mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
2128 lines
No EOL
71 KiB
JSON
2128 lines
No EOL
71 KiB
JSON
[
|
||
{
|
||
"id": 413890827,
|
||
"name": "cve-2021-41773",
|
||
"full_name": "Vulnmachines\/cve-2021-41773",
|
||
"owner": {
|
||
"login": "Vulnmachines",
|
||
"id": 79006904,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
|
||
"html_url": "https:\/\/github.com\/Vulnmachines"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Vulnmachines\/cve-2021-41773",
|
||
"description": "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.",
|
||
"fork": false,
|
||
"created_at": "2021-10-05T16:13:38Z",
|
||
"updated_at": "2021-11-26T20:23:14Z",
|
||
"pushed_at": "2021-11-26T20:23:11Z",
|
||
"stargazers_count": 28,
|
||
"watchers_count": 28,
|
||
"forks_count": 10,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 10,
|
||
"watchers": 28,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 413892415,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "numanturle\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "numanturle",
|
||
"id": 7007951,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
|
||
"html_url": "https:\/\/github.com\/numanturle"
|
||
},
|
||
"html_url": "https:\/\/github.com\/numanturle\/CVE-2021-41773",
|
||
"description": "CVE-2021-41773",
|
||
"fork": false,
|
||
"created_at": "2021-10-05T16:18:09Z",
|
||
"updated_at": "2021-10-10T08:49:06Z",
|
||
"pushed_at": "2021-10-05T16:48:27Z",
|
||
"stargazers_count": 9,
|
||
"watchers_count": 9,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 9,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 413901787,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "knqyf263\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "knqyf263",
|
||
"id": 2253692,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
|
||
"html_url": "https:\/\/github.com\/knqyf263"
|
||
},
|
||
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2021-41773",
|
||
"description": "Path traversal in Apache HTTP Server 2.4.49 (CVE-2021-41773) ",
|
||
"fork": false,
|
||
"created_at": "2021-10-05T16:45:41Z",
|
||
"updated_at": "2021-10-19T03:08:08Z",
|
||
"pushed_at": "2021-10-06T05:40:34Z",
|
||
"stargazers_count": 9,
|
||
"watchers_count": 9,
|
||
"forks_count": 6,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 6,
|
||
"watchers": 9,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 413916578,
|
||
"name": "CVE-2021-41773-PoC",
|
||
"full_name": "ZephrFish\/CVE-2021-41773-PoC",
|
||
"owner": {
|
||
"login": "ZephrFish",
|
||
"id": 5783068,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
|
||
"html_url": "https:\/\/github.com\/ZephrFish"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ZephrFish\/CVE-2021-41773-PoC",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-10-05T17:29:49Z",
|
||
"updated_at": "2021-10-19T08:07:47Z",
|
||
"pushed_at": "2021-10-06T09:25:38Z",
|
||
"stargazers_count": 18,
|
||
"watchers_count": 18,
|
||
"forks_count": 9,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 9,
|
||
"watchers": 18,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 413916846,
|
||
"name": "PoC-CVE-2021-41773",
|
||
"full_name": "iilegacyyii\/PoC-CVE-2021-41773",
|
||
"owner": {
|
||
"login": "iilegacyyii",
|
||
"id": 68760809,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68760809?v=4",
|
||
"html_url": "https:\/\/github.com\/iilegacyyii"
|
||
},
|
||
"html_url": "https:\/\/github.com\/iilegacyyii\/PoC-CVE-2021-41773",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-10-05T17:30:43Z",
|
||
"updated_at": "2021-11-25T03:40:06Z",
|
||
"pushed_at": "2021-11-24T12:57:46Z",
|
||
"stargazers_count": 36,
|
||
"watchers_count": 36,
|
||
"forks_count": 32,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"apache",
|
||
"cve",
|
||
"lfi",
|
||
"poc",
|
||
"rce"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 32,
|
||
"watchers": 36,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 413943505,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "masahiro331\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "masahiro331",
|
||
"id": 20438853,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20438853?v=4",
|
||
"html_url": "https:\/\/github.com\/masahiro331"
|
||
},
|
||
"html_url": "https:\/\/github.com\/masahiro331\/CVE-2021-41773",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-10-05T18:56:04Z",
|
||
"updated_at": "2021-10-10T18:37:45Z",
|
||
"pushed_at": "2021-10-06T03:43:42Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 413969845,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "RyouYoo\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "RyouYoo",
|
||
"id": 48088579,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48088579?v=4",
|
||
"html_url": "https:\/\/github.com\/RyouYoo"
|
||
},
|
||
"html_url": "https:\/\/github.com\/RyouYoo\/CVE-2021-41773",
|
||
"description": "Exploitation of CVE-2021-41773 a Directory Traversal in Apache 2.4.49.",
|
||
"fork": false,
|
||
"created_at": "2021-10-05T20:30:01Z",
|
||
"updated_at": "2021-10-10T18:01:45Z",
|
||
"pushed_at": "2021-10-05T22:06:50Z",
|
||
"stargazers_count": 11,
|
||
"watchers_count": 11,
|
||
"forks_count": 5,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 5,
|
||
"watchers": 11,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 413972926,
|
||
"name": "POC-CVE-2021-41773",
|
||
"full_name": "TishcaTpx\/POC-CVE-2021-41773",
|
||
"owner": {
|
||
"login": "TishcaTpx",
|
||
"id": 91351013,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91351013?v=4",
|
||
"html_url": "https:\/\/github.com\/TishcaTpx"
|
||
},
|
||
"html_url": "https:\/\/github.com\/TishcaTpx\/POC-CVE-2021-41773",
|
||
"description": "Poc.py ",
|
||
"fork": false,
|
||
"created_at": "2021-10-05T20:41:34Z",
|
||
"updated_at": "2021-10-14T18:36:50Z",
|
||
"pushed_at": "2021-10-05T21:29:59Z",
|
||
"stargazers_count": 6,
|
||
"watchers_count": 6,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 6,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414013246,
|
||
"name": "CVE-2021-41773-PoC",
|
||
"full_name": "lorddemon\/CVE-2021-41773-PoC",
|
||
"owner": {
|
||
"login": "lorddemon",
|
||
"id": 6675738,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6675738?v=4",
|
||
"html_url": "https:\/\/github.com\/lorddemon"
|
||
},
|
||
"html_url": "https:\/\/github.com\/lorddemon\/CVE-2021-41773-PoC",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-10-05T23:53:48Z",
|
||
"updated_at": "2021-11-30T01:22:18Z",
|
||
"pushed_at": "2021-10-06T15:37:23Z",
|
||
"stargazers_count": 37,
|
||
"watchers_count": 37,
|
||
