[ { "id": 413890827, "name": "cve-2021-41773", "full_name": "Vulnmachines\/cve-2021-41773", "owner": { "login": "Vulnmachines", "id": 79006904, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4", "html_url": "https:\/\/github.com\/Vulnmachines" }, "html_url": "https:\/\/github.com\/Vulnmachines\/cve-2021-41773", "description": "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.", "fork": false, "created_at": "2021-10-05T16:13:38Z", "updated_at": "2022-08-17T04:57:04Z", "pushed_at": "2022-08-30T11:58:32Z", "stargazers_count": 41, "watchers_count": 41, "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 13, "watchers": 41, "score": 0 }, { "id": 414043746, "name": "CVE-2021-41773_CVE-2021-42013", "full_name": "Ls4ss\/CVE-2021-41773_CVE-2021-42013", "owner": { "login": "Ls4ss", "id": 25537761, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25537761?v=4", "html_url": "https:\/\/github.com\/Ls4ss" }, "html_url": "https:\/\/github.com\/Ls4ss\/CVE-2021-41773_CVE-2021-42013", "description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE", "fork": false, "created_at": "2021-10-06T02:28:41Z", "updated_at": "2022-09-12T15:02:52Z", "pushed_at": "2022-09-09T16:09:11Z", "stargazers_count": 22, "watchers_count": 22, "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "apache", "cve", "exploit", "payload", "pentest", "rce" ], "visibility": "public", "forks": 8, "watchers": 22, "score": 0 }, { "id": 414082287, "name": "CVE-2021-41773-POC", "full_name": "creadpag\/CVE-2021-41773-POC", "owner": { "login": "creadpag", "id": 15526083, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15526083?v=4", "html_url": "https:\/\/github.com\/creadpag" }, "html_url": "https:\/\/github.com\/creadpag\/CVE-2021-41773-POC", "description": "CVE-2021-41773", "fork": false, "created_at": "2021-10-06T05:34:48Z", "updated_at": "2021-11-15T12:00:37Z", "pushed_at": "2022-08-29T23:05:10Z", "stargazers_count": 11, "watchers_count": 11, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 11, "score": 0 }, { "id": 414248192, "name": "CVE-2021-41773", "full_name": "ranggaggngntt\/CVE-2021-41773", "owner": { "login": "ranggaggngntt", "id": 57105391, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57105391?v=4", "html_url": "https:\/\/github.com\/ranggaggngntt" }, "html_url": "https:\/\/github.com\/ranggaggngntt\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-10-06T14:36:05Z", "updated_at": "2021-10-10T18:53:04Z", "pushed_at": "2022-06-11T13:34:00Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 1, "score": 0 }, { "id": 420407065, "name": "cve-2021-41773", "full_name": "walnutsecurity\/cve-2021-41773", "owner": { "login": "walnutsecurity", "id": 92915142, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92915142?v=4", "html_url": "https:\/\/github.com\/walnutsecurity" }, "html_url": "https:\/\/github.com\/walnutsecurity\/cve-2021-41773", "description": "cve-2021-41773.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.49", "fork": false, "created_at": "2021-10-23T12:31:53Z", "updated_at": "2021-11-25T09:32:45Z", "pushed_at": "2022-05-26T08:34:39Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 447314257, "name": "CVE-2021-41773-exploiter", "full_name": "norrig\/CVE-2021-41773-exploiter", "owner": { "login": "norrig", "id": 5526261, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5526261?v=4", "html_url": "https:\/\/github.com\/norrig" }, "html_url": "https:\/\/github.com\/norrig\/CVE-2021-41773-exploiter", "description": "School project - Please use other repos for actual testing", "fork": false, "created_at": "2022-01-12T17:42:36Z", "updated_at": "2022-01-12T18:26:57Z", "pushed_at": "2022-01-13T16:18:33Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 452242021, "name": "CVE-2021-41773-exercise", "full_name": "m96dg\/CVE-2021-41773-exercise", "owner": { "login": "m96dg", "id": 65173648, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65173648?v=4", "html_url": "https:\/\/github.com\/m96dg" }, "html_url": "https:\/\/github.com\/m96dg\/CVE-2021-41773-exercise", "description": "A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration \"require all denied\", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and not earlier versions. Credits to: https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-41773 ", "fork": false, "created_at": "2022-01-26T11:02:46Z", "updated_at": "2022-01-26T11:22:13Z", "pushed_at": "2022-01-30T19:02:43Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 464271089, "name": "CVE-2021-41773", "full_name": "skentagon\/CVE-2021-41773", "owner": { "login": "skentagon", "id": 49702576, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49702576?v=4", "html_url": "https:\/\/github.com\/skentagon" }, "html_url": "https:\/\/github.com\/skentagon\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2022-02-27T22:39:58Z", "updated_at": "2022-03-04T00:11:58Z", "pushed_at": "2022-03-04T00:05:44Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 467687901, "name": "CVE-2021-41773", "full_name": "mauricelambert\/CVE-2021-41773", "owner": { "login": "mauricelambert", "id": 50479118, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4", "html_url": "https:\/\/github.com\/mauricelambert" }, "html_url": "https:\/\/github.com\/mauricelambert\/CVE-2021-41773", "description": "These Metasploit, Nmap, Python and Ruby scripts detects and exploits CVE-2021-41773 with RCE and local file disclosure.", "fork": false, "created_at": "2022-03-08T21:55:53Z", "updated_at": "2022-03-23T16:56:34Z", "pushed_at": "2022-03-14T07:34:49Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "cve-2021-41773", "detection", "exploit", "metasploit", "nmap", "python3", "rce", "ruby", "scanner", "vulnerability" ], "visibility": "public", "forks": 2, "watchers": 1, "score": 0 }, { "id": 468909402, "name": "CVE-2021-41773", "full_name": "the29a\/CVE-2021-41773", "owner": { "login": "the29a", "id": 4436697, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4436697?v=4", "html_url": "https:\/\/github.com\/the29a" }, "html_url": "https:\/\/github.com\/the29a\/CVE-2021-41773", "description": "Small PoC of CVE-2021-41773", "fork": false, "created_at": "2022-03-11T21:50:35Z", "updated_at": "2022-03-11T21:52:35Z", "pushed_at": "2022-03-11T22:10:25Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 469203660, "name": "CVE-2021-41773", "full_name": "thehackersbrain\/CVE-2021-41773", "owner": { "login": "thehackersbrain", "id": 36809025, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36809025?v=4", "html_url": "https:\/\/github.com\/thehackersbrain" }, "html_url": "https:\/\/github.com\/thehackersbrain\/CVE-2021-41773", "description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773", "fork": false, "created_at": "2022-03-12T21:24:55Z", "updated_at": "2022-09-22T10:14:32Z", "pushed_at": "2022-03-12T21:30:58Z", "stargazers_count": 52, "watchers_count": 52, "forks_count": 21, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "apache2", "cve-2021-41773", "exploit", "gauravraj", "lfi", "python", "rce", "thehackersbrain" ], "visibility": "public", "forks": 21, "watchers": 52, "score": 0 }, { "id": 469576020, "name": "CVE-2021-41773", "full_name": "honypot\/CVE-2021-41773", "owner": { "login": "honypot", "id": 101309325, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101309325?v=4", "html_url": "https:\/\/github.com\/honypot" }, "html_url": "https:\/\/github.com\/honypot\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2022-03-14T04:08:56Z", "updated_at": "2022-03-14T04:09:11Z", "pushed_at": "2022-03-14T04:09:05Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 469821841, "name": "CVE-2021-41773", "full_name": "Fa1c0n35\/CVE-2021-41773", "owner": { "login": "Fa1c0n35", "id": 33335488, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4", "html_url": "https:\/\/github.com\/Fa1c0n35" }, "html_url": "https:\/\/github.com\/Fa1c0n35\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2022-03-14T16:43:49Z", "updated_at": "2022-03-14T16:44:00Z", "pushed_at": "2022-03-14T16:43:57Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 474747864, "name": "CVE-2021-41773-", "full_name": "N3w-elf\/CVE-2021-41773-", "owner": { "login": "N3w-elf", "id": 80478753, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80478753?v=4", "html_url": "https:\/\/github.com\/N3w-elf" }, "html_url": "https:\/\/github.com\/N3w-elf\/CVE-2021-41773-", "description": null, "fork": false, "created_at": "2022-03-27T20:10:30Z", "updated_at": "2022-03-27T20:10:30Z", "pushed_at": "2022-03-27T20:10:31Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 474963195, "name": "CVE-2021-41773", "full_name": "puckiestyle\/CVE-2021-41773", "owner": { "login": "puckiestyle", "id": 