mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
460 lines
No EOL
16 KiB
JSON
460 lines
No EOL
16 KiB
JSON
[
|
|
{
|
|
"id": 413890827,
|
|
"name": "cve-2021-41773",
|
|
"full_name": "Vulnmachines\/cve-2021-41773",
|
|
"owner": {
|
|
"login": "Vulnmachines",
|
|
"id": 79006904,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
|
|
"html_url": "https:\/\/github.com\/Vulnmachines",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Vulnmachines\/cve-2021-41773",
|
|
"description": "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.",
|
|
"fork": false,
|
|
"created_at": "2021-10-05T16:13:38Z",
|
|
"updated_at": "2024-09-03T02:15:12Z",
|
|
"pushed_at": "2022-08-30T11:58:32Z",
|
|
"stargazers_count": 40,
|
|
"watchers_count": 40,
|
|
"has_discussions": false,
|
|
"forks_count": 14,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 14,
|
|
"watchers": 40,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 414043746,
|
|
"name": "CVE-2021-41773_CVE-2021-42013",
|
|
"full_name": "Ls4ss\/CVE-2021-41773_CVE-2021-42013",
|
|
"owner": {
|
|
"login": "Ls4ss",
|
|
"id": 25537761,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25537761?v=4",
|
|
"html_url": "https:\/\/github.com\/Ls4ss",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Ls4ss\/CVE-2021-41773_CVE-2021-42013",
|
|
"description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE",
|
|
"fork": false,
|
|
"created_at": "2021-10-06T02:28:41Z",
|
|
"updated_at": "2024-08-12T20:17:00Z",
|
|
"pushed_at": "2022-09-09T16:09:11Z",
|
|
"stargazers_count": 21,
|
|
"watchers_count": 21,
|
|
"has_discussions": false,
|
|
"forks_count": 9,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"apache",
|
|
"cve",
|
|
"exploit",
|
|
"payload",
|
|
"pentest",
|
|
"rce"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 9,
|
|
"watchers": 21,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 414044140,
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "itsecurityco\/CVE-2021-41773",
|
|
"owner": {
|
|
"login": "itsecurityco",
|
|
"id": 1725054,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1725054?v=4",
|
|
"html_url": "https:\/\/github.com\/itsecurityco",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/itsecurityco\/CVE-2021-41773",
|
|
"description": "CVE-2021-41773 POC with Docker",
|
|
"fork": false,
|
|
"created_at": "2021-10-06T02:30:40Z",
|
|
"updated_at": "2024-08-12T20:17:00Z",
|
|
"pushed_at": "2022-10-07T23:37:10Z",
|
|
"stargazers_count": 10,
|
|
"watchers_count": 10,
|
|
"has_discussions": false,
|
|
"forks_count": 6,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 6,
|
|
"watchers": 10,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 414082287,
|
|
"name": "CVE-2021-41773-POC",
|
|
"full_name": "creadpag\/CVE-2021-41773-POC",
|
|
"owner": {
|
|
"login": "creadpag",
|
|
"id": 15526083,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15526083?v=4",
|
|
"html_url": "https:\/\/github.com\/creadpag",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/creadpag\/CVE-2021-41773-POC",
|
|
"description": "CVE-2021-41773",
|
|
"fork": false,
|
|
"created_at": "2021-10-06T05:34:48Z",
|
|
"updated_at": "2024-08-12T20:17:00Z",
|
|
"pushed_at": "2022-12-28T17:49:24Z",
|
|
"stargazers_count": 8,
|
|
"watchers_count": 8,
|
|
"has_discussions": false,
|
|
"forks_count": 5,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 5,
|
|
"watchers": 8,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 414248192,
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "ranggaggngntt\/CVE-2021-41773",
|
|
"owner": {
|
|
"login": "ranggaggngntt",
|
|
"id": 57105391,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57105391?v=4",
|
|
"html_url": "https:\/\/github.com\/ranggaggngntt",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ranggaggngntt\/CVE-2021-41773",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-10-06T14:36:05Z",
|
|
"updated_at": "2024-08-12T20:17:01Z",
|
|
"pushed_at": "2022-06-11T13:34:00Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 414592683,
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "noflowpls\/CVE-2021-41773",
|
|
"owner": {
|
|
"login": "noflowpls",
|
|
"id": 84136529,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84136529?v=4",
|
|
"html_url": "https:\/\/github.com\/noflowpls",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/noflowpls\/CVE-2021-41773",
|
|
"description": "CVE-2021-41773",
|
|
"fork": false,
|
|
"created_at": "2021-10-07T12:30:13Z",
|
|
"updated_at": "2024-08-12T20:17:04Z",
|
|
"pushed_at": "2022-11-15T08:51:33Z",
|
|
"stargazers_count": 6,
|
|
"watchers_count": 6,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 6,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 414650983,
|
|
"name": "mass_cve-2021-41773",
|
|
"full_name": "justakazh\/mass_cve-2021-41773",
|
|
"owner": {
|
|
"login": "justakazh",
|
|
"id": 36891477,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36891477?v=4",
|
|
"html_url": "https:\/\/github.com\/justakazh",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/justakazh\/mass_cve-2021-41773",
|
|
"description": "MASS CVE-2021-41773",
|
|
"fork": false,
|
|
"created_at": "2021-10-07T15:13:18Z",
|
|
"updated_at": "2024-08-12T20:17:04Z",
|
|
"pushed_at": "2023-11-14T07:00:33Z",
|
|
"stargazers_count": 27,
|
|
"watchers_count": 27,
|
|
"has_discussions": false,
|
|
"forks_count": 24,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"automatic",
|
|
"cve-2021-41773",
|
|
