PoC-in-GitHub/2021/CVE-2021-41773.json
2025-01-10 15:32:26 +09:00

3782 lines
No EOL
130 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 413890827,
"name": "cve-2021-41773",
"full_name": "Vulnmachines\/cve-2021-41773",
"owner": {
"login": "Vulnmachines",
"id": 79006904,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
"html_url": "https:\/\/github.com\/Vulnmachines",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Vulnmachines\/cve-2021-41773",
"description": "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.",
"fork": false,
"created_at": "2021-10-05T16:13:38Z",
"updated_at": "2024-09-03T02:15:12Z",
"pushed_at": "2022-08-30T11:58:32Z",
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 40,
"score": 0,
"subscribers_count": 1
},
{
"id": 413892415,
"name": "CVE-2021-41773",
"full_name": "numanturle\/CVE-2021-41773",
"owner": {
"login": "numanturle",
"id": 7007951,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
"html_url": "https:\/\/github.com\/numanturle",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/numanturle\/CVE-2021-41773",
"description": "CVE-2021-41773",
"fork": false,
"created_at": "2021-10-05T16:18:09Z",
"updated_at": "2024-08-12T20:16:59Z",
"pushed_at": "2021-10-05T16:48:27Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 9,
"score": 0,
"subscribers_count": 3
},
{
"id": 413901787,
"name": "CVE-2021-41773",
"full_name": "knqyf263\/CVE-2021-41773",
"owner": {
"login": "knqyf263",
"id": 2253692,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
"html_url": "https:\/\/github.com\/knqyf263",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2021-41773",
"description": "Path traversal in Apache HTTP Server 2.4.49 (CVE-2021-41773) ",
"fork": false,
"created_at": "2021-10-05T16:45:41Z",
"updated_at": "2024-08-12T20:16:59Z",
"pushed_at": "2021-10-06T05:40:34Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 10,
"score": 0,
"subscribers_count": 3
},
{
"id": 413916578,
"name": "CVE-2021-41773-PoC",
"full_name": "ZephrFish\/CVE-2021-41773-PoC",
"owner": {
"login": "ZephrFish",
"id": 5783068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
"html_url": "https:\/\/github.com\/ZephrFish",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ZephrFish\/CVE-2021-41773-PoC",
"description": null,
"fork": false,
"created_at": "2021-10-05T17:29:49Z",
"updated_at": "2024-08-12T20:16:59Z",
"pushed_at": "2021-10-06T09:25:38Z",
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 17,
"score": 0,
"subscribers_count": 3
},
{
"id": 413916846,
"name": "PoC-CVE-2021-41773",
"full_name": "iilegacyyii\/PoC-CVE-2021-41773",
"owner": {
"login": "iilegacyyii",
"id": 68760809,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68760809?v=4",
"html_url": "https:\/\/github.com\/iilegacyyii",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/iilegacyyii\/PoC-CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-05T17:30:43Z",
"updated_at": "2024-08-12T20:16:59Z",
"pushed_at": "2021-11-24T12:57:46Z",
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache",
"cve",
"lfi",
"poc",
"rce"
],
"visibility": "public",
"forks": 38,
"watchers": 47,
"score": 0,
"subscribers_count": 1
},
{
"id": 413943505,
"name": "CVE-2021-41773",
"full_name": "masahiro331\/CVE-2021-41773",
"owner": {
"login": "masahiro331",
"id": 20438853,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20438853?v=4",
"html_url": "https:\/\/github.com\/masahiro331",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/masahiro331\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-05T18:56:04Z",
"updated_at": "2024-08-12T20:16:59Z",
"pushed_at": "2021-10-06T03:43:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 3
},
{
"id": 413969845,
"name": "CVE-2021-41773",
"full_name": "j4k0m\/CVE-2021-41773",
"owner": {
"login": "j4k0m",
"id": 48088579,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48088579?v=4",
"html_url": "https:\/\/github.com\/j4k0m",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/j4k0m\/CVE-2021-41773",
"description": "Exploitation of CVE-2021-41773 a Directory Traversal in Apache 2.4.49.",
"fork": false,
"created_at": "2021-10-05T20:30:01Z",
"updated_at": "2024-08-12T20:17:00Z",
"pushed_at": "2021-10-05T22:06:50Z",
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 12,
"score": 0,
"subscribers_count": 2
},
{
"id": 413972926,
"name": "POC-CVE-2021-41773",
"full_name": "TishcaTpx\/POC-CVE-2021-41773",
"owner": {
"login": "TishcaTpx",
"id": 91351013,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91351013?v=4",
"html_url": "https:\/\/github.com\/TishcaTpx",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/TishcaTpx\/POC-CVE-2021-41773",
"description": "Poc.py ",
"fork": false,
"created_at": "2021-10-05T20:41:34Z",
"updated_at": "2024-08-12T20:17:00Z",
"pushed_at": "2021-10-05T21:29:59Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 6,
"score": 0,
"subscribers_count": 2
},
{
"id": 414013246,
"name": "CVE-2021-41773-PoC",
"full_name": "lorddemon\/CVE-2021-41773-PoC",
"owner": {
"login": "lorddemon",
"id": 6675738,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6675738?v=4",
"html_url": "https:\/\/github.com\/lorddemon",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/lorddemon\/CVE-2021-41773-PoC",
"description": null,
"fork": false,
"created_at": "2021-10-05T23:53:48Z",
"updated_at": "2024-10-29T01:57:23Z",
"pushed_at": "2021-10-06T15:37:23Z",
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 37,
"score": 0,
"subscribers_count": 1
},
{
"id": 414043746,
"name": "CVE-2021-41773_CVE-2021-42013",
"full_name": "Ls4ss\/CVE-2021-41773_CVE-2021-42013",
"owner": {
"login": "Ls4ss",
"id": 25537761,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25537761?v=4",
"html_url": "https:\/\/github.com\/Ls4ss",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Ls4ss\/CVE-2021-41773_CVE-2021-42013",
"description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE",
"fork": false,
"created_at": "2021-10-06T02:28:41Z",
"updated_at": "2024-08-12T20:17:00Z",
"pushed_at": "2022-09-09T16:09:11Z",
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache",
"cve",
"exploit",
"payload",
"pentest",
"rce"
],
"visibility": "public",
"forks": 9,
"watchers": 21,
"score": 0,
"subscribers_count": 2
},
{
"id": 414044140,
"name": "CVE-2021-41773",
"full_name": "itsecurityco\/CVE-2021-41773",
"owner": {
"login": "itsecurityco",
"id": 1725054,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1725054?v=4",
"html_url": "https:\/\/github.com\/itsecurityco",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/itsecurityco\/CVE-2021-41773",
"description": "CVE-2021-41773 POC with Docker",
"fork": false,
"created_at": "2021-10-06T02:30:40Z",
"updated_at": "2025-01-05T09:07:45Z",
"pushed_at": "2022-10-07T23:37:10Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 11,
"score": 0,
"subscribers_count": 2
},
{
"id": 414050354,
"name": "CVE-2021-41773-PoC",
"full_name": "habibiefaried\/CVE-2021-41773-PoC",
"owner": {
"login": "habibiefaried",
"id": 4345690,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4345690?v=4",
"html_url": "https:\/\/github.com\/habibiefaried",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/habibiefaried\/CVE-2021-41773-PoC",
"description": "PoC for CVE-2021-41773 with docker to demonstrate",
"fork": false,
"created_at": "2021-10-06T03:01:41Z",
"updated_at": "2024-08-12T20:17:00Z",
"pushed_at": "2021-10-06T05:39:24Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 4,
"score": 0,
"subscribers_count": 2
},
{
"id": 414082287,
"name": "CVE-2021-41773-POC",
"full_name": "creadpag\/CVE-2021-41773-POC",
"owner": {
"login": "creadpag",
"id": 15526083,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15526083?v=4",
"html_url": "https:\/\/github.com\/creadpag",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/creadpag\/CVE-2021-41773-POC",
"description": "CVE-2021-41773",
"fork": false,
"created_at": "2021-10-06T05:34:48Z",
"updated_at": "2024-08-12T20:17:00Z",
"pushed_at": "2022-12-28T17:49:24Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 8,
"score": 0,
"subscribers_count": 2
},
{
"id": 414082633,
"name": "cve-2021-41773-nse",
"full_name": "TAI-REx\/cve-2021-41773-nse",
"owner": {
"login": "TAI-REx",
"id": 78527947,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78527947?v=4",
"html_url": "https:\/\/github.com\/TAI-REx",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/TAI-REx\/cve-2021-41773-nse",
"description": "CVE-2021-41773.nse",
"fork": false,
"created_at": "2021-10-06T05:36:22Z",
"updated_at": "2021-11-26T18:07:10Z",
"pushed_at": "2021-10-06T05:23:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 414108838,
"name": "CVE-2021-41773",
"full_name": "blasty\/CVE-2021-41773",
"owner": {
"login": "blasty",
"id": 101374,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101374?v=4",
"html_url": "https:\/\/github.com\/blasty",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/blasty\/CVE-2021-41773",
"description": "CVE-2021-41773 playground",