57447087, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4", "html_url": "https:\/\/github.com\/puckiestyle" }, "html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2022-03-28T11:02:46Z", "updated_at": "2022-03-28T11:03:00Z", "pushed_at": "2022-03-28T11:41:55Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 475931011, "name": "CVE-2021-41773", "full_name": "WynSon\/CVE-2021-41773", "owner": { "login": "WynSon", "id": 83699106, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83699106?v=4", "html_url": "https:\/\/github.com\/WynSon" }, "html_url": "https:\/\/github.com\/WynSon\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2022-03-30T15:04:27Z", "updated_at": "2022-03-30T17:46:13Z", "pushed_at": "2022-04-14T21:54:47Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 476112666, "name": "Reserch-CVE-2021-41773", "full_name": "DoTuan1\/Reserch-CVE-2021-41773", "owner": { "login": "DoTuan1", "id": 63194321, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63194321?v=4", "html_url": "https:\/\/github.com\/DoTuan1" }, "html_url": "https:\/\/github.com\/DoTuan1\/Reserch-CVE-2021-41773", "description": null, "fork": false, "created_at": "2022-03-31T01:48:33Z", "updated_at": "2022-03-31T01:54:45Z", "pushed_at": "2022-03-31T03:03:09Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 477111512, "name": "netsec-polygon", "full_name": "bernardas\/netsec-polygon", "owner": { "login": "bernardas", "id": 62701131, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62701131?v=4", "html_url": "https:\/\/github.com\/bernardas" }, "html_url": "https:\/\/github.com\/bernardas\/netsec-polygon", "description": "Environment for CVE-2021-41773 recreation.", "fork": false, "created_at": "2022-04-02T16:34:45Z", "updated_at": "2022-04-03T08:19:39Z", "pushed_at": "2022-05-17T22:16:34Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 477889492, "name": "Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit", "full_name": "CalfCrusher\/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit", "owner": { "login": "CalfCrusher", "id": 5812023, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5812023?v=4", "html_url": "https:\/\/github.com\/CalfCrusher" }, "html_url": "https:\/\/github.com\/CalfCrusher\/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit", "description": "CVE-2021-41773 | CVE-2021-42013 Exploit Tool (Apache\/2.4.49-2.4.50)", "fork": false, "created_at": "2022-04-04T22:07:21Z", "updated_at": "2022-04-05T05:17:33Z", "pushed_at": "2022-04-08T09:24:35Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-41773", "cve-2021-42013", "exploit" ], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 478605535, "name": "cve-2021-41773", "full_name": "vuongnv3389-sec\/cve-2021-41773", "owner": { "login": "vuongnv3389-sec", "id": 64488431, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64488431?v=4", "html_url": "https:\/\/github.com\/vuongnv3389-sec" }, "html_url": "https:\/\/github.com\/vuongnv3389-sec\/cve-2021-41773", "description": null, "fork": false, "created_at": "2022-04-06T14:53:19Z", "updated_at": "2022-04-06T14:54:12Z", "pushed_at": "2022-04-06T15:41:47Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 480821526, "name": "CVE-2021-41773", "full_name": "Chocapikk\/CVE-2021-41773", "owner": { "login": "Chocapikk", "id": 88535377, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", "html_url": "https:\/\/github.com\/Chocapikk" }, "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2022-04-12T13:25:58Z", "updated_at": "2022-09-27T23:55:41Z", "pushed_at": "2022-04-12T13:26:22Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0 }, { "id": 486245191, "name": "Apache_Penetration_Tool", "full_name": "wangfly-me\/Apache_Penetration_Tool", "owner": { "login": "wangfly-me", "id": 25388540, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25388540?v=4", "html_url": "https:\/\/github.com\/wangfly-me" }, "html_url": "https:\/\/github.com\/wangfly-me\/Apache_Penetration_Tool", "description": "CVE-2021-41773&CVE-2021-42013图形化漏洞检测利用工具", "fork": false, "created_at": "2022-04-27T15:17:38Z", "updated_at": "2022-05-23T03:30:13Z", "pushed_at": "2022-07-17T14:04:16Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0 }, { "id": 500809753, "name": "CVE-2021-41773", "full_name": "hab1b0x\/CVE-2021-41773", "owner": { "login": "hab1b0x", "id": 