"forks_count": 20,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 20,
|
||
"watchers": 37,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414043746,
|
||
"name": "CVE-2021-41773_CVE-2021-42013",
|
||
"full_name": "Ls4ss\/CVE-2021-41773_CVE-2021-42013",
|
||
"owner": {
|
||
"login": "Ls4ss",
|
||
"id": 25537761,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25537761?v=4",
|
||
"html_url": "https:\/\/github.com\/Ls4ss"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Ls4ss\/CVE-2021-41773_CVE-2021-42013",
|
||
"description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE",
|
||
"fork": false,
|
||
"created_at": "2021-10-06T02:28:41Z",
|
||
"updated_at": "2021-11-11T01:33:47Z",
|
||
"pushed_at": "2021-10-09T19:37:29Z",
|
||
"stargazers_count": 16,
|
||
"watchers_count": 16,
|
||
"forks_count": 7,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"apache",
|
||
"cve",
|
||
"exploit",
|
||
"payload",
|
||
"pentest",
|
||
"rce"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 7,
|
||
"watchers": 16,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414044140,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "itsecurityco\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "itsecurityco",
|
||
"id": 1725054,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1725054?v=4",
|
||
"html_url": "https:\/\/github.com\/itsecurityco"
|
||
},
|
||
"html_url": "https:\/\/github.com\/itsecurityco\/CVE-2021-41773",
|
||
"description": "CVE-2021-41773 POC with Docker",
|
||
"fork": false,
|
||
"created_at": "2021-10-06T02:30:40Z",
|
||
"updated_at": "2021-11-04T23:33:40Z",
|
||
"pushed_at": "2021-10-06T03:37:20Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"forks_count": 5,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 5,
|
||
"watchers": 4,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414050354,
|
||
"name": "CVE-2021-41773-PoC",
|
||
"full_name": "habibiefaried\/CVE-2021-41773-PoC",
|
||
"owner": {
|
||
"login": "habibiefaried",
|
||
"id": 4345690,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4345690?v=4",
|
||
"html_url": "https:\/\/github.com\/habibiefaried"
|
||
},
|
||
"html_url": "https:\/\/github.com\/habibiefaried\/CVE-2021-41773-PoC",
|
||
"description": "PoC for CVE-2021-41773 with docker to demonstrate",
|
||
"fork": false,
|
||
"created_at": "2021-10-06T03:01:41Z",
|
||
"updated_at": "2021-11-04T23:35:58Z",
|
||
"pushed_at": "2021-10-06T05:39:24Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414082287,
|
||
"name": "CVE-2021-41773-POC",
|
||
"full_name": "creadpag\/CVE-2021-41773-POC",
|
||
"owner": {
|
||
"login": "creadpag",
|
||
"id": 15526083,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15526083?v=4",
|
||
"html_url": "https:\/\/github.com\/creadpag"
|
||
},
|
||
"html_url": "https:\/\/github.com\/creadpag\/CVE-2021-41773-POC",
|
||
"description": "CVE-2021-41773",
|
||
"fork": false,
|
||
"created_at": "2021-10-06T05:34:48Z",
|
||
"updated_at": "2021-11-15T12:00:37Z",
|
||
"pushed_at": "2021-10-06T05:48:55Z",
|
||
"stargazers_count": 11,
|
||
"watchers_count": 11,
|
||
"forks_count": 5,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 5,
|
||
"watchers": 11,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414082633,
|
||
"name": "cve-2021-41773-nse",
|
||
"full_name": "TAI-REx\/cve-2021-41773-nse",
|
||
"owner": {
|
||
"login": "TAI-REx",
|
||
"id": 78527947,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78527947?v=4",
|
||
"html_url": "https:\/\/github.com\/TAI-REx"
|
||
},
|
||
"html_url": "https:\/\/github.com\/TAI-REx\/cve-2021-41773-nse",
|
||
"description": "CVE-2021-41773.nse",
|
||
"fork": false,
|
||
"created_at": "2021-10-06T05:36:22Z",
|
||
"updated_at": "2021-11-26T18:07:10Z",
|
||
"pushed_at": "2021-10-06T05:23:16Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414108838,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "blasty\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "blasty",
|
||
"id": 101374,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101374?v=4",
|
||
"html_url": "https:\/\/github.com\/blasty"
|
||
},
|
||
"html_url": "https:\/\/github.com\/blasty\/CVE-2021-41773",
|
||
"description": "CVE-2021-41773 playground",
|
||
"fork": false,
|
||
"created_at": "2021-10-06T07:17:05Z",
|
||
"updated_at": "2021-11-24T17:01:38Z",
|
||
"pushed_at": "2021-10-07T17:56:38Z",
|
||
"stargazers_count": 199,
|
||
"watchers_count": 199,
|
||
"forks_count": 50,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 50,
|
||
"watchers": 199,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414159388,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "PentesterGuruji\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "PentesterGuruji",
|
||
"id": 87645282,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87645282?v=4",
|
||
"html_url": "https:\/\/github.com\/PentesterGuruji"
|
||
},
|
||
"html_url": "https:\/\/github.com\/PentesterGuruji\/CVE-2021-41773",
|
||
"description": "Path Traversal vulnerability in Apache 2.4.49",
|
||
"fork": false,
|
||
"created_at": "2021-10-06T10:04:22Z",
|
||
"updated_at": "2021-10-10T18:52:52Z",
|
||
"pushed_at": "2021-10-07T19:39:09Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414227353,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "jbovet\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "jbovet",
|
||
"id": 41589,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41589?v=4",
|
||
"html_url": "https:\/\/github.com\/jbovet"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jbovet\/CVE-2021-41773",
|
||
"description": "Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49 (CVE-2021-41773)",
|
||
"fork": false,
|
||
"created_at": "2021-10-06T13:39:57Z",
|
||
"updated_at": "2021-10-10T18:53:15Z",
|
||
"pushed_at": "2021-10-06T14:15:45Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414239384,
|
||
"name": "cve-2021-41773",
|
||
"full_name": "mohwahyudi\/cve-2021-41773",
|
||
"owner": {
|
||
"login": "mohwahyudi",
|
||
"id": 57562836,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57562836?v=4",
|
||
"html_url": "https:\/\/github.com\/mohwahyudi"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mohwahyudi\/cve-2021-41773",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-10-06T14:12:07Z",
|
||
"updated_at": "2021-10-18T00:55:02Z",
|
||
"pushed_at": "2021-10-08T01:55:22Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414241382,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "1nhann\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "1nhann",
|
||
"id": 76624149,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76624149?v=4",
|
||
