[ { "id": 413890827, "name": "cve-2021-41773", "full_name": "Vulnmachines\/cve-2021-41773", "owner": { "login": "Vulnmachines", "id": 79006904, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4", "html_url": "https:\/\/github.com\/Vulnmachines" }, "html_url": "https:\/\/github.com\/Vulnmachines\/cve-2021-41773", "description": "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.", "fork": false, "created_at": "2021-10-05T16:13:38Z", "updated_at": "2021-12-22T06:48:03Z", "pushed_at": "2021-12-07T12:48:44Z", "stargazers_count": 31, "watchers_count": 31, "forks_count": 10, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 10, "watchers": 31, "score": 0 }, { "id": 413892415, "name": "CVE-2021-41773", "full_name": "numanturle\/CVE-2021-41773", "owner": { "login": "numanturle", "id": 7007951, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4", "html_url": "https:\/\/github.com\/numanturle" }, "html_url": "https:\/\/github.com\/numanturle\/CVE-2021-41773", "description": "CVE-2021-41773", "fork": false, "created_at": "2021-10-05T16:18:09Z", "updated_at": "2021-12-16T06:09:21Z", "pushed_at": "2021-10-05T16:48:27Z", "stargazers_count": 11, "watchers_count": 11, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 11, "score": 0 }, { "id": 413901787, "name": "CVE-2021-41773", "full_name": "knqyf263\/CVE-2021-41773", "owner": { "login": "knqyf263", "id": 2253692, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4", "html_url": "https:\/\/github.com\/knqyf263" }, "html_url": "https:\/\/github.com\/knqyf263\/CVE-2021-41773", "description": "Path traversal in Apache HTTP Server 2.4.49 (CVE-2021-41773) ", "fork": false, "created_at": "2021-10-05T16:45:41Z", "updated_at": "2021-10-19T03:08:08Z", "pushed_at": "2021-10-06T05:40:34Z", "stargazers_count": 9, "watchers_count": 9, "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 9, "score": 0 }, { "id": 413916578, "name": "CVE-2021-41773-PoC", "full_name": "ZephrFish\/CVE-2021-41773-PoC", "owner": { "login": "ZephrFish", "id": 5783068, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4", "html_url": "https:\/\/github.com\/ZephrFish" }, "html_url": "https:\/\/github.com\/ZephrFish\/CVE-2021-41773-PoC", "description": null, "fork": false, "created_at": "2021-10-05T17:29:49Z", "updated_at": "2021-10-19T08:07:47Z", "pushed_at": "2021-10-06T09:25:38Z", "stargazers_count": 18, "watchers_count": 18, "forks_count": 9, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 9, "watchers": 18, "score": 0 }, { "id": 413916846, "name": "PoC-CVE-2021-41773", "full_name": "iilegacyyii\/PoC-CVE-2021-41773", "owner": { "login": "iilegacyyii", "id": 68760809, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68760809?v=4", "html_url": "https:\/\/github.com\/iilegacyyii" }, "html_url": "https:\/\/github.com\/iilegacyyii\/PoC-CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-10-05T17:30:43Z", "updated_at": "2021-12-15T14:43:07Z", "pushed_at": "2021-11-24T12:57:46Z", "stargazers_count": 38, "watchers_count": 38, "forks_count": 33, "allow_forking": true, "is_template": false, "topics": [ "apache", "cve", "lfi", "poc", "rce" ], "visibility": "public", "forks": 33, "watchers": 38, "score": 0 }, { "id": 413943505, "name": "CVE-2021-41773", "full_name": "masahiro331\/CVE-2021-41773", "owner": { "login": "masahiro331", "id": 20438853, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20438853?v=4", "html_url": "https:\/\/github.com\/masahiro331" }, "html_url": "https:\/\/github.com\/masahiro331\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-10-05T18:56:04Z", "updated_at": "2021-10-10T18:37:45Z", "pushed_at": "2021-10-06T03:43:42Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0 }, { "id": 413969845, "name": "CVE-2021-41773", "full_name": "RyouYoo\/CVE-2021-41773", "owner": { "login": "RyouYoo", "id": 48088579, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48088579?v=4", "html_url": "https:\/\/github.com\/RyouYoo" }, "html_url": "https:\/\/github.com\/RyouYoo\/CVE-2021-41773", "description": "Exploitation of CVE-2021-41773 a Directory Traversal in Apache 2.4.49.", "fork": false, "created_at": "2021-10-05T20:30:01Z", "updated_at": "2021-10-10T18:01:45Z", "pushed_at": "2021-10-05T22:06:50Z", "stargazers_count": 11, "watchers_count": 11, "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 11, "score": 0 }, { "id": 413972926, "name": "POC-CVE-2021-41773", "full_name": "TishcaTpx\/POC-CVE-2021-41773", "owner": { "login": "TishcaTpx", "id": 91351013, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91351013?v=4", "html_url": "https:\/\/github.com\/TishcaTpx" }, "html_url": "https:\/\/github.com\/TishcaTpx\/POC-CVE-2021-41773", "description": "Poc.py ", "fork": false, "created_at": "2021-10-05T20:41:34Z", "updated_at": "2021-10-14T18:36:50Z", "pushed_at": "2021-10-05T21:29:59Z", "stargazers_count": 6, "watchers_count": 6, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 6, "score": 0 }, { "id": 414013246, "name": "CVE-2021-41773-PoC", "full_name": "lorddemon\/CVE-2021-41773-PoC", "owner": { "login": "lorddemon", "id": 6675738, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6675738?v=4", "html_url": "https:\/\/github.com\/lorddemon" }, "html_url": "https:\/\/github.com\/lorddemon\/CVE-2021-41773-PoC", "description": null, "fork": false, "created_at": "2021-10-05T23:53:48Z", "updated_at": "2021-12-15T14:43:07Z", "pushed_at": "2021-10-06T15:37:23Z", "stargazers_count": 37, "watchers_count": 37, "forks_count": 21, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 21, "watchers": 37, "score": 0 }, { "id": 414043746, "name": "CVE-2021-41773_CVE-2021-42013", "full_name": "Ls4ss\/CVE-2021-41773_CVE-2021-42013", "owner": { "login": "Ls4ss", "id": 25537761, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25537761?v=4", "html_url": "https:\/\/github.com\/Ls4ss" }, "html_url": "https:\/\/github.com\/Ls4ss\/CVE-2021-41773_CVE-2021-42013", "description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE", "fork": false, "created_at": "2021-10-06T02:28:41Z", "updated_at": "2021-12-22T23:54:35Z", "pushed_at": "2021-12-22T23:54:18Z", "stargazers_count": 16, "watchers_count": 16, "forks_count": 8, "allow_forking": true, "is_template": false, "topics": [ "apache", "cve", "exploit", "payload", "pentest", "rce" ], "visibility": "public", "forks": 8, "watchers": 16, "score": 0 }, { "id": 414044140, "name": "CVE-2021-41773", "full_name": "itsecurityco\/CVE-2021-41773", "owner": { "login": "itsecurityco", "id": 1725054, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1725054?v=4", "html_url": "https:\/\/github.com\/itsecurityco" }, "html_url": "https:\/\/github.com\/itsecurityco\/CVE-2021-41773", "description": "CVE-2021-41773 POC with Docker", "fork": false, "created_at": "2021-10-06T02:30:40Z", "updated_at": "2021-12-18T17:49:02Z", "pushed_at": "2021-10-06T03:37:20Z", "stargazers_count": 5, "watchers_count": 5, "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 5, "score": 0 }, { "id": 414050354, "name": "CVE-2021-41773-PoC", "full_name": "habibiefaried\/CVE-2021-41773-PoC", "owner": { "login": "habibiefaried", "id": 4345690, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4345690?v=4", "html_url": "https:\/\/github.com\/habibiefaried" }, "html_url": "https:\/\/github.com\/habibiefaried\/CVE-2021-41773-PoC", "description": "PoC for CVE-2021-41773 with docker to demonstrate", "fork": false, "created_at": "2021-10-06T03:01:41Z", "updated_at": "2021-11-04T23:35:58Z", "pushed_at": "2021-10-06T05:39:24Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 3, "score": 0 }, { "id": 414082287, "name": "CVE-2021-41773-POC", "full_name": "creadpag\/CVE-2021-41773-POC", "owner": { "login": "creadpag", "id": 15526083, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15526083?v=4", "html_url": "https:\/\/github.com\/creadpag" }, "html_url": "https:\/\/github.com\/creadpag\/CVE-2021-41773-POC", "description": "CVE-2021-41773", "fork": false, "created_at": "2021-10-06T05:34:48Z", "updated_at": "2021-11-15T12:00:37Z", "pushed_at": "2021-10-06T05:48:55Z", "stargazers_count": 11, "watchers_count": 11, "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 11, "score": 0 }, { "id": 414082633, "name": "cve-2021-41773-nse", "full_name": "TAI-REx\/cve-2021-41773-nse", "owner": { "login": "TAI-REx", "id": 78527947, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78527947?v=4", "html_url": "https:\/\/github.com\/TAI-REx" }, "html_url": "https:\/\/github.com\/TAI-REx\/cve-2021-41773-nse", "description": "CVE-2021-41773.nse", "fork": false, "created_at": "2021-10-06T05:36:22Z", "updated_at": "2021-11-26T18:07:10Z", "pushed_at": "2021-10-06T05:23:16Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 414108838, "name": "CVE-2021-41773", "full_name": "blasty\/CVE-2021-41773", "owner": { "login": "blasty", "id": 101374, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101374?v=4", "html_url": "https:\/\/github.com\/blasty" }, "html_url": "https:\/\/github.com\/blasty\/CVE-2021-41773", "description": "CVE-2021-41773 playground", "fork": false, "created_at": "2021-10-06T07:17:05Z", "updated_at": "2021-12-24T15:12:42Z", "pushed_at": "2021-10-07T17:56:38Z", "stargazers_count": 202, "watchers_count": 202, "forks_count": 50, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 50, "watchers": 202, "score": 0 }, { "id": 414159388, "name": "CVE-2021-41773", "full_name": "PentesterGuruji\/CVE-2021-41773", "owner": { "login": "PentesterGuruji", "id": 87645282, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87645282?v=4", "html_url": "https:\/\/github.com\/PentesterGuruji" }, "html_url": "https:\/\/github.com\/PentesterGuruji\/CVE-2021-41773", "description": "Path Traversal vulnerability in Apache 2.4.49", "fork": false, "created_at": "2021-10-06T10:04:22Z", "updated_at": "2021-10-10T18:52:52Z", "pushed_at": "2021-10-07T19:39:09Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 414227353, "name": "CVE-2021-41773", "full_name": "jbovet\/CVE-2021-41773", "owner": { "login": "jbovet", "id": 41589, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41589?v=4", "html_url": "https:\/\/github.com\/jbovet" }, "html_url": "https:\/\/github.com\/jbovet\/CVE-2021-41773", "description": "Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49 (CVE-2021-41773)", "fork": false, "created_at": "2021-10-06T13:39:57Z", "updated_at": "2021-10-10T18:53:15Z", "pushed_at": "2021-10-06T14:15:45Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 1, "score": 0 }, { "id": 414239384, "name": "cve-2021-41773", "full_name": "mohwahyudi\/cve-2021-41773", "owner": { "login": "mohwahyudi", "id": 57562836, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57562836?v=4", "html_url": "https:\/\/github.com\/mohwahyudi" }, "html_url": "https:\/\/github.com\/mohwahyudi\/cve-2021-41773", "description": null, "fork": false, "created_at": "2021-10-06T14:12:07Z", "updated_at": "2021-10-18T00:55:02Z", "pushed_at": "2021-10-08T01:55:22Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 2, "score": 0 }, { "id": 414241382, "name": "CVE-2021-41773", "full_name": "1nhann\/CVE-2021-41773", "owner": { "login": "1nhann", "id": 76624149, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76624149?v=4", "html_url": "https:\/\/github.com\/1nhann" }, "html_url": "https:\/\/github.com\/1nhann\/CVE-2021-41773", "description": "CVE-2021-41773 的复现", "fork": false, "created_at": "2021-10-06T14:17:31Z", "updated_at": "2021-12-25T01:18:28Z", "pushed_at": "2021-10-08T05:03:10Z", "stargazers_count": 8, "watchers_count": 8, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 8, "score": 0 }, { "id": 414248192, "name": "CVE-2021-41773", "full_name": "ranggaggngntt\/CVE-2021-41773", "owner": { "login": "ranggaggngntt", "id": 57105391, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57105391?v=4", "html_url": "https:\/\/github.com\/ranggaggngntt" }, "html_url": "https:\/\/github.com\/ranggaggngntt\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-10-06T14:36:05Z", "updated_at": "2021-10-10T18:53:04Z", "pushed_at": "2021-10-06T14:41:08Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 1, "score": 0 }, { "id": 414252359, "name": "CVE-2021-41773", "full_name": "BlueTeamSteve\/CVE-2021-41773", "owner": { "login": "BlueTeamSteve", "id": 550582, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/550582?v=4", "html_url": "https:\/\/github.com\/BlueTeamSteve" }, "html_url": "https:\/\/github.com\/BlueTeamSteve\/CVE-2021-41773", "description": "Vulnerable docker images for CVE-2021-41773", "fork": false, "created_at": "2021-10-06T14:47:23Z", "updated_at": "2021-11-25T23:21:31Z", "pushed_at": "2021-10-06T15:07:48Z", "stargazers_count": 11, "watchers_count": 11, "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 11, "score": 0 }, { "id": 414256797, "name": "apache_normalize_path", "full_name": "Zeop-CyberSec\/apache_normalize_path", "owner": { "login": "Zeop-CyberSec", "id": 68154603, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68154603?v=4", "html_url": "https:\/\/github.com\/Zeop-CyberSec" }, "html_url": "https:\/\/github.com\/Zeop-CyberSec\/apache_normalize_path", "description": "Metasploit-Framework modules (scanner and exploit) for the CVE-2021-41773 and CVE-2021-42013 (Path Traversal in Apache 2.4.49\/2.4.50)", "fork": false, "created_at": "2021-10-06T14:58:27Z", "updated_at": "2021-11-07T19:19:39Z", "pushed_at": "2021-10-21T18:51:00Z", "stargazers_count": 12, "watchers_count": 12, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 12, "score": 0 }, { "id": 414284449, "name": "CVE-2021-41773", "full_name": "r00tVen0m\/CVE-2021-41773", "owner": { "login": "r00tVen0m", "id": 50659263, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50659263?v=4", "html_url": "https:\/\/github.com\/r00tVen0m" }, "html_url": "https:\/\/github.com\/r00tVen0m\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-10-06T16:15:21Z", "updated_at": "2021-10-10T18:37:20Z", "pushed_at": "2021-10-06T19:05:07Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0 }, { "id": 414347675, "name": "CVE-2021-41773", "full_name": "n3k00n3\/CVE-2021-41773", "owner": { "login": "n3k00n3", "id": 7244777, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7244777?v=4", "html_url": "https:\/\/github.com\/n3k00n3" }, "html_url": "https:\/\/github.com\/n3k00n3\/CVE-2021-41773", "description": "exploit to CVE-2021-41773", "fork": false, "created_at": "2021-10-06T19:39:25Z", "updated_at": "2021-10-10T18:59:35Z", "pushed_at": "2021-10-08T16:32:51Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 1, "score": 0 }, { "id": 414350527, "name": "CVE-2021-41773-RCE", "full_name": "fnatalucci\/CVE-2021-41773-RCE", "owner": { "login": "fnatalucci", "id": 5574371, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5574371?v=4", "html_url": "https:\/\/github.com\/fnatalucci" }, "html_url": "https:\/\/github.com\/fnatalucci\/CVE-2021-41773-RCE", "description": null, "fork": false, "created_at": "2021-10-06T19:50:33Z", "updated_at": "2021-10-10T18:59:25Z", "pushed_at": "2021-10-06T20:14:27Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 414376599, "name": "CVE-2021-41773", "full_name": "AssassinUKG\/CVE-2021-41773", "owner": { "login": "AssassinUKG", "id": 5285547, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5285547?v=4", "html_url": "https:\/\/github.com\/AssassinUKG" }, "html_url": "https:\/\/github.com\/AssassinUKG\/CVE-2021-41773", "description": "Apache 2.4.49", "fork": false, "created_at": "2021-10-06T21:37:18Z", "updated_at": "2021-10-20T23:04:09Z", "pushed_at": "2021-10-20T23:04:06Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0 }, { "id": 414402542, "name": "Simple-CVE-2021-41773-checker", "full_name": "jheeree\/Simple-CVE-2021-41773-checker", "owner": { "login": "jheeree", "id": 19227591, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19227591?v=4", "html_url": "https:\/\/github.com\/jheeree" }, "html_url": "https:\/\/github.com\/jheeree\/Simple-CVE-2021-41773-checker", "description": "Simple script realizado en bash, para revisión de múltiples hosts para CVE-2021-41773 (Apache)", "fork": false, "created_at": "2021-10-06T23:32:30Z", "updated_at": "2021-12-01T00:49:45Z", "pushed_at": "2021-10-12T03:28:51Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 3, "score": 0 }, { "id": 414410579, "name": "CVE-2021-41773", "full_name": "thomsdev\/CVE-2021-41773", "owner": { "login": "thomsdev", "id": 91846073, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4", "html_url": "https:\/\/github.com\/thomsdev" }, "html_url": "https:\/\/github.com\/thomsdev\/CVE-2021-41773", "description": "Apache HTTPd (2.4.49) – Local File Disclosure (LFI)", "fork": false, "created_at": "2021-10-07T00:14:40Z", "updated_at": "2021-11-01T09:04:40Z", "pushed_at": "2021-10-07T00:19:26Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [ "httpd", "remote-code-execution" ], "visibility": "public", "forks": 2, "watchers": 3, "score": 0 }, { "id": 414425270, "name": "scarce-apache2", "full_name": "HightechSec\/scarce-apache2", "owner": { "login": "HightechSec", "id": 24645706, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24645706?v=4", "html_url": "https:\/\/github.com\/HightechSec" }, "html_url": "https:\/\/github.com\/HightechSec\/scarce-apache2", "description": "A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public ", "fork": false, "created_at": "2021-10-07T01:31:13Z", "updated_at": "2021-12-14T01:30:06Z", "pushed_at": "2021-10-07T08:25:26Z", "stargazers_count": 48, "watchers_count": 48, "forks_count": 13, "allow_forking": true, "is_template": false, "topics": [ "bash-script", "bug-hunting", "cve-2021-41773", "hacktoberfest", "pentesting" ], "visibility": "public", "forks": 13, "watchers": 48, "score": 0 }, { "id": 414514606, "name": "CVE-2021-41773-exploit", "full_name": "vinhjaxt\/CVE-2021-41773-exploit", "owner": { "login": "vinhjaxt", "id": 8877695, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8877695?v=4", "html_url": "https:\/\/github.com\/vinhjaxt" }, "html_url": "https:\/\/github.com\/vinhjaxt\/CVE-2021-41773-exploit", "description": "CVE-2021-41773, poc, exploit", "fork": false, "created_at": "2021-10-07T08:10:00Z", "updated_at": "2021-10-10T18:59:44Z", "pushed_at": "2021-10-08T04:55:32Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0 }, { "id": 414581409, "name": "CVE-2021-41773", "full_name": "twseptian\/CVE-2021-41773", "owner": { "login": "twseptian", "id": 9025301, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9025301?v=4", "html_url": "https:\/\/github.com\/twseptian" }, "html_url": "https:\/\/github.com\/twseptian\/CVE-2021-41773", "description": "CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited", "fork": false, "created_at": "2021-10-07T11:55:10Z", "updated_at": "2021-11-08T02:00:42Z", "pushed_at": "2021-10-10T05:19:29Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [ "apache", "cve-2021-41773", "path-traversal", "shodan", "shodan-cli", "vulnerability" ], "visibility": "public", "forks": 2, "watchers": 2, "score": 0 }, { "id": 414592683, "name": "CVE-2021-41773", "full_name": "ComdeyOverflow\/CVE-2021-41773", "owner": { "login": "ComdeyOverflow", "id": 84136529, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84136529?v=4", "html_url": "https:\/\/github.com\/ComdeyOverflow" }, "html_url": "https:\/\/github.com\/ComdeyOverflow\/CVE-2021-41773", "description": "CVE-2021-41773", "fork": false, "created_at": "2021-10-07T12:30:13Z", "updated_at": "2021-10-10T18:36:13Z", "pushed_at": "2021-10-08T09:19:09Z", "stargazers_count": 6, "watchers_count": 6, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 6, "score": 0 }, { "id": 414646379, "name": "CVE-2021-41773", "full_name": "shiomiyan\/CVE-2021-41773", "owner": { "login": "shiomiyan", "id": 35842766, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35842766?v=4", "html_url": "https:\/\/github.com\/shiomiyan" }, "html_url": "https:\/\/github.com\/shiomiyan\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-10-07T15:00:55Z", "updated_at": "2021-10-15T19:28:33Z", "pushed_at": "2021-10-15T19:28:30Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 414650983, "name": "mass_cve-2021-41773", "full_name": "justakazh\/mass_cve-2021-41773", "owner": { "login": "justakazh", "id": 36891477, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36891477?v=4", "html_url": "https:\/\/github.com\/justakazh" }, "html_url": "https:\/\/github.com\/justakazh\/mass_cve-2021-41773", "description": "MASS CVE-2021-41773", "fork": false, "created_at": "2021-10-07T15:13:18Z", "updated_at": "2021-12-15T14:43:09Z", "pushed_at": "2021-10-10T09:14:27Z", "stargazers_count": 23, "watchers_count": 23, "forks_count": 16, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 16, "watchers": 23, "score": 0 }, { "id": 414674481, "name": "Poc-CVE-2021-41773", "full_name": "LetouRaphael\/Poc-CVE-2021-41773", "owner": { "login": "LetouRaphael", "id": 48223543, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48223543?v=4", "html_url": "https:\/\/github.com\/LetouRaphael" }, "html_url": "https:\/\/github.com\/LetouRaphael\/Poc-CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-10-07T16:19:45Z", "updated_at": "2021-10-08T01:15:42Z", "pushed_at": "2021-10-07T16:48:27Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 414764740, "name": "CVE-2021-41773", "full_name": "Sakura-nee\/CVE-2021-41773", "owner": { "login": "Sakura-nee", "id": 74785477, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74785477?v=4", "html_url": "https:\/\/github.com\/Sakura-nee" }, "html_url": "https:\/\/github.com\/Sakura-nee\/CVE-2021-41773", "description": "Mass exploitation CVE-2021-41773 and auto detect possible RCE", "fork": false, "created_at": "2021-10-07T21:37:50Z", "updated_at": "2021-10-10T18:52:13Z", "pushed_at": "2021-10-07T21:52:57Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0 }, { "id": 414804962, "name": "CVE-2021-41773", "full_name": "shellreaper\/CVE-2021-41773", "owner": { "login": "shellreaper", "id": 76930483, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76930483?v=4", "html_url": "https:\/\/github.com\/shellreaper" }, "html_url": "https:\/\/github.com\/shellreaper\/CVE-2021-41773", "description": "This is a simple POC for Apache\/2.4.49 Path Traversal Vulnerability", "fork": false, "created_at": "2021-10-08T01:13:33Z", "updated_at": "2021-11-12T00:05:10Z", "pushed_at": "2021-11-12T00:03:34Z", "stargazers_count": 4, "watchers_count": 4, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 4, "score": 0 }, { "id": 414845157, "name": "CVE-2021-41773", "full_name": "0xRar\/CVE-2021-41773", "owner": { "login": "0xRar", "id": 33517160, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33517160?v=4", "html_url": "https:\/\/github.com\/0xRar" }, "html_url": "https:\/\/github.com\/0xRar\/CVE-2021-41773", "description": "Exploit for Apache 2.4.49", "fork": false, "created_at": "2021-10-08T04:26:31Z", "updated_at": "2021-12-15T11:22:38Z", "pushed_at": "2021-10-08T05:54:25Z", "stargazers_count": 4, "watchers_count": 4, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 4, "score": 0 }, { "id": 