24976957, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24976957?v=4", "html_url": "https:\/\/github.com\/hab1b0x" }, "html_url": "https:\/\/github.com\/hab1b0x\/CVE-2021-41773", "description": "CVE-2021-41773 | Apache HTTP Server 2.4.49 is vulnerable to Path Traversal and Remote Code execution attacks ", "fork": false, "created_at": "2022-06-07T11:22:08Z", "updated_at": "2022-07-06T09:28:44Z", "pushed_at": "2022-06-07T11:23:40Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0 }, { "id": 504547542, "name": "CVE-2021-41773-Apache-RCE", "full_name": "pwn3z\/CVE-2021-41773-Apache-RCE", "owner": { "login": "pwn3z", "id": 71440287, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71440287?v=4", "html_url": "https:\/\/github.com\/pwn3z" }, "html_url": "https:\/\/github.com\/pwn3z\/CVE-2021-41773-Apache-RCE", "description": "A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration \"require all denied\", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.", "fork": false, "created_at": "2022-06-17T13:36:42Z", "updated_at": "2022-06-17T13:38:47Z", "pushed_at": "2022-06-17T13:39:38Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 516684881, "name": "Mitigation-Apache-CVE-2021-41773-", "full_name": "EkamSinghWalia\/Mitigation-Apache-CVE-2021-41773-", "owner": { "login": "EkamSinghWalia", "id": 106553324, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106553324?v=4", "html_url": "https:\/\/github.com\/EkamSinghWalia" }, "html_url": "https:\/\/github.com\/EkamSinghWalia\/Mitigation-Apache-CVE-2021-41773-", "description": "Mitigation\/fix of CVE-2021-41773 A Path Traversal And File Disclosure Vulnerability In Apache", "fork": false, "created_at": "2022-07-22T09:11:47Z", "updated_at": "2022-07-22T09:29:20Z", "pushed_at": "2022-07-22T14:59:37Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 521335808, "name": "CVE-2021-41773", "full_name": "Plunder283\/CVE-2021-41773", "owner": { "login": "Plunder283", "id": 87617893, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87617893?v=4", "html_url": "https:\/\/github.com\/Plunder283" }, "html_url": "https:\/\/github.com\/Plunder283\/CVE-2021-41773", "description": "CVE-2021-41773 Gaurav Raj's exploit modified by Plunder", "fork": false, "created_at": "2022-08-04T16:19:42Z", "updated_at": "2022-08-04T16:33:22Z", "pushed_at": "2022-08-04T16:34:38Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 536947281, "name": "cve-2021-41773", "full_name": "mightysai1997\/cve-2021-41773", "owner": { "login": "mightysai1997", "id": 110396758, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4", "html_url": "https:\/\/github.com\/mightysai1997" }, "html_url": "https:\/\/github.com\/mightysai1997\/cve-2021-41773", "description": null, "fork": false, "created_at": "2022-09-15T09:08:58Z", "updated_at": "2022-09-15T09:09:16Z", "pushed_at": "2022-09-15T09:09:11Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 536953912, "name": "CVE-2021-41773h", "full_name": "mightysai1997\/CVE-2021-41773h", "owner": { "login": "mightysai1997", "id": 110396758, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4", "html_url": "https:\/\/github.com\/mightysai1997" }, "html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773h", "description": null, "fork": false, "created_at": "2022-09-15T09:27:04Z", "updated_at": "2022-09-15T09:27:22Z", "pushed_at": "2022-09-15T09:27:19Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 536957144, "name": "cve-2021-41773-v-", "full_name": "mightysai1997\/cve-2021-41773-v-", "owner": { "login": "mightysai1997", "id": 110396758, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4", "html_url": "https:\/\/github.com\/mightysai1997" }, "html_url": "https:\/\/github.com\/mightysai1997\/cve-2021-41773-v-", "description": null, "fork": false, "created_at": "2022-09-15T09:36:17Z", "updated_at": "2022-09-15T09:36:35Z", "pushed_at": "2022-09-15T09:36:30Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 536957769, "name": "CVE-2021-41773-i-", "full_name": "mightysai1997\/CVE-2021-41773-i-", "owner": { "login": "mightysai1997", "id": 110396758, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4", "html_url": "https:\/\/github.com\/mightysai1997" }, "html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773-i-", "description": null, "fork": false, "created_at": "2022-09-15T09:38:04Z", "updated_at": "2022-09-15T09:38:16Z", "pushed_at": "2022-09-15T09:38:13Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 