"fork": false,
"created_at": "2021-10-06T07:17:05Z",
"updated_at": "2024-11-22T13:23:13Z",
"pushed_at": "2021-10-07T17:56:38Z",
"stargazers_count": 206,
"watchers_count": 206,
"has_discussions": false,
"forks_count": 46,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 206,
"score": 0,
"subscribers_count": 6
},
{
"id": 414159388,
"name": "CVE-2021-41773",
"full_name": "PentesterGuruji\/CVE-2021-41773",
"owner": {
"login": "PentesterGuruji",
"id": 87645282,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87645282?v=4",
"html_url": "https:\/\/github.com\/PentesterGuruji",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/PentesterGuruji\/CVE-2021-41773",
"description": "Path Traversal vulnerability in Apache 2.4.49",
"fork": false,
"created_at": "2021-10-06T10:04:22Z",
"updated_at": "2024-08-12T20:17:01Z",
"pushed_at": "2021-10-07T19:39:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 414227353,
"name": "CVE-2021-41773",
"full_name": "jbovet\/CVE-2021-41773",
"owner": {
"login": "jbovet",
"id": 41589,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41589?v=4",
"html_url": "https:\/\/github.com\/jbovet",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jbovet\/CVE-2021-41773",
"description": "Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49 (CVE-2021-41773)",
"fork": false,
"created_at": "2021-10-06T13:39:57Z",
"updated_at": "2024-08-12T20:17:01Z",
"pushed_at": "2021-10-06T14:15:45Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 3
},
{
"id": 414239384,
"name": "cve-2021-41773",
"full_name": "mohwahyudi\/cve-2021-41773",
"owner": {
"login": "mohwahyudi",
"id": 57562836,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57562836?v=4",
"html_url": "https:\/\/github.com\/mohwahyudi",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mohwahyudi\/cve-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-06T14:12:07Z",
"updated_at": "2024-08-12T20:17:01Z",
"pushed_at": "2021-10-08T01:55:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 414241382,
"name": "CVE-2021-41773",
"full_name": "1nhann\/CVE-2021-41773",
"owner": {
"login": "1nhann",
"id": 76624149,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76624149?v=4",
"html_url": "https:\/\/github.com\/1nhann",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/1nhann\/CVE-2021-41773",
"description": "CVE-2021-41773 的复现",
"fork": false,
"created_at": "2021-10-06T14:17:31Z",
"updated_at": "2024-08-12T20:17:01Z",
"pushed_at": "2021-10-08T05:03:10Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},
{
"id": 414248192,
"name": "CVE-2021-41773",
"full_name": "ranggaggngntt\/CVE-2021-41773",
"owner": {
"login": "ranggaggngntt",
"id": 57105391,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57105391?v=4",
"html_url": "https:\/\/github.com\/ranggaggngntt",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ranggaggngntt\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-06T14:36:05Z",
"updated_at": "2024-08-12T20:17:01Z",
"pushed_at": "2022-06-11T13:34:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 414252359,
"name": "CVE-2021-41773",
"full_name": "BlueTeamSteve\/CVE-2021-41773",
"owner": {
"login": "BlueTeamSteve",
"id": 550582,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/550582?v=4",
"html_url": "https:\/\/github.com\/BlueTeamSteve",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/BlueTeamSteve\/CVE-2021-41773",
"description": "Vulnerable docker images for CVE-2021-41773",
"fork": false,
"created_at": "2021-10-06T14:47:23Z",
"updated_at": "2024-08-12T20:17:01Z",
"pushed_at": "2021-10-06T15:07:48Z",
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 20,
"score": 0,
"subscribers_count": 1
},
{
"id": 414256797,
"name": "apache_normalize_path",
"full_name": "Zeop-CyberSec\/apache_normalize_path",
"owner": {
"login": "Zeop-CyberSec",
"id": 68154603,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68154603?v=4",
"html_url": "https:\/\/github.com\/Zeop-CyberSec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Zeop-CyberSec\/apache_normalize_path",
"description": "Metasploit-Framework modules (scanner and exploit) for the CVE-2021-41773 and CVE-2021-42013 (Path Traversal in Apache 2.4.49\/2.4.50)",
"fork": false,
"created_at": "2021-10-06T14:58:27Z",
"updated_at": "2024-08-12T20:17:01Z",
"pushed_at": "2021-10-21T18:51:00Z",
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 12,
"score": 0,
"subscribers_count": 2
},
{
"id": 414284449,
"name": "CVE-2021-41773",
"full_name": "r00tVen0m\/CVE-2021-41773",
"owner": {
"login": "r00tVen0m",
"id": 50659263,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50659263?v=4",
"html_url": "https:\/\/github.com\/r00tVen0m",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/r00tVen0m\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-06T16:15:21Z",
"updated_at": "2024-08-12T20:17:02Z",
"pushed_at": "2021-10-06T19:05:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 414347675,
"name": "CVE-2021-41773",
"full_name": "n3k00n3\/CVE-2021-41773",
"owner": {
"login": "n3k00n3",
"id": 7244777,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7244777?v=4",
"html_url": "https:\/\/github.com\/n3k00n3",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/n3k00n3\/CVE-2021-41773",
"description": "exploit to CVE-2021-41773",
"fork": false,
"created_at": "2021-10-06T19:39:25Z",
"updated_at": "2024-08-12T20:17:02Z",
"pushed_at": "2021-10-08T16:32:51Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 414350527,
"name": "CVE-2021-41773-RCE",
"full_name": "fnatalucci\/CVE-2021-41773-RCE",
"owner": {
"login": "fnatalucci",
"id": 5574371,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5574371?v=4",
"html_url": "https:\/\/github.com\/fnatalucci",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/fnatalucci\/CVE-2021-41773-RCE",
"description": null,
"fork": false,
"created_at": "2021-10-06T19:50:33Z",
"updated_at": "2024-08-12T20:17:02Z",
"pushed_at": "2021-10-06T20:14:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 414376599,
"name": "CVE-2021-41773",
"full_name": "AssassinUKG\/CVE-2021-41773",
"owner": {
"login": "AssassinUKG",
"id": 5285547,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5285547?v=4",
"html_url": "https:\/\/github.com\/AssassinUKG",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/AssassinUKG\/CVE-2021-41773",
"description": "Apache 2.4.49",
"fork": false,
"created_at": "2021-10-06T21:37:18Z",
"updated_at": "2024-08-12T20:17:02Z",
"pushed_at": "2021-10-20T23:04:06Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},
{
"id": 414402542,
"name": "Simple-CVE-2021-41773-checker",
"full_name": "jheeree\/Simple-CVE-2021-41773-checker",
"owner": {
"login": "jheeree",
"id": 19227591,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19227591?v=4",
"html_url": "https:\/\/github.com\/jheeree",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jheeree\/Simple-CVE-2021-41773-checker",
"description": "Simple script realizado en bash, para revisión de múltiples hosts para CVE-2021-41773 (Apache)",
"fork": false,
"created_at": "2021-10-06T23:32:30Z",
"updated_at": "2024-08-12T20:17:03Z",
"pushed_at": "2021-10-12T03:28:51Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},
{
"id": 414410579,
"name": "CVE-2021-41773",
"full_name": "orangmuda\/CVE-2021-41773",
"owner": {
"login": "orangmuda",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/orangmuda",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/orangmuda\/CVE-2021-41773",
"description": "Apache HTTPd (2.4.49) Local File Disclosure (LFI)",
"fork": false,
"created_at": "2021-10-07T00:14:40Z",
"updated_at": "2024-08-12T20:17:03Z",
"pushed_at": "2021-10-07T00:19:26Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"httpd",
"remote-code-execution"
],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 2
},
{
"id": 414425270,
"name": "scarce-apache2",
"full_name": "HightechSec\/scarce-apache2",
"owner": {
"login": "HightechSec",
"id": 24645706,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24645706?v=4",
"html_url": "https:\/\/github.com\/HightechSec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/HightechSec\/scarce-apache2",
"description": "A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public ",
"fork": false,
"created_at": "2021-10-07T01:31:13Z",
"updated_at": "2024-09-16T03:44:54Z",
"pushed_at": "2021-10-07T08:25:26Z",
"stargazers_count": 62,
"watchers_count": 62,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bash-script",
"bug-hunting",
"cve-2021-41773",
"hacktoberfest",
"pentesting"
],
"visibility": "public",
"forks": 18,
"watchers": 62,
"score": 0,
"subscribers_count": 2
},
{
"id": 414514606,
"name": "CVE-2021-41773-exploit",
"full_name": "vinhjaxt\/CVE-2021-41773-exploit",
"owner": {
"login": "vinhjaxt",
"id": 8877695,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8877695?v=4",
"html_url": "https:\/\/github.com\/vinhjaxt",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/vinhjaxt\/CVE-2021-41773-exploit",
"description": "CVE-2021-41773, poc, exploit",
