mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-18 05:42:21 +01:00
637 lines
No EOL
22 KiB
JSON
637 lines
No EOL
22 KiB
JSON
[
|
||
{
|
||
"id": 413890827,
|
||
"name": "cve-2021-41773",
|
||
"full_name": "Vulnmachines\/cve-2021-41773",
|
||
"owner": {
|
||
"login": "Vulnmachines",
|
||
"id": 79006904,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
|
||
"html_url": "https:\/\/github.com\/Vulnmachines"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Vulnmachines\/cve-2021-41773",
|
||
"description": "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.",
|
||
"fork": false,
|
||
"created_at": "2021-10-05T16:13:38Z",
|
||
"updated_at": "2022-03-23T16:50:30Z",
|
||
"pushed_at": "2022-03-10T14:02:09Z",
|
||
"stargazers_count": 38,
|
||
"watchers_count": 38,
|
||
"forks_count": 11,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 11,
|
||
"watchers": 38,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 413916846,
|
||
"name": "PoC-CVE-2021-41773",
|
||
"full_name": "iilegacyyii\/PoC-CVE-2021-41773",
|
||
"owner": {
|
||
"login": "iilegacyyii",
|
||
"id": 68760809,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68760809?v=4",
|
||
"html_url": "https:\/\/github.com\/iilegacyyii"
|
||
},
|
||
"html_url": "https:\/\/github.com\/iilegacyyii\/PoC-CVE-2021-41773",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-10-05T17:30:43Z",
|
||
"updated_at": "2022-03-16T11:34:06Z",
|
||
"pushed_at": "2021-11-24T12:57:46Z",
|
||
"stargazers_count": 40,
|
||
"watchers_count": 40,
|
||
"forks_count": 37,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"apache",
|
||
"cve",
|
||
"lfi",
|
||
"poc",
|
||
"rce"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 37,
|
||
"watchers": 40,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414043746,
|
||
"name": "CVE-2021-41773_CVE-2021-42013",
|
||
"full_name": "Ls4ss\/CVE-2021-41773_CVE-2021-42013",
|
||
"owner": {
|
||
"login": "Ls4ss",
|
||
"id": 25537761,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25537761?v=4",
|
||
"html_url": "https:\/\/github.com\/Ls4ss"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Ls4ss\/CVE-2021-41773_CVE-2021-42013",
|
||
"description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE",
|
||
"fork": false,
|
||
"created_at": "2021-10-06T02:28:41Z",
|
||
"updated_at": "2022-03-14T15:59:57Z",
|
||
"pushed_at": "2021-12-22T23:54:18Z",
|
||
"stargazers_count": 19,
|
||
"watchers_count": 19,
|
||
"forks_count": 8,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"apache",
|
||
"cve",
|
||
"exploit",
|
||
"payload",
|
||
"pentest",
|
||
"rce"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 8,
|
||
"watchers": 19,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414804962,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "shellreaper\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "shellreaper",
|
||
"id": 76930483,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76930483?v=4",
|
||
"html_url": "https:\/\/github.com\/shellreaper"
|
||
},
|
||
"html_url": "https:\/\/github.com\/shellreaper\/CVE-2021-41773",
|
||
"description": "This is a simple POC for Apache\/2.4.49 Path Traversal Vulnerability",
|
||
"fork": false,
|
||
"created_at": "2021-10-08T01:13:33Z",
|
||
"updated_at": "2021-11-12T00:05:10Z",
|
||
"pushed_at": "2021-11-12T00:03:34Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 4,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 420407065,
|
||
"name": "cve-2021-41773",
|
||
"full_name": "walnutsecurity\/cve-2021-41773",
|
||
"owner": {
|
||
"login": "walnutsecurity",
|
||
"id": 92915142,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92915142?v=4",
|
||
"html_url": "https:\/\/github.com\/walnutsecurity"
|
||
},
|
||
"html_url": "https:\/\/github.com\/walnutsecurity\/cve-2021-41773",
|
||
"description": "cve-2021-41773.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.49",
|
||
"fork": false,
|
||
"created_at": "2021-10-23T12:31:53Z",
|
||
"updated_at": "2021-11-25T09:32:45Z",
|
||
"pushed_at": "2021-11-25T09:32:43Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 421553366,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "Balgogan\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "Balgogan",
|
||
"id": 88535377,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||
"html_url": "https:\/\/github.com\/Balgogan"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Balgogan\/CVE-2021-41773",
|
||
"description": "Ce programme permet de détecter une faille RCE sur les serveurs Apache 2.4.49 et Apache 2.4.50",
|
||
"fork": false,
|
||
"created_at": "2021-10-26T19:11:28Z",
|
||
"updated_at": "2022-03-14T21:33:30Z",
|
||
"pushed_at": "2021-11-11T00:48:37Z",
|
||
"stargazers_count": 12,
|
||
"watchers_count": 12,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 12,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 424762276,
|
||
"name": "CVE-2021-41773-Playground",
|
||
"full_name": "Hydragyrum\/CVE-2021-41773-Playground",
|
||
"owner": {
|
||
"login": "Hydragyrum",
|
||
"id": 4928181,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4928181?v=4",
|
||
"html_url": "https:\/\/github.com\/Hydragyrum"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Hydragyrum\/CVE-2021-41773-Playground",
|
||
"description": "Some docker images to play with CVE-2021-41773 and CVE-2021-42013",
|
||
"fork": false,
|
||
"created_at": "2021-11-04T22:52:44Z",
|
||
"updated_at": "2022-01-11T09:06:38Z",
|
||
"pushed_at": "2021-11-04T22:56:14Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 5,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 426066790,
|
||
"name": "Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit",
|
||
"full_name": "IcmpOff\/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit",
|
||
"owner": {
|
||
"login": "IcmpOff",
|
||
"id": 71145797,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71145797?v=4",
|
||
"html_url": "https:\/\/github.com\/IcmpOff"
|
||
},
|
||
"html_url": "https:\/\/github.com\/IcmpOff\/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit",
|
||
"description": "This Metasploit module exploits an unauthenticated remote code execution vulnerability which exists in Apache version 2.4.49 (CVE-2021-41773). If files outside of the document root are not protected by ‘require all denied’ and CGI has been explicitly enabled, it can be used to execute arbitrary commands. This vulnerability has been reintroduced in the Apache 2.4.50 fix (CVE-2021-42013).",
|
||
"fork": false,
|
||
"created_at": "2021-11-09T02:38:13Z",
|
||
"updated_at": "2021-11-09T02:42:52Z",
|
||
"pushed_at": "2021-11-09T02:39:22Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"apache",
|
||
"exploit",
|
||
"metasploit",
|
||
"metasploit-framework",
|
||
"metasploit-modules",
|
||
"rce"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 427815832,
|
||
"name": "POC-CVE-2021-41773",
|
||
"full_name": "kubota\/POC-CVE-2021-41773",
|
||
"owner": {
|
||
"login": "kubota",
|
||
"id": 119277,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119277?v=4",
|
||
"html_url": "https:\/\/github.com\/kubota"
|
||
},
|
||
"html_url": "https:\/\/github.com\/kubota\/POC-CVE-2021-41773",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-11-14T02:02:45Z",
|
||
"updated_at": "2021-11-16T20:42:27Z",
|
||
"pushed_at": "2021-11-16T20:42:25Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 427956449,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "xMohamed0\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "xMohamed0",
|
||
"id": 94008154,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94008154?v=4",
|
||
"html_url": "https:\/\/github.com\/xMohamed0"
|
||
},
|
||
"html_url": "https:\/\/github.com\/xMohamed0\/CVE-2021-41773",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-11-14T14:50:45Z",
|
||
"updated_at": "2021-11-14T14:55:20Z",
|
||
"pushed_at": "2021-11-14T14:55:18Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 438514241,
|
||
"name": "MASS_CVE-2021-41773",
|
||
"full_name": "i6c\/MASS_CVE-2021-41773",
|
||
"owner": {
|
||
"login": "i6c",
|
||
"id": 87837042,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87837042?v=4",
|
||
"html_url": "https:\/\/github.com\/i6c"
|
||
},
|
||
"html_url": "https:\/\/github.com\/i6c\/MASS_CVE-2021-41773",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-12-15T06:04:41Z",
|
||
"updated_at": "2021-12-24T17:27:13Z",
|
||
"pushed_at": "2021-12-15T06:06:53Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 447314257,
|
||
"name": "CVE-2021-41773-exploiter",
|
||
"full_name": "norrig\/CVE-2021-41773-exploiter",
|
||
"owner": {
|
||
"login": "norrig",
|
||
"id": 5526261,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5526261?v=4",
|
||
"html_url": "https:\/\/github.com\/norrig"
|
||
},
|
||
"html_url": "https:\/\/github.com\/norrig\/CVE-2021-41773-exploiter",
|
||
"description": "School project - Please use other repos for actual testing",
|
||
"fork": false,
|
||
"created_at": "2022-01-12T17:42:36Z",
|
||
"updated_at": "2022-01-12T18:26:57Z",
|
||
"pushed_at": "2022-01-13T16:18:33Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 452242021,
|
||
"name": "CVE-2021-41773-exercise",
|
||
"full_name": "m96dg\/CVE-2021-41773-exercise",
|
||
"owner": {
|
||
"login": "m96dg",
|
||
"id": 65173648,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65173648?v=4",
|
||
"html_url": "https:\/\/github.com\/m96dg"
|
||
},
|
||
"html_url": "https:\/\/github.com\/m96dg\/CVE-2021-41773-exercise",
|
||
"description": "A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration \"require all denied\", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and not earlier versions. Credits to: https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-41773 ",
|
||
"fork": false,
|
||
"created_at": "2022-01-26T11:02:46Z",
|
||
"updated_at": "2022-01-26T11:22:13Z",
|
||
"pushed_at": "2022-01-30T19:02:43Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 464271089,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "skentagon\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "skentagon",
|
||
"id": 49702576,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49702576?v=4",
|
||
"html_url": "https:\/\/github.com\/skentagon"
|
||
},
|
||
"html_url": "https:\/\/github.com\/skentagon\/CVE-2021-41773",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-02-27T22:39:58Z",
|
||
"updated_at": "2022-03-04T00:11:58Z",
|
||
"pushed_at": "2022-03-04T00:05:44Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 467687901,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "mauricelambert\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "mauricelambert",
|
||
"id": 50479118,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4",
|
||
"html_url": "https:\/\/github.com\/mauricelambert"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mauricelambert\/CVE-2021-41773",
|
||
"description": "These Metasploit, Nmap, Python and Ruby scripts detects and exploits CVE-2021-41773 with RCE and local file disclosure.",
|
||
"fork": false,
|
||
"created_at": "2022-03-08T21:55:53Z",
|
||
"updated_at": "2022-03-23T16:56:34Z",
|
||
"pushed_at": "2022-03-14T07:34:49Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve",
|
||
"cve-2021-41773",
|
||
"detection",
|
||
"exploit",
|
||
"metasploit",
|
||
"nmap",
|
||
"python3",
|
||
"rce",
|
||
"ruby",
|
||
"scanner",
|
||
"vulnerability"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 468909402,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "the29a\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "the29a",
|
||
"id": 4436697,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4436697?v=4",
|
||
"html_url": "https:\/\/github.com\/the29a"
|
||
},
|
||
"html_url": "https:\/\/github.com\/the29a\/CVE-2021-41773",
|
||
"description": "Small PoC of CVE-2021-41773",
|
||
"fork": false,
|
||
"created_at": "2022-03-11T21:50:35Z",
|
||
"updated_at": "2022-03-11T21:52:35Z",
|
||
"pushed_at": "2022-03-11T22:10:25Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 469203660,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "thehackersbrain\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "thehackersbrain",
|
||
"id": 36809025,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36809025?v=4",
|
||
"html_url": "https:\/\/github.com\/thehackersbrain"
|
||
},
|
||
"html_url": "https:\/\/github.com\/thehackersbrain\/CVE-2021-41773",
|
||
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
|
||
"fork": false,
|
||
"created_at": "2022-03-12T21:24:55Z",
|
||
"updated_at": "2022-03-24T13:32:22Z",
|
||
"pushed_at": "2022-03-12T21:30:58Z",
|
||
"stargazers_count": 50,
|
||
"watchers_count": 50,
|
||
"forks_count": 15,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"apache2",
|
||
"cve-2021-41773",
|
||
"exploit",
|
||
"gauravraj",
|
||
"lfi",
|
||
"python",
|
||
"rce",
|
||
"thehackersbrain"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 15,
|
||
"watchers": 50,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 469576020,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "cryst4lliz3\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "cryst4lliz3",
|
||
"id": 101309325,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101309325?v=4",
|
||
"html_url": "https:\/\/github.com\/cryst4lliz3"
|
||
},
|
||
"html_url": "https:\/\/github.com\/cryst4lliz3\/CVE-2021-41773",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-03-14T04:08:56Z",
|
||
"updated_at": "2022-03-14T04:09:11Z",
|
||
"pushed_at": "2022-03-14T04:09:05Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 469821841,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "Fa1c0n35\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "Fa1c0n35",
|
||
"id": 33335488,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4",
|
||
"html_url": "https:\/\/github.com\/Fa1c0n35"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Fa1c0n35\/CVE-2021-41773",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-03-14T16:43:49Z",
|
||
"updated_at": "2022-03-14T16:44:00Z",
|
||
"pushed_at": "2022-03-14T16:43:57Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 474747864,
|
||
"name": "CVE-2021-41773-",
|
||
"full_name": "N3w-elf\/CVE-2021-41773-",
|
||
"owner": {
|
||
"login": "N3w-elf",
|
||
"id": 80478753,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80478753?v=4",
|
||
"html_url": "https:\/\/github.com\/N3w-elf"
|
||
},
|
||
"html_url": "https:\/\/github.com\/N3w-elf\/CVE-2021-41773-",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-03-27T20:10:30Z",
|
||
"updated_at": "2022-03-27T20:10:30Z",
|
||
"pushed_at": "2022-03-27T20:10:31Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 474963195,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "puckiestyle\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "puckiestyle",
|
||
"id": 57447087,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
|
||
"html_url": "https:\/\/github.com\/puckiestyle"
|
||
},
|
||
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-41773",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-03-28T11:02:46Z",
|
||
"updated_at": "2022-03-28T11:03:00Z",
|
||
"pushed_at": "2022-03-28T11:41:55Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 475931011,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "spiderz0ne\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "spiderz0ne",
|
||
"id": 83699106,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83699106?v=4",
|
||
"html_url": "https:\/\/github.com\/spiderz0ne"
|
||
},
|
||
"html_url": "https:\/\/github.com\/spiderz0ne\/CVE-2021-41773",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-03-30T15:04:27Z",
|
||
"updated_at": "2022-03-30T17:46:13Z",
|
||
"pushed_at": "2022-03-30T17:46:11Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
}
|
||
] |