536968315, "name": "CVE-2021-41773-L-", "full_name": "mightysai1997\/CVE-2021-41773-L-", "owner": { "login": "mightysai1997", "id": 110396758, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4", "html_url": "https:\/\/github.com\/mightysai1997" }, "html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773-L-", "description": null, "fork": false, "created_at": "2022-09-15T10:08:36Z", "updated_at": "2022-09-15T10:08:51Z", "pushed_at": "2022-09-15T10:08:46Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 536985771, "name": "CVE-2021-41773-PoC", "full_name": "mightysai1997\/CVE-2021-41773-PoC", "owner": { "login": "mightysai1997", "id": 110396758, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4", "html_url": "https:\/\/github.com\/mightysai1997" }, "html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773-PoC", "description": null, "fork": false, "created_at": "2022-09-15T11:01:45Z", "updated_at": "2022-09-15T11:02:07Z", "pushed_at": "2022-09-15T11:02:02Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 537018809, "name": "CVE-2021-41773.git1", "full_name": "mightysai1997\/CVE-2021-41773.git1", "owner": { "login": "mightysai1997", "id": 110396758, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4", "html_url": "https:\/\/github.com\/mightysai1997" }, "html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773.git1", "description": null, "fork": false, "created_at": "2022-09-15T12:35:06Z", "updated_at": "2022-09-15T12:35:18Z", "pushed_at": "2022-09-15T12:35:14Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 537019898, "name": "CVE-2021-41773m", "full_name": "mightysai1997\/CVE-2021-41773m", "owner": { "login": "mightysai1997", "id": 110396758, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4", "html_url": "https:\/\/github.com\/mightysai1997" }, "html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773m", "description": null, "fork": false, "created_at": "2022-09-15T12:37:59Z", "updated_at": "2022-09-16T01:01:18Z", "pushed_at": "2022-09-15T12:38:09Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 537060189, "name": "CVE-2021-41773S", "full_name": "mightysai1997\/CVE-2021-41773S", "owner": { "login": "mightysai1997", "id": 110396758, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4", "html_url": "https:\/\/github.com\/mightysai1997" }, "html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773S", "description": null, "fork": false, "created_at": "2022-09-15T14:17:45Z", "updated_at": "2022-09-16T01:01:16Z", "pushed_at": "2022-09-15T14:17:56Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 538798099, "name": "LayarKacaSiber-CVE-2021-41773", "full_name": "dileepdkumar\/LayarKacaSiber-CVE-2021-41773", "owner": { "login": "dileepdkumar", "id": 89115244, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89115244?v=4", "html_url": "https:\/\/github.com\/dileepdkumar" }, "html_url": "https:\/\/github.com\/dileepdkumar\/LayarKacaSiber-CVE-2021-41773", "description": null, "fork": false, "created_at": "2022-09-20T03:45:24Z", "updated_at": "2022-09-20T03:45:37Z", "pushed_at": "2022-09-20T03:45:32Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 541594544, "name": "apache-CVE-2021-41773-CVE-2021-42013", "full_name": "sne4ker\/apache-CVE-2021-41773-CVE-2021-42013", "owner": { "login": "sne4ker", "id": 101662671, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101662671?v=4", "html_url": "https:\/\/github.com\/sne4ker" }, "html_url": "https:\/\/github.com\/sne4ker\/apache-CVE-2021-41773-CVE-2021-42013", "description": null, "fork": false, "created_at": "2022-09-26T13:13:37Z", "updated_at": "2022-09-26T13:19:05Z", "pushed_at": "2022-09-26T13:19:01Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 542775271, "name": "CVE-2021-41773", "full_name": "Juuso1337\/CVE-2021-41773", "owner": { "login": "Juuso1337", "id": 106491133, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106491133?v=4", "html_url": "https:\/\/github.com\/Juuso1337" }, "html_url": "https:\/\/github.com\/Juuso1337\/CVE-2021-41773", "description": "Apache 2.4.49 & 2.4.50 LFI to RCE exploit", "fork": false, "created_at": "2022-09-28T20:12:34Z", "updated_at": "2022-09-30T00:02:55Z", "pushed_at": "2022-09-30T00:07:43Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 } ]