PoC-in-GitHub/2021/CVE-2021-41773.json
2025-03-07 03:12:43 +09:00

329 lines
No EOL
11 KiB
JSON

[
{
"id": 414650983,
"name": "mass_cve-2021-41773",
"full_name": "justakazh\/mass_cve-2021-41773",
"owner": {
"login": "justakazh",
"id": 36891477,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36891477?v=4",
"html_url": "https:\/\/github.com\/justakazh",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/justakazh\/mass_cve-2021-41773",
"description": "MASS CVE-2021-41773",
"fork": false,
"created_at": "2021-10-07T15:13:18Z",
"updated_at": "2024-08-12T20:17:04Z",
"pushed_at": "2023-11-14T07:00:33Z",
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"automatic",
"cve-2021-41773",
"exploit",
"scanner"
],
"visibility": "public",
"forks": 24,
"watchers": 27,
"score": 0,
"subscribers_count": 4
},
{
"id": 416830075,
"name": "SimplesApachePathTraversal",
"full_name": "MrCl0wnLab\/SimplesApachePathTraversal",
"owner": {
"login": "MrCl0wnLab",
"id": 17049332,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17049332?v=4",
"html_url": "https:\/\/github.com\/MrCl0wnLab",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MrCl0wnLab\/SimplesApachePathTraversal",
"description": "Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519",
"fork": false,
"created_at": "2021-10-13T17:03:56Z",
"updated_at": "2024-08-28T17:32:14Z",
"pushed_at": "2024-08-14T14:41:14Z",
"stargazers_count": 60,
"watchers_count": 60,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2020-17519",
"cve-2021-41773",
"cve-2021-42013"
],
"visibility": "public",
"forks": 15,
"watchers": 60,
"score": 0,
"subscribers_count": 2
},
{
"id": 464271089,
"name": "CVE-2021-41773",
"full_name": "skentagon\/CVE-2021-41773",
"owner": {
"login": "skentagon",
"id": 49702576,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49702576?v=4",
"html_url": "https:\/\/github.com\/skentagon",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/skentagon\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2022-02-27T22:39:58Z",
"updated_at": "2024-10-28T08:59:20Z",
"pushed_at": "2024-10-28T08:59:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 847507185,
"name": "Apache-HTTP-Server-2.4.50-RCE",
"full_name": "Zyx2440\/Apache-HTTP-Server-2.4.50-RCE",
"owner": {
"login": "Zyx2440",
"id": 178906552,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/178906552?v=4",
"html_url": "https:\/\/github.com\/Zyx2440",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Zyx2440\/Apache-HTTP-Server-2.4.50-RCE",
"description": "Apache-HTTP-Server-2.4.50-RCE This tool is designed to test Apache servers for the CVE-2021-41773 \/ CVE-2021-42013 vulnerability. It is intended for educational purposes only and should be used responsibly on systems you have explicit permission to test.",
"fork": false,
"created_at": "2024-08-26T01:54:06Z",
"updated_at": "2024-08-27T12:54:48Z",
"pushed_at": "2024-08-26T16:32:21Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache",
"apache2",
"check-version",
"cve-2021-41773",
"cve-2021-41773-poc",
"cve-2021-42013",
"rce"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 847643436,
"name": "CVE-2021-41773",
"full_name": "0xc4t\/CVE-2021-41773",
"owner": {
"login": "0xc4t",
"id": 105418279,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105418279?v=4",
"html_url": "https:\/\/github.com\/0xc4t",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xc4t\/CVE-2021-41773",
"description": "POC & Lab For CVE-2021-41773",
"fork": false,
"created_at": "2024-08-26T09:07:33Z",
"updated_at": "2024-08-27T11:37:07Z",
"pushed_at": "2024-08-27T11:37:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 848546482,
"name": "Additive-Vulnerability-Analysis-CVE-2021-41773",
"full_name": "jkska23\/Additive-Vulnerability-Analysis-CVE-2021-41773",
"owner": {
"login": "jkska23",
"id": 51857894,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51857894?v=4",
"html_url": "https:\/\/github.com\/jkska23",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jkska23\/Additive-Vulnerability-Analysis-CVE-2021-41773",
"description": "Apache: a Mainstream Web Service Turned a Vector of Attack for Remote Code Execution",
"fork": false,
"created_at": "2024-08-28T00:49:09Z",
"updated_at": "2024-08-28T00:54:26Z",
"pushed_at": "2024-08-28T00:54:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 904005872,
"name": "CVE-2021-41773",
"full_name": "redspy-sec\/CVE-2021-41773",
"owner": {
"login": "redspy-sec",
"id": 142095788,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142095788?v=4",
"html_url": "https:\/\/github.com\/redspy-sec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/redspy-sec\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2024-12-16T04:23:41Z",
"updated_at": "2024-12-16T04:25:13Z",
"pushed_at": "2024-12-16T04:25:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 911772666,
"name": "CVE-2021-41773",
"full_name": "FakesiteSecurity\/CVE-2021-41773",
"owner": {
"login": "FakesiteSecurity",
"id": 193509744,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/193509744?v=4",
"html_url": "https:\/\/github.com\/FakesiteSecurity",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/FakesiteSecurity\/CVE-2021-41773",
"description": "MASS CVE-2021-41773",
"fork": false,
"created_at": "2025-01-03T20:13:52Z",
"updated_at": "2025-01-03T20:14:15Z",
"pushed_at": "2025-01-03T20:14:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 913181555,
"name": "cve-2021-41773",
"full_name": "Taldrid1\/cve-2021-41773",
"owner": {
"login": "Taldrid1",
"id": 46970381,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46970381?v=4",
"html_url": "https:\/\/github.com\/Taldrid1",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Taldrid1\/cve-2021-41773",
"description": null,
"fork": false,
"created_at": "2025-01-07T07:32:25Z",
"updated_at": "2025-01-07T07:37:28Z",
"pushed_at": "2025-01-07T07:37:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 926220979,
"name": "SSH-key-and-RCE-PoC-for-CVE-2021-41773",
"full_name": "tiemio\/SSH-key-and-RCE-PoC-for-CVE-2021-41773",
"owner": {
"login": "tiemio",
"id": 196255514,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/196255514?v=4",
"html_url": "https:\/\/github.com\/tiemio",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tiemio\/SSH-key-and-RCE-PoC-for-CVE-2021-41773",
"description": "This repository contains a Proof-of-Concept for the CVE-2021-41773. This CVE contains a LFI and RCE vulnerablity.",
"fork": false,
"created_at": "2025-02-02T20:36:23Z",
"updated_at": "2025-02-02T22:19:10Z",
"pushed_at": "2025-02-02T22:19:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]