"fork": false,
"created_at": "2021-10-07T08:10:00Z",
"updated_at": "2024-08-12T20:17:04Z",
"pushed_at": "2021-10-08T04:55:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 414536267,
"name": "CVE-2021-41773",
"full_name": "sixpacksecurity\/CVE-2021-41773",
"owner": {
"login": "sixpacksecurity",
"id": 91971692,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91971692?v=4",
"html_url": "https:\/\/github.com\/sixpacksecurity",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sixpacksecurity\/CVE-2021-41773",
"description": "CVE-2021-41773 exploit PoC with Docker setup.",
"fork": false,
"created_at": "2021-10-07T09:21:29Z",
"updated_at": "2021-10-07T13:00:21Z",
"pushed_at": "2021-10-07T13:00:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 414574168,
"name": "POC-CVE-2021-41773",
"full_name": "Hattan515\/POC-CVE-2021-41773",
"owner": {
"login": "Hattan515",
"id": 92092916,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92092916?v=4",
"html_url": "https:\/\/github.com\/Hattan515",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Hattan515\/POC-CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-07T11:31:03Z",
"updated_at": "2024-08-21T22:27:15Z",
"pushed_at": "2021-10-07T11:42:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 414581409,
"name": "cve-2021-41773",
"full_name": "twseptian\/cve-2021-41773",
"owner": {
"login": "twseptian",
"id": 9025301,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9025301?v=4",
"html_url": "https:\/\/github.com\/twseptian",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/twseptian\/cve-2021-41773",
"description": "CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited",
"fork": false,
"created_at": "2021-10-07T11:55:10Z",
"updated_at": "2024-09-26T02:12:24Z",
"pushed_at": "2021-10-10T05:19:29Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache",
"cve-2021-41773",
"path-traversal",
"shodan",
"shodan-cli",
"vulnerability"
],
"visibility": "public",
"forks": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 2
},
{
"id": 414592683,
"name": "CVE-2021-41773",
"full_name": "noflowpls\/CVE-2021-41773",
"owner": {
"login": "noflowpls",
"id": 84136529,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84136529?v=4",
"html_url": "https:\/\/github.com\/noflowpls",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/noflowpls\/CVE-2021-41773",
"description": "CVE-2021-41773",
"fork": false,
"created_at": "2021-10-07T12:30:13Z",
"updated_at": "2024-08-12T20:17:04Z",
"pushed_at": "2022-11-15T08:51:33Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
{
"id": 414639113,
"name": "CVE-2021-41773",
"full_name": "McSl0vv\/CVE-2021-41773",
"owner": {
"login": "McSl0vv",
"id": 36660195,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36660195?v=4",
"html_url": "https:\/\/github.com\/McSl0vv",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/McSl0vv\/CVE-2021-41773",
"description": "Apache 2.4.49 Exploit",
"fork": false,
"created_at": "2021-10-07T14:41:05Z",
"updated_at": "2021-10-07T14:46:05Z",
"pushed_at": "2021-10-07T14:46:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 414646379,
"name": "CVE-2021-41773",
"full_name": "shiomiyan\/CVE-2021-41773",
"owner": {
"login": "shiomiyan",
"id": 35842766,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35842766?v=4",
"html_url": "https:\/\/github.com\/shiomiyan",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/shiomiyan\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-07T15:00:55Z",
"updated_at": "2021-10-15T19:28:33Z",
"pushed_at": "2021-10-15T19:28:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 414650983,
"name": "mass_cve-2021-41773",
"full_name": "justakazh\/mass_cve-2021-41773",
"owner": {
"login": "justakazh",
"id": 36891477,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36891477?v=4",
"html_url": "https:\/\/github.com\/justakazh",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/justakazh\/mass_cve-2021-41773",
"description": "MASS CVE-2021-41773",
"fork": false,
"created_at": "2021-10-07T15:13:18Z",
"updated_at": "2024-08-12T20:17:04Z",
"pushed_at": "2023-11-14T07:00:33Z",
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"automatic",
"cve-2021-41773",
"exploit",
"scanner"
],
"visibility": "public",
"forks": 24,
"watchers": 27,
"score": 0,
"subscribers_count": 4
},
{
"id": 414804962,
"name": "CVE-2021-41773",
"full_name": "shellreaper\/CVE-2021-41773",
"owner": {
"login": "shellreaper",
"id": 76930483,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76930483?v=4",
"html_url": "https:\/\/github.com\/shellreaper",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/shellreaper\/CVE-2021-41773",
"description": "This is a simple POC for Apache\/2.4.49 Path Traversal Vulnerability",
"fork": false,
"created_at": "2021-10-08T01:13:33Z",
"updated_at": "2024-12-04T10:08:03Z",
"pushed_at": "2021-11-12T00:03:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 414845157,
"name": "CVE-2021-41773",
"full_name": "0xRar\/CVE-2021-41773",
"owner": {
"login": "0xRar",
"id": 33517160,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33517160?v=4",
"html_url": "https:\/\/github.com\/0xRar",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xRar\/CVE-2021-41773",
"description": "Exploit for Apache 2.4.49",
"fork": false,
"created_at": "2021-10-08T04:26:31Z",
"updated_at": "2024-08-12T20:17:05Z",
"pushed_at": "2021-10-08T05:54:25Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
{
"id": 414848372,
"name": "Sigma-Rule-for-CVE-2021-41773-and-CVE-2021-42013-exploitation-attempt",
"full_name": "pisut4152\/Sigma-Rule-for-CVE-2021-41773-and-CVE-2021-42013-exploitation-attempt",
"owner": {
"login": "pisut4152",
"id": 72641661,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72641661?v=4",
"html_url": "https:\/\/github.com\/pisut4152",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/pisut4152\/Sigma-Rule-for-CVE-2021-41773-and-CVE-2021-42013-exploitation-attempt",
"description": null,
"fork": false,
"created_at": "2021-10-08T04:43:27Z",
"updated_at": "2024-08-12T20:17:05Z",
"pushed_at": "2021-10-08T04:46:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 414878778,
"name": "CVE-2021-41773",
"full_name": "corelight\/CVE-2021-41773",
"owner": {
"login": "corelight",
"id": 21672558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
"html_url": "https:\/\/github.com\/corelight",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/corelight\/CVE-2021-41773",
"description": "A Zeek package which raises notices for Path Traversal\/RCE in Apache HTTP Server 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013)",
"fork": false,
"created_at": "2021-10-08T06:54:27Z",
"updated_at": "2021-10-28T05:48:41Z",
"pushed_at": "2021-10-28T05:55:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 9
},
{
"id": 414887591,
"name": "CVE-2021-41773",
"full_name": "zeronine9\/CVE-2021-41773",
"owner": {
"login": "zeronine9",
"id": 60152515,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60152515?v=4",
"html_url": "https:\/\/github.com\/zeronine9",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zeronine9\/CVE-2021-41773",
"description": "Fast python tool to test apache path traversal CVE-2021-41773 in a List of url ",
"fork": false,
"created_at": "2021-10-08T07:24:49Z",
"updated_at": "2024-08-12T20:17:06Z",
"pushed_at": "2021-10-08T07:27:04Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 11,
"score": 0,
"subscribers_count": 2
},
{
"id": 414907601,
"name": "CVE-2021-41773",
"full_name": "b1tsec\/CVE-2021-41773",
"owner": {
"login": "b1tsec",
"id": 74562513,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74562513?v=4",
"html_url": "https:\/\/github.com\/b1tsec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/b1tsec\/CVE-2021-41773",
"description": "A Python script to check if an Apache web server is vulnerable to CVE-2021-41773",
"fork": false,
"created_at": "2021-10-08T08:32:51Z",
"updated_at": "2024-08-12T20:17:06Z",
"pushed_at": "2021-10-08T12:15:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 415041820,
"name": "CVE-2021-41773",
"full_name": "superzerosec\/CVE-2021-41773",
"owner": {
"login": "superzerosec",
"id": 57648217,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4",
"html_url": "https:\/\/github.com\/superzerosec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/superzerosec\/CVE-2021-41773",
"description": "POC",
"fork": false,
"created_at": "2021-10-08T15:40:41Z",
"updated_at": "2024-08-12T20:17:06Z",
"pushed_at": "2021-10-11T22:24:12Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 2
},
{
"id": 415177333,
"name": "apachrot",
"full_name": "im-hanzou\/apachrot",
"owner": {
"login": "im-hanzou",
"id": 61415393,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61415393?v=4",
"html_url": "https:\/\/github.com\/im-hanzou",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/im-hanzou\/apachrot",
"description": "Apache (Linux) CVE-2021-41773\/2021-42013 Mass Vulnerability Checker",
"fork": false,