"exploit",
|
|
"scanner"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 24,
|
|
"watchers": 27,
|
|
"score": 0,
|
|
"subscribers_count": 4
|
|
},
|
|
{
|
|
"id": 416830075,
|
|
"name": "SimplesApachePathTraversal",
|
|
"full_name": "MrCl0wnLab\/SimplesApachePathTraversal",
|
|
"owner": {
|
|
"login": "MrCl0wnLab",
|
|
"id": 17049332,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17049332?v=4",
|
|
"html_url": "https:\/\/github.com\/MrCl0wnLab",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/MrCl0wnLab\/SimplesApachePathTraversal",
|
|
"description": "Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519",
|
|
"fork": false,
|
|
"created_at": "2021-10-13T17:03:56Z",
|
|
"updated_at": "2024-08-28T17:32:14Z",
|
|
"pushed_at": "2024-08-14T14:41:14Z",
|
|
"stargazers_count": 60,
|
|
"watchers_count": 60,
|
|
"has_discussions": false,
|
|
"forks_count": 15,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2020-17519",
|
|
"cve-2021-41773",
|
|
"cve-2021-42013"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 15,
|
|
"watchers": 60,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 417643516,
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "LudovicPatho\/CVE-2021-41773",
|
|
"owner": {
|
|
"login": "LudovicPatho",
|
|
"id": 26960886,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26960886?v=4",
|
|
"html_url": "https:\/\/github.com\/LudovicPatho",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/LudovicPatho\/CVE-2021-41773",
|
|
"description": "The first vulnerability with the CVE identifier CVE-2021-41773 is a path traversal flaw that exists in Apache HTTP Server 2.4.49.",
|
|
"fork": false,
|
|
"created_at": "2021-10-15T21:38:48Z",
|
|
"updated_at": "2023-12-13T10:08:43Z",
|
|
"pushed_at": "2022-10-26T18:01:44Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 3,
|
|
"score": 0,
|
|
"subscribers_count": 3
|
|
},
|
|
{
|
|
"id": 420407065,
|
|
"name": "cve-2021-41773",
|
|
"full_name": "walnutsecurity\/cve-2021-41773",
|
|
"owner": {
|
|
"login": "walnutsecurity",
|
|
"id": 92915142,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92915142?v=4",
|
|
"html_url": "https:\/\/github.com\/walnutsecurity",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/walnutsecurity\/cve-2021-41773",
|
|
"description": "cve-2021-41773.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.49",
|
|
"fork": false,
|
|
"created_at": "2021-10-23T12:31:53Z",
|
|
"updated_at": "2024-08-25T14:50:10Z",
|
|
"pushed_at": "2023-01-11T14:04:08Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 464271089,
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "skentagon\/CVE-2021-41773",
|
|
"owner": {
|
|
"login": "skentagon",
|
|
"id": 49702576,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49702576?v=4",
|
|
"html_url": "https:\/\/github.com\/skentagon",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/skentagon\/CVE-2021-41773",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-02-27T22:39:58Z",
|
|
"updated_at": "2024-10-28T08:59:20Z",
|
|
"pushed_at": "2024-10-28T08:59:16Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 847507185,
|
|
"name": "Apache-HTTP-Server-2.4.50-RCE",
|
|
"full_name": "Zyx2440\/Apache-HTTP-Server-2.4.50-RCE",
|
|
"owner": {
|
|
"login": "Zyx2440",
|
|
"id": 178906552,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/178906552?v=4",
|
|
"html_url": "https:\/\/github.com\/Zyx2440",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Zyx2440\/Apache-HTTP-Server-2.4.50-RCE",
|
|
"description": "Apache-HTTP-Server-2.4.50-RCE This tool is designed to test Apache servers for the CVE-2021-41773 \/ CVE-2021-42013 vulnerability. It is intended for educational purposes only and should be used responsibly on systems you have explicit permission to test.",
|
|
"fork": false,
|
|
"created_at": "2024-08-26T01:54:06Z",
|
|
"updated_at": "2024-08-27T12:54:48Z",
|
|
"pushed_at": "2024-08-26T16:32:21Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"apache",
|
|
"apache2",
|
|
"check-version",
|
|
"cve-2021-41773",
|
|
"cve-2021-41773-poc",
|
|
"cve-2021-42013",
|
|
"rce"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 847643436,
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "0xc4t\/CVE-2021-41773",
|
|
"owner": {
|
|
"login": "0xc4t",
|
|
"id": 105418279,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105418279?v=4",
|
|
"html_url": "https:\/\/github.com\/0xc4t",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/0xc4t\/CVE-2021-41773",
|
|
"description": "POC & Lab For CVE-2021-41773",
|
|
"fork": false,
|
|
"created_at": "2024-08-26T09:07:33Z",
|
|
"updated_at": "2024-08-27T11:37:07Z",
|
|
"pushed_at": "2024-08-27T11:37:04Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 848546482,
|
|
"name": "Additive-Vulnerability-Analysis-CVE-2021-41773",
|
|
"full_name": "jkska23\/Additive-Vulnerability-Analysis-CVE-2021-41773",
|
|
"owner": {
|
|
"login": "jkska23",
|
|
"id": 51857894,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51857894?v=4",
|
|
"html_url": "https:\/\/github.com\/jkska23",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/jkska23\/Additive-Vulnerability-Analysis-CVE-2021-41773",
|
|
"description": "Apache: a Mainstream Web Service Turned a Vector of Attack for Remote Code Execution",
|
|
"fork": false,
|
|
"created_at": "2024-08-28T00:49:09Z",
|
|
"updated_at": "2024-08-28T00:54:26Z",
|
|
"pushed_at": "2024-08-28T00:54:24Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |