[ { "name": "CVE-2021-41773_CVE-2021-42013", "full_name": "inbug-team/CVE-2021-41773_CVE-2021-42013", "html_url": "https://github.com/inbug-team/CVE-2021-41773_CVE-2021-42013", "description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具", "stargazers_count": 147, "forks_count": 48, "created_at": "2021-10-09T03:32:18Z" }, { "name": "cve-2021-42013", "full_name": "walnutsecurity/cve-2021-42013", "html_url": "https://github.com/walnutsecurity/cve-2021-42013", "description": "cve-2021-42013.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.50", "stargazers_count": 24, "forks_count": 14, "created_at": "2021-10-27T14:29:10Z" }, { "name": "CVE-2021-41773_CVE-2021-42013", "full_name": "Ls4ss/CVE-2021-41773_CVE-2021-42013", "html_url": "https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013", "description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE", "stargazers_count": 21, "forks_count": 9, "created_at": "2021-10-06T02:28:41Z" }, { "name": "cve-2021-42013", "full_name": "Vulnmachines/cve-2021-42013", "html_url": "https://github.com/Vulnmachines/cve-2021-42013", "description": "Apache 2.4.50 Path traversal vulnerability", "stargazers_count": 17, "forks_count": 3, "created_at": "2021-10-08T05:44:54Z" }, { "name": "CVE-2021-42013-Apache-RCE-Poc-Exp", "full_name": "asaotomo/CVE-2021-42013-Apache-RCE-Poc-Exp", "html_url": "https://github.com/asaotomo/CVE-2021-42013-Apache-RCE-Poc-Exp", "description": "Apache 远程代码执行 (CVE-2021-42013)批量检测工具:Apache HTTP Server是美国阿帕奇(Apache)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点,发现 Apache HTTP Server 2.4.50 中针对 CVE-2021-41773 的修复不够充分。攻击者可以使用路径遍历攻击将 URL 映射到由类似别名的指令配置的目录之外的文件。如果这些目录之外的文件不受通常的默认配置“要求全部拒绝”的保护,则这些请求可能会成功。如果还为这些别名路径启用了 CGI 脚本,则这可能允许远程代码执行。此问题仅影响 Apache 2.4.49 和 Apache 2.4.50,而不影响更早版本。", "stargazers_count": 10, "forks_count": 2, "created_at": "2021-12-23T14:46:41Z" }, { "name": "apache-exploit-CVE-2021-42013", "full_name": "andrea-mattioli/apache-exploit-CVE-2021-42013", "html_url": "https://github.com/andrea-mattioli/apache-exploit-CVE-2021-42013", "description": "Exploit with integrated shodan search", "stargazers_count": 9, "forks_count": 5, "created_at": "2021-10-07T18:31:29Z" }, { "name": "CVE-2021-42013_Reverse-Shell", "full_name": "TheLastVvV/CVE-2021-42013_Reverse-Shell", "html_url": "https://github.com/TheLastVvV/CVE-2021-42013_Reverse-Shell", "description": "PoC CVE-2021-42013 reverse shell Apache 2.4.50 with CGI", "stargazers_count": 7, "forks_count": 2, "created_at": "2021-10-24T12:57:55Z" }, { "name": "CVE-2021-41773_CVE-2021-42013_Exploits", "full_name": "OfriOuzan/CVE-2021-41773_CVE-2021-42013_Exploits", "html_url": "https://github.com/OfriOuzan/CVE-2021-41773_CVE-2021-42013_Exploits", "description": "Exploit CVE-2021-41773 and CVE-2021-42013", "stargazers_count": 4, "forks_count": 1, "created_at": "2023-08-02T09:50:10Z" }, { "name": "CVE-2021-42013", "full_name": "BassoNicolas/CVE-2021-42013", "html_url": "https://github.com/BassoNicolas/CVE-2021-42013", "description": "CVE-2021-42013 Vulnerability Scanner This Python script checks for the Remote Code Execution (RCE) vulnerability (CVE-2021-42013) in Apache 2.4.50. ", "stargazers_count": 3, "forks_count": 0, "created_at": "2024-04-07T16:04:06Z" }, { "name": "cve-2021-42013-docker-lab", "full_name": "twseptian/cve-2021-42013-docker-lab", "html_url": "https://github.com/twseptian/cve-2021-42013-docker-lab", "description": "Docker container lab to play/learn with CVE-2021-42013", "stargazers_count": 2, "forks_count": 6, "created_at": "2021-10-14T18:00:48Z" }, { "name": "cve-2021-41773-and-cve-2021-42013", "full_name": "5gstudent/cve-2021-41773-and-cve-2021-42013", "html_url": "https://github.com/5gstudent/cve-2021-41773-and-cve-2021-42013", "description": "cve-2021-41773 即 cve-2021-42013 批量检测脚本", "stargazers_count": 2, "forks_count": 2, "created_at": "2021-10-09T11:33:56Z" }, { "name": "CVE-2021-41773_42013", "full_name": "zerodaywolf/CVE-2021-41773_42013", "html_url": "https://github.com/zerodaywolf/CVE-2021-41773_42013", "description": "Lab setup for CVE-2021-41773 (Apache httpd 2.4.49) and CVE-2021-42013 (Apache httpd 2.4.50).", "stargazers_count": 2, "forks_count": 2, "created_at": "2021-10-18T12:01:58Z" }, { "name": "CVE-2021-42013", "full_name": "TheLastVvV/CVE-2021-42013", "html_url": "https://github.com/TheLastVvV/CVE-2021-42013", "description": "Poc CVE-2021-42013 - Apache 2.4.50 without CGI", "stargazers_count": 2, "forks_count": 