"created_at": "2021-10-09T02:12:39Z",
"updated_at": "2024-10-25T23:47:22Z",
"pushed_at": "2021-10-12T07:27:09Z",
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache",
"checker",
"cve-2021-41773",
"cve-2021-42013",
"vulnerability"
],
"visibility": "public",
"forks": 6,
"watchers": 22,
"score": 0,
"subscribers_count": 1
},
{
"id": 415191949,
"name": "CVE-2021-41773_CVE-2021-42013",
"full_name": "inbug-team\/CVE-2021-41773_CVE-2021-42013",
"owner": {
"login": "inbug-team",
"id": 81735769,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81735769?v=4",
"html_url": "https:\/\/github.com\/inbug-team",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/inbug-team\/CVE-2021-41773_CVE-2021-42013",
"description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具",
"fork": false,
"created_at": "2021-10-09T03:32:18Z",
"updated_at": "2024-12-04T10:07:59Z",
"pushed_at": "2021-10-09T03:49:21Z",
"stargazers_count": 147,
"watchers_count": 147,
"has_discussions": false,
"forks_count": 51,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 51,
"watchers": 147,
"score": 0,
"subscribers_count": 3
},
{
"id": 415290894,
"name": "cve-2021-41773-and-cve-2021-42013",
"full_name": "5gstudent\/cve-2021-41773-and-cve-2021-42013",
"owner": {
"login": "5gstudent",
"id": 37172754,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37172754?v=4",
"html_url": "https:\/\/github.com\/5gstudent",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/5gstudent\/cve-2021-41773-and-cve-2021-42013",
"description": "cve-2021-41773 即 cve-2021-42013 批量检测脚本",
"fork": false,
"created_at": "2021-10-09T11:33:56Z",
"updated_at": "2024-09-15T12:36:18Z",
"pushed_at": "2021-10-09T12:14:29Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 415357102,
"name": "CVE-2021-41773",
"full_name": "EagleTube\/CVE-2021-41773",
"owner": {
"login": "EagleTube",
"id": 87413459,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87413459?v=4",
"html_url": "https:\/\/github.com\/EagleTube",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/EagleTube\/CVE-2021-41773",
"description": "Apache 2.4.49 Path Traversal Vulnerability Checker ",
"fork": false,
"created_at": "2021-10-09T16:07:57Z",
"updated_at": "2024-08-12T20:17:08Z",
"pushed_at": "2021-10-09T16:32:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 415737041,
"name": "Apachuk",
"full_name": "apapedulimu\/Apachuk",
"owner": {
"login": "apapedulimu",
"id": 16370264,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16370264?v=4",
"html_url": "https:\/\/github.com\/apapedulimu",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/apapedulimu\/Apachuk",
"description": "CVE-2021-41773 Grabber",
"fork": false,
"created_at": "2021-10-11T00:57:27Z",
"updated_at": "2024-12-11T02:03:51Z",
"pushed_at": "2021-10-11T02:51:11Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 415761005,
"name": "CVE-2021-41773",
"full_name": "scarmandef\/CVE-2021-41773",
"owner": {
"login": "scarmandef",
"id": 80011252,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80011252?v=4",
"html_url": "https:\/\/github.com\/scarmandef",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/scarmandef\/CVE-2021-41773",
"description": " Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE",
"fork": false,
"created_at": "2021-10-11T03:03:08Z",
"updated_at": "2021-10-14T04:59:46Z",
"pushed_at": "2021-10-14T04:59:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 416511119,
"name": "httpd-2.4.49",
"full_name": "ksanchezcld\/httpd-2.4.49",
"owner": {
"login": "ksanchezcld",
"id": 3130599,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3130599?v=4",
"html_url": "https:\/\/github.com\/ksanchezcld",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ksanchezcld\/httpd-2.4.49",
"description": "critical: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773) (CVE-2021-42013)",
"fork": false,
"created_at": "2021-10-12T22:02:09Z",
"updated_at": "2023-04-29T16:26:04Z",
"pushed_at": "2021-10-12T22:02:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 416830075,
"name": "SimplesApachePathTraversal",
"full_name": "MrCl0wnLab\/SimplesApachePathTraversal",
"owner": {
"login": "MrCl0wnLab",
"id": 17049332,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17049332?v=4",
"html_url": "https:\/\/github.com\/MrCl0wnLab",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MrCl0wnLab\/SimplesApachePathTraversal",
"description": "Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519",
"fork": false,
"created_at": "2021-10-13T17:03:56Z",
"updated_at": "2024-08-28T17:32:14Z",
"pushed_at": "2024-08-14T14:41:14Z",
"stargazers_count": 60,
"watchers_count": 60,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2020-17519",
"cve-2021-41773",
"cve-2021-42013"
],
"visibility": "public",
"forks": 15,
"watchers": 60,
"score": 0,
"subscribers_count": 2
},
{
"id": 417461813,
"name": "apache-httpd-path-traversal-checker",
"full_name": "theLSA\/apache-httpd-path-traversal-checker",
"owner": {
"login": "theLSA",
"id": 28248956,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28248956?v=4",
"html_url": "https:\/\/github.com\/theLSA",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/theLSA\/apache-httpd-path-traversal-checker",
"description": "apache httpd path traversal checker(CVE-2021-41773 \/ CVE-2021-42013)",
"fork": false,
"created_at": "2021-10-15T10:38:44Z",
"updated_at": "2023-03-19T15:06:52Z",
"pushed_at": "2021-10-16T10:28:23Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 8,
"score": 0,
"subscribers_count": 4
},
{
"id": 417643516,
"name": "CVE-2021-41773",
"full_name": "LudovicPatho\/CVE-2021-41773",
"owner": {
"login": "LudovicPatho",
"id": 26960886,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26960886?v=4",
"html_url": "https:\/\/github.com\/LudovicPatho",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/LudovicPatho\/CVE-2021-41773",
"description": "The first vulnerability with the CVE identifier CVE-2021-41773 is a path traversal flaw that exists in Apache HTTP Server 2.4.49.",
"fork": false,
"created_at": "2021-10-15T21:38:48Z",
"updated_at": "2023-12-13T10:08:43Z",
"pushed_at": "2022-10-26T18:01:44Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 3
},
{
"id": 417869261,
"name": "CVE-2021-41773_Honeypot",
"full_name": "lopqto\/CVE-2021-41773_Honeypot",
"owner": {
"login": "lopqto",
"id": 30213943,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30213943?v=4",
"html_url": "https:\/\/github.com\/lopqto",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/lopqto\/CVE-2021-41773_Honeypot",
"description": "Simple honeypot for CVE-2021-41773 vulnerability",
"fork": false,
"created_at": "2021-10-16T15:30:34Z",
"updated_at": "2024-03-02T10:06:40Z",
"pushed_at": "2021-10-17T08:13:08Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 418481558,
"name": "CVE-2021-41773_42013",
"full_name": "zerodaywolf\/CVE-2021-41773_42013",
"owner": {
"login": "zerodaywolf",
"id": 37404408,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37404408?v=4",
"html_url": "https:\/\/github.com\/zerodaywolf",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zerodaywolf\/CVE-2021-41773_42013",
"description": "Lab setup for CVE-2021-41773 (Apache httpd 2.4.49) and CVE-2021-42013 (Apache httpd 2.4.50).",
"fork": false,
"created_at": "2021-10-18T12:01:58Z",
"updated_at": "2024-09-26T10:44:41Z",
"pushed_at": "2021-10-18T12:47:56Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache",
"cve",
"cve-2021-41773",
"cve-2021-42013",
"httpd",
"lfi",
"penetration-testing",
"rce",
"security",
"vulnerable",
"web"
],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 419369252,
"name": "CVE-2021-41773",
"full_name": "LayarKacaSiber\/CVE-2021-41773",
"owner": {
"login": "LayarKacaSiber",
"id": 92864439,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92864439?v=4",
"html_url": "https:\/\/github.com\/LayarKacaSiber",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/LayarKacaSiber\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-20T14:41:15Z",
"updated_at": "2021-10-23T13:15:51Z",
"pushed_at": "2021-10-23T13:15:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 420144635,
"name": "CVE-2021-41773",
"full_name": "BabyTeam1024\/CVE-2021-41773",
"owner": {
"login": "BabyTeam1024",
"id": 74447452,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74447452?v=4",
"html_url": "https:\/\/github.com\/BabyTeam1024",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/BabyTeam1024\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-22T15:12:12Z",
"updated_at": "2024-08-12T20:17:27Z",
"pushed_at": "2021-10-22T15:23:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 420407065,
"name": "cve-2021-41773",
"full_name": "walnutsecurity\/cve-2021-41773",
"owner": {
"login": "walnutsecurity",
"id": 92915142,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92915142?v=4",
"html_url": "https:\/\/github.com\/walnutsecurity",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/walnutsecurity\/cve-2021-41773",