"html_url": "https:\/\/github.com\/1nhann"
|
||
},
|
||
"html_url": "https:\/\/github.com\/1nhann\/CVE-2021-41773",
|
||
"description": "CVE-2021-41773 的复现",
|
||
"fork": false,
|
||
"created_at": "2021-10-06T14:17:31Z",
|
||
"updated_at": "2021-11-24T10:27:46Z",
|
||
"pushed_at": "2021-10-08T05:03:10Z",
|
||
"stargazers_count": 6,
|
||
"watchers_count": 6,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 6,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414248192,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "ranggaggngntt\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "ranggaggngntt",
|
||
"id": 57105391,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57105391?v=4",
|
||
"html_url": "https:\/\/github.com\/ranggaggngntt"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ranggaggngntt\/CVE-2021-41773",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-10-06T14:36:05Z",
|
||
"updated_at": "2021-10-10T18:53:04Z",
|
||
"pushed_at": "2021-10-06T14:41:08Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414252359,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "BlueTeamSteve\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "BlueTeamSteve",
|
||
"id": 550582,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/550582?v=4",
|
||
"html_url": "https:\/\/github.com\/BlueTeamSteve"
|
||
},
|
||
"html_url": "https:\/\/github.com\/BlueTeamSteve\/CVE-2021-41773",
|
||
"description": "Vulnerable docker images for CVE-2021-41773",
|
||
"fork": false,
|
||
"created_at": "2021-10-06T14:47:23Z",
|
||
"updated_at": "2021-11-25T23:21:31Z",
|
||
"pushed_at": "2021-10-06T15:07:48Z",
|
||
"stargazers_count": 11,
|
||
"watchers_count": 11,
|
||
"forks_count": 7,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 7,
|
||
"watchers": 11,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414256797,
|
||
"name": "apache_normalize_path",
|
||
"full_name": "Zeop-CyberSec\/apache_normalize_path",
|
||
"owner": {
|
||
"login": "Zeop-CyberSec",
|
||
"id": 68154603,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68154603?v=4",
|
||
"html_url": "https:\/\/github.com\/Zeop-CyberSec"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Zeop-CyberSec\/apache_normalize_path",
|
||
"description": "Metasploit-Framework modules (scanner and exploit) for the CVE-2021-41773 and CVE-2021-42013 (Path Traversal in Apache 2.4.49\/2.4.50)",
|
||
"fork": false,
|
||
"created_at": "2021-10-06T14:58:27Z",
|
||
"updated_at": "2021-11-07T19:19:39Z",
|
||
"pushed_at": "2021-10-21T18:51:00Z",
|
||
"stargazers_count": 12,
|
||
"watchers_count": 12,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 12,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414284449,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "r00tVen0m\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "r00tVen0m",
|
||
"id": 50659263,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50659263?v=4",
|
||
"html_url": "https:\/\/github.com\/r00tVen0m"
|
||
},
|
||
"html_url": "https:\/\/github.com\/r00tVen0m\/CVE-2021-41773",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-10-06T16:15:21Z",
|
||
"updated_at": "2021-10-10T18:37:20Z",
|
||
"pushed_at": "2021-10-06T19:05:07Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414347675,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "n3k00n3\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "n3k00n3",
|
||
"id": 7244777,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7244777?v=4",
|
||
"html_url": "https:\/\/github.com\/n3k00n3"
|
||
},
|
||
"html_url": "https:\/\/github.com\/n3k00n3\/CVE-2021-41773",
|
||
"description": "exploit to CVE-2021-41773",
|
||
"fork": false,
|
||
"created_at": "2021-10-06T19:39:25Z",
|
||
"updated_at": "2021-10-10T18:59:35Z",
|
||
"pushed_at": "2021-10-08T16:32:51Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414350527,
|
||
"name": "CVE-2021-41773-RCE",
|
||
"full_name": "fnatalucci\/CVE-2021-41773-RCE",
|
||
"owner": {
|
||
"login": "fnatalucci",
|
||
"id": 5574371,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5574371?v=4",
|
||
"html_url": "https:\/\/github.com\/fnatalucci"
|
||
},
|
||
"html_url": "https:\/\/github.com\/fnatalucci\/CVE-2021-41773-RCE",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-10-06T19:50:33Z",
|
||
"updated_at": "2021-10-10T18:59:25Z",
|
||
"pushed_at": "2021-10-06T20:14:27Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414376599,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "AssassinUKG\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "AssassinUKG",
|
||
"id": 5285547,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5285547?v=4",
|
||
"html_url": "https:\/\/github.com\/AssassinUKG"
|
||
},
|
||
"html_url": "https:\/\/github.com\/AssassinUKG\/CVE-2021-41773",
|
||
"description": "Apache 2.4.49",
|
||
"fork": false,
|
||
"created_at": "2021-10-06T21:37:18Z",
|
||
"updated_at": "2021-10-20T23:04:09Z",
|
||
"pushed_at": "2021-10-20T23:04:06Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414402542,
|
||
"name": "Simple-CVE-2021-41773-checker",
|
||
"full_name": "jheeree\/Simple-CVE-2021-41773-checker",
|
||
"owner": {
|
||
"login": "jheeree",
|
||
"id": 19227591,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19227591?v=4",
|
||
"html_url": "https:\/\/github.com\/jheeree"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jheeree\/Simple-CVE-2021-41773-checker",
|
||
"description": "Simple script realizado en bash, para revisión de múltiples hosts para CVE-2021-41773 (Apache)",
|
||
"fork": false,
|
||
"created_at": "2021-10-06T23:32:30Z",
|
||
"updated_at": "2021-12-01T00:49:45Z",
|
||
"pushed_at": "2021-10-12T03:28:51Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414410579,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "oxctdev\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "oxctdev",
|
||
"id": 91846073,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
|
||
"html_url": "https:\/\/github.com\/oxctdev"
|
||
},
|
||
"html_url": "https:\/\/github.com\/oxctdev\/CVE-2021-41773",
|
||
"description": "Apache HTTPd (2.4.49) – Local File Disclosure (LFI)",
|
||
"fork": false,
|
||
"created_at": "2021-10-07T00:14:40Z",
|
||
"updated_at": "2021-11-01T09:04:40Z",
|
||
"pushed_at": "2021-10-07T00:19:26Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"httpd",
|
||
"remote-code-execution"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414425270,
|
||
"name": "scarce-apache2",
|
||
"full_name": "HightechSec\/scarce-apache2",
|
||
"owner": {
|
||
"login": "HightechSec",
|
||
"id": 24645706,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24645706?v=4",