414848372, "name": "Sigma-Rule-for-CVE-2021-41773-and-CVE-2021-42013-exploitation-attempt", "full_name": "pisut4152\/Sigma-Rule-for-CVE-2021-41773-and-CVE-2021-42013-exploitation-attempt", "owner": { "login": "pisut4152", "id": 72641661, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72641661?v=4", "html_url": "https:\/\/github.com\/pisut4152" }, "html_url": "https:\/\/github.com\/pisut4152\/Sigma-Rule-for-CVE-2021-41773-and-CVE-2021-42013-exploitation-attempt", "description": null, "fork": false, "created_at": "2021-10-08T04:43:27Z", "updated_at": "2021-10-10T18:50:04Z", "pushed_at": "2021-10-08T04:46:08Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 414878778, "name": "CVE-2021-41773", "full_name": "corelight\/CVE-2021-41773", "owner": { "login": "corelight", "id": 21672558, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4", "html_url": "https:\/\/github.com\/corelight" }, "html_url": "https:\/\/github.com\/corelight\/CVE-2021-41773", "description": "A Zeek package which raises notices for Path Traversal\/RCE in Apache HTTP Server 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013)", "fork": false, "created_at": "2021-10-08T06:54:27Z", "updated_at": "2021-10-28T05:48:41Z", "pushed_at": "2021-10-28T05:55:41Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 414887591, "name": "CVE-2021-41773", "full_name": "zeronine9\/CVE-2021-41773", "owner": { "login": "zeronine9", "id": 60152515, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60152515?v=4", "html_url": "https:\/\/github.com\/zeronine9" }, "html_url": "https:\/\/github.com\/zeronine9\/CVE-2021-41773", "description": "Fast python tool to test apache path traversal CVE-2021-41773 in a List of url ", "fork": false, "created_at": "2021-10-08T07:24:49Z", "updated_at": "2021-12-21T21:34:24Z", "pushed_at": "2021-10-08T07:27:04Z", "stargazers_count": 10, "watchers_count": 10, "forks_count": 8, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 8, "watchers": 10, "score": 0 }, { "id": 414907601, "name": "CVE-2021-41773", "full_name": "b1tsec\/CVE-2021-41773", "owner": { "login": "b1tsec", "id": 74562513, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74562513?v=4", "html_url": "https:\/\/github.com\/b1tsec" }, "html_url": "https:\/\/github.com\/b1tsec\/CVE-2021-41773", "description": "A Python script to check if an Apache web server is vulnerable to CVE-2021-41773", "fork": false, "created_at": "2021-10-08T08:32:51Z", "updated_at": "2021-10-10T18:53:24Z", "pushed_at": "2021-10-08T12:15:50Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 415041820, "name": "CVE-2021-41773", "full_name": "superzerosec\/CVE-2021-41773", "owner": { "login": "superzerosec", "id": 57648217, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4", "html_url": "https:\/\/github.com\/superzerosec" }, "html_url": "https:\/\/github.com\/superzerosec\/CVE-2021-41773", "description": "POC", "fork": false, "created_at": "2021-10-08T15:40:41Z", "updated_at": "2021-10-11T22:24:14Z", "pushed_at": "2021-10-11T22:24:12Z", "stargazers_count": 4, "watchers_count": 4, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 4, "score": 0 }, { "id": 415177333, "name": "apachrot", "full_name": "im-hanzou\/apachrot", "owner": { "login": "im-hanzou", "id": 61415393, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61415393?v=4", "html_url": "https:\/\/github.com\/im-hanzou" }, "html_url": "https:\/\/github.com\/im-hanzou\/apachrot", "description": "Apache (Linux) CVE-2021-41773\/2021-42013 Mass Vulnerability Checker", "fork": false, "created_at": "2021-10-09T02:12:39Z", "updated_at": "2021-12-10T06:06:39Z", "pushed_at": "2021-10-12T07:27:09Z", "stargazers_count": 20, "watchers_count": 20, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [ "apache", "checker", "cve-2021-41773", "cve-2021-42013", "vulnerability" ], "visibility": "public", "forks": 4, "watchers": 20, "score": 0 }, { "id": 415189947, "name": "CVE-2021-41773", "full_name": "KAB8345\/CVE-2021-41773", "owner": { "login": "KAB8345", "id": 40665473, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40665473?v=4", "html_url": "https:\/\/github.com\/KAB8345" }, "html_url": "https:\/\/github.com\/KAB8345\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-10-09T03:21:41Z", "updated_at": "2021-10-09T03:21:45Z", "pushed_at": "2021-10-09T03:21:42Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 415191949, "name": "CVE-2021-41773_CVE-2021-42013", "full_name": "inbug-team\/CVE-2021-41773_CVE-2021-42013", "owner": { "login": "inbug-team", "id": 81735769, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81735769?v=4", "html_url": "https:\/\/github.com\/inbug-team" }, "html_url": "https:\/\/github.com\/inbug-team\/CVE-2021-41773_CVE-2021-42013", "description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具", "fork": false, "created_at": "2021-10-09T03:32:18Z", "updated_at": "2021-12-16T06:21:05Z", "pushed_at": "2021-10-09T03:49:21Z", "stargazers_count": 118, "watchers_count": 118, "forks_count": 39, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 39, "watchers": 118, "score": 0 }, { "id": 415290894, "name": "cve-2021-41773-and-cve-2021-42013", "full_name": "5gstudent\/cve-2021-41773-and-cve-2021-42013", "owner": { "login": "5gstudent", "id": 37172754, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37172754?v=4", "html_url": "https:\/\/github.com\/5gstudent" }, "html_url": "https:\/\/github.com\/5gstudent\/cve-2021-41773-and-cve-2021-42013", "description": "cve-2021-41773 即 cve-2021-42013 批量检测脚本", "fork": false, "created_at": "2021-10-09T11:33:56Z", "updated_at": "2021-10-12T06:48:47Z", "pushed_at": "2021-10-09T12:14:29Z", "stargazers_count": 4, "watchers_count": 4, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 4, "score": 0 }, { "id": 415357102, "name": "CVE-2021-41773", "full_name": "EagleTube\/CVE-2021-41773", "owner": { "login": "EagleTube", "id": 87413459, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87413459?v=4", "html_url": "https:\/\/github.com\/EagleTube" }, "html_url": "https:\/\/github.com\/EagleTube\/CVE-2021-41773", "description": "Apache 2.4.49 Path Traversal Vulnerability Checker ", "fork": false, "created_at": "2021-10-09T16:07:57Z", "updated_at": "2021-10-10T18:55:45Z", "pushed_at": "2021-10-09T16:32:08Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 415549063, "name": "CVE-2021-41773-42013", "full_name": "cgddgc\/CVE-2021-41773-42013", "owner": { "login": "cgddgc", "id": 20945826, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20945826?v=4", "html_url": "https:\/\/github.com\/cgddgc" }, "html_url": "https:\/\/github.com\/cgddgc\/CVE-2021-41773-42013", "description": null, "fork": false, "created_at": "2021-10-10T10:09:52Z", "updated_at": "2021-10-11T04:09:16Z", "pushed_at": "2021-10-10T10:20:09Z", "stargazers_count": 5, "watchers_count": 5, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 5, "score": 0 }, { "id": 415737041, "name": "Apachuk", "full_name": "apapedulimu\/Apachuk", "owner": { "login": "apapedulimu", "id": 16370264, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16370264?v=4", "html_url": "https:\/\/github.com\/apapedulimu" }, "html_url": "https:\/\/github.com\/apapedulimu\/Apachuk", "description": "CVE-2021-41773 Grabber", "fork": false, "created_at": "2021-10-11T00:57:27Z", "updated_at": "2021-12-15T14:43:10Z", "pushed_at": "2021-10-11T02:51:11Z", "stargazers_count": 5, "watchers_count": 5, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 5, "score": 0 }, { "id": 415761005, "name": "CVE-2021-41773", "full_name": "scarmandef\/CVE-2021-41773", "owner": { "login": "scarmandef", "id": 80011252, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80011252?v=4", "html_url": "https:\/\/github.com\/scarmandef" }, "html_url": "https:\/\/github.com\/scarmandef\/CVE-2021-41773", "description": " Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE", "fork": false, "created_at": "2021-10-11T03:03:08Z", "updated_at": "2021-10-14T04:59:46Z", "pushed_at": "2021-10-14T04:59:43Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 416132671, "name": "CVE-2021-41773-PoC", "full_name": "0xAlmighty\/CVE-2021-41773-PoC", "owner": { "login": "0xAlmighty", "id": 58662599, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58662599?v=4", "html_url": "https:\/\/github.com\/0xAlmighty" }, "html_url": "https:\/\/github.com\/0xAlmighty\/CVE-2021-41773-PoC", "description": "Path Traversal and RCE in Apache HTTP Server 2.4.49 ", "fork": false, "created_at": "2021-10-12T00:51:32Z", "updated_at": "2021-10-18T15:37:03Z", "pushed_at": "2021-10-12T00:52:59Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 416511119, "name": "httpd-2.4.49", "full_name": "ksanchezcld\/httpd-2.4.49", "owner": { "login": "ksanchezcld", "id": 3130599, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3130599?v=4", "html_url": "https:\/\/github.com\/ksanchezcld" }, "html_url": "https:\/\/github.com\/ksanchezcld\/httpd-2.4.49", "description": "critical: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773) (CVE-2021-42013)", "fork": false, "created_at": "2021-10-12T22:02:09Z", "updated_at": "2021-10-21T12:52:18Z", "pushed_at": "2021-10-12T22:02:19Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0 }, { "id": 416830075, "name": "SimplesApachePathTraversal", "full_name": "MrCl0wnLab\/SimplesApachePathTraversal", "owner": { "login": "MrCl0wnLab", "id": 17049332, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17049332?v=4", "html_url": "https:\/\/github.com\/MrCl0wnLab" }, "html_url": "https:\/\/github.com\/MrCl0wnLab\/SimplesApachePathTraversal", "description": "Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519", "fork": false, "created_at": "2021-10-13T17:03:56Z", "updated_at": "2021-12-21T21:15:45Z", "pushed_at": "2021-10-14T21:11:44Z", "stargazers_count": 49, "watchers_count": 49, "forks_count": 11, "allow_forking": true, "is_template": false, "topics": [ "cve-2020-17519", "cve-2021-41773", "cve-2021-42013" ], "visibility": "public", "forks": 11, "watchers": 49, "score": 0 }, { "id": 417461813, "name": "apache-httpd-path-traversal-checker", "full_name": "theLSA\/apache-httpd-path-traversal-checker", "owner": { "login": "theLSA", "id": 28248956, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28248956?v=4", "html_url": "https:\/\/github.com\/theLSA" }, "html_url": "https:\/\/github.com\/theLSA\/apache-httpd-path-traversal-checker", "description": "apache httpd path traversal checker(CVE-2021-41773 \/ CVE-2021-42013)", "fork": false, "created_at": "2021-10-15T10:38:44Z", "updated_at": "2021-11-08T07:56:02Z", "pushed_at": "2021-10-16T10:28:23Z", "stargazers_count": 4, "watchers_count": 4, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 4, "score": 0 }, { "id": 417643516, "name": "CVE-2021-41773", "full_name": "LudovicPatho\/CVE-2021-41773", "owner": { "login": "LudovicPatho", "id": 26960886, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26960886?v=4", "html_url": "https:\/\/github.com\/LudovicPatho" }, "html_url": "https:\/\/github.com\/LudovicPatho\/CVE-2021-41773", "description": "The first vulnerability with the CVE identifier CVE-2021-41773 is a path traversal flaw that exists in Apache HTTP Server 2.4.49.", "fork": false, "created_at": "2021-10-15T21:38:48Z", "updated_at": "2021-10-21T07:26:16Z", "pushed_at": "2021-10-21T07:26:13Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 417869261, "name": "CVE-2021-41773_Honeypot", "full_name": "lopqto\/CVE-2021-41773_Honeypot", "owner": { "login": "lopqto", "id": 30213943, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30213943?v=4", "html_url": "https:\/\/github.com\/lopqto" }, "html_url": "https:\/\/github.com\/lopqto\/CVE-2021-41773_Honeypot", "description": "Simple