PoC-in-GitHub/2021/CVE-2021-41773.json
2021-11-05 09:13:01 +09:00

1945 lines
No EOL
65 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 413890827,
"name": "cve-2021-41773",
"full_name": "Vulnmachines\/cve-2021-41773",
"owner": {
"login": "Vulnmachines",
"id": 79006904,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
"html_url": "https:\/\/github.com\/Vulnmachines"
},
"html_url": "https:\/\/github.com\/Vulnmachines\/cve-2021-41773",
"description": "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.",
"fork": false,
"created_at": "2021-10-05T16:13:38Z",
"updated_at": "2021-10-26T06:15:12Z",
"pushed_at": "2021-10-07T06:55:32Z",
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 27,
"score": 0
},
{
"id": 413892415,
"name": "CVE-2021-41773",
"full_name": "numanturle\/CVE-2021-41773",
"owner": {
"login": "numanturle",
"id": 7007951,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
"html_url": "https:\/\/github.com\/numanturle"
},
"html_url": "https:\/\/github.com\/numanturle\/CVE-2021-41773",
"description": "CVE-2021-41773",
"fork": false,
"created_at": "2021-10-05T16:18:09Z",
"updated_at": "2021-10-10T08:49:06Z",
"pushed_at": "2021-10-05T16:48:27Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 9,
"score": 0
},
{
"id": 413901787,
"name": "CVE-2021-41773",
"full_name": "knqyf263\/CVE-2021-41773",
"owner": {
"login": "knqyf263",
"id": 2253692,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
"html_url": "https:\/\/github.com\/knqyf263"
},
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2021-41773",
"description": "Path traversal in Apache HTTP Server 2.4.49 (CVE-2021-41773) ",
"fork": false,
"created_at": "2021-10-05T16:45:41Z",
"updated_at": "2021-10-19T03:08:08Z",
"pushed_at": "2021-10-06T05:40:34Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 9,
"score": 0
},
{
"id": 413916578,
"name": "CVE-2021-41773-PoC",
"full_name": "ZephrFish\/CVE-2021-41773-PoC",
"owner": {
"login": "ZephrFish",
"id": 5783068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
"html_url": "https:\/\/github.com\/ZephrFish"
},
"html_url": "https:\/\/github.com\/ZephrFish\/CVE-2021-41773-PoC",
"description": null,
"fork": false,
"created_at": "2021-10-05T17:29:49Z",
"updated_at": "2021-10-19T08:07:47Z",
"pushed_at": "2021-10-06T09:25:38Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 18,
"score": 0
},
{
"id": 413916846,
"name": "PoC-CVE-2021-41773",
"full_name": "iilegacyyii\/PoC-CVE-2021-41773",
"owner": {
"login": "iilegacyyii",
"id": 68760809,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68760809?v=4",
"html_url": "https:\/\/github.com\/iilegacyyii"
},
"html_url": "https:\/\/github.com\/iilegacyyii\/PoC-CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-05T17:30:43Z",
"updated_at": "2021-11-03T10:02:31Z",
"pushed_at": "2021-11-03T10:02:26Z",
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 34,
"score": 0
},
{
"id": 413943505,
"name": "CVE-2021-41773",
"full_name": "masahiro331\/CVE-2021-41773",
"owner": {
"login": "masahiro331",
"id": 20438853,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20438853?v=4",
"html_url": "https:\/\/github.com\/masahiro331"
},
"html_url": "https:\/\/github.com\/masahiro331\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-05T18:56:04Z",
"updated_at": "2021-10-10T18:37:45Z",
"pushed_at": "2021-10-06T03:43:42Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 413969845,
"name": "CVE-2021-41773",
"full_name": "RyouYoo\/CVE-2021-41773",
"owner": {
"login": "RyouYoo",
"id": 48088579,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48088579?v=4",
"html_url": "https:\/\/github.com\/RyouYoo"
},
"html_url": "https:\/\/github.com\/RyouYoo\/CVE-2021-41773",
"description": "Exploitation of CVE-2021-41773 a Directory Traversal in Apache 2.4.49.",
"fork": false,
"created_at": "2021-10-05T20:30:01Z",
"updated_at": "2021-10-10T18:01:45Z",
"pushed_at": "2021-10-05T22:06:50Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 11,
"score": 0
},
{
"id": 413972926,
"name": "POC-CVE-2021-41773",
"full_name": "TishcaTpx\/POC-CVE-2021-41773",
"owner": {
"login": "TishcaTpx",
"id": 91351013,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91351013?v=4",
"html_url": "https:\/\/github.com\/TishcaTpx"
},
"html_url": "https:\/\/github.com\/TishcaTpx\/POC-CVE-2021-41773",
"description": "Poc.py ",
"fork": false,
"created_at": "2021-10-05T20:41:34Z",
"updated_at": "2021-10-14T18:36:50Z",
"pushed_at": "2021-10-05T21:29:59Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 6,
"score": 0
},
{
"id": 414013246,
"name": "CVE-2021-41773-PoC",
"full_name": "lorddemon\/CVE-2021-41773-PoC",
"owner": {
"login": "lorddemon",
"id": 6675738,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6675738?v=4",
"html_url": "https:\/\/github.com\/lorddemon"
},
"html_url": "https:\/\/github.com\/lorddemon\/CVE-2021-41773-PoC",
"description": null,
"fork": false,
"created_at": "2021-10-05T23:53:48Z",
"updated_at": "2021-11-02T18:29:15Z",
"pushed_at": "2021-10-06T15:37:23Z",
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 34,
"score": 0
},
{