|
||
"html_url": "https:\/\/github.com\/HightechSec"
|
||
},
|
||
"html_url": "https:\/\/github.com\/HightechSec\/scarce-apache2",
|
||
"description": "A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public ",
|
||
"fork": false,
|
||
"created_at": "2021-10-07T01:31:13Z",
|
||
"updated_at": "2021-12-02T09:30:58Z",
|
||
"pushed_at": "2021-10-07T08:25:26Z",
|
||
"stargazers_count": 41,
|
||
"watchers_count": 41,
|
||
"forks_count": 13,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"bash-script",
|
||
"bug-hunting",
|
||
"cve-2021-41773",
|
||
"hacktoberfest",
|
||
"pentesting"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 13,
|
||
"watchers": 41,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414514606,
|
||
"name": "CVE-2021-41773-exploit",
|
||
"full_name": "vinhjaxt\/CVE-2021-41773-exploit",
|
||
"owner": {
|
||
"login": "vinhjaxt",
|
||
"id": 8877695,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8877695?v=4",
|
||
"html_url": "https:\/\/github.com\/vinhjaxt"
|
||
},
|
||
"html_url": "https:\/\/github.com\/vinhjaxt\/CVE-2021-41773-exploit",
|
||
"description": "CVE-2021-41773, poc, exploit",
|
||
"fork": false,
|
||
"created_at": "2021-10-07T08:10:00Z",
|
||
"updated_at": "2021-10-10T18:59:44Z",
|
||
"pushed_at": "2021-10-08T04:55:32Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414581409,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "twseptian\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "twseptian",
|
||
"id": 9025301,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9025301?v=4",
|
||
"html_url": "https:\/\/github.com\/twseptian"
|
||
},
|
||
"html_url": "https:\/\/github.com\/twseptian\/CVE-2021-41773",
|
||
"description": "CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited",
|
||
"fork": false,
|
||
"created_at": "2021-10-07T11:55:10Z",
|
||
"updated_at": "2021-11-08T02:00:42Z",
|
||
"pushed_at": "2021-10-10T05:19:29Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"apache",
|
||
"cve-2021-41773",
|
||
"path-traversal",
|
||
"shodan",
|
||
"shodan-cli",
|
||
"vulnerability"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414592683,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "ComdeyOverflow\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "ComdeyOverflow",
|
||
"id": 84136529,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84136529?v=4",
|
||
"html_url": "https:\/\/github.com\/ComdeyOverflow"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ComdeyOverflow\/CVE-2021-41773",
|
||
"description": "CVE-2021-41773",
|
||
"fork": false,
|
||
"created_at": "2021-10-07T12:30:13Z",
|
||
"updated_at": "2021-10-10T18:36:13Z",
|
||
"pushed_at": "2021-10-08T09:19:09Z",
|
||
"stargazers_count": 6,
|
||
"watchers_count": 6,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 6,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414646379,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "shiomiyan\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "shiomiyan",
|
||
"id": 35842766,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35842766?v=4",
|
||
"html_url": "https:\/\/github.com\/shiomiyan"
|
||
},
|
||
"html_url": "https:\/\/github.com\/shiomiyan\/CVE-2021-41773",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-10-07T15:00:55Z",
|
||
"updated_at": "2021-10-15T19:28:33Z",
|
||
"pushed_at": "2021-10-15T19:28:30Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414650983,
|
||
"name": "mass_cve-2021-41773",
|
||
"full_name": "justakazh\/mass_cve-2021-41773",
|
||
"owner": {
|
||
"login": "justakazh",
|
||
"id": 36891477,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36891477?v=4",
|
||
"html_url": "https:\/\/github.com\/justakazh"
|
||
},
|
||
"html_url": "https:\/\/github.com\/justakazh\/mass_cve-2021-41773",
|
||
"description": "MASS CVE-2021-41773",
|
||
"fork": false,
|
||
"created_at": "2021-10-07T15:13:18Z",
|
||
"updated_at": "2021-10-12T15:02:02Z",
|
||
"pushed_at": "2021-10-10T09:14:27Z",
|
||
"stargazers_count": 22,
|
||
"watchers_count": 22,
|
||
"forks_count": 16,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 16,
|
||
"watchers": 22,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414674481,
|
||
"name": "Poc-CVE-2021-41773",
|
||
"full_name": "LetouRaphael\/Poc-CVE-2021-41773",
|
||
"owner": {
|
||
"login": "LetouRaphael",
|
||
"id": 48223543,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48223543?v=4",
|
||
"html_url": "https:\/\/github.com\/LetouRaphael"
|
||
},
|
||
"html_url": "https:\/\/github.com\/LetouRaphael\/Poc-CVE-2021-41773",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-10-07T16:19:45Z",
|
||
"updated_at": "2021-10-08T01:15:42Z",
|
||
"pushed_at": "2021-10-07T16:48:27Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414764740,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "Sakura-nee\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "Sakura-nee",
|
||
"id": 74785477,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74785477?v=4",
|
||
"html_url": "https:\/\/github.com\/Sakura-nee"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Sakura-nee\/CVE-2021-41773",
|
||
"description": "Mass exploitation CVE-2021-41773 and auto detect possible RCE",
|
||
"fork": false,
|
||
"created_at": "2021-10-07T21:37:50Z",
|
||
"updated_at": "2021-10-10T18:52:13Z",
|
||
"pushed_at": "2021-10-07T21:52:57Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414787621,
|
||
"name": "lab-cve-2021-41773",
|
||
"full_name": "htrgouvea\/lab-cve-2021-41773",
|
||
"owner": {
|
||
"login": "htrgouvea",
|
||
"id": 10741284,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10741284?v=4",
|
||
"html_url": "https:\/\/github.com\/htrgouvea"
|
||
},
|
||
"html_url": "https:\/\/github.com\/htrgouvea\/lab-cve-2021-41773",
|
||
"description": "Docker container lab to play\/learn with CVE-2021-41773",
|
||
"fork": false,
|
||
"created_at": "2021-10-07T23:38:36Z",
|
||
"updated_at": "2021-11-20T12:37:40Z",
|
||
"pushed_at": "2021-10-08T12:29:44Z",
|
||
"stargazers_count": 14,
|
||
"watchers_count": 14,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"apache",
|
||
"container",
|
||
"cve-2021-41773",
|
||
"docker",
|
||
"lab"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 14,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414804962,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "shellreaper\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "shellreaper",
|
||
"id": 76930483,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76930483?v=4",
|
||
"html_url": "https:\/\/github.com\/shellreaper"
|
||
},
|
||