honeypot for CVE-2021-41773 vulnerability", "fork": false, "created_at": "2021-10-16T15:30:34Z", "updated_at": "2021-10-17T08:13:10Z", "pushed_at": "2021-10-17T08:13:08Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 418481558, "name": "CVE-2021-41773_42013", "full_name": "vulf\/CVE-2021-41773_42013", "owner": { "login": "vulf", "id": 37404408, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37404408?v=4", "html_url": "https:\/\/github.com\/vulf" }, "html_url": "https:\/\/github.com\/vulf\/CVE-2021-41773_42013", "description": "Lab setup for CVE-2021-41773 (Apache httpd 2.4.49) and CVE-2021-42013 (Apache httpd 2.4.50).", "fork": false, "created_at": "2021-10-18T12:01:58Z", "updated_at": "2021-12-10T06:09:44Z", "pushed_at": "2021-10-18T12:47:56Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [ "apache", "cve", "cve-2021-41773", "cve-2021-42013", "httpd", "lfi", "penetration-testing", "rce", "security", "vulnerable", "web" ], "visibility": "public", "forks": 2, "watchers": 1, "score": 0 }, { "id": 419143683, "name": "CVE-2021-41773", "full_name": "cloudbyteelias\/CVE-2021-41773", "owner": { "login": "cloudbyteelias", "id": 44121417, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44121417?v=4", "html_url": "https:\/\/github.com\/cloudbyteelias" }, "html_url": "https:\/\/github.com\/cloudbyteelias\/CVE-2021-41773", "description": "CVE-2021-41773 Docker lab", "fork": false, "created_at": "2021-10-20T01:20:21Z", "updated_at": "2021-11-04T23:37:34Z", "pushed_at": "2021-10-20T01:21:34Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [ "cve-2021-41773" ], "visibility": "public", "forks": 1, "watchers": 2, "score": 0 }, { "id": 419301010, "name": "CVE-2021-41773", "full_name": "qwutony\/CVE-2021-41773", "owner": { "login": "qwutony", "id": 45024645, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45024645?v=4", "html_url": "https:\/\/github.com\/qwutony" }, "html_url": "https:\/\/github.com\/qwutony\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-10-20T11:27:12Z", "updated_at": "2021-10-20T12:26:59Z", "pushed_at": "2021-10-20T12:26:56Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 419369252, "name": "CVE-2021-41773", "full_name": "LayarKacaSiber\/CVE-2021-41773", "owner": { "login": "LayarKacaSiber", "id": 92864439, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92864439?v=4", "html_url": "https:\/\/github.com\/LayarKacaSiber" }, "html_url": "https:\/\/github.com\/LayarKacaSiber\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-10-20T14:41:15Z", "updated_at": "2021-10-23T13:15:51Z", "pushed_at": "2021-10-23T13:15:48Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 420144635, "name": "CVE-2021-41773", "full_name": "BabyTeam1024\/CVE-2021-41773", "owner": { "login": "BabyTeam1024", "id": 74447452, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74447452?v=4", "html_url": "https:\/\/github.com\/BabyTeam1024" }, "html_url": "https:\/\/github.com\/BabyTeam1024\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-10-22T15:12:12Z", "updated_at": "2021-10-24T07:10:34Z", "pushed_at": "2021-10-22T15:23:56Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 420407065, "name": "cve-2021-41773", "full_name": "walnutsecurity\/cve-2021-41773", "owner": { "login": "walnutsecurity", "id": 92915142, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92915142?v=4", "html_url": "https:\/\/github.com\/walnutsecurity" }, "html_url": "https:\/\/github.com\/walnutsecurity\/cve-2021-41773", "description": "cve-2021-41773.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.49", "fork": false, "created_at": "2021-10-23T12:31:53Z", "updated_at": "2021-11-25T09:32:45Z", "pushed_at": "2021-11-25T09:32:43Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 420528447, "name": "CVE-2021-41773", "full_name": "TheLastVvV\/CVE-2021-41773", "owner": { "login": "TheLastVvV", "id": 71128830, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71128830?v=4", "html_url": "https:\/\/github.com\/TheLastVvV" }, "html_url": "https:\/\/github.com\/TheLastVvV\/CVE-2021-41773", "description": "Poc CVE-2021-41773 - Apache 2.4.49 with CGI enabled", "fork": false, "created_at": "2021-10-23T21:37:25Z", "updated_at": "2021-10-23T23:15:50Z", "pushed_at": "2021-10-23T21:50:36Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 421138366, "name": "CVE-2021-41773", "full_name": "MazX0p\/CVE-2021-41773", "owner": { "login": "MazX0p", "id": 54814433, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54814433?v=4", "html_url": "https:\/\/github.com\/MazX0p" }, "html_url": "https:\/\/github.com\/MazX0p\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-10-25T18:21:43Z", "updated_at": "2021-10-25T18:39:13Z", "pushed_at": "2021-10-25T18:39:11Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 421191229, "name": "Scanner-CVE-2021-41773", "full_name": "vida00\/Scanner-CVE-2021-41773", "owner": { "login": "vida00", "id": 77762068, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77762068?v=4", "html_url": "https:\/\/github.com\/vida00" }, "html_url": "https:\/\/github.com\/vida00\/Scanner-CVE-2021-41773", "description": "A automatic scanner to apache 2.4.49", "fork": false, "created_at": "2021-10-25T21:34:08Z", "updated_at": "2021-10-25T22:17:23Z", "pushed_at": "2021-10-25T22:17:21Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 421530564, "name": "CVE-2021-41773", "full_name": "mr-exo\/CVE-2021-41773", "owner": { "login": "mr-exo", "id": 76655540, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76655540?v=4", "html_url": "https:\/\/github.com\/mr-exo" }, "html_url": "https:\/\/github.com\/mr-exo\/CVE-2021-41773", "description": "Remote Code Execution exploit for Apache servers. Affected versions: Apache 2.4.49, Apache 