0, "created_at": "2021-10-23T21:58:44Z" }, { "name": "CVE-2021-42013-EXPLOIT", "full_name": "K3ysTr0K3R/CVE-2021-42013-EXPLOIT", "html_url": "https://github.com/K3ysTr0K3R/CVE-2021-42013-EXPLOIT", "description": "A PoC exploit for CVE-2021-42013 - Apache 2.4.49 & 2.4.50 Remote Code Execution", "stargazers_count": 2, "forks_count": 0, "created_at": "2023-08-25T19:51:01Z" }, { "name": "CVE-2021-42013", "full_name": "mauricelambert/CVE-2021-42013", "html_url": "https://github.com/mauricelambert/CVE-2021-42013", "description": "These Nmap, Python and Ruby scripts detects and exploits CVE-2021-42013 with RCE and local file disclosure.", "stargazers_count": 1, "forks_count": 1, "created_at": "2022-03-08T21:48:40Z" }, { "name": "cve-2021-42013", "full_name": "bananoname/cve-2021-42013", "html_url": "https://github.com/bananoname/cve-2021-42013", "description": null, "stargazers_count": 1, "forks_count": 0, "created_at": "2024-07-31T07:48:39Z" }, { "name": "CVE-2021-42013", "full_name": "robotsense1337/CVE-2021-42013", "html_url": "https://github.com/robotsense1337/CVE-2021-42013", "description": "Exploit Apache 2.4.50(CVE-2021-42013)", "stargazers_count": 1, "forks_count": 1, "created_at": "2021-11-03T17:33:52Z" }, { "name": "CVE-2021-42013", "full_name": "Hamesawian/CVE-2021-42013", "html_url": "https://github.com/Hamesawian/CVE-2021-42013", "description": null, "stargazers_count": 1, "forks_count": 1, "created_at": "2023-06-29T16:32:44Z" }, { "name": "CVE-2021-42013", "full_name": "vudala/CVE-2021-42013", "html_url": "https://github.com/vudala/CVE-2021-42013", "description": "Exploring CVE-2021-42013, using Suricata and OpenVAS to gather info", "stargazers_count": 1, "forks_count": 0, "created_at": "2023-06-20T21:43:13Z" }, { "name": "cve-2021-42013-httpd", "full_name": "cybfar/cve-2021-42013-httpd", "html_url": "https://github.com/cybfar/cve-2021-42013-httpd", "description": "CVE: 2021-42013 Tested on: 2.4.49 and 2.4.50 Description: Path Traversal or Remote Code Execution vulnerabilities in Apache 2.4.49 and 2.4.50", "stargazers_count": 1, "forks_count": 1, "created_at": "2023-06-08T08:49:15Z" }, { "name": "CVE-2021-42013-LAB", "full_name": "jas9reet/CVE-2021-42013-LAB", "html_url": "https://github.com/jas9reet/CVE-2021-42013-LAB", "description": "Apache HTTP Server 2.4.50 - RCE Lab", "stargazers_count": 1, "forks_count": 0, "created_at": "2022-02-03T13:26:05Z" }, { "name": "cve-2021-42013L", "full_name": "mightysai1997/cve-2021-42013L", "html_url": "https://github.com/mightysai1997/cve-2021-42013L", "description": null, "stargazers_count": 0, "forks_count": 0, "created_at": "2022-09-15T11:35:00Z" }, { "name": "CVE-2021-42013", "full_name": "LayarKacaSiber/CVE-2021-42013", "html_url": "https://github.com/LayarKacaSiber/CVE-2021-42013", "description": null, "stargazers_count": 0, "forks_count": 0, "created_at": "2021-10-20T15:32:39Z" }, { "name": "cve-2021-42013", "full_name": "viliuspovilaika/cve-2021-42013", "html_url": "https://github.com/viliuspovilaika/cve-2021-42013", "description": "Exploit for Apache 2.4.50 (CVE-2021-42013)", "stargazers_count": 0, "forks_count": 0, "created_at": "2022-05-31T03:28:20Z" }, { "name": "CVE-2021-42013", "full_name": "12345qwert123456/CVE-2021-42013", "html_url": "https://github.com/12345qwert123456/CVE-2021-42013", "description": "Vulnerable configuration Apache HTTP Server version 2.4.49/2.4.50", "stargazers_count": 0, "forks_count": 0, "created_at": "2022-11-18T17:53:46Z" }, { "name": "CVE-2021-42013", "full_name": "asepsaepdin/CVE-2021-42013", "html_url": "https://github.com/asepsaepdin/CVE-2021-42013", "description": null, "stargazers_count": 0, "forks_count": 1, "created_at": "2025-01-30T01:28:57Z" }, { "name": "cve-2021-42013", "full_name": "mightysai1997/cve-2021-42013", "html_url": "https://github.com/mightysai1997/cve-2021-42013", "description": null, "stargazers_count": 0, "forks_count": 0, "created_at": "2022-09-15T11:28:39Z" }, { "name": "CVE-2021-42013", "full_name": "rnsss/CVE-2021-42013", "html_url": "https://github.com/rnsss/CVE-2021-42013", "description": "CVE-2021-42013-exp", "stargazers_count": 0, "forks_count": 0, "created_at": "2022-01-07T03:12:45Z" }, { "name": "CVE-2021-42013", "full_name": "honypot/CVE-2021-42013", "html_url": "https://github.com/honypot/CVE-2021-42013", "description": null, "stargazers_count": 0, "forks_count": 0, "created_at": "2022-03-14T04:08:24Z" }, { "name": "cve-2021-42013.get", "full_name": "mightysai1997/cve-2021-42013.get", "html_url": "https://github.com/mightysai1997/cve-2021-42013.get", "description": null, "stargazers_count": 0, "forks_count": 0, "created_at": "2022-09-15T12:15:00Z" } ]