"id": 414043746,
"name": "CVE-2021-41773_CVE-2021-42013",
"full_name": "Ls4ss\/CVE-2021-41773_CVE-2021-42013",
"owner": {
"login": "Ls4ss",
"id": 25537761,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25537761?v=4",
"html_url": "https:\/\/github.com\/Ls4ss"
},
"html_url": "https:\/\/github.com\/Ls4ss\/CVE-2021-41773_CVE-2021-42013",
"description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE",
"fork": false,
"created_at": "2021-10-06T02:28:41Z",
"updated_at": "2021-10-22T14:18:56Z",
"pushed_at": "2021-10-09T19:37:29Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [
"apache",
"cve",
"exploit",
"payload",
"pentest",
"rce"
],
"visibility": "public",
"forks": 7,
"watchers": 15,
"score": 0
},
{
"id": 414044140,
"name": "CVE-2021-41773",
"full_name": "itsecurityco\/CVE-2021-41773",
"owner": {
"login": "itsecurityco",
"id": 1725054,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1725054?v=4",
"html_url": "https:\/\/github.com\/itsecurityco"
},
"html_url": "https:\/\/github.com\/itsecurityco\/CVE-2021-41773",
"description": "CVE-2021-41773 POC with Docker",
"fork": false,
"created_at": "2021-10-06T02:30:40Z",
"updated_at": "2021-11-04T23:33:40Z",
"pushed_at": "2021-10-06T03:37:20Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 4,
"score": 0
},
{
"id": 414050354,
"name": "CVE-2021-41773-PoC",
"full_name": "habibiefaried\/CVE-2021-41773-PoC",
"owner": {
"login": "habibiefaried",
"id": 4345690,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4345690?v=4",
"html_url": "https:\/\/github.com\/habibiefaried"
},
"html_url": "https:\/\/github.com\/habibiefaried\/CVE-2021-41773-PoC",
"description": "PoC for CVE-2021-41773 with docker to demonstrate",
"fork": false,
"created_at": "2021-10-06T03:01:41Z",
"updated_at": "2021-11-04T23:35:58Z",
"pushed_at": "2021-10-06T05:39:24Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 3,
"score": 0
},
{
"id": 414079512,
"name": "cve-2021-41773-nse",
"full_name": "TishcaTpx\/cve-2021-41773-nse",
"owner": {
"login": "TishcaTpx",
"id": 91351013,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91351013?v=4",
"html_url": "https:\/\/github.com\/TishcaTpx"
},
"html_url": "https:\/\/github.com\/TishcaTpx\/cve-2021-41773-nse",
"description": "CVE-2021-41773.nse",
"fork": false,
"created_at": "2021-10-06T05:22:42Z",
"updated_at": "2021-10-06T05:24:35Z",
"pushed_at": "2021-10-06T05:23:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 414082287,
"name": "CVE-2021-41773-POC",
"full_name": "creadpag\/CVE-2021-41773-POC",
"owner": {
"login": "creadpag",
"id": 15526083,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15526083?v=4",
"html_url": "https:\/\/github.com\/creadpag"
},
"html_url": "https:\/\/github.com\/creadpag\/CVE-2021-41773-POC",
"description": "CVE-2021-41773",
"fork": false,
"created_at": "2021-10-06T05:34:48Z",
"updated_at": "2021-10-14T18:36:40Z",
"pushed_at": "2021-10-06T05:48:55Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 10,
"score": 0
},
{
"id": 414108838,
"name": "CVE-2021-41773",
"full_name": "blasty\/CVE-2021-41773",
"owner": {
"login": "blasty",
"id": 101374,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101374?v=4",
"html_url": "https:\/\/github.com\/blasty"
},
"html_url": "https:\/\/github.com\/blasty\/CVE-2021-41773",
"description": "CVE-2021-41773 playground",
"fork": false,
"created_at": "2021-10-06T07:17:05Z",
"updated_at": "2021-10-28T03:18:00Z",
"pushed_at": "2021-10-07T17:56:38Z",
"stargazers_count": 195,
"watchers_count": 195,
"forks_count": 49,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 195,
"score": 0
},
{
"id": 414159388,
"name": "CVE-2021-41773",
"full_name": "PentesterGuruji\/CVE-2021-41773",
"owner": {
"login": "PentesterGuruji",
"id": 87645282,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87645282?v=4",
"html_url": "https:\/\/github.com\/PentesterGuruji"
},
"html_url": "https:\/\/github.com\/PentesterGuruji\/CVE-2021-41773",
"description": "Path Traversal vulnerability in Apache 2.4.49",
"fork": false,
"created_at": "2021-10-06T10:04:22Z",
"updated_at": "2021-10-10T18:52:52Z",
"pushed_at": "2021-10-07T19:39:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 414227353,
"name": "CVE-2021-41773",
"full_name": "jbovet\/CVE-2021-41773",
"owner": {
"login": "jbovet",
"id": 41589,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41589?v=4",
"html_url": "https:\/\/github.com\/jbovet"
},
"html_url": "https:\/\/github.com\/jbovet\/CVE-2021-41773",
"description": "Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49 (CVE-2021-41773)",
"fork": false,
"created_at": "2021-10-06T13:39:57Z",
"updated_at": "2021-10-10T18:53:15Z",
"pushed_at": "2021-10-06T14:15:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 1,
"score": 0
},
{
"id": 414239384,
"name": "cve-2021-41773",
"full_name": "mohwahyudi\/cve-2021-41773",
"owner": {
"login": "mohwahyudi",
"id": 57562836,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57562836?v=4",
"html_url": "https:\/\/github.com\/mohwahyudi"
},
"html_url": "https:\/\/github.com\/mohwahyudi\/cve-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-06T14:12:07Z",
"updated_at": "2021-10-18T00:55:02Z",
"pushed_at": "2021-10-08T01:55:22Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 414241382,
"name": "CVE-2021-41773",
"full_name": "1nhann\/CVE-2021-41773",
"owner": {
"login": "1nhann",
"id": 76624149,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76624149?v=4",
"html_url": "https:\/\/github.com\/1nhann"
},
"html_url": "https:\/\/github.com\/1nhann\/CVE-2021-41773",
"description": "CVE-2021-41773 的复现",
"fork": false,
"created_at": "2021-10-06T14:17:31Z",
"updated_at": "2021-10-12T09:27:30Z",
"pushed_at": "2021-10-08T05:03:10Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 5,
"score": 0
},
{
"id": 414248192,
"name": "CVE-2021-41773",
"full_name": "ranggaggngntt\/CVE-2021-41773",
"owner": {
"login": "ranggaggngntt",
"id": 57105391,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57105391?v=4",
"html_url": "https:\/\/github.com\/ranggaggngntt"
},
"html_url": "https:\/\/github.com\/ranggaggngntt\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-06T14:36:05Z",
"updated_at": "2021-10-10T18:53:04Z",
"pushed_at": "2021-10-06T14:41:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 414252359,
"name": "CVE-2021-41773",
"full_name": "BlueTeamSteve\/CVE-2021-41773",
"owner": {
"login": "BlueTeamSteve",
"id": 550582,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/550582?v=4",
"html_url": "https:\/\/github.com\/BlueTeamSteve"
},
"html_url": "https:\/\/github.com\/BlueTeamSteve\/CVE-2021-41773",
"description": "Vulnerable docker images for CVE-2021-41773",
"fork": false,
"created_at": "2021-10-06T14:47:23Z",
"updated_at": "2021-10-18T10:40:36Z",
"pushed_at": "2021-10-06T15:07:48Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 9,
"score": 0
},
{
"id": 414256797,
"name": "apache_normalize_path",
"full_name": "Zeop-CyberSec\/apache_normalize_path",
"owner": {
"login": "Zeop-CyberSec",
"id": 68154603,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68154603?v=4",
"html_url": "https:\/\/github.com\/Zeop-CyberSec"
},
"html_url": "https:\/\/github.com\/Zeop-CyberSec\/apache_normalize_path",
"description": "Metasploit-Framework modules (scanner and exploit) for the CVE-2021-41773 and CVE-2021-42013 (Path Traversal in Apache 2.4.49\/2.4.50)",
"fork": false,
"created_at": "2021-10-06T14:58:27Z",
"updated_at": "2021-10-29T19:36:30Z",
"pushed_at": "2021-10-21T18:51:00Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 11,
"score": 0
},
{
"id": 414284449,
"name": "CVE-2021-41773",
"full_name": "r00tVen0m\/CVE-2021-41773",
"owner": {
"login": "r00tVen0m",
"id": 50659263,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50659263?v=4",
"html_url": "https:\/\/github.com\/r00tVen0m"
},
"html_url": "https:\/\/github.com\/r00tVen0m\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-06T16:15:21Z",
"updated_at": "2021-10-10T18:37:20Z",
"pushed_at": "2021-10-06T19:05:07Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 414347675,
"name": "CVE-2021-41773",
"full_name": "n3k00n3\/CVE-2021-41773",
"owner": {
"login": "n3k00n3",
"id": 7244777,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7244777?v=4",
"html_url": "https:\/\/github.com\/n3k00n3"
},
"html_url": "https:\/\/github.com\/n3k00n3\/CVE-2021-41773",
"description": "exploit to CVE-2021-41773",
"fork": false,
"created_at": "2021-10-06T19:39:25Z",
"updated_at": "2021-10-10T18:59:35Z",
"pushed_at": "2021-10-08T16:32:51Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 414350527,
"name": "CVE-2021-41773-RCE",
"full_name": "fnatalucci\/CVE-2021-41773-RCE",
"owner": {
"login": "fnatalucci",
"id": 5574371,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5574371?v=4",
"html_url": "https:\/\/github.com\/fnatalucci"
},
"html_url": "https:\/\/github.com\/fnatalucci\/CVE-2021-41773-RCE",
"description": null,
"fork": false,
"created_at": "2021-10-06T19:50:33Z",
"updated_at": "2021-10-10T18:59:25Z",
"pushed_at": "2021-10-06T20:14:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 414376599,
"name": "CVE-2021-41773",
"full_name": "AssassinUKG\/CVE-2021-41773",
"owner": {
"login": "AssassinUKG",
"id": 5285547,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5285547?v=4",
"html_url": "https:\/\/github.com\/AssassinUKG"
},
"html_url": "https:\/\/github.com\/AssassinUKG\/CVE-2021-41773",
"description": "Apache 2.4.49",
"fork": false,
"created_at": "2021-10-06T21:37:18Z",
"updated_at": "2021-10-20T23:04:09Z",
"pushed_at": "2021-10-20T23:04:06Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 414402542,
"name": "Simple-CVE-2021-41773-checker",
"full_name": "jheeree\/Simple-CVE-2021-41773-checker",
"owner": {
"login": "jheeree",
"id": 19227591,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19227591?v=4",
"html_url": "https:\/\/github.com\/jheeree"
},
"html_url": "https:\/\/github.com\/jheeree\/Simple-CVE-2021-41773-checker",
"description": "Simple script realizado en bash, para revisión de múltiples hosts para CVE-2021-41773 (Apache)",
"fork": false,
"created_at": "2021-10-06T23:32:30Z",
"updated_at": "2021-10-13T14:46:52Z",
"pushed_at": "2021-10-12T03:28:51Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 3,
"score": 0
},
{
"id": 414410579,
"name": "CVE-2021-41773",
"full_name": "oxctdev\/CVE-2021-41773",
"owner": {
"login": "oxctdev",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/oxctdev"
},
"html_url": "https:\/\/github.com\/oxctdev\/CVE-2021-41773",
"description": "Apache HTTPd (2.4.49) Local File Disclosure (LFI)",
"fork": false,
"created_at": "2021-10-07T00:14:40Z",
"updated_at": "2021-11-01T09:04:40Z",
"pushed_at": "2021-10-07T00:19:26Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [
"httpd",
"remote-code-execution"
],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0
},
{
"id": 414425270,
"name": "scarce-apache2",
"full_name": "HightechSec\/scarce-apache2",
"owner": {
"login": "HightechSec",
"id": 24645706,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24645706?v=4",
"html_url": "https:\/\/github.com\/HightechSec"
},
"html_url": "https:\/\/github.com\/HightechSec\/scarce-apache2",
"description": "A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public ",
"fork": false,
"created_at": "2021-10-07T01:31:13Z",
"updated_at": "2021-11-04T22:05:21Z",
"pushed_at": "2021-10-07T08:25:26Z",
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [
"bash-script",
"bug-hunting",
"cve-2021-41773",
"hacktoberfest",
"pentesting"
],
"visibility": "public",
"forks": 11,
"watchers": 32,
"score": 0
},
{
"id": 414514606,
"name": "CVE-2021-41773-exploit",
"full_name": "vinhjaxt\/CVE-2021-41773-exploit",
"owner": {
"login": "vinhjaxt",
"id": 8877695,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8877695?v=4",
"html_url": "https:\/\/github.com\/vinhjaxt"
},
"html_url": "https:\/\/github.com\/vinhjaxt\/CVE-2021-41773-exploit",
"description": "CVE-2021-41773, poc, exploit",
"fork": false,
"created_at": "2021-10-07T08:10:00Z",
"updated_at": "2021-10-10T18:59:44Z",
"pushed_at": "2021-10-08T04:55:32Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 414581409,
"name": "CVE-2021-41773",
"full_name": "twseptian\/CVE-2021-41773",
"owner": {
"login": "twseptian",
"id": 9025301,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9025301?v=4",
"html_url": "https:\/\/github.com\/twseptian"
},
"html_url": "https:\/\/github.com\/twseptian\/CVE-2021-41773",
"description": "CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited",
"fork": false,
"created_at": "2021-10-07T11:55:10Z",
"updated_at": "2021-10-12T03:41:30Z",
"pushed_at": "2021-10-10T05:19:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [
"apache",
"cve-2021-41773",
"path-traversal",
"shodan",
"shodan-cli",
"vulnerability"
],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 414592683,
"name": "CVE-2021-41773",
"full_name": "ComdeyOverFlow\/CVE-2021-41773",
"owner": {
"login": "ComdeyOverFlow",
"id": 84136529,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84136529?v=4",
"html_url": "https:\/\/github.com\/ComdeyOverFlow"
},
"html_url": "https:\/\/github.com\/ComdeyOverFlow\/CVE-2021-41773",
"description": "CVE-2021-41773",
"fork": false,
"created_at": "2021-10-07T12:30:13Z",
"updated_at": "2021-10-10T18:36:13Z",
"pushed_at": "2021-10-08T09:19:09Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"score": 0
},
{
"id": 414646379,
"name": "CVE-2021-41773",
"full_name": "shiomiyan\/CVE-2021-41773",
"owner": {
"login": "shiomiyan",
"id": 35842766,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35842766?v=4",
"html_url": "https:\/\/github.com\/shiomiyan"
},
"html_url": "https:\/\/github.com\/shiomiyan\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-07T15:00:55Z",
"updated_at": "2021-10-15T19:28:33Z",
"pushed_at": "2021-10-15T19:28:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 414650983,
"name": "mass_cve-2021-41773",
"full_name": "justakazh\/mass_cve-2021-41773",
"owner": {
"login": "justakazh",
"id": 36891477,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36891477?v=4",
"html_url": "https:\/\/github.com\/justakazh"
},
"html_url": "https:\/\/github.com\/justakazh\/mass_cve-2021-41773",
"description": "MASS CVE-2021-41773",
"fork": false,
"created_at": "2021-10-07T15:13:18Z",
"updated_at": "2021-10-12T15:02:02Z",
"pushed_at": "2021-10-10T09:14:27Z",
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 22,
"score": 0
},
{
"id": 414674481,
"name": "Poc-CVE-2021-41773",
"full_name": "LetouRaphael\/Poc-CVE-2021-41773",
"owner": {
"login": "LetouRaphael",
"id": 48223543,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48223543?v=4",
"html_url": "https:\/\/github.com\/LetouRaphael"
},
"html_url": "https:\/\/github.com\/LetouRaphael\/Poc-CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-07T16:19:45Z",
"updated_at": "2021-10-08T01:15:42Z",
"pushed_at": "2021-10-07T16:48:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 414764740,
"name": "CVE-2021-41773",
"full_name": "Sakura-nee\/CVE-2021-41773",
"owner": {
"login": "Sakura-nee",
"id": 74785477,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74785477?v=4",
"html_url": "https:\/\/github.com\/Sakura-nee"
},
"html_url": "https:\/\/github.com\/Sakura-nee\/CVE-2021-41773",
