PoC-in-GitHub/2021/CVE-2021-41773.json
2024-10-29 21:30:55 +09:00

460 lines
No EOL
16 KiB
JSON

[
{
"id": 413890827,
"name": "cve-2021-41773",
"full_name": "Vulnmachines\/cve-2021-41773",
"owner": {
"login": "Vulnmachines",
"id": 79006904,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
"html_url": "https:\/\/github.com\/Vulnmachines",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Vulnmachines\/cve-2021-41773",
"description": "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.",
"fork": false,
"created_at": "2021-10-05T16:13:38Z",
"updated_at": "2024-09-03T02:15:12Z",
"pushed_at": "2022-08-30T11:58:32Z",
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 40,
"score": 0,
"subscribers_count": 1
},
{
"id": 414043746,
"name": "CVE-2021-41773_CVE-2021-42013",
"full_name": "Ls4ss\/CVE-2021-41773_CVE-2021-42013",
"owner": {
"login": "Ls4ss",
"id": 25537761,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25537761?v=4",
"html_url": "https:\/\/github.com\/Ls4ss",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Ls4ss\/CVE-2021-41773_CVE-2021-42013",
"description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE",
"fork": false,
"created_at": "2021-10-06T02:28:41Z",
"updated_at": "2024-08-12T20:17:00Z",
"pushed_at": "2022-09-09T16:09:11Z",
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache",
"cve",
"exploit",
"payload",
"pentest",
"rce"
],
"visibility": "public",
"forks": 9,
"watchers": 21,
"score": 0,
"subscribers_count": 2
},
{
"id": 414044140,
"name": "CVE-2021-41773",
"full_name": "itsecurityco\/CVE-2021-41773",
"owner": {
"login": "itsecurityco",
"id": 1725054,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1725054?v=4",
"html_url": "https:\/\/github.com\/itsecurityco",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/itsecurityco\/CVE-2021-41773",
"description": "CVE-2021-41773 POC with Docker",
"fork": false,
"created_at": "2021-10-06T02:30:40Z",
"updated_at": "2024-08-12T20:17:00Z",
"pushed_at": "2022-10-07T23:37:10Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 10,
"score": 0,
"subscribers_count": 2
},
{
"id": 414082287,
"name": "CVE-2021-41773-POC",
"full_name": "creadpag\/CVE-2021-41773-POC",
"owner": {
"login": "creadpag",
"id": 15526083,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15526083?v=4",
"html_url": "https:\/\/github.com\/creadpag",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/creadpag\/CVE-2021-41773-POC",
"description": "CVE-2021-41773",
"fork": false,
"created_at": "2021-10-06T05:34:48Z",
"updated_at": "2024-08-12T20:17:00Z",
"pushed_at": "2022-12-28T17:49:24Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 8,
"score": 0,
"subscribers_count": 2
},
{
"id": 414248192,
"name": "CVE-2021-41773",
"full_name": "ranggaggngntt\/CVE-2021-41773",
"owner": {
"login": "ranggaggngntt",
"id": 57105391,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57105391?v=4",
"html_url": "https:\/\/github.com\/ranggaggngntt",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ranggaggngntt\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-06T14:36:05Z",
"updated_at": "2024-08-12T20:17:01Z",
"pushed_at": "2022-06-11T13:34:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 414592683,
"name": "CVE-2021-41773",
"full_name": "noflowpls\/CVE-2021-41773",
"owner": {
"login": "noflowpls",
"id": 84136529,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84136529?v=4",
"html_url": "https:\/\/github.com\/noflowpls",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/noflowpls\/CVE-2021-41773",
"description": "CVE-2021-41773",
"fork": false,
"created_at": "2021-10-07T12:30:13Z",
"updated_at": "2024-08-12T20:17:04Z",
"pushed_at": "2022-11-15T08:51:33Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
{
"id": 414650983,
"name": "mass_cve-2021-41773",
"full_name": "justakazh\/mass_cve-2021-41773",
"owner": {
"login": "justakazh",
"id": 36891477,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36891477?v=4",
"html_url": "https:\/\/github.com\/justakazh",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/justakazh\/mass_cve-2021-41773",
"description": "MASS CVE-2021-41773",
"fork": false,
"created_at": "2021-10-07T15:13:18Z",
"updated_at": "2024-08-12T20:17:04Z",
"pushed_at": "2023-11-14T07:00:33Z",
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"automatic",
"cve-2021-41773",
"exploit",
"scanner"
],
"visibility": "public",
"forks": 24,
"watchers": 27,
"score": 0,
"subscribers_count": 4
},
{
"id": 416830075,
"name": "SimplesApachePathTraversal",
"full_name": "MrCl0wnLab\/SimplesApachePathTraversal",
"owner": {
"login": "MrCl0wnLab",