2.4.50", "fork": false, "created_at": "2021-10-26T17:56:25Z", "updated_at": "2021-10-26T18:04:45Z", "pushed_at": "2021-10-26T18:04:43Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 421553366, "name": "CVE-2021-41773", "full_name": "Balgogan\/CVE-2021-41773", "owner": { "login": "Balgogan", "id": 88535377, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", "html_url": "https:\/\/github.com\/Balgogan" }, "html_url": "https:\/\/github.com\/Balgogan\/CVE-2021-41773", "description": "Ce programme permet de détecter une faille RCE sur les serveurs Apache 2.4.49 et Apache 2.4.50", "fork": false, "created_at": "2021-10-26T19:11:28Z", "updated_at": "2021-12-18T21:27:40Z", "pushed_at": "2021-11-11T00:48:37Z", "stargazers_count": 10, "watchers_count": 10, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 10, "score": 0 }, { "id": 422466104, "name": "CVE-2021-41773", "full_name": "wolf1892\/CVE-2021-41773", "owner": { "login": "wolf1892", "id": 24608781, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24608781?v=4", "html_url": "https:\/\/github.com\/wolf1892" }, "html_url": "https:\/\/github.com\/wolf1892\/CVE-2021-41773", "description": "Setup vulnerable enviornment", "fork": false, "created_at": "2021-10-29T06:31:57Z", "updated_at": "2021-10-29T06:33:41Z", "pushed_at": "2021-10-29T06:33:39Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 424762276, "name": "CVE-2021-41773-Playground", "full_name": "Hydragyrum\/CVE-2021-41773-Playground", "owner": { "login": "Hydragyrum", "id": 4928181, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4928181?v=4", "html_url": "https:\/\/github.com\/Hydragyrum" }, "html_url": "https:\/\/github.com\/Hydragyrum\/CVE-2021-41773-Playground", "description": "Some docker images to play with CVE-2021-41773 and CVE-2021-42013", "fork": false, "created_at": "2021-11-04T22:52:44Z", "updated_at": "2021-12-23T14:26:41Z", "pushed_at": "2021-11-04T22:56:14Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0 }, { "id": 426066790, "name": "Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit", "full_name": "IcmpOff\/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit", "owner": { "login": "IcmpOff", "id": 71145797, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71145797?v=4", "html_url": "https:\/\/github.com\/IcmpOff" }, "html_url": "https:\/\/github.com\/IcmpOff\/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit", "description": "This Metasploit module exploits an unauthenticated remote code execution vulnerability which exists in Apache version 2.4.49 (CVE-2021-41773). If files outside of the document root are not protected by ‘require all denied’ and CGI has been explicitly enabled, it can be used to execute arbitrary commands. This vulnerability has been reintroduced in the Apache 2.4.50 fix (CVE-2021-42013).", "fork": false, "created_at": "2021-11-09T02:38:13Z", "updated_at": "2021-11-09T02:42:52Z", "pushed_at": "2021-11-09T02:39:22Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [ "apache", "exploit", "metasploit", "metasploit-framework", "metasploit-modules", "rce" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 426099647, "name": "CVE-2021-41773", "full_name": "ahmad4fifz\/CVE-2021-41773", "owner": { "login": "ahmad4fifz", "id": 45918058, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45918058?v=4", "html_url": "https:\/\/github.com\/ahmad4fifz" }, "html_url": "https:\/\/github.com\/ahmad4fifz\/CVE-2021-41773", "description": "CVE-2021-41773 on Docker", "fork": false, "created_at": "2021-11-09T05:13:17Z", "updated_at": "2021-12-19T14:36:23Z", "pushed_at": "2021-11-25T09:54:42Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [ "apache", "cve", "cve-2021-41773", "docker", "docker-compose", "lfi", "rce" ], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 427815832, "name": "POC-CVE-2021-41773", "full_name": "kubota\/POC-CVE-2021-41773", "owner": { "login": "kubota", "id": 119277, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119277?v=4", "html_url": "https:\/\/github.com\/kubota" }, "html_url": "https:\/\/github.com\/kubota\/POC-CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-11-14T02:02:45Z", "updated_at": "2021-11-16T20:42:27Z", "pushed_at": "2021-11-16T20:42:25Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 427956449, "name": "CVE-2021-41773", "full_name": "xMohamed0\/CVE-2021-41773", "owner": { "login": "xMohamed0", "id": 94008154, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94008154?v=4", "html_url": "https:\/\/github.com\/xMohamed0" }, "html_url": "https:\/\/github.com\/xMohamed0\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-11-14T14:50:45Z", "updated_at": "2021-11-14T14:55:20Z", "pushed_at": "2021-11-14T14:55:18Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 432057910, "name": "CVE-2021-41773", "full_name": "jhye0n\/CVE-2021-41773", "owner": { "login": "jhye0n", "id": 50125695, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50125695?v=4", "html_url": "https:\/\/github.com\/jhye0n" }, "html_url": "https:\/\/github.com\/jhye0n\/CVE-2021-41773", "description": "CVE-2021-41773 Test Page & Exploit Code", "fork": false, "created_at": "2021-11-26T04:54:16Z", "updated_at": "2021-12-05T13:36:42Z", "pushed_at": "2021-11-26T05:18:02Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0 }, { "id": 438514241, "name": "MASS_CVE-2021-41773", "full_name": "i6c\/MASS_CVE-2021-41773", "owner": { "login": "i6c", "id": 87837042, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87837042?v=4", "html_url": "https:\/\/github.com\/i6c" }, "html_url": "https:\/\/github.com\/i6c\/MASS_CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-12-15T06:04:41Z", "updated_at": "2021-12-24T17:27:13Z", "pushed_at": "2021-12-15T06:06:53Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0 } ]