"html_url": "https:\/\/github.com\/shellreaper\/CVE-2021-41773",
|
||
"description": "This is a simple POC for Apache\/2.4.49 Path Traversal Vulnerability",
|
||
"fork": false,
|
||
"created_at": "2021-10-08T01:13:33Z",
|
||
"updated_at": "2021-11-12T00:05:10Z",
|
||
"pushed_at": "2021-11-12T00:03:34Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 4,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414845157,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "0xRar\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "0xRar",
|
||
"id": 33517160,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33517160?v=4",
|
||
"html_url": "https:\/\/github.com\/0xRar"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0xRar\/CVE-2021-41773",
|
||
"description": "Exploit for Apache 2.4.49",
|
||
"fork": false,
|
||
"created_at": "2021-10-08T04:26:31Z",
|
||
"updated_at": "2021-11-27T02:44:46Z",
|
||
"pushed_at": "2021-10-08T05:54:25Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414848372,
|
||
"name": "Sigma-Rule-for-CVE-2021-41773-and-CVE-2021-42013-exploitation-attempt",
|
||
"full_name": "pisut4152\/Sigma-Rule-for-CVE-2021-41773-and-CVE-2021-42013-exploitation-attempt",
|
||
"owner": {
|
||
"login": "pisut4152",
|
||
"id": 72641661,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72641661?v=4",
|
||
"html_url": "https:\/\/github.com\/pisut4152"
|
||
},
|
||
"html_url": "https:\/\/github.com\/pisut4152\/Sigma-Rule-for-CVE-2021-41773-and-CVE-2021-42013-exploitation-attempt",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-10-08T04:43:27Z",
|
||
"updated_at": "2021-10-10T18:50:04Z",
|
||
"pushed_at": "2021-10-08T04:46:08Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414878778,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "corelight\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "corelight",
|
||
"id": 21672558,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
|
||
"html_url": "https:\/\/github.com\/corelight"
|
||
},
|
||
"html_url": "https:\/\/github.com\/corelight\/CVE-2021-41773",
|
||
"description": "A Zeek package which raises notices for Path Traversal\/RCE in Apache HTTP Server 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013)",
|
||
"fork": false,
|
||
"created_at": "2021-10-08T06:54:27Z",
|
||
"updated_at": "2021-10-28T05:48:41Z",
|
||
"pushed_at": "2021-10-28T05:55:41Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414887591,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "zeronine9\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "zeronine9",
|
||
"id": 60152515,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60152515?v=4",
|
||
"html_url": "https:\/\/github.com\/zeronine9"
|
||
},
|
||
"html_url": "https:\/\/github.com\/zeronine9\/CVE-2021-41773",
|
||
"description": "Fast python tool to test apache path traversal CVE-2021-41773 in a List of url ",
|
||
"fork": false,
|
||
"created_at": "2021-10-08T07:24:49Z",
|
||
"updated_at": "2021-10-11T16:02:36Z",
|
||
"pushed_at": "2021-10-08T07:27:04Z",
|
||
"stargazers_count": 9,
|
||
"watchers_count": 9,
|
||
"forks_count": 7,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 7,
|
||
"watchers": 9,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 414907601,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "b1tsec\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "b1tsec",
|
||
"id": 74562513,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74562513?v=4",
|
||
"html_url": "https:\/\/github.com\/b1tsec"
|
||
},
|
||
"html_url": "https:\/\/github.com\/b1tsec\/CVE-2021-41773",
|
||
"description": "A Python script to check if an Apache web server is vulnerable to CVE-2021-41773",
|
||
"fork": false,
|
||
"created_at": "2021-10-08T08:32:51Z",
|
||
"updated_at": "2021-10-10T18:53:24Z",
|
||
"pushed_at": "2021-10-08T12:15:50Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 415041820,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "superzerosec\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "superzerosec",
|
||
"id": 57648217,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4",
|
||
"html_url": "https:\/\/github.com\/superzerosec"
|
||
},
|
||
"html_url": "https:\/\/github.com\/superzerosec\/CVE-2021-41773",
|
||
"description": "POC",
|
||
"fork": false,
|
||
"created_at": "2021-10-08T15:40:41Z",
|
||
"updated_at": "2021-10-11T22:24:14Z",
|
||
"pushed_at": "2021-10-11T22:24:12Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 4,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 415177333,
|
||
"name": "apachrot",
|
||
"full_name": "im-hanzou\/apachrot",
|
||
"owner": {
|
||
"login": "im-hanzou",
|
||
"id": 61415393,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61415393?v=4",
|
||
"html_url": "https:\/\/github.com\/im-hanzou"
|
||
},
|
||
"html_url": "https:\/\/github.com\/im-hanzou\/apachrot",
|
||
"description": "Apache (Linux) CVE-2021-41773\/2021-42013 Mass Vulnerability Checker",
|
||
"fork": false,
|
||
"created_at": "2021-10-09T02:12:39Z",
|
||
"updated_at": "2021-11-17T16:51:16Z",
|
||
"pushed_at": "2021-10-12T07:27:09Z",
|
||
"stargazers_count": 21,
|
||
"watchers_count": 21,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"apache",
|
||
"checker",
|
||
"cve-2021-41773",
|
||
"cve-2021-42013",
|
||
"vulnerability"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 21,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 415189947,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "KAB8345\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "KAB8345",
|
||
"id": 40665473,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40665473?v=4",
|
||
"html_url": "https:\/\/github.com\/KAB8345"
|
||
},
|
||
"html_url": "https:\/\/github.com\/KAB8345\/CVE-2021-41773",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-10-09T03:21:41Z",
|
||
"updated_at": "2021-10-09T03:21:45Z",
|
||
"pushed_at": "2021-10-09T03:21:42Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 415191949,
|
||
"name": "CVE-2021-41773_CVE-2021-42013",
|
||
"full_name": "inbug-team\/CVE-2021-41773_CVE-2021-42013",
|
||
"owner": {
|
||
"login": "inbug-team",
|
||
"id": 81735769,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81735769?v=4",
|
||
"html_url": "https:\/\/github.com\/inbug-team"
|
||
},
|
||
"html_url": "https:\/\/github.com\/inbug-team\/CVE-2021-41773_CVE-2021-42013",
|
||
"description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具",
|
||
"fork": false,
|
||
"created_at": "2021-10-09T03:32:18Z",
|
||
"updated_at": "2021-11-27T14:47:24Z",
|
||
"pushed_at": "2021-10-09T03:49:21Z",
|
||
"stargazers_count": 106,
|
||
"watchers_count": 106,
|
||