"description": "cve-2021-41773.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.49",
"fork": false,
"created_at": "2021-10-23T12:31:53Z",
"updated_at": "2024-08-25T14:50:10Z",
"pushed_at": "2023-01-11T14:04:08Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 420528447,
"name": "CVE-2021-41773",
"full_name": "TheLastVvV\/CVE-2021-41773",
"owner": {
"login": "TheLastVvV",
"id": 71128830,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71128830?v=4",
"html_url": "https:\/\/github.com\/TheLastVvV",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/TheLastVvV\/CVE-2021-41773",
"description": "Poc CVE-2021-41773 - Apache 2.4.49 with CGI enabled",
"fork": false,
"created_at": "2021-10-23T21:37:25Z",
"updated_at": "2021-10-23T23:15:50Z",
"pushed_at": "2021-10-23T21:50:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 421138366,
"name": "CVE-2021-41773",
"full_name": "MazX0p\/CVE-2021-41773",
"owner": {
"login": "MazX0p",
"id": 54814433,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54814433?v=4",
"html_url": "https:\/\/github.com\/MazX0p",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MazX0p\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-25T18:21:43Z",
"updated_at": "2022-07-01T21:33:34Z",
"pushed_at": "2021-10-25T18:39:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 421191229,
"name": "Scanner-CVE-2021-41773",
"full_name": "vida003\/Scanner-CVE-2021-41773",
"owner": {
"login": "vida003",
"id": 77762068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77762068?v=4",
"html_url": "https:\/\/github.com\/vida003",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/vida003\/Scanner-CVE-2021-41773",
"description": "A automatic scanner to apache 2.4.49",
"fork": false,
"created_at": "2021-10-25T21:34:08Z",
"updated_at": "2021-10-25T22:17:23Z",
"pushed_at": "2021-10-25T22:17:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 421530564,
"name": "CVE-2021-41773",
"full_name": "mr-exo\/CVE-2021-41773",
"owner": {
"login": "mr-exo",
"id": 76655540,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76655540?v=4",
"html_url": "https:\/\/github.com\/mr-exo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mr-exo\/CVE-2021-41773",
"description": "Remote Code Execution exploit for Apache servers. Affected versions: Apache 2.4.49, Apache 2.4.50",
"fork": false,
"created_at": "2021-10-26T17:56:25Z",
"updated_at": "2024-07-25T10:40:47Z",
"pushed_at": "2021-10-26T18:04:43Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},
{
"id": 422466104,
"name": "CVE-2021-41773",
"full_name": "wolf1892\/CVE-2021-41773",
"owner": {
"login": "wolf1892",
"id": 24608781,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24608781?v=4",
"html_url": "https:\/\/github.com\/wolf1892",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/wolf1892\/CVE-2021-41773",
"description": "Setup vulnerable enviornment",
"fork": false,
"created_at": "2021-10-29T06:31:57Z",
"updated_at": "2021-10-29T06:33:41Z",
"pushed_at": "2021-10-29T06:33:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 424762276,
"name": "CVE-2021-41773-Playground",
"full_name": "Hydragyrum\/CVE-2021-41773-Playground",
"owner": {
"login": "Hydragyrum",
"id": 4928181,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4928181?v=4",
"html_url": "https:\/\/github.com\/Hydragyrum",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Hydragyrum\/CVE-2021-41773-Playground",
"description": "Some docker images to play with CVE-2021-41773 and CVE-2021-42013",
"fork": false,
"created_at": "2021-11-04T22:52:44Z",
"updated_at": "2024-11-16T17:56:37Z",
"pushed_at": "2021-11-04T22:56:14Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"score": 0,
"subscribers_count": 2
},
{
"id": 426066790,
"name": "Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit",
"full_name": "IcmpOff\/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit",
"owner": {
"login": "IcmpOff",
"id": 71145797,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71145797?v=4",
"html_url": "https:\/\/github.com\/IcmpOff",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/IcmpOff\/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit",
"description": "This Metasploit module exploits an unauthenticated remote code execution vulnerability which exists in Apache version 2.4.49 (CVE-2021-41773). If files outside of the document root are not protected by require all denied and CGI has been explicitly enabled, it can be used to execute arbitrary commands. This vulnerability has been reintroduced in the Apache 2.4.50 fix (CVE-2021-42013).",
"fork": false,
"created_at": "2021-11-09T02:38:13Z",
"updated_at": "2024-10-17T08:07:25Z",
"pushed_at": "2021-11-09T02:39:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache",
"exploit",
"metasploit",
"metasploit-framework",
"metasploit-modules",
"rce"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 427005450,
"name": "CVE-2021-41773",
"full_name": "pirenga\/CVE-2021-41773",
"owner": {
"login": "pirenga",
"id": 10979104,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10979104?v=4",
"html_url": "https:\/\/github.com\/pirenga",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/pirenga\/CVE-2021-41773",
"description": "Ce programme permet de détecter une faille RCE sur les serveurs Apache 2.4.49 et Apache 2.4.50",
"fork": false,
"created_at": "2021-11-11T13:10:05Z",
"updated_at": "2024-08-12T20:18:00Z",
"pushed_at": "2021-11-11T00:48:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 427815832,
"name": "POC-CVE-2021-41773",
"full_name": "kubota\/POC-CVE-2021-41773",
"owner": {
"login": "kubota",
"id": 119277,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119277?v=4",
"html_url": "https:\/\/github.com\/kubota",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/kubota\/POC-CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-11-14T02:02:45Z",
"updated_at": "2021-11-16T20:42:27Z",
"pushed_at": "2021-11-16T20:42:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 427956449,
"name": "CVE-2021-41773",
"full_name": "xMohamed0\/CVE-2021-41773",
"owner": {
"login": "xMohamed0",
"id": 94008154,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94008154?v=4",
"html_url": "https:\/\/github.com\/xMohamed0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xMohamed0\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-11-14T14:50:45Z",
"updated_at": "2021-11-14T14:55:20Z",
"pushed_at": "2021-11-14T14:55:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 438514241,
"name": "MASS_CVE-2021-41773",
"full_name": "i6c\/MASS_CVE-2021-41773",
"owner": {
"login": "i6c",
"id": 87837042,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87837042?v=4",
"html_url": "https:\/\/github.com\/i6c",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/i6c\/MASS_CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-12-15T06:04:41Z",
"updated_at": "2024-11-10T13:46:50Z",
"pushed_at": "2021-12-15T06:06:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 452242021,
"name": "CVE-2021-41773-exercise",
"full_name": "m96dg\/CVE-2021-41773-exercise",
"owner": {
"login": "m96dg",
"id": 65173648,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65173648?v=4",
"html_url": "https:\/\/github.com\/m96dg",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/m96dg\/CVE-2021-41773-exercise",
"description": "A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration \"require all denied\", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and not earlier versions. Credits to: https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-41773 ",
"fork": false,
"created_at": "2022-01-26T11:02:46Z",
"updated_at": "2022-01-26T11:22:13Z",
"pushed_at": "2022-01-30T19:02:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 464271089,
"name": "CVE-2021-41773",
"full_name": "skentagon\/CVE-2021-41773",
"owner": {
"login": "skentagon",
"id": 49702576,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49702576?v=4",
"html_url": "https:\/\/github.com\/skentagon",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/skentagon\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-02-27T22:39:58Z",
"updated_at": "2024-10-28T08:59:20Z",
"pushed_at": "2024-10-28T08:59:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 467687901,
"name": "CVE-2021-41773",
"full_name": "mauricelambert\/CVE-2021-41773",
"owner": {
"login": "mauricelambert",
"id": 50479118,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4",
"html_url": "https:\/\/github.com\/mauricelambert",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mauricelambert\/CVE-2021-41773",
"description": "These Metasploit, Nmap, Python and Ruby scripts detects and exploits CVE-2021-41773 with RCE and local file disclosure.",
"fork": false,
"created_at": "2022-03-08T21:55:53Z",
"updated_at": "2022-03-23T16:56:34Z",
"pushed_at": "2022-03-14T07:34:49Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2021-41773",
"detection",
"exploit",
"metasploit",
"nmap",
"python3",
"rce",
"ruby",
"scanner",
"vulnerability"
],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 469203660,
