[ { "id": 413890827, "name": "cve-2021-41773", "full_name": "Vulnmachines\/cve-2021-41773", "owner": { "login": "Vulnmachines", "id": 79006904, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4", "html_url": "https:\/\/github.com\/Vulnmachines" }, "html_url": "https:\/\/github.com\/Vulnmachines\/cve-2021-41773", "description": "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.", "fork": false, "created_at": "2021-10-05T16:13:38Z", "updated_at": "2022-03-23T16:50:30Z", "pushed_at": "2022-03-10T14:02:09Z", "stargazers_count": 38, "watchers_count": 38, "forks_count": 11, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 11, "watchers": 38, "score": 0 }, { "id": 414043746, "name": "CVE-2021-41773_CVE-2021-42013", "full_name": "Ls4ss\/CVE-2021-41773_CVE-2021-42013", "owner": { "login": "Ls4ss", "id": 25537761, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25537761?v=4", "html_url": "https:\/\/github.com\/Ls4ss" }, "html_url": "https:\/\/github.com\/Ls4ss\/CVE-2021-41773_CVE-2021-42013", "description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE", "fork": false, "created_at": "2021-10-06T02:28:41Z", "updated_at": "2022-05-07T16:03:31Z", "pushed_at": "2021-12-22T23:54:18Z", "stargazers_count": 20, "watchers_count": 20, "forks_count": 8, "allow_forking": true, "is_template": false, "topics": [ "apache", "cve", "exploit", "payload", "pentest", "rce" ], "visibility": "public", "forks": 8, "watchers": 20, "score": 0 }, { "id": 438514241, "name": "MASS_CVE-2021-41773", "full_name": "i6c\/MASS_CVE-2021-41773", "owner": { "login": "i6c", "id": 87837042, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87837042?v=4", "html_url": "https:\/\/github.com\/i6c" }, "html_url": "https:\/\/github.com\/i6c\/MASS_CVE-2021-41773", "description": null, "fork": false, "created_at": "2021-12-15T06:04:41Z", "updated_at": "2021-12-24T17:27:13Z", "pushed_at": "2021-12-15T06:06:53Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0 }, { "id": 447314257, "name": "CVE-2021-41773-exploiter", "full_name": "norrig\/CVE-2021-41773-exploiter", "owner": { "login": "norrig", "id": 5526261, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5526261?v=4", "html_url": "https:\/\/github.com\/norrig" }, "html_url": "https:\/\/github.com\/norrig\/CVE-2021-41773-exploiter", "description": "School project - Please use other repos for actual testing", "fork": false, "created_at": "2022-01-12T17:42:36Z", "updated_at": "2022-01-12T18:26:57Z", "pushed_at": "2022-01-13T16:18:33Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 452242021, "name": "CVE-2021-41773-exercise", "full_name": "m96dg\/CVE-2021-41773-exercise", "owner": { "login": "m96dg", "id": 65173648, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65173648?v=4", "html_url": "https:\/\/github.com\/m96dg" }, "html_url": "https:\/\/github.com\/m96dg\/CVE-2021-41773-exercise", "description": "A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration \"require all denied\", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and not earlier versions. Credits to: https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-41773 ", "fork": false, "created_at": "2022-01-26T11:02:46Z", "updated_at": "2022-01-26T11:22:13Z", "pushed_at": "2022-01-30T19:02:43Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 464271089, "name": "CVE-2021-41773", "full_name": "skentagon\/CVE-2021-41773", "owner": { "login": "skentagon", "id": 49702576, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49702576?v=4", "html_url": "https:\/\/github.com\/skentagon" }, "html_url": "https:\/\/github.com\/skentagon\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2022-02-27T22:39:58Z", "updated_at": "2022-03-04T00:11:58Z", "pushed_at": "2022-03-04T00:05:44Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 467687901, "name": "CVE-2021-41773", "full_name": "mauricelambert\/CVE-2021-41773", "owner": { "login": "mauricelambert", "id": 50479118, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4", "html_url": "https:\/\/github.com\/mauricelambert" }, "html_url": "https:\/\/github.com\/mauricelambert\/CVE-2021-41773", "description": "These Metasploit, Nmap, Python and Ruby scripts detects and exploits CVE-2021-41773 with RCE and local file disclosure.", "fork": false, "created_at": "2022-03-08T21:55:53Z", "updated_at": "2022-03-23T16:56:34Z", "pushed_at": "2022-03-14T07:34:49Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [ "cve", "cve-2021-41773", "detection", "exploit", "metasploit", "nmap", "python3", "rce", "ruby", "scanner", "vulnerability" ], "visibility": "public", "forks": 2, "watchers": 1, "score": 0 }, { "id": 468909402, "name": "CVE-2021-41773", "full_name": "the29a\/CVE-2021-41773", "owner": { "login": "the29a", "id": 4436697, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4436697?v=4", "html_url": "https:\/\/github.com\/the29a" }, "html_url": "https:\/\/github.com\/the29a\/CVE-2021-41773", "description": "Small PoC of CVE-2021-41773", "fork": false, "created_at": "2022-03-11T21:50:35Z", "updated_at": "2022-03-11T21:52:35Z", "pushed_at": "2022-03-11T22:10:25Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 469203660, "name": "CVE-2021-41773", "full_name": "thehackersbrain\/CVE-2021-41773", "owner": { "login": "thehackersbrain", "id": 36809025, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36809025?v=4", "html_url": "https:\/\/github.com\/thehackersbrain" }, "html_url": "https:\/\/github.com\/thehackersbrain\/CVE-2021-41773", "description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773", "fork": false, "created_at": "2022-03-12T21:24:55Z", "updated_at": "2022-03-31T12:45:37Z", "pushed_at": "2022-03-12T21:30:58Z", "stargazers_count": 51, "watchers_count": 51, "forks_count": 17, "allow_forking": true, "is_template": false, "topics": [ "apache2", "cve-2021-41773", "exploit", "gauravraj", "lfi", "python", "rce", "thehackersbrain" ], "visibility": "public", "forks": 17, "watchers": 51, "score": 0 }, { "id": 469576020, "name": "CVE-2021-41773", "full_name": "honypot\/CVE-2021-41773", "owner": { "login": "honypot", "id": 101309325, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101309325?v=4", "html_url": "https:\/\/github.com\/honypot" }, "html_url": "https:\/\/github.com\/honypot\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2022-03-14T04:08:56Z", "updated_at": "2022-03-14T04:09:11Z", "pushed_at": "2022-03-14T04:09:05Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 469821841, "name": "CVE-2021-41773", "full_name": "Fa1c0n35\/CVE-2021-41773", "owner": { "login": "Fa1c0n35", "id": 33335488, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4", "html_url": "https:\/\/github.com\/Fa1c0n35" }, "html_url": "https:\/\/github.com\/Fa1c0n35\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2022-03-14T16:43:49Z", "updated_at": "2022-03-14T16:44:00Z", "pushed_at": "2022-03-14T16:43:57Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 474747864, "name": "CVE-2021-41773-", "full_name": "N3w-elf\/CVE-2021-41773-", "owner": { "login": "N3w-elf", "id": 80478753, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80478753?v=4", "html_url": "https:\/\/github.com\/N3w-elf" }, "html_url": "https:\/\/github.com\/N3w-elf\/CVE-2021-41773-", "description": null, "fork": false, "created_at": "2022-03-27T20:10:30Z", "updated_at": "2022-03-27T20:10:30Z", "pushed_at": "2022-03-27T20:10:31Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 474963195, "name": "CVE-2021-41773", "full_name": "puckiestyle\/CVE-2021-41773", "owner": { "login": "puckiestyle", "id": 57447087, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4", "html_url": "https:\/\/github.com\/puckiestyle" }, "html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2022-03-28T11:02:46Z", "updated_at": "2022-03-28T11:03:00Z", "pushed_at": "2022-03-28T11:41:55Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 475931011, "name": "CVE-2021-41773", "full_name": "WynSon\/CVE-2021-41773", "owner": { "login": "WynSon", "id": 83699106, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83699106?v=4", "html_url": "https:\/\/github.com\/WynSon" }, "html_url": "https:\/\/github.com\/WynSon\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2022-03-30T15:04:27Z", "updated_at": "2022-03-30T17:46:13Z", "pushed_at": "2022-04-14T21:54:47Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 476112666, "name": "Reserch-CVE-2021-41773", "full_name": "DoTuan1\/Reserch-CVE-2021-41773", "owner": { "login": "DoTuan1", "id": 63194321, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63194321?v=4", "html_url": "https:\/\/github.com\/DoTuan1" }, "html_url": "https:\/\/github.com\/DoTuan1\/Reserch-CVE-2021-41773", "description": null, "fork": false, "created_at": "2022-03-31T01:48:33Z", "updated_at": "2022-03-31T01:54:45Z", "pushed_at": "2022-03-31T03:03:09Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 477111512, "name": "netsec-polygon", "full_name": "bernardas\/netsec-polygon", "owner": { "login": "bernardas", "id": 62701131, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62701131?v=4", "html_url": "https:\/\/github.com\/bernardas" }, "html_url": "https:\/\/github.com\/bernardas\/netsec-polygon", "description": "Environment for CVE-2021-41773 recreation.", "fork": false, "created_at": "2022-04-02T16:34:45Z", "updated_at": "2022-04-03T08:19:39Z", "pushed_at": "2022-04-14T20:21:49Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 477889492, "name": "Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit", "full_name": "CalfCrusher\/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit", "owner": { "login": "CalfCrusher", "id": 5812023, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5812023?v=4", "html_url": "https:\/\/github.com\/CalfCrusher" }, "html_url": "https:\/\/github.com\/CalfCrusher\/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit", "description": "CVE-2021-41773 | CVE-2021-42013 Exploit Tool (Apache\/2.4.49-2.4.50)", "fork": false, "created_at": "2022-04-04T22:07:21Z", "updated_at": "2022-04-05T05:17:33Z", "pushed_at": "2022-04-08T09:24:35Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [ "cve-2021-41773", "cve-2021-42013", "exploit" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 478605535, "name": "cve-2021-41773", "full_name": "vuongnv3389-sec\/cve-2021-41773", "owner": { "login": "vuongnv3389-sec", "id": 64488431, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64488431?v=4", "html_url": "https:\/\/github.com\/vuongnv3389-sec" }, "html_url": "https:\/\/github.com\/vuongnv3389-sec\/cve-2021-41773", "description": null, "fork": false, "created_at": "2022-04-06T14:53:19Z", "updated_at": "2022-04-06T14:54:12Z", "pushed_at": "2022-04-06T15:41:47Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 480821526, "name": "CVE-2021-41773", "full_name": "Chocapikk\/CVE-2021-41773", "owner": { "login": "Chocapikk", "id": 88535377, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4", "html_url": "https:\/\/github.com\/Chocapikk" }, "html_url": "https:\/\/github.com\/Chocapikk\/CVE-2021-41773", "description": null, "fork": false, "created_at": "2022-04-12T13:25:58Z", "updated_at": "2022-04-19T17:03:53Z", "pushed_at": "2022-04-12T13:26:22Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 486245191, "name": "Apache_Penetration_Tool", "full_name": "wangfly-me\/Apache_Penetration_Tool", "owner": { "login": "wangfly-me", "id": 25388540, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25388540?v=4", "html_url": "https:\/\/github.com\/wangfly-me" }, "html_url": "https:\/\/github.com\/wangfly-me\/Apache_Penetration_Tool", "description": "CVE-2021-41773&CVE-2021-42013图形化漏洞检测利用工具", "fork": false, "created_at": "2022-04-27T15:17:38Z", "updated_at": "2022-04-28T02:44:52Z", "pushed_at": "2022-04-27T15:36:24Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0 } ]