"forks_count": 32,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 32,
|
||
"watchers": 106,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 415290894,
|
||
"name": "cve-2021-41773-and-cve-2021-42013",
|
||
"full_name": "5gstudent\/cve-2021-41773-and-cve-2021-42013",
|
||
"owner": {
|
||
"login": "5gstudent",
|
||
"id": 37172754,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37172754?v=4",
|
||
"html_url": "https:\/\/github.com\/5gstudent"
|
||
},
|
||
"html_url": "https:\/\/github.com\/5gstudent\/cve-2021-41773-and-cve-2021-42013",
|
||
"description": "cve-2021-41773 即 cve-2021-42013 批量检测脚本",
|
||
"fork": false,
|
||
"created_at": "2021-10-09T11:33:56Z",
|
||
"updated_at": "2021-10-12T06:48:47Z",
|
||
"pushed_at": "2021-10-09T12:14:29Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 4,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 415357102,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "EagleTube\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "EagleTube",
|
||
"id": 87413459,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87413459?v=4",
|
||
"html_url": "https:\/\/github.com\/EagleTube"
|
||
},
|
||
"html_url": "https:\/\/github.com\/EagleTube\/CVE-2021-41773",
|
||
"description": "Apache 2.4.49 Path Traversal Vulnerability Checker ",
|
||
"fork": false,
|
||
"created_at": "2021-10-09T16:07:57Z",
|
||
"updated_at": "2021-10-10T18:55:45Z",
|
||
"pushed_at": "2021-10-09T16:32:08Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 415549063,
|
||
"name": "CVE-2021-41773-42013",
|
||
"full_name": "cgddgc\/CVE-2021-41773-42013",
|
||
"owner": {
|
||
"login": "cgddgc",
|
||
"id": 20945826,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20945826?v=4",
|
||
"html_url": "https:\/\/github.com\/cgddgc"
|
||
},
|
||
"html_url": "https:\/\/github.com\/cgddgc\/CVE-2021-41773-42013",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-10-10T10:09:52Z",
|
||
"updated_at": "2021-10-11T04:09:16Z",
|
||
"pushed_at": "2021-10-10T10:20:09Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 5,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 415737041,
|
||
"name": "Apachuk",
|
||
"full_name": "apapedulimu\/Apachuk",
|
||
"owner": {
|
||
"login": "apapedulimu",
|
||
"id": 16370264,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16370264?v=4",
|
||
"html_url": "https:\/\/github.com\/apapedulimu"
|
||
},
|
||
"html_url": "https:\/\/github.com\/apapedulimu\/Apachuk",
|
||
"description": "CVE-2021-41773 Grabber",
|
||
"fork": false,
|
||
"created_at": "2021-10-11T00:57:27Z",
|
||
"updated_at": "2021-10-12T10:13:51Z",
|
||
"pushed_at": "2021-10-11T02:51:11Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 4,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 415761005,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "scarmandef\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "scarmandef",
|
||
"id": 80011252,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80011252?v=4",
|
||
"html_url": "https:\/\/github.com\/scarmandef"
|
||
},
|
||
"html_url": "https:\/\/github.com\/scarmandef\/CVE-2021-41773",
|
||
"description": " Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE",
|
||
"fork": false,
|
||
"created_at": "2021-10-11T03:03:08Z",
|
||
"updated_at": "2021-10-14T04:59:46Z",
|
||
"pushed_at": "2021-10-14T04:59:43Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 416132671,
|
||
"name": "CVE-2021-41773-PoC",
|
||
"full_name": "0xAlmighty\/CVE-2021-41773-PoC",
|
||
"owner": {
|
||
"login": "0xAlmighty",
|
||
"id": 58662599,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58662599?v=4",
|
||
"html_url": "https:\/\/github.com\/0xAlmighty"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0xAlmighty\/CVE-2021-41773-PoC",
|
||
"description": "Path Traversal and RCE in Apache HTTP Server 2.4.49 ",
|
||
"fork": false,
|
||
"created_at": "2021-10-12T00:51:32Z",
|
||
"updated_at": "2021-10-18T15:37:03Z",
|
||
"pushed_at": "2021-10-12T00:52:59Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 416511119,
|
||
"name": "httpd-2.4.49",
|
||
"full_name": "ksanchezcld\/httpd-2.4.49",
|
||
"owner": {
|
||
"login": "ksanchezcld",
|
||
"id": 3130599,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3130599?v=4",
|
||
"html_url": "https:\/\/github.com\/ksanchezcld"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ksanchezcld\/httpd-2.4.49",
|
||
"description": "critical: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773) (CVE-2021-42013)",
|
||
"fork": false,
|
||
"created_at": "2021-10-12T22:02:09Z",
|
||
"updated_at": "2021-10-21T12:52:18Z",
|
||
"pushed_at": "2021-10-12T22:02:19Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 416830075,
|
||
"name": "SimplesApachePathTraversal",
|
||
"full_name": "MrCl0wnLab\/SimplesApachePathTraversal",
|
||
"owner": {
|
||
"login": "MrCl0wnLab",
|
||
"id": 17049332,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17049332?v=4",
|
||
"html_url": "https:\/\/github.com\/MrCl0wnLab"
|
||
},
|
||
"html_url": "https:\/\/github.com\/MrCl0wnLab\/SimplesApachePathTraversal",
|
||
"description": "Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519",
|
||
"fork": false,
|
||
"created_at": "2021-10-13T17:03:56Z",
|
||
"updated_at": "2021-12-02T07:38:55Z",
|
||
"pushed_at": "2021-10-14T21:11:44Z",
|
||
"stargazers_count": 48,
|
||
"watchers_count": 48,
|
||
"forks_count": 11,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2020-17519",
|
||
"cve-2021-41773",
|
||
"cve-2021-42013"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 11,
|
||
"watchers": 48,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 417461813,
|
||
"name": "apache-httpd-path-traversal-checker",
|
||
"full_name": "theLSA\/apache-httpd-path-traversal-checker",
|
||
"owner": {
|
||
"login": "theLSA",
|
||
"id": 28248956,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28248956?v=4",
|
||
"html_url": "https:\/\/github.com\/theLSA"
|
||
},
|
||
"html_url": "https:\/\/github.com\/theLSA\/apache-httpd-path-traversal-checker",
|
||
"description": "apache httpd path traversal checker(CVE-2021-41773 \/ CVE-2021-42013)",
|
||
"fork": false,
|
||
"created_at": "2021-10-15T10:38:44Z",
|
||
"updated_at": "2021-11-08T07:56:02Z",
|
||
"pushed_at": "2021-10-16T10:28:23Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 4,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 417643516,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "LudovicPatho\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "LudovicPatho",
|
||
"id": 26960886,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26960886?v=4",
|
||
"html_url": "https:\/\/github.com\/LudovicPatho"