"id": 17049332,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17049332?v=4",
"html_url": "https:\/\/github.com\/MrCl0wnLab",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MrCl0wnLab\/SimplesApachePathTraversal",
"description": "Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519",
"fork": false,
"created_at": "2021-10-13T17:03:56Z",
"updated_at": "2024-08-28T17:32:14Z",
"pushed_at": "2024-08-14T14:41:14Z",
"stargazers_count": 60,
"watchers_count": 60,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2020-17519",
"cve-2021-41773",
"cve-2021-42013"
],
"visibility": "public",
"forks": 15,
"watchers": 60,
"score": 0,
"subscribers_count": 2
},
{
"id": 417643516,
"name": "CVE-2021-41773",
"full_name": "LudovicPatho\/CVE-2021-41773",
"owner": {
"login": "LudovicPatho",
"id": 26960886,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26960886?v=4",
"html_url": "https:\/\/github.com\/LudovicPatho",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/LudovicPatho\/CVE-2021-41773",
"description": "The first vulnerability with the CVE identifier CVE-2021-41773 is a path traversal flaw that exists in Apache HTTP Server 2.4.49.",
"fork": false,
"created_at": "2021-10-15T21:38:48Z",
"updated_at": "2023-12-13T10:08:43Z",
"pushed_at": "2022-10-26T18:01:44Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 3
},
{
"id": 420407065,
"name": "cve-2021-41773",
"full_name": "walnutsecurity\/cve-2021-41773",
"owner": {
"login": "walnutsecurity",
"id": 92915142,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92915142?v=4",
"html_url": "https:\/\/github.com\/walnutsecurity",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/walnutsecurity\/cve-2021-41773",
"description": "cve-2021-41773.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.49",
"fork": false,
"created_at": "2021-10-23T12:31:53Z",
"updated_at": "2024-08-25T14:50:10Z",
"pushed_at": "2023-01-11T14:04:08Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 464271089,
"name": "CVE-2021-41773",
"full_name": "skentagon\/CVE-2021-41773",
"owner": {
"login": "skentagon",
"id": 49702576,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49702576?v=4",
"html_url": "https:\/\/github.com\/skentagon",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/skentagon\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-02-27T22:39:58Z",
"updated_at": "2024-10-28T08:59:20Z",
"pushed_at": "2024-10-28T08:59:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 847507185,
"name": "Apache-HTTP-Server-2.4.50-RCE",
"full_name": "Zyx2440\/Apache-HTTP-Server-2.4.50-RCE",
"owner": {
"login": "Zyx2440",
"id": 178906552,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/178906552?v=4",
"html_url": "https:\/\/github.com\/Zyx2440",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Zyx2440\/Apache-HTTP-Server-2.4.50-RCE",
"description": "Apache-HTTP-Server-2.4.50-RCE This tool is designed to test Apache servers for the CVE-2021-41773 \/ CVE-2021-42013 vulnerability. It is intended for educational purposes only and should be used responsibly on systems you have explicit permission to test.",
"fork": false,
"created_at": "2024-08-26T01:54:06Z",
"updated_at": "2024-08-27T12:54:48Z",
"pushed_at": "2024-08-26T16:32:21Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache",
"apache2",
"check-version",
"cve-2021-41773",
"cve-2021-41773-poc",
"cve-2021-42013",
"rce"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 847643436,
"name": "CVE-2021-41773",
"full_name": "0xc4t\/CVE-2021-41773",
"owner": {
"login": "0xc4t",
"id": 105418279,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105418279?v=4",
"html_url": "https:\/\/github.com\/0xc4t",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xc4t\/CVE-2021-41773",
"description": "POC & Lab For CVE-2021-41773",
"fork": false,
"created_at": "2024-08-26T09:07:33Z",
"updated_at": "2024-08-27T11:37:07Z",
"pushed_at": "2024-08-27T11:37:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 848546482,
"name": "Additive-Vulnerability-Analysis-CVE-2021-41773",
"full_name": "jkska23\/Additive-Vulnerability-Analysis-CVE-2021-41773",
"owner": {
"login": "jkska23",
"id": 51857894,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51857894?v=4",
"html_url": "https:\/\/github.com\/jkska23",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jkska23\/Additive-Vulnerability-Analysis-CVE-2021-41773",
"description": "Apache: a Mainstream Web Service Turned a Vector of Attack for Remote Code Execution",
"fork": false,
"created_at": "2024-08-28T00:49:09Z",
"updated_at": "2024-08-28T00:54:26Z",
"pushed_at": "2024-08-28T00:54:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]