"description": "Mass exploitation CVE-2021-41773 and auto detect possible RCE",
"fork": false,
"created_at": "2021-10-07T21:37:50Z",
"updated_at": "2021-10-10T18:52:13Z",
"pushed_at": "2021-10-07T21:52:57Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 414787621,
"name": "lab-cve-2021-41773",
"full_name": "htrgouvea\/lab-cve-2021-41773",
"owner": {
"login": "htrgouvea",
"id": 10741284,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10741284?v=4",
"html_url": "https:\/\/github.com\/htrgouvea"
},
"html_url": "https:\/\/github.com\/htrgouvea\/lab-cve-2021-41773",
"description": "Docker container lab to play\/learn with CVE-2021-41773",
"fork": false,
"created_at": "2021-10-07T23:38:36Z",
"updated_at": "2021-10-13T10:46:18Z",
"pushed_at": "2021-10-08T12:29:44Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [
"apache",
"container",
"cve-2021-41773",
"docker",
"lab"
],
"visibility": "public",
"forks": 4,
"watchers": 13,
"score": 0
},
{
"id": 414804962,
"name": "CVE-2021-41773",
"full_name": "shellreaper\/CVE-2021-41773",
"owner": {
"login": "shellreaper",
"id": 76930483,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76930483?v=4",
"html_url": "https:\/\/github.com\/shellreaper"
},
"html_url": "https:\/\/github.com\/shellreaper\/CVE-2021-41773",
"description": "This a simple poc for Apache\/2.4.49 Path Traversal Vulnerability",
"fork": false,
"created_at": "2021-10-08T01:13:33Z",
"updated_at": "2021-10-10T18:36:34Z",
"pushed_at": "2021-10-09T18:24:26Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"score": 0
},
{
"id": 414845157,
"name": "CVE-2021-41773",
"full_name": "0xRar\/CVE-2021-41773",
"owner": {
"login": "0xRar",
"id": 33517160,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33517160?v=4",
"html_url": "https:\/\/github.com\/0xRar"
},
"html_url": "https:\/\/github.com\/0xRar\/CVE-2021-41773",
"description": "Exploit for Apache 2.4.49",
"fork": false,
"created_at": "2021-10-08T04:26:31Z",
"updated_at": "2021-10-10T18:53:53Z",
"pushed_at": "2021-10-08T05:54:25Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 414848372,
"name": "Sigma-Rule-for-CVE-2021-41773-and-CVE-2021-42013-exploitation-attempt",
"full_name": "pisut4152\/Sigma-Rule-for-CVE-2021-41773-and-CVE-2021-42013-exploitation-attempt",
"owner": {
"login": "pisut4152",
"id": 72641661,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72641661?v=4",
"html_url": "https:\/\/github.com\/pisut4152"
},
"html_url": "https:\/\/github.com\/pisut4152\/Sigma-Rule-for-CVE-2021-41773-and-CVE-2021-42013-exploitation-attempt",
"description": null,
"fork": false,
"created_at": "2021-10-08T04:43:27Z",
"updated_at": "2021-10-10T18:50:04Z",
"pushed_at": "2021-10-08T04:46:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 414878778,
"name": "CVE-2021-41773",
"full_name": "corelight\/CVE-2021-41773",
"owner": {
"login": "corelight",
"id": 21672558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
"html_url": "https:\/\/github.com\/corelight"
},
"html_url": "https:\/\/github.com\/corelight\/CVE-2021-41773",
"description": "A Zeek package which raises notices for Path Traversal\/RCE in Apache HTTP Server 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013)",
"fork": false,
"created_at": "2021-10-08T06:54:27Z",
"updated_at": "2021-10-28T05:48:41Z",
"pushed_at": "2021-10-28T05:55:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 414887591,
"name": "CVE-2021-41773",
"full_name": "zeronine9\/CVE-2021-41773",
"owner": {
"login": "zeronine9",
"id": 60152515,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60152515?v=4",
"html_url": "https:\/\/github.com\/zeronine9"
},
"html_url": "https:\/\/github.com\/zeronine9\/CVE-2021-41773",
"description": "Fast python tool to test apache path traversal CVE-2021-41773 in a List of url ",
"fork": false,
"created_at": "2021-10-08T07:24:49Z",
"updated_at": "2021-10-11T16:02:36Z",
"pushed_at": "2021-10-08T07:27:04Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 9,
"score": 0
},
{
"id": 414907601,
"name": "CVE-2021-41773",
"full_name": "b1tsec\/CVE-2021-41773",
"owner": {
"login": "b1tsec",
"id": 74562513,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74562513?v=4",
"html_url": "https:\/\/github.com\/b1tsec"
},
"html_url": "https:\/\/github.com\/b1tsec\/CVE-2021-41773",
"description": "A Python script to check if an Apache web server is vulnerable to CVE-2021-41773",
"fork": false,
"created_at": "2021-10-08T08:32:51Z",
"updated_at": "2021-10-10T18:53:24Z",
"pushed_at": "2021-10-08T12:15:50Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 415041820,
"name": "CVE-2021-41773",
"full_name": "superzerosec\/CVE-2021-41773",
"owner": {
"login": "superzerosec",
"id": 57648217,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4",
"html_url": "https:\/\/github.com\/superzerosec"
},
"html_url": "https:\/\/github.com\/superzerosec\/CVE-2021-41773",
"description": "POC",
"fork": false,
"created_at": "2021-10-08T15:40:41Z",
"updated_at": "2021-10-11T22:24:14Z",
"pushed_at": "2021-10-11T22:24:12Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0
},
{
"id": 415177333,
"name": "apachrot",
"full_name": "im-hanzou\/apachrot",
"owner": {
"login": "im-hanzou",
"id": 61415393,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61415393?v=4",
"html_url": "https:\/\/github.com\/im-hanzou"
},
"html_url": "https:\/\/github.com\/im-hanzou\/apachrot",
"description": "Apache (Linux) CVE-2021-41773\/2021-42013 Mass Vulnerability Checker",
"fork": false,
"created_at": "2021-10-09T02:12:39Z",
"updated_at": "2021-10-20T16:14:59Z",
"pushed_at": "2021-10-12T07:27:09Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [
"apache",
"checker",
"cve-2021-41773",
"cve-2021-42013",
"vulnerability"
],
"visibility": "public",
"forks": 4,
"watchers": 19,
"score": 0
},
{
"id": 415189947,
"name": "CVE-2021-41773",
"full_name": "KAB8345\/CVE-2021-41773",
"owner": {
"login": "KAB8345",
"id": 40665473,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40665473?v=4",
"html_url": "https:\/\/github.com\/KAB8345"
},
"html_url": "https:\/\/github.com\/KAB8345\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-09T03:21:41Z",
"updated_at": "2021-10-09T03:21:45Z",
"pushed_at": "2021-10-09T03:21:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 415191949,
"name": "CVE-2021-41773_CVE-2021-42013",
"full_name": "inbug-team\/CVE-2021-41773_CVE-2021-42013",
"owner": {
"login": "inbug-team",
"id": 81735769,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81735769?v=4",
"html_url": "https:\/\/github.com\/inbug-team"
},
"html_url": "https:\/\/github.com\/inbug-team\/CVE-2021-41773_CVE-2021-42013",
"description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具",
"fork": false,
"created_at": "2021-10-09T03:32:18Z",
"updated_at": "2021-11-02T10:48:22Z",
"pushed_at": "2021-10-09T03:49:21Z",
"stargazers_count": 88,
"watchers_count": 88,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 88,
"score": 0
},
{
"id": 415290894,
"name": "cve-2021-41773-and-cve-2021-42013",
"full_name": "5gstudent\/cve-2021-41773-and-cve-2021-42013",
"owner": {
"login": "5gstudent",
"id": 37172754,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37172754?v=4",
"html_url": "https:\/\/github.com\/5gstudent"
},
"html_url": "https:\/\/github.com\/5gstudent\/cve-2021-41773-and-cve-2021-42013",
"description": "cve-2021-41773 即 cve-2021-42013 批量检测脚本",
"fork": false,
"created_at": "2021-10-09T11:33:56Z",
"updated_at": "2021-10-12T06:48:47Z",
"pushed_at": "2021-10-09T12:14:29Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0
},
{
"id": 415357102,
"name": "CVE-2021-41773",
"full_name": "EagleTube\/CVE-2021-41773",
"owner": {
"login": "EagleTube",
"id": 87413459,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87413459?v=4",
"html_url": "https:\/\/github.com\/EagleTube"
},
"html_url": "https:\/\/github.com\/EagleTube\/CVE-2021-41773",
"description": "Apache 2.4.49 Path Traversal Vulnerability Checker ",
"fork": false,
"created_at": "2021-10-09T16:07:57Z",
"updated_at": "2021-10-10T18:55:45Z",
"pushed_at": "2021-10-09T16:32:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 415549063,
"name": "CVE-2021-41773-42013",
"full_name": "cgddgc\/CVE-2021-41773-42013",
"owner": {
"login": "cgddgc",
"id": 20945826,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20945826?v=4",
"html_url": "https:\/\/github.com\/cgddgc"
},
"html_url": "https:\/\/github.com\/cgddgc\/CVE-2021-41773-42013",
"description": null,
"fork": false,
"created_at": "2021-10-10T10:09:52Z",
"updated_at": "2021-10-11T04:09:16Z",
"pushed_at": "2021-10-10T10:20:09Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"score": 0
},
{
"id": 415737041,
"name": "Apachuk",
"full_name": "apapedulimu\/Apachuk",
"owner": {
"login": "apapedulimu",
"id": 16370264,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16370264?v=4",
"html_url": "https:\/\/github.com\/apapedulimu"
},
"html_url": "https:\/\/github.com\/apapedulimu\/Apachuk",
"description": "CVE-2021-41773 Grabber",
"fork": false,
"created_at": "2021-10-11T00:57:27Z",
"updated_at": "2021-10-12T10:13:51Z",
"pushed_at": "2021-10-11T02:51:11Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"score": 0
},
{
"id": 415761005,
"name": "CVE-2021-41773",
"full_name": "scarmandef\/CVE-2021-41773",
"owner": {
"login": "scarmandef",
"id": 80011252,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80011252?v=4",
"html_url": "https:\/\/github.com\/scarmandef"
},
"html_url": "https:\/\/github.com\/scarmandef\/CVE-2021-41773",
"description": " Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE",
"fork": false,
"created_at": "2021-10-11T03:03:08Z",
"updated_at": "2021-10-14T04:59:46Z",
"pushed_at": "2021-10-14T04:59:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 416132671,
"name": "CVE-2021-41773-PoC",
"full_name": "0xAlmighty\/CVE-2021-41773-PoC",
"owner": {
"login": "0xAlmighty",
"id": 58662599,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58662599?v=4",
"html_url": "https:\/\/github.com\/0xAlmighty"
},
"html_url": "https:\/\/github.com\/0xAlmighty\/CVE-2021-41773-PoC",
"description": "Path Traversal and RCE in Apache HTTP Server 2.4.49 ",
"fork": false,
"created_at": "2021-10-12T00:51:32Z",
"updated_at": "2021-10-18T15:37:03Z",
"pushed_at": "2021-10-12T00:52:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 416511119,
"name": "httpd-2.4.49",
"full_name": "ksanchezcld\/httpd-2.4.49",
"owner": {
"login": "ksanchezcld",
"id": 3130599,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3130599?v=4",
"html_url": "https:\/\/github.com\/ksanchezcld"
},
"html_url": "https:\/\/github.com\/ksanchezcld\/httpd-2.4.49",
"description": "critical: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773) (CVE-2021-42013)",
"fork": false,
"created_at": "2021-10-12T22:02:09Z",
"updated_at": "2021-10-21T12:52:18Z",
"pushed_at": "2021-10-12T22:02:19Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 416830075,
"name": "SimplesApachePathTraversal",
"full_name": "MrCl0wnLab\/SimplesApachePathTraversal",
"owner": {
"login": "MrCl0wnLab",
"id": 17049332,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17049332?v=4",
"html_url": "https:\/\/github.com\/MrCl0wnLab"
},
"html_url": "https:\/\/github.com\/MrCl0wnLab\/SimplesApachePathTraversal",
"description": "Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519",
"fork": false,
"created_at": "2021-10-13T17:03:56Z",
"updated_at": "2021-11-04T23:08:59Z",
"pushed_at": "2021-10-14T21:11:44Z",
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2020-17519",
"cve-2021-41773",
"cve-2021-42013"
],
"visibility": "public",
"forks": 10,
"watchers": 42,
"score": 0
},
{
"id": 417461813,
"name": "apache-httpd-path-traversal-checker",
"full_name": "theLSA\/apache-httpd-path-traversal-checker",
"owner": {
"login": "theLSA",
"id": 28248956,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28248956?v=4",
"html_url": "https:\/\/github.com\/theLSA"
},
"html_url": "https:\/\/github.com\/theLSA\/apache-httpd-path-traversal-checker",
"description": "apache httpd path traversal checker(CVE-2021-41773 \/ CVE-2021-42013)",
"fork": false,
"created_at": "2021-10-15T10:38:44Z",
"updated_at": "2021-10-20T02:37:59Z",
"pushed_at": "2021-10-16T10:28:23Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0
},
{
"id": 417643516,
"name": "CVE-2021-41773",
"full_name": "LudovicPatho\/CVE-2021-41773",
"owner": {
"login": "LudovicPatho",
"id": 26960886,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26960886?v=4",
"html_url": "https:\/\/github.com\/LudovicPatho"
},
"html_url": "https:\/\/github.com\/LudovicPatho\/CVE-2021-41773",
"description": "The first vulnerability with the CVE identifier CVE-2021-41773 is a path traversal flaw that exists in Apache HTTP Server 2.4.49.",
"fork": false,
"created_at": "2021-10-15T21:38:48Z",
"updated_at": "2021-10-21T07:26:16Z",
"pushed_at": "2021-10-21T07:26:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 417869261,
"name": "CVE-2021-41773_Honeypot",
"full_name": "lopqto\/CVE-2021-41773_Honeypot",
"owner": {
"login": "lopqto",
"id": 30213943,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30213943?v=4",
"html_url": "https:\/\/github.com\/lopqto"
},
"html_url": "https:\/\/github.com\/lopqto\/CVE-2021-41773_Honeypot",
"description": "Simple honeypot for CVE-2021-41773 vulnerability",
"fork": false,
"created_at": "2021-10-16T15:30:34Z",
"updated_at": "2021-10-17T08:13:10Z",
"pushed_at": "2021-10-17T08:13:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 418481558,
"name": "CVE-2021-41773_42013",
"full_name": "vulf\/CVE-2021-41773_42013",
"owner": {
"login": "vulf",
"id": 37404408,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37404408?v=4",
"html_url": "https:\/\/github.com\/vulf"
},
"html_url": "https:\/\/github.com\/vulf\/CVE-2021-41773_42013",
"description": "Lab setup for CVE-2021-41773 (Apache httpd 2.4.49) and CVE-2021-42013 (Apache httpd 2.4.50).",
"fork": false,
"created_at": "2021-10-18T12:01:58Z",
"updated_at": "2021-10-26T14:26:45Z",
"pushed_at": "2021-10-18T12:47:56Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [
"apache",
"cve",
"cve-2021-41773",
"cve-2021-42013",
"httpd",
"lfi",
"penetration-testing",
"rce",
"security",
"vulnerable",
"web"
],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 419143683,
"name": "CVE-2021-41773",
"full_name": "cloudbyteelias\/CVE-2021-41773",
"owner": {
"login": "cloudbyteelias",
"id": 44121417,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44121417?v=4",
"html_url": "https:\/\/github.com\/cloudbyteelias"
},
"html_url": "https:\/\/github.com\/cloudbyteelias\/CVE-2021-41773",
"description": "CVE-2021-41773 Docker lab",
"fork": false,
"created_at": "2021-10-20T01:20:21Z",
"updated_at": "2021-11-04T23:37:34Z",
"pushed_at": "2021-10-20T01:21:34Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-41773"
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 419301010,
"name": "CVE-2021-41773",
"full_name": "qwutony\/CVE-2021-41773",
"owner": {
"login": "qwutony",
"id": 45024645,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45024645?v=4",
"html_url": "https:\/\/github.com\/qwutony"
},
"html_url": "https:\/\/github.com\/qwutony\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-20T11:27:12Z",
"updated_at": "2021-10-20T12:26:59Z",
"pushed_at": "2021-10-20T12:26:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 419369252,
"name": "CVE-2021-41773",
"full_name": "LayarKacaSiber\/CVE-2021-41773",
"owner": {
"login": "LayarKacaSiber",
"id": 92864439,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92864439?v=4",
"html_url": "https:\/\/github.com\/LayarKacaSiber"
},
"html_url": "https:\/\/github.com\/LayarKacaSiber\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-20T14:41:15Z",
"updated_at": "2021-10-23T13:15:51Z",
"pushed_at": "2021-10-23T13:15:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 420144635,
"name": "CVE-2021-41773",
"full_name": "BabyTeam1024\/CVE-2021-41773",
"owner": {
"login": "BabyTeam1024",
"id": 74447452,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74447452?v=4",
"html_url": "https:\/\/github.com\/BabyTeam1024"
},
"html_url": "https:\/\/github.com\/BabyTeam1024\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-22T15:12:12Z",
"updated_at": "2021-10-24T07:10:34Z",
"pushed_at": "2021-10-22T15:23:56Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 420407065,
"name": "cve-2021-41773",
"full_name": "walnutsecurity\/cve-2021-41773",
"owner": {
"login": "walnutsecurity",
"id": 92915142,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92915142?v=4",
"html_url": "https:\/\/github.com\/walnutsecurity"
},
"html_url": "https:\/\/github.com\/walnutsecurity\/cve-2021-41773",
"description": "cve-2021-41773.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.49",
"fork": false,
"created_at": "2021-10-23T12:31:53Z",
"updated_at": "2021-10-27T14:35:36Z",
"pushed_at": "2021-10-27T14:23:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 420528447,
"name": "CVE-2021-41773",
"full_name": "TheLastVvV\/CVE-2021-41773",
"owner": {
"login": "TheLastVvV",
"id": 71128830,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71128830?v=4",
"html_url": "https:\/\/github.com\/TheLastVvV"
},
"html_url": "https:\/\/github.com\/TheLastVvV\/CVE-2021-41773",
"description": "Poc CVE-2021-41773 - Apache 2.4.49 with CGI enabled",
"fork": false,
"created_at": "2021-10-23T21:37:25Z",
"updated_at": "2021-10-23T23:15:50Z",
"pushed_at": "2021-10-23T21:50:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 421191229,
"name": "Scanner-CVE-2021-41773",
"full_name": "vida00\/Scanner-CVE-2021-41773",
"owner": {
"login": "vida00",
"id": 77762068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77762068?v=4",
"html_url": "https:\/\/github.com\/vida00"
},
"html_url": "https:\/\/github.com\/vida00\/Scanner-CVE-2021-41773",
"description": "A automatic scanner to apache 2.4.49",
"fork": false,
"created_at": "2021-10-25T21:34:08Z",
"updated_at": "2021-10-25T22:17:23Z",
"pushed_at": "2021-10-25T22:17:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 421530564,
"name": "CVE-2021-41773",
"full_name": "mr-exo\/CVE-2021-41773",
"owner": {
"login": "mr-exo",
"id": 76655540,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76655540?v=4",
"html_url": "https:\/\/github.com\/mr-exo"
},
"html_url": "https:\/\/github.com\/mr-exo\/CVE-2021-41773",
"description": "Remote Code Execution exploit for Apache servers. Affected versions: Apache 2.4.49, Apache 2.4.50",
"fork": false,
"created_at": "2021-10-26T17:56:25Z",
"updated_at": "2021-10-26T18:04:45Z",
"pushed_at": "2021-10-26T18:04:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 421553366,
"name": "CVE-2021-41773",
"full_name": "Balgogan\/CVE-2021-41773",
"owner": {
"login": "Balgogan",
"id": 88535377,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
"html_url": "https:\/\/github.com\/Balgogan"
},
"html_url": "https:\/\/github.com\/Balgogan\/CVE-2021-41773",
"description": "Ce programme permet de détecter une faille RCE sur les serveurs Apache 2.4.49 et Apache 2.4.50",
"fork": false,
"created_at": "2021-10-26T19:11:28Z",
"updated_at": "2021-10-26T21:05:17Z",
"pushed_at": "2021-10-26T19:15:04Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 422466104,
"name": "CVE-2021-41773",
"full_name": "wolf1892\/CVE-2021-41773",
"owner": {
"login": "wolf1892",
"id": 24608781,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24608781?v=4",
"html_url": "https:\/\/github.com\/wolf1892"
},
"html_url": "https:\/\/github.com\/wolf1892\/CVE-2021-41773",
"description": "Setup vulnerable enviornment",
"fork": false,
"created_at": "2021-10-29T06:31:57Z",
"updated_at": "2021-10-29T06:33:41Z",
"pushed_at": "2021-10-29T06:33:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 424762276,
"name": "CVE-2021-41773-Playground",
"full_name": "Hydragyrum\/CVE-2021-41773-Playground",
"owner": {
"login": "Hydragyrum",
"id": 4928181,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4928181?v=4",
"html_url": "https:\/\/github.com\/Hydragyrum"
},
"html_url": "https:\/\/github.com\/Hydragyrum\/CVE-2021-41773-Playground",
"description": "Some docker images to play with CVE-2021-41773 and CVE-2021-42013",
"fork": false,
"created_at": "2021-11-04T22:52:44Z",
"updated_at": "2021-11-04T23:39:42Z",
"pushed_at": "2021-11-04T22:56:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]