|
||
},
|
||
"html_url": "https:\/\/github.com\/LudovicPatho\/CVE-2021-41773",
|
||
"description": "The first vulnerability with the CVE identifier CVE-2021-41773 is a path traversal flaw that exists in Apache HTTP Server 2.4.49.",
|
||
"fork": false,
|
||
"created_at": "2021-10-15T21:38:48Z",
|
||
"updated_at": "2021-10-21T07:26:16Z",
|
||
"pushed_at": "2021-10-21T07:26:13Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 417869261,
|
||
"name": "CVE-2021-41773_Honeypot",
|
||
"full_name": "lopqto\/CVE-2021-41773_Honeypot",
|
||
"owner": {
|
||
"login": "lopqto",
|
||
"id": 30213943,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30213943?v=4",
|
||
"html_url": "https:\/\/github.com\/lopqto"
|
||
},
|
||
"html_url": "https:\/\/github.com\/lopqto\/CVE-2021-41773_Honeypot",
|
||
"description": "Simple honeypot for CVE-2021-41773 vulnerability",
|
||
"fork": false,
|
||
"created_at": "2021-10-16T15:30:34Z",
|
||
"updated_at": "2021-10-17T08:13:10Z",
|
||
"pushed_at": "2021-10-17T08:13:08Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 418481558,
|
||
"name": "CVE-2021-41773_42013",
|
||
"full_name": "vulf\/CVE-2021-41773_42013",
|
||
"owner": {
|
||
"login": "vulf",
|
||
"id": 37404408,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37404408?v=4",
|
||
"html_url": "https:\/\/github.com\/vulf"
|
||
},
|
||
"html_url": "https:\/\/github.com\/vulf\/CVE-2021-41773_42013",
|
||
"description": "Lab setup for CVE-2021-41773 (Apache httpd 2.4.49) and CVE-2021-42013 (Apache httpd 2.4.50).",
|
||
"fork": false,
|
||
"created_at": "2021-10-18T12:01:58Z",
|
||
"updated_at": "2021-10-26T14:26:45Z",
|
||
"pushed_at": "2021-10-18T12:47:56Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"apache",
|
||
"cve",
|
||
"cve-2021-41773",
|
||
"cve-2021-42013",
|
||
"httpd",
|
||
"lfi",
|
||
"penetration-testing",
|
||
"rce",
|
||
"security",
|
||
"vulnerable",
|
||
"web"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 419143683,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "cloudbyteelias\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "cloudbyteelias",
|
||
"id": 44121417,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44121417?v=4",
|
||
"html_url": "https:\/\/github.com\/cloudbyteelias"
|
||
},
|
||
"html_url": "https:\/\/github.com\/cloudbyteelias\/CVE-2021-41773",
|
||
"description": "CVE-2021-41773 Docker lab",
|
||
"fork": false,
|
||
"created_at": "2021-10-20T01:20:21Z",
|
||
"updated_at": "2021-11-04T23:37:34Z",
|
||
"pushed_at": "2021-10-20T01:21:34Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-41773"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 419301010,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "qwutony\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "qwutony",
|
||
"id": 45024645,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45024645?v=4",
|
||
"html_url": "https:\/\/github.com\/qwutony"
|
||
},
|
||
"html_url": "https:\/\/github.com\/qwutony\/CVE-2021-41773",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-10-20T11:27:12Z",
|
||
"updated_at": "2021-10-20T12:26:59Z",
|
||
"pushed_at": "2021-10-20T12:26:56Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 419369252,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "LayarKacaSiber\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "LayarKacaSiber",
|
||
"id": 92864439,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92864439?v=4",
|
||
"html_url": "https:\/\/github.com\/LayarKacaSiber"
|
||
},
|
||
"html_url": "https:\/\/github.com\/LayarKacaSiber\/CVE-2021-41773",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-10-20T14:41:15Z",
|
||
"updated_at": "2021-10-23T13:15:51Z",
|
||
"pushed_at": "2021-10-23T13:15:48Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 420144635,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "BabyTeam1024\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "BabyTeam1024",
|
||
"id": 74447452,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74447452?v=4",
|
||
"html_url": "https:\/\/github.com\/BabyTeam1024"
|
||
},
|
||
"html_url": "https:\/\/github.com\/BabyTeam1024\/CVE-2021-41773",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-10-22T15:12:12Z",
|
||
"updated_at": "2021-10-24T07:10:34Z",
|
||
"pushed_at": "2021-10-22T15:23:56Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 420407065,
|
||
"name": "cve-2021-41773",
|
||
"full_name": "walnutsecurity\/cve-2021-41773",
|
||
"owner": {
|
||
"login": "walnutsecurity",
|
||
"id": 92915142,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92915142?v=4",
|
||
"html_url": "https:\/\/github.com\/walnutsecurity"
|
||
},
|
||
"html_url": "https:\/\/github.com\/walnutsecurity\/cve-2021-41773",
|
||
"description": "cve-2021-41773.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.49",
|
||
"fork": false,
|
||
"created_at": "2021-10-23T12:31:53Z",
|
||
"updated_at": "2021-11-25T09:32:45Z",
|
||
"pushed_at": "2021-11-25T09:32:43Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 420528447,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "TheLastVvV\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "TheLastVvV",
|
||
"id": 71128830,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71128830?v=4",
|
||
"html_url": "https:\/\/github.com\/TheLastVvV"
|
||
},
|
||
"html_url": "https:\/\/github.com\/TheLastVvV\/CVE-2021-41773",
|
||
"description": "Poc CVE-2021-41773 - Apache 2.4.49 with CGI enabled",
|
||
"fork": false,
|
||
"created_at": "2021-10-23T21:37:25Z",
|
||
"updated_at": "2021-10-23T23:15:50Z",
|
||
"pushed_at": "2021-10-23T21:50:36Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 421138366,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "MazX0p\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "MazX0p",
|
||
"id": 54814433,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54814433?v=4",
|
||
"html_url": "https:\/\/github.com\/MazX0p"
|
||
},
|
||
"html_url": "https:\/\/github.com\/MazX0p\/CVE-2021-41773",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-10-25T18:21:43Z",
|
||
"updated_at": "2021-10-25T18:39:13Z",
|
||
"pushed_at": "2021-10-25T18:39:11Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 421191229,
|
||
"name": "Scanner-CVE-2021-41773",
|
||
"full_name": "vida00\/Scanner-CVE-2021-41773",
|
||
"owner": {
|
||
"login": "vida00",
|
||
"id": 77762068,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77762068?v=4",
|
||
"html_url": "https:\/\/github.com\/vida00"
|
||
},
|
||
"html_url": "https:\/\/github.com\/vida00\/Scanner-CVE-2021-41773",
|
||
"description": "A automatic scanner to apache 2.4.49",
|
||
