywok" }, "html_url": "https:\/\/github.com\/belajarqywok\/CVE-2021-41773-MSF", "description": "Simple Metasploit-Framework module for conducting website penetration tests (CVE-2021-41773).", "fork": false, "created_at": "2023-08-11T12:12:09Z", "updated_at": "2023-10-02T04:03:33Z", "pushed_at": "2023-08-11T12:14:35Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "metasploit-framework", "metasploit-modules", "penetration-testing", "research", "security-automation", "testing" ], "visibility": "public", "forks": 0, "watchers": 7, "score": 0, "subscribers_count": 1 }, { "id": 721073490, "name": "CVE-2021-41773", "full_name": "Iris288\/CVE-2021-41773", "owner": { "login": "Iris288", "id": 101178777, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101178777?v=4", "html_url": "https:\/\/github.com\/Iris288" }, "html_url": "https:\/\/github.com\/Iris288\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2023-11-20T09:57:07Z", "updated_at": "2023-11-20T13:51:44Z", "pushed_at": "2023-11-20T10:42:20Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 } ]