PoC-in-GitHub/2021/CVE-2021-41773.json
2022-08-11 09:18:35 +09:00

762 lines
No EOL
27 KiB
JSON

[
{
"id": 413890827,
"name": "cve-2021-41773",
"full_name": "Vulnmachines\/cve-2021-41773",
"owner": {
"login": "Vulnmachines",
"id": 79006904,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
"html_url": "https:\/\/github.com\/Vulnmachines"
},
"html_url": "https:\/\/github.com\/Vulnmachines\/cve-2021-41773",
"description": "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.",
"fork": false,
"created_at": "2021-10-05T16:13:38Z",
"updated_at": "2022-07-30T20:35:48Z",
"pushed_at": "2022-03-10T14:02:09Z",
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 40,
"score": 0
},
{
"id": 414043746,
"name": "CVE-2021-41773_CVE-2021-42013",
"full_name": "Ls4ss\/CVE-2021-41773_CVE-2021-42013",
"owner": {
"login": "Ls4ss",
"id": 25537761,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25537761?v=4",
"html_url": "https:\/\/github.com\/Ls4ss"
},
"html_url": "https:\/\/github.com\/Ls4ss\/CVE-2021-41773_CVE-2021-42013",
"description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE",
"fork": false,
"created_at": "2021-10-06T02:28:41Z",
"updated_at": "2022-08-03T18:35:01Z",
"pushed_at": "2021-12-22T23:54:18Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache",
"cve",
"exploit",
"payload",
"pentest",
"rce"
],
"visibility": "public",
"forks": 8,
"watchers": 20,
"score": 0
},
{
"id": 414248192,
"name": "CVE-2021-41773",
"full_name": "ranggaggngntt\/CVE-2021-41773",
"owner": {
"login": "ranggaggngntt",
"id": 57105391,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57105391?v=4",
"html_url": "https:\/\/github.com\/ranggaggngntt"
},
"html_url": "https:\/\/github.com\/ranggaggngntt\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-06T14:36:05Z",
"updated_at": "2021-10-10T18:53:04Z",
"pushed_at": "2022-06-11T13:34:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 420407065,
"name": "cve-2021-41773",
"full_name": "walnutsecurity\/cve-2021-41773",
"owner": {
"login": "walnutsecurity",
"id": 92915142,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92915142?v=4",
"html_url": "https:\/\/github.com\/walnutsecurity"
},
"html_url": "https:\/\/github.com\/walnutsecurity\/cve-2021-41773",
"description": "cve-2021-41773.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.49",
"fork": false,
"created_at": "2021-10-23T12:31:53Z",
"updated_at": "2021-11-25T09:32:45Z",
"pushed_at": "2022-05-26T08:34:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 438514241,
"name": "MASS_CVE-2021-41773",
"full_name": "i6c\/MASS_CVE-2021-41773",
"owner": {
"login": "i6c",
"id": 87837042,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87837042?v=4",
"html_url": "https:\/\/github.com\/i6c"
},
"html_url": "https:\/\/github.com\/i6c\/MASS_CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-12-15T06:04:41Z",
"updated_at": "2021-12-24T17:27:13Z",
"pushed_at": "2021-12-15T06:06:53Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 447314257,
"name": "CVE-2021-41773-exploiter",
"full_name": "norrig\/CVE-2021-41773-exploiter",
"owner": {
"login": "norrig",
"id": 5526261,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5526261?v=4",
"html_url": "https:\/\/github.com\/norrig"
},
"html_url": "https:\/\/github.com\/norrig\/CVE-2021-41773-exploiter",
"description": "School project - Please use other repos for actual testing",
"fork": false,
"created_at": "2022-01-12T17:42:36Z",
"updated_at": "2022-01-12T18:26:57Z",
"pushed_at": "2022-01-13T16:18:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 452242021,
"name": "CVE-2021-41773-exercise",
"full_name": "m96dg\/CVE-2021-41773-exercise",
"owner": {
"login": "m96dg",
"id": 65173648,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65173648?v=4",
"html_url": "https:\/\/github.com\/m96dg"
},
"html_url": "https:\/\/github.com\/m96dg\/CVE-2021-41773-exercise",
"description": "A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration \"require all denied\", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and not earlier versions. Credits to: https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-41773 ",
"fork": false,
"created_at": "2022-01-26T11:02:46Z",
"updated_at": "2022-01-26T11:22:13Z",
"pushed_at": "2022-01-30T19:02:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 464271089,
"name": "CVE-2021-41773",
"full_name": "skentagon\/CVE-2021-41773",
"owner": {
"login": "skentagon",
"id": 49702576,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49702576?v=4",
"html_url": "https:\/\/github.com\/skentagon"
},
"html_url": "https:\/\/github.com\/skentagon\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-02-27T22:39:58Z",
"updated_at": "2022-03-04T00:11:58Z",
"pushed_at": "2022-03-04T00:05:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 467687901,
"name": "CVE-2021-41773",
"full_name": "mauricelambert\/CVE-2021-41773",
"owner": {
"login": "mauricelambert",
"id": 50479118,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4",
"html_url": "https:\/\/github.com\/mauricelambert"
},
"html_url": "https:\/\/github.com\/mauricelambert\/CVE-2021-41773",
"description": "These Metasploit, Nmap, Python and Ruby scripts detects and exploits CVE-2021-41773 with RCE and local file disclosure.",
"fork": false,
"created_at": "2022-03-08T21:55:53Z",
"updated_at": "2022-03-23T16:56:34Z",
"pushed_at": "2022-03-14T07:34:49Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2021-41773",
"detection",
"exploit",
"metasploit",
"nmap",
"python3",
"rce",
"ruby",
"scanner",
"vulnerability"
],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 468909402,
"name": "CVE-2021-41773",
"full_name": "the29a\/CVE-2021-41773",
"owner": {
"login": "the29a",
"id": 4436697,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4436697?v=4",
"html_url": "https:\/\/github.com\/the29a"
},
"html_url": "https:\/\/github.com\/the29a\/CVE-2021-41773",
"description": "Small PoC of CVE-2021-41773",
"fork": false,
"created_at": "2022-03-11T21:50:35Z",
"updated_at": "2022-03-11T21:52:35Z",
"pushed_at": "2022-03-11T22:10:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 469203660,
"name": "CVE-2021-41773",
"full_name": "thehackersbrain\/CVE-2021-41773",
"owner": {
"login": "thehackersbrain",
"id": 36809025,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36809025?v=4",
"html_url": "https:\/\/github.com\/thehackersbrain"
},
"html_url": "https:\/\/github.com\/thehackersbrain\/CVE-2021-41773",
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
"fork": false,
"created_at": "2022-03-12T21:24:55Z",
"updated_at": "2022-07-19T06:07:31Z",
"pushed_at": "2022-03-12T21:30:58Z",
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache2",
"cve-2021-41773",
"exploit",
"gauravraj",
"lfi",
"python",
"rce",
"thehackersbrain"
],
"visibility": "public",
"forks": 19,
"watchers": 52,
"score": 0
},
{
"id": 469576020,
"name": "CVE-2021-41773",
"full_name": "honypot\/CVE-2021-41773",
"owner": {
"login": "honypot",
"id": 101309325,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101309325?v=4",
"html_url": "https:\/\/github.com\/honypot"
},
"html_url": "https:\/\/github.com\/honypot\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-03-14T04:08:56Z",
"updated_at": "2022-03-14T04:09:11Z",
"pushed_at": "2022-03-14T04:09:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 469821841,
"name": "CVE-2021-41773",
"full_name": "Fa1c0n35\/CVE-2021-41773",
"owner": {
"login": "Fa1c0n35",
"id": 33335488,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4",
"html_url": "https:\/\/github.com\/Fa1c0n35"
},
"html_url": "https:\/\/github.com\/Fa1c0n35\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-03-14T16:43:49Z",
"updated_at": "2022-03-14T16:44:00Z",
"pushed_at": "2022-03-14T16:43:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 474747864,
"name": "CVE-2021-41773-",
"full_name": "N3w-elf\/CVE-2021-41773-",
"owner": {
"login": "N3w-elf",
"id": 80478753,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80478753?v=4",
"html_url": "https:\/\/github.com\/N3w-elf"
},
"html_url": "https:\/\/github.com\/N3w-elf\/CVE-2021-41773-",
"description": null,
"fork": false,
"created_at": "2022-03-27T20:10:30Z",
"updated_at": "2022-03-27T20:10:30Z",
"pushed_at": "2022-03-27T20:10:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 474963195,
"name": "CVE-2021-41773",
"full_name": "puckiestyle\/CVE-2021-41773",
"owner": {
"login": "puckiestyle",
"id": 57447087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
"html_url": "https:\/\/github.com\/puckiestyle"
},
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-03-28T11:02:46Z",
"updated_at": "2022-03-28T11:03:00Z",
"pushed_at": "2022-03-28T11:41:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 475931011,
"name": "CVE-2021-41773",
"full_name": "WynSon\/CVE-2021-41773",
"owner": {
"login": "WynSon",
"id": 83699106,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83699106?v=4",
"html_url": "https:\/\/github.com\/WynSon"
},
"html_url": "https:\/\/github.com\/WynSon\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-03-30T15:04:27Z",
"updated_at": "2022-03-30T17:46:13Z",
"pushed_at": "2022-04-14T21:54:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 476112666,
"name": "Reserch-CVE-2021-41773",
"full_name": "DoTuan1\/Reserch-CVE-2021-41773",
"owner": {
"login": "DoTuan1",
"id": 63194321,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63194321?v=4",
"html_url": "https:\/\/github.com\/DoTuan1"
},
"html_url": "https:\/\/github.com\/DoTuan1\/Reserch-CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-03-31T01:48:33Z",
"updated_at": "2022-03-31T01:54:45Z",
"pushed_at": "2022-03-31T03:03:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 477111512,
"name": "netsec-polygon",
"full_name": "bernardas\/netsec-polygon",
"owner": {
"login": "bernardas",
"id": 62701131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62701131?v=4",
"html_url": "https:\/\/github.com\/bernardas"
},
"html_url": "https:\/\/github.com\/bernardas\/netsec-polygon",
"description": "Environment for CVE-2021-41773 recreation.",
"fork": false,
"created_at": "2022-04-02T16:34:45Z",
"updated_at": "2022-04-03T08:19:39Z",
"pushed_at": "2022-05-17T22:16:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 477889492,
"name": "Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit",
"full_name": "CalfCrusher\/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit",
"owner": {
"login": "CalfCrusher",
"id": 5812023,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5812023?v=4",
"html_url": "https:\/\/github.com\/CalfCrusher"
},
"html_url": "https:\/\/github.com\/CalfCrusher\/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit",
"description": "CVE-2021-41773 | CVE-2021-42013 Exploit Tool (Apache\/2.4.49-2.4.50)",
"fork": false,
"created_at": "2022-04-04T22:07:21Z",
"updated_at": "2022-04-05T05:17:33Z",
"pushed_at": "2022-04-08T09:24:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-41773",
"cve-2021-42013",
"exploit"
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 478605535,
"name": "cve-2021-41773",
"full_name": "vuongnv3389-sec\/cve-2021-41773",
"owner": {
"login": "vuongnv3389-sec",
"id": 64488431,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64488431?v=4",
"html_url": "https:\/\/github.com\/vuongnv3389-sec"
},
"html_url": "https:\/\/github.com\/vuongnv3389-sec\/cve-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-04-06T14:53:19Z",
"updated_at": "2022-04-06T14:54:12Z",
"pushed_at": "2022-04-06T15:41:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 480821526,
"name": "CVE-2021-41773",
"full_name": "Chocapikk\/CVE-2021-41773",
"owner": {
"login": "Chocapikk",
"id": 88535377,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
"html_url": "https:\/\/github.com\/Chocapikk"
},
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-04-12T13:25:58Z",
"updated_at": "2022-04-19T17:03:53Z",
"pushed_at": "2022-04-12T13:26:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 486245191,
"name": "Apache_Penetration_Tool",
"full_name": "wangfly-me\/Apache_Penetration_Tool",
"owner": {
"login": "wangfly-me",
"id": 25388540,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25388540?v=4",
"html_url": "https:\/\/github.com\/wangfly-me"
},
"html_url": "https:\/\/github.com\/wangfly-me\/Apache_Penetration_Tool",
"description": "CVE-2021-41773&CVE-2021-42013图形化漏洞检测利用工具",
"fork": false,
"created_at": "2022-04-27T15:17:38Z",
"updated_at": "2022-05-23T03:30:13Z",
"pushed_at": "2022-07-17T14:04:16Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 500809753,
"name": "CVE-2021-41773",
"full_name": "hab1b0x\/CVE-2021-41773",
"owner": {
"login": "hab1b0x",
"id": 24976957,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24976957?v=4",
"html_url": "https:\/\/github.com\/hab1b0x"
},
"html_url": "https:\/\/github.com\/hab1b0x\/CVE-2021-41773",
"description": "CVE-2021-41773 | Apache HTTP Server 2.4.49 is vulnerable to Path Traversal and Remote Code execution attacks ",
"fork": false,
"created_at": "2022-06-07T11:22:08Z",
"updated_at": "2022-07-06T09:28:44Z",
"pushed_at": "2022-06-07T11:23:40Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 504547542,
"name": "CVE-2021-41773-Apache-RCE",
"full_name": "pwn3z\/CVE-2021-41773-Apache-RCE",
"owner": {
"login": "pwn3z",
"id": 71440287,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71440287?v=4",
"html_url": "https:\/\/github.com\/pwn3z"
},
"html_url": "https:\/\/github.com\/pwn3z\/CVE-2021-41773-Apache-RCE",
"description": "A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration \"require all denied\", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.",
"fork": false,
"created_at": "2022-06-17T13:36:42Z",
"updated_at": "2022-06-17T13:38:47Z",
"pushed_at": "2022-06-17T13:39:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 516684881,
"name": "Mitigation-Apache-CVE-2021-41773-",
"full_name": "EkamSinghWalia\/Mitigation-Apache-CVE-2021-41773-",
"owner": {
"login": "EkamSinghWalia",
"id": 106553324,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106553324?v=4",
"html_url": "https:\/\/github.com\/EkamSinghWalia"
},
"html_url": "https:\/\/github.com\/EkamSinghWalia\/Mitigation-Apache-CVE-2021-41773-",
"description": "Mitigation\/fix of CVE-2021-41773 A Path Traversal And File Disclosure Vulnerability In Apache",
"fork": false,
"created_at": "2022-07-22T09:11:47Z",
"updated_at": "2022-07-22T09:29:20Z",
"pushed_at": "2022-07-22T14:59:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 521335808,
"name": "CVE-2021-41773",
"full_name": "Plunder283\/CVE-2021-41773",
"owner": {
"login": "Plunder283",
"id": 87617893,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87617893?v=4",
"html_url": "https:\/\/github.com\/Plunder283"
},
"html_url": "https:\/\/github.com\/Plunder283\/CVE-2021-41773",
"description": "CVE-2021-41773 Gaurav Raj's exploit modified by Plunder",
"fork": false,
"created_at": "2022-08-04T16:19:42Z",
"updated_at": "2022-08-04T16:33:22Z",
"pushed_at": "2022-08-04T16:34:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]