"name": "CVE-2021-41773",
"full_name": "thehackersbrain\/CVE-2021-41773",
"owner": {
"login": "thehackersbrain",
"id": 36809025,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36809025?v=4",
"html_url": "https:\/\/github.com\/thehackersbrain",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/thehackersbrain\/CVE-2021-41773",
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
"fork": false,
"created_at": "2022-03-12T21:24:55Z",
"updated_at": "2024-12-31T03:18:22Z",
"pushed_at": "2022-03-12T21:30:58Z",
"stargazers_count": 104,
"watchers_count": 104,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache2",
"cve-2021-41773",
"exploit",
"gauravraj",
"lfi",
"python",
"rce",
"thehackersbrain"
],
"visibility": "public",
"forks": 35,
"watchers": 104,
"score": 0,
"subscribers_count": 2
},
{
"id": 469576020,
"name": "CVE-2021-41773",
"full_name": "honypot\/CVE-2021-41773",
"owner": {
"login": "honypot",
"id": 101309325,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101309325?v=4",
"html_url": "https:\/\/github.com\/honypot",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/honypot\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-03-14T04:08:56Z",
"updated_at": "2022-03-14T04:09:11Z",
"pushed_at": "2022-03-14T04:09:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 469821841,
"name": "CVE-2021-41773",
"full_name": "Fa1c0n35\/CVE-2021-41773",
"owner": {
"login": "Fa1c0n35",
"id": 33335488,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4",
"html_url": "https:\/\/github.com\/Fa1c0n35",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Fa1c0n35\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-03-14T16:43:49Z",
"updated_at": "2022-03-14T16:44:00Z",
"pushed_at": "2022-03-14T16:43:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 474963195,
"name": "CVE-2021-41773",
"full_name": "puckiestyle\/CVE-2021-41773",
"owner": {
"login": "puckiestyle",
"id": 57447087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
"html_url": "https:\/\/github.com\/puckiestyle",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-03-28T11:02:46Z",
"updated_at": "2022-03-28T11:03:00Z",
"pushed_at": "2022-03-28T11:41:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 475931011,
"name": "CVE-2021-41773",
"full_name": "zer0qs\/CVE-2021-41773",
"owner": {
"login": "zer0qs",
"id": 83699106,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83699106?v=4",
"html_url": "https:\/\/github.com\/zer0qs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zer0qs\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-03-30T15:04:27Z",
"updated_at": "2022-03-30T17:46:13Z",
"pushed_at": "2022-04-14T21:54:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 476112666,
"name": "Reserch-CVE-2021-41773",
"full_name": "DoTuan1\/Reserch-CVE-2021-41773",
"owner": {
"login": "DoTuan1",
"id": 63194321,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63194321?v=4",
"html_url": "https:\/\/github.com\/DoTuan1",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/DoTuan1\/Reserch-CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-03-31T01:48:33Z",
"updated_at": "2022-03-31T01:54:45Z",
"pushed_at": "2022-03-31T03:03:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 477111512,
"name": "netsec-polygon",
"full_name": "bernardas\/netsec-polygon",
"owner": {
"login": "bernardas",
"id": 62701131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62701131?v=4",
"html_url": "https:\/\/github.com\/bernardas",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/bernardas\/netsec-polygon",
"description": "Environment for CVE-2021-41773 recreation.",
"fork": false,
"created_at": "2022-04-02T16:34:45Z",
"updated_at": "2022-04-03T08:19:39Z",
"pushed_at": "2022-05-17T22:16:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 477889492,
"name": "Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit",
"full_name": "CalfCrusher\/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit",
"owner": {
"login": "CalfCrusher",
"id": 5812023,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5812023?v=4",
"html_url": "https:\/\/github.com\/CalfCrusher",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/CalfCrusher\/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit",
"description": "CVE-2021-41773 | CVE-2021-42013 Exploit Tool (Apache\/2.4.49-2.4.50)",
"fork": false,
"created_at": "2022-04-04T22:07:21Z",
"updated_at": "2024-08-21T17:50:35Z",
"pushed_at": "2022-04-08T09:24:35Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-41773",
"cve-2021-42013",
"exploit"
],
"visibility": "public",
"forks": 2,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},
{
"id": 478605535,
"name": "cve-2021-41773",
"full_name": "vuongnv3389-sec\/cve-2021-41773",
"owner": {
"login": "vuongnv3389-sec",
"id": 64488431,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64488431?v=4",
"html_url": "https:\/\/github.com\/vuongnv3389-sec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/vuongnv3389-sec\/cve-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-04-06T14:53:19Z",
"updated_at": "2022-04-06T14:54:12Z",
"pushed_at": "2022-04-06T15:41:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 480821526,
"name": "CVE-2021-41773",
"full_name": "Chocapikk\/CVE-2021-41773",
"owner": {
"login": "Chocapikk",
"id": 88535377,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
"html_url": "https:\/\/github.com\/Chocapikk",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-04-12T13:25:58Z",
"updated_at": "2024-08-12T20:22:22Z",
"pushed_at": "2022-04-12T13:26:22Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},
{
"id": 486245191,
"name": "Apache_Penetration_Tool",
"full_name": "wangfly-me\/Apache_Penetration_Tool",
"owner": {
"login": "wangfly-me",
"id": 25388540,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25388540?v=4",
"html_url": "https:\/\/github.com\/wangfly-me",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/wangfly-me\/Apache_Penetration_Tool",
"description": "CVE-2021-41773&CVE-2021-42013图形化漏洞检测利用工具",
"fork": false,
"created_at": "2022-04-27T15:17:38Z",
"updated_at": "2024-09-05T01:32:23Z",
"pushed_at": "2023-05-22T16:00:49Z",
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-41773",
"cve-2021-42013",
"exp"
],
"visibility": "public",
"forks": 0,
"watchers": 14,
"score": 0,
"subscribers_count": 2
},
{
"id": 491353620,
"name": "CVE-2021-41773-Scanner",
"full_name": "anldori\/CVE-2021-41773-Scanner",
"owner": {
"login": "anldori",
"id": 101538840,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101538840?v=4",
"html_url": "https:\/\/github.com\/anldori",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/anldori\/CVE-2021-41773-Scanner",
"description": "CVE-2021-41773 Shodan scanner",
"fork": false,
"created_at": "2022-05-12T03:42:24Z",
"updated_at": "2022-05-12T03:42:49Z",
"pushed_at": "2022-05-12T03:44:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 491523422,
"name": "ApacheRCEEssay",
"full_name": "iosifache\/ApacheRCEEssay",
"owner": {
"login": "iosifache",
"id": 11766982,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11766982?v=4",
"html_url": "https:\/\/github.com\/iosifache",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/iosifache\/ApacheRCEEssay",
"description": "Essay (and PoCs) about CVE-2021-41773, a remote code execution vulnerability in Apache 2.4.49 🕸️",
"fork": false,
"created_at": "2022-05-12T13:23:08Z",
"updated_at": "2023-02-14T06:59:33Z",
"pushed_at": "2022-05-13T06:10:12Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-41773",
"cve-2021-41773-poc"
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},
{
"id": 500809753,
"name": "CVE-2021-41773",
"full_name": "Habib0x0\/CVE-2021-41773",
"owner": {
"login": "Habib0x0",
"id": 24976957,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24976957?v=4",
"html_url": "https:\/\/github.com\/Habib0x0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Habib0x0\/CVE-2021-41773",
"description": "CVE-2021-41773 | Apache HTTP Server 2.4.49 is vulnerable to Path Traversal and Remote Code execution attacks ",
"fork": false,
"created_at": "2022-06-07T11:22:08Z",
"updated_at": "2024-02-20T09:21:58Z",
"pushed_at": "2022-12-11T16:02:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 504547542,
"name": "CVE-2021-41773-Apache-RCE",
"full_name": "pwn3z\/CVE-2021-41773-Apache-RCE",
"owner": {
"login": "pwn3z",
"id": 71440287,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71440287?v=4",
"html_url": "https:\/\/github.com\/pwn3z",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/pwn3z\/CVE-2021-41773-Apache-RCE",
"description": "A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration \"require all denied\", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.",
"fork": false,
"created_at": "2022-06-17T13:36:42Z",
"updated_at": "2022-06-17T13:38:47Z",
"pushed_at": "2022-06-17T13:39:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 516684881,
"name": "Mitigation-Apache-CVE-2021-41773-",
"full_name": "EkamSinghWalia\/Mitigation-Apache-CVE-2021-41773-",
"owner": {
"login": "EkamSinghWalia",
"id": 106553324,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106553324?v=4",
"html_url": "https:\/\/github.com\/EkamSinghWalia",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/EkamSinghWalia\/Mitigation-Apache-CVE-2021-41773-",
"description": "Mitigation\/fix of CVE-2021-41773 A Path Traversal And File Disclosure Vulnerability In Apache",
"fork": false,
"created_at": "2022-07-22T09:11:47Z",
"updated_at": "2022-07-22T09:29:20Z",
"pushed_at": "2022-07-22T14:59:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 521335808,
"name": "CVE-2021-41773",
"full_name": "Plunder283\/CVE-2021-41773",
"owner": {
"login": "Plunder283",
"id": 87617893,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87617893?v=4",
"html_url": "https:\/\/github.com\/Plunder283",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Plunder283\/CVE-2021-41773",
"description": "CVE-2021-41773 Gaurav Raj's exploit modified by Plunder",
"fork": false,
"created_at": "2022-08-04T16:19:42Z",
"updated_at": "2022-08-04T16:33:22Z",
"pushed_at": "2022-08-04T16:34:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 536947281,
"name": "cve-2021-41773",
"full_name": "mightysai1997\/cve-2021-41773",
"owner": {
"login": "mightysai1997",
"id": 110396758,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
"html_url": "https:\/\/github.com\/mightysai1997",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mightysai1997\/cve-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-09-15T09:08:58Z",
"updated_at": "2022-09-15T09:09:16Z",
"pushed_at": "2022-09-15T09:09:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 536953912,
"name": "CVE-2021-41773h",
"full_name": "mightysai1997\/CVE-2021-41773h",
"owner": {
"login": "mightysai1997",
"id": 110396758,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
"html_url": "https:\/\/github.com\/mightysai1997",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773h",
"description": null,
"fork": false,
"created_at": "2022-09-15T09:27:04Z",
"updated_at": "2022-09-15T09:27:22Z",
"pushed_at": "2024-11-19T21:39:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 536957144,
"name": "cve-2021-41773-v-",
"full_name": "mightysai1997\/cve-2021-41773-v-",
"owner": {
"login": "mightysai1997",
"id": 110396758,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
"html_url": "https:\/\/github.com\/mightysai1997",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mightysai1997\/cve-2021-41773-v-",
"description": null,
"fork": false,
"created_at": "2022-09-15T09:36:17Z",
"updated_at": "2022-09-15T09:36:35Z",
"pushed_at": "2022-09-15T09:36:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 536957769,
"name": "CVE-2021-41773-i-",
"full_name": "mightysai1997\/CVE-2021-41773-i-",
"owner": {
"login": "mightysai1997",
"id": 110396758,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
"html_url": "https:\/\/github.com\/mightysai1997",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773-i-",
"description": null,
"fork": false,
"created_at": "2022-09-15T09:38:04Z",
"updated_at": "2022-09-15T09:38:16Z",
"pushed_at": "2024-09-28T04:32:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 536968315,
"name": "CVE-2021-41773-L-",
"full_name": "mightysai1997\/CVE-2021-41773-L-",
"owner": {
"login": "mightysai1997",
"id": 110396758,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
"html_url": "https:\/\/github.com\/mightysai1997",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773-L-",
"description": null,
"fork": false,
"created_at": "2022-09-15T10:08:36Z",
"updated_at": "2022-09-15T10:08:51Z",
"pushed_at": "2022-09-15T10:08:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 536985771,
"name": "CVE-2021-41773-PoC",
"full_name": "mightysai1997\/CVE-2021-41773-PoC",
"owner": {
"login": "mightysai1997",
"id": 110396758,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
"html_url": "https:\/\/github.com\/mightysai1997",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773-PoC",
"description": null,
"fork": false,
"created_at": "2022-09-15T11:01:45Z",
"updated_at": "2022-09-15T11:02:07Z",
"pushed_at": "2024-09-29T01:26:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 537018809,
"name": "CVE-2021-41773.git1",
"full_name": "mightysai1997\/CVE-2021-41773.git1",
"owner": {
"login": "mightysai1997",
"id": 110396758,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
"html_url": "https:\/\/github.com\/mightysai1997",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773.git1",
"description": null,
"fork": false,
"created_at": "2022-09-15T12:35:06Z",
"updated_at": "2022-09-15T12:35:18Z",
"pushed_at": "2022-09-15T12:35:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 537019898,
"name": "CVE-2021-41773m",
"full_name": "mightysai1997\/CVE-2021-41773m",
"owner": {
"login": "mightysai1997",
"id": 110396758,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
"html_url": "https:\/\/github.com\/mightysai1997",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773m",
"description": null,
"fork": false,
"created_at": "2022-09-15T12:37:59Z",
"updated_at": "2022-09-16T01:01:18Z",
"pushed_at": "2022-09-15T12:38:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 537060189,
"name": "CVE-2021-41773S",
"full_name": "mightysai1997\/CVE-2021-41773S",
"owner": {
"login": "mightysai1997",
"id": 110396758,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
"html_url": "https:\/\/github.com\/mightysai1997",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773S",
"description": null,
"fork": false,
"created_at": "2022-09-15T14:17:45Z",
"updated_at": "2022-09-16T01:01:16Z",
"pushed_at": "2024-10-24T18:33:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 538798099,
"name": "LayarKacaSiber-CVE-2021-41773",
"full_name": "dileepdkumar\/LayarKacaSiber-CVE-2021-41773",
"owner": {
"login": "dileepdkumar",
"id": 89115244,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89115244?v=4",
"html_url": "https:\/\/github.com\/dileepdkumar",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dileepdkumar\/LayarKacaSiber-CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-09-20T03:45:24Z",
"updated_at": "2022-09-20T03:45:37Z",
"pushed_at": "2024-09-28T12:11:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 560281575,
"name": "CVE-2021-41773",
"full_name": "aqiao-jashell\/CVE-2021-41773",
"owner": {
"login": "aqiao-jashell",
"id": 94209165,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94209165?v=4",
"html_url": "https:\/\/github.com\/aqiao-jashell",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/aqiao-jashell\/CVE-2021-41773",
"description": "apache路径穿越漏洞poc&exp",
"fork": false,
"created_at": "2022-11-01T05:58:59Z",
"updated_at": "2024-06-14T09:26:51Z",
"pushed_at": "2023-05-25T01:03:36Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},
{
"id": 560339513,
"name": "py-CVE-2021-41773",
"full_name": "aqiao-jashell\/py-CVE-2021-41773",
"owner": {
"login": "aqiao-jashell",
"id": 94209165,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94209165?v=4",
"html_url": "https:\/\/github.com\/aqiao-jashell",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/aqiao-jashell\/py-CVE-2021-41773",
"description": "python编写的apache路径穿越poc&exp",
"fork": false,
"created_at": "2022-11-01T09:17:03Z",
"updated_at": "2023-02-06T08:31:07Z",
"pushed_at": "2022-11-02T09:26:06Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
{
"id": 567720828,
"name": "CVE-2021-41773",
"full_name": "12345qwert123456\/CVE-2021-41773",
"owner": {
"login": "12345qwert123456",
"id": 63474188,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63474188?v=4",
"html_url": "https:\/\/github.com\/12345qwert123456",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/12345qwert123456\/CVE-2021-41773",
"description": "Vulnerable configuration Apache HTTP Server version 2.4.49",
"fork": false,
"created_at": "2022-11-18T12:23:04Z",
"updated_at": "2022-11-21T16:25:14Z",
"pushed_at": "2022-11-21T16:20:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache",
"cve",
"cve-2021-41773",
"docker",
"http-server",
"lfi",
"vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 569296799,
"name": "Apache-HTTP-Server-2.4.49-2.4.50-Path-Traversal-Remote-Code-Execution",
"full_name": "blackn0te\/Apache-HTTP-Server-2.4.49-2.4.50-Path-Traversal-Remote-Code-Execution",
"owner": {
"login": "blackn0te",
"id": 33929865,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33929865?v=4",
"html_url": "https:\/\/github.com\/blackn0te",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/blackn0te\/Apache-HTTP-Server-2.4.49-2.4.50-Path-Traversal-Remote-Code-Execution",
"description": "Apache HTTP-Server 2.4.49-2.4.50 Path Traversal & Remote Code Execution PoC (CVE-2021-41773 & CVE-2021-42013)",
"fork": false,
"created_at": "2022-11-22T14:09:18Z",
"updated_at": "2024-12-26T23:39:53Z",
"pushed_at": "2022-11-22T14:42:10Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 10,
"score": 0,
"subscribers_count": 2
},
{
"id": 574682128,
"name": "exploit-apache2-cve-2021-41773",
"full_name": "TheKernelPanic\/exploit-apache2-cve-2021-41773",
"owner": {
"login": "TheKernelPanic",
"id": 78765297,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78765297?v=4",
"html_url": "https:\/\/github.com\/TheKernelPanic",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/TheKernelPanic\/exploit-apache2-cve-2021-41773",
"description": "Exploit for path transversal vulnerability in apache",
"fork": false,
"created_at": "2022-12-05T21:11:28Z",
"updated_at": "2024-07-27T17:23:49Z",
"pushed_at": "2022-12-05T21:13:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 603146964,
"name": "apache2.4.49VulnerableLabSetup",
"full_name": "retrymp3\/apache2.4.49VulnerableLabSetup",
"owner": {
"login": "retrymp3",
"id": 65720815,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65720815?v=4",
"html_url": "https:\/\/github.com\/retrymp3",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/retrymp3\/apache2.4.49VulnerableLabSetup",
"description": "CVE-2021-41773 vulnerable apache version 2.4.49 lab set-up.",
"fork": false,
"created_at": "2023-02-17T18:03:23Z",
"updated_at": "2023-02-17T18:05:53Z",
"pushed_at": "2023-02-18T05:51:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 630673981,
"name": "docker-cve-2021-41773",
"full_name": "MatanelGordon\/docker-cve-2021-41773",
"owner": {
"login": "MatanelGordon",
"id": 72258277,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72258277?v=4",
"html_url": "https:\/\/github.com\/MatanelGordon",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MatanelGordon\/docker-cve-2021-41773",
"description": "A little demonstration of cve-2021-41773 on httpd docker containers",
"fork": false,
"created_at": "2023-04-20T22:37:06Z",
"updated_at": "2023-04-27T10:44:37Z",
"pushed_at": "2023-04-21T18:36:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-41773",
"docker"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 649140370,
"name": "Apache-CVEs",
"full_name": "0xGabe\/Apache-CVEs",
"owner": {
"login": "0xGabe",
"id": 68028935,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68028935?v=4",
"html_url": "https:\/\/github.com\/0xGabe",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xGabe\/Apache-CVEs",
"description": "Exploit created in python3 to exploit known vulnerabilities in Apache web server (CVE-2021-41773, CVE-2021-42013)",
"fork": false,
"created_at": "2023-06-03T22:59:20Z",
"updated_at": "2023-06-04T02:56:40Z",
"pushed_at": "2023-06-03T23:12:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 673733144,
"name": "CVE-2021-41773_CVE-2021-42013_Exploits",
"full_name": "OfriOuzan\/CVE-2021-41773_CVE-2021-42013_Exploits",
"owner": {
"login": "OfriOuzan",
"id": 104366208,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104366208?v=4",
"html_url": "https:\/\/github.com\/OfriOuzan",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/OfriOuzan\/CVE-2021-41773_CVE-2021-42013_Exploits",
"description": "Exploit CVE-2021-41773 and CVE-2021-42013",
"fork": false,
"created_at": "2023-08-02T09:50:10Z",
"updated_at": "2023-11-10T19:10:30Z",
"pushed_at": "2023-08-02T09:51:50Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 677373693,
"name": "CVE-2021-41773-MSF",
"full_name": "belajarqywok\/CVE-2021-41773-MSF",
"owner": {
"login": "belajarqywok",
"id": 59132829,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59132829?v=4",
"html_url": "https:\/\/github.com\/belajarqywok",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/belajarqywok\/CVE-2021-41773-MSF",
"description": "Simple Metasploit-Framework module for conducting website penetration tests (CVE-2021-41773).",
"fork": false,
"created_at": "2023-08-11T12:12:09Z",
"updated_at": "2023-10-02T04:03:33Z",
"pushed_at": "2023-08-11T12:14:35Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"metasploit-framework",
"metasploit-modules",
"penetration-testing",
"research",
"security-automation",
"testing"
],
"visibility": "public",
"forks": 0,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
{
"id": 721073490,
"name": "CVE-2021-41773",
"full_name": "Iris288\/CVE-2021-41773",
"owner": {
"login": "Iris288",
"id": 101178777,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101178777?v=4",
"html_url": "https:\/\/github.com\/Iris288",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Iris288\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2023-11-20T09:57:07Z",
"updated_at": "2023-11-20T13:51:44Z",
"pushed_at": "2023-11-20T10:42:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 809527050,
"name": "CVE-2021-41773",
"full_name": "Maybe4a6f7365\/CVE-2021-41773",
"owner": {
"login": "Maybe4a6f7365",
"id": 87483432,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87483432?v=4",
"html_url": "https:\/\/github.com\/Maybe4a6f7365",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Maybe4a6f7365\/CVE-2021-41773",
"description": "CVE-2021-41773.py",
"fork": false,
"created_at": "2024-06-02T23:43:35Z",
"updated_at": "2024-06-03T00:03:13Z",
"pushed_at": "2024-06-03T00:03:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": true,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 847507185,
"name": "Apache-HTTP-Server-2.4.50-RCE",
"full_name": "Zyx2440\/Apache-HTTP-Server-2.4.50-RCE",
"owner": {
"login": "Zyx2440",
"id": 178906552,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/178906552?v=4",
"html_url": "https:\/\/github.com\/Zyx2440",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Zyx2440\/Apache-HTTP-Server-2.4.50-RCE",
"description": "Apache-HTTP-Server-2.4.50-RCE This tool is designed to test Apache servers for the CVE-2021-41773 \/ CVE-2021-42013 vulnerability. It is intended for educational purposes only and should be used responsibly on systems you have explicit permission to test.",
"fork": false,
"created_at": "2024-08-26T01:54:06Z",
"updated_at": "2024-08-27T12:54:48Z",
"pushed_at": "2024-08-26T16:32:21Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache",
"apache2",
"check-version",
"cve-2021-41773",
"cve-2021-41773-poc",
"cve-2021-42013",
"rce"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 847643436,
"name": "CVE-2021-41773",
"full_name": "0xc4t\/CVE-2021-41773",
"owner": {
"login": "0xc4t",
"id": 105418279,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105418279?v=4",
"html_url": "https:\/\/github.com\/0xc4t",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xc4t\/CVE-2021-41773",
"description": "POC & Lab For CVE-2021-41773",
"fork": false,
"created_at": "2024-08-26T09:07:33Z",
"updated_at": "2024-08-27T11:37:07Z",
"pushed_at": "2024-08-27T11:37:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 848546482,
"name": "Additive-Vulnerability-Analysis-CVE-2021-41773",
"full_name": "jkska23\/Additive-Vulnerability-Analysis-CVE-2021-41773",
"owner": {
"login": "jkska23",
"id": 51857894,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51857894?v=4",
"html_url": "https:\/\/github.com\/jkska23",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jkska23\/Additive-Vulnerability-Analysis-CVE-2021-41773",
"description": "Apache: a Mainstream Web Service Turned a Vector of Attack for Remote Code Execution",
"fork": false,
"created_at": "2024-08-28T00:49:09Z",
"updated_at": "2024-08-28T00:54:26Z",
"pushed_at": "2024-08-28T00:54:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 904005872,
"name": "CVE-2021-41773",
"full_name": "redspy-sec\/CVE-2021-41773",
"owner": {
"login": "redspy-sec",
"id": 142095788,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142095788?v=4",
"html_url": "https:\/\/github.com\/redspy-sec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/redspy-sec\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2024-12-16T04:23:41Z",
"updated_at": "2024-12-16T04:25:13Z",
"pushed_at": "2024-12-16T04:25:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 911772666,
"name": "CVE-2021-41773",
"full_name": "FakesiteSecurity\/CVE-2021-41773",
"owner": {
"login": "FakesiteSecurity",
"id": 193509744,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/193509744?v=4",
"html_url": "https:\/\/github.com\/FakesiteSecurity",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/FakesiteSecurity\/CVE-2021-41773",
"description": "MASS CVE-2021-41773",
"fork": false,
"created_at": "2025-01-03T20:13:52Z",
"updated_at": "2025-01-03T20:14:15Z",
"pushed_at": "2025-01-03T20:14:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 913181555,
"name": "cve-2021-41773",
"full_name": "Taldrid1\/cve-2021-41773",
"owner": {
"login": "Taldrid1",
"id": 46970381,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46970381?v=4",
"html_url": "https:\/\/github.com\/Taldrid1",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Taldrid1\/cve-2021-41773",
"description": null,
"fork": false,
"created_at": "2025-01-07T07:32:25Z",
"updated_at": "2025-01-07T07:37:28Z",
"pushed_at": "2025-01-07T07:37:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]