"fork": false,
|
||
"created_at": "2021-10-25T21:34:08Z",
|
||
"updated_at": "2021-10-25T22:17:23Z",
|
||
"pushed_at": "2021-10-25T22:17:21Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 421530564,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "mr-exo\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "mr-exo",
|
||
"id": 76655540,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76655540?v=4",
|
||
"html_url": "https:\/\/github.com\/mr-exo"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mr-exo\/CVE-2021-41773",
|
||
"description": "Remote Code Execution exploit for Apache servers. Affected versions: Apache 2.4.49, Apache 2.4.50",
|
||
"fork": false,
|
||
"created_at": "2021-10-26T17:56:25Z",
|
||
"updated_at": "2021-10-26T18:04:45Z",
|
||
"pushed_at": "2021-10-26T18:04:43Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 421553366,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "Balgogan\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "Balgogan",
|
||
"id": 88535377,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||
"html_url": "https:\/\/github.com\/Balgogan"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Balgogan\/CVE-2021-41773",
|
||
"description": "Ce programme permet de détecter une faille RCE sur les serveurs Apache 2.4.49 et Apache 2.4.50",
|
||
"fork": false,
|
||
"created_at": "2021-10-26T19:11:28Z",
|
||
"updated_at": "2021-11-25T15:33:40Z",
|
||
"pushed_at": "2021-11-11T00:48:37Z",
|
||
"stargazers_count": 8,
|
||
"watchers_count": 8,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 8,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 422466104,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "wolf1892\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "wolf1892",
|
||
"id": 24608781,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24608781?v=4",
|
||
"html_url": "https:\/\/github.com\/wolf1892"
|
||
},
|
||
"html_url": "https:\/\/github.com\/wolf1892\/CVE-2021-41773",
|
||
"description": "Setup vulnerable enviornment",
|
||
"fork": false,
|
||
"created_at": "2021-10-29T06:31:57Z",
|
||
"updated_at": "2021-10-29T06:33:41Z",
|
||
"pushed_at": "2021-10-29T06:33:39Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 424762276,
|
||
"name": "CVE-2021-41773-Playground",
|
||
"full_name": "Hydragyrum\/CVE-2021-41773-Playground",
|
||
"owner": {
|
||
"login": "Hydragyrum",
|
||
"id": 4928181,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4928181?v=4",
|
||
"html_url": "https:\/\/github.com\/Hydragyrum"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Hydragyrum\/CVE-2021-41773-Playground",
|
||
"description": "Some docker images to play with CVE-2021-41773 and CVE-2021-42013",
|
||
"fork": false,
|
||
"created_at": "2021-11-04T22:52:44Z",
|
||
"updated_at": "2021-11-05T01:39:45Z",
|
||
"pushed_at": "2021-11-04T22:56:14Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 426066790,
|
||
"name": "Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit",
|
||
"full_name": "IcmpOff\/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit",
|
||
"owner": {
|
||
"login": "IcmpOff",
|
||
"id": 71145797,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71145797?v=4",
|
||
"html_url": "https:\/\/github.com\/IcmpOff"
|
||
},
|
||
"html_url": "https:\/\/github.com\/IcmpOff\/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit",
|
||
"description": "This Metasploit module exploits an unauthenticated remote code execution vulnerability which exists in Apache version 2.4.49 (CVE-2021-41773). If files outside of the document root are not protected by ‘require all denied’ and CGI has been explicitly enabled, it can be used to execute arbitrary commands. This vulnerability has been reintroduced in the Apache 2.4.50 fix (CVE-2021-42013).",
|
||
"fork": false,
|
||
"created_at": "2021-11-09T02:38:13Z",
|
||
"updated_at": "2021-11-09T02:42:52Z",
|
||
"pushed_at": "2021-11-09T02:39:22Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"apache",
|
||
"exploit",
|
||
"metasploit",
|
||
"metasploit-framework",
|
||
"metasploit-modules",
|
||
"rce"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 426099647,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "ahmad4fifz\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "ahmad4fifz",
|
||
"id": 45918058,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45918058?v=4",
|
||
"html_url": "https:\/\/github.com\/ahmad4fifz"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ahmad4fifz\/CVE-2021-41773",
|
||
"description": "CVE-2021-41773 on Docker",
|
||
"fork": false,
|
||
"created_at": "2021-11-09T05:13:17Z",
|
||
"updated_at": "2021-11-25T09:54:45Z",
|
||
"pushed_at": "2021-11-25T09:54:42Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"apache",
|
||
"cve",
|
||
"cve-2021-41773",
|
||
"docker",
|
||
"docker-compose",
|
||
"lfi",
|
||
"rce"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 427815832,
|
||
"name": "POC-CVE-2021-41773",
|
||
"full_name": "kubota\/POC-CVE-2021-41773",
|
||
"owner": {
|
||
"login": "kubota",
|
||
"id": 119277,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119277?v=4",
|
||
"html_url": "https:\/\/github.com\/kubota"
|
||
},
|
||
"html_url": "https:\/\/github.com\/kubota\/POC-CVE-2021-41773",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-11-14T02:02:45Z",
|
||
"updated_at": "2021-11-16T20:42:27Z",
|
||
"pushed_at": "2021-11-16T20:42:25Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 427956449,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "xMohamed0\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "xMohamed0",
|
||
"id": 94008154,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94008154?v=4",
|
||
"html_url": "https:\/\/github.com\/xMohamed0"
|
||
},
|
||
"html_url": "https:\/\/github.com\/xMohamed0\/CVE-2021-41773",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-11-14T14:50:45Z",
|
||
"updated_at": "2021-11-14T14:55:20Z",
|
||
"pushed_at": "2021-11-14T14:55:18Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 432057910,
|
||
"name": "CVE-2021-41773",
|
||
"full_name": "jhye0n\/CVE-2021-41773",
|
||
"owner": {
|
||
"login": "jhye0n",
|
||
"id": 50125695,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50125695?v=4",
|
||
"html_url": "https:\/\/github.com\/jhye0n"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jhye0n\/CVE-2021-41773",
|
||
"description": "CVE-2021-41773 Test Page & Exploit Code",
|
||
"fork": false,
|
||
"created_at": "2021-11-26T04:54:16Z",
|
||
"updated_at": "2021-11-26T05:18:05Z",
|
||
"pushed_at": "2021-11-26T05:18:02Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
}
|
||
] |