272 lines
No EOL
9.2 KiB
JSON
272 lines
No EOL
9.2 KiB
JSON
[
|
|
{
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "blasty/CVE-2021-41773",
|
|
"html_url": "https://github.com/blasty/CVE-2021-41773",
|
|
"description": "CVE-2021-41773 playground",
|
|
"stargazers_count": 207,
|
|
"forks_count": 46,
|
|
"created_at": "2021-10-06T07:17:05Z"
|
|
},
|
|
{
|
|
"name": "CVE-2021-41773_CVE-2021-42013",
|
|
"full_name": "inbug-team/CVE-2021-41773_CVE-2021-42013",
|
|
"html_url": "https://github.com/inbug-team/CVE-2021-41773_CVE-2021-42013",
|
|
"description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具",
|
|
"stargazers_count": 147,
|
|
"forks_count": 48,
|
|
"created_at": "2021-10-09T03:32:18Z"
|
|
},
|
|
{
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "thehackersbrain/CVE-2021-41773",
|
|
"html_url": "https://github.com/thehackersbrain/CVE-2021-41773",
|
|
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
|
|
"stargazers_count": 107,
|
|
"forks_count": 35,
|
|
"created_at": "2022-03-12T21:24:55Z"
|
|
},
|
|
{
|
|
"name": "PoC-CVE-2021-41773",
|
|
"full_name": "iilegacyyii/PoC-CVE-2021-41773",
|
|
"html_url": "https://github.com/iilegacyyii/PoC-CVE-2021-41773",
|
|
"description": null,
|
|
"stargazers_count": 47,
|
|
"forks_count": 38,
|
|
"created_at": "2021-10-05T17:30:43Z"
|
|
},
|
|
{
|
|
"name": "cve-2021-41773",
|
|
"full_name": "Vulnmachines/cve-2021-41773",
|
|
"html_url": "https://github.com/Vulnmachines/cve-2021-41773",
|
|
"description": "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.",
|
|
"stargazers_count": 40,
|
|
"forks_count": 9,
|
|
"created_at": "2021-10-05T16:13:38Z"
|
|
},
|
|
{
|
|
"name": "CVE-2021-41773-PoC",
|
|
"full_name": "lorddemon/CVE-2021-41773-PoC",
|
|
"html_url": "https://github.com/lorddemon/CVE-2021-41773-PoC",
|
|
"description": null,
|
|
"stargazers_count": 37,
|
|
"forks_count": 22,
|
|
"created_at": "2021-10-05T23:53:48Z"
|
|
},
|
|
{
|
|
"name": "mass_cve-2021-41773",
|
|
"full_name": "justakazh/mass_cve-2021-41773",
|
|
"html_url": "https://github.com/justakazh/mass_cve-2021-41773",
|
|
"description": "MASS CVE-2021-41773",
|
|
"stargazers_count": 27,
|
|
"forks_count": 19,
|
|
"created_at": "2021-10-07T15:13:18Z"
|
|
},
|
|
{
|
|
"name": "CVE-2021-41773_CVE-2021-42013",
|
|
"full_name": "Ls4ss/CVE-2021-41773_CVE-2021-42013",
|
|
"html_url": "https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013",
|
|
"description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE",
|
|
"stargazers_count": 21,
|
|
"forks_count": 9,
|
|
"created_at": "2021-10-06T02:28:41Z"
|
|
},
|
|
{
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "BlueTeamSteve/CVE-2021-41773",
|
|
"html_url": "https://github.com/BlueTeamSteve/CVE-2021-41773",
|
|
"description": "Vulnerable docker images for CVE-2021-41773",
|
|
"stargazers_count": 20,
|
|
"forks_count": 7,
|
|
"created_at": "2021-10-06T14:47:23Z"
|
|
},
|
|
{
|
|
"name": "CVE-2021-41773-PoC",
|
|
"full_name": "ZephrFish/CVE-2021-41773-PoC",
|
|
"html_url": "https://github.com/ZephrFish/CVE-2021-41773-PoC",
|
|
"description": null,
|
|
"stargazers_count": 17,
|
|
"forks_count": 11,
|
|
"created_at": "2021-10-05T17:29:49Z"
|
|
},
|
|
{
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "j4k0m/CVE-2021-41773",
|
|
"html_url": "https://github.com/j4k0m/CVE-2021-41773",
|
|
"description": "Exploitation of CVE-2021-41773 a Directory Traversal in Apache 2.4.49.",
|
|
"stargazers_count": 12,
|
|
"forks_count": 7,
|
|
"created_at": "2021-10-05T20:30:01Z"
|
|
},
|
|
{
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "zeronine9/CVE-2021-41773",
|
|
"html_url": "https://github.com/zeronine9/CVE-2021-41773",
|
|
"description": "Fast python tool to test apache path traversal CVE-2021-41773 in a List of url ",
|
|
"stargazers_count": 11,
|
|
"forks_count": 7,
|
|
"created_at": "2021-10-08T07:24:49Z"
|
|
},
|
|
{
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "itsecurityco/CVE-2021-41773",
|
|
"html_url": "https://github.com/itsecurityco/CVE-2021-41773",
|
|
"description": "CVE-2021-41773 POC with Docker",
|
|
"stargazers_count": 11,
|
|
"forks_count": 6,
|
|
"created_at": "2021-10-06T02:30:40Z"
|
|
},
|
|
{
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "knqyf263/CVE-2021-41773",
|
|
"html_url": "https://github.com/knqyf263/CVE-2021-41773",
|
|
"description": "Path traversal in Apache HTTP Server 2.4.49 (CVE-2021-41773) ",
|
|
"stargazers_count": 10,
|
|
"forks_count": 7,
|
|
"created_at": "2021-10-05T16:45:41Z"
|
|
},
|
|
{
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "1nhann/CVE-2021-41773",
|
|
"html_url": "https://github.com/1nhann/CVE-2021-41773",
|
|
"description": "CVE-2021-41773 的复现",
|
|
"stargazers_count": 10,
|
|
"forks_count": 4,
|
|
"created_at": "2021-10-06T14:17:31Z"
|
|
},
|
|
{
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "mr-exo/CVE-2021-41773",
|
|
"html_url": "https://github.com/mr-exo/CVE-2021-41773",
|
|
"description": "Remote Code Execution exploit for Apache servers. Affected versions: Apache 2.4.49, Apache 2.4.50",
|
|
"stargazers_count": 10,
|
|
"forks_count": 0,
|
|
"created_at": "2021-10-26T17:56:25Z"
|
|
},
|
|
{
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "numanturle/CVE-2021-41773",
|
|
"html_url": "https://github.com/numanturle/CVE-2021-41773",
|
|
"description": "CVE-2021-41773",
|
|
"stargazers_count": 9,
|
|
"forks_count": 4,
|
|
"created_at": "2021-10-05T16:18:09Z"
|
|
},
|
|
{
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "aqiao-jashell/CVE-2021-41773",
|
|
"html_url": "https://github.com/aqiao-jashell/CVE-2021-41773",
|
|
"description": "apache路径穿越漏洞poc&exp",
|
|
"stargazers_count": 9,
|
|
"forks_count": 1,
|
|
"created_at": "2022-11-01T05:58:59Z"
|
|
},
|
|
{
|
|
"name": "CVE-2021-41773-POC",
|
|
"full_name": "creadpag/CVE-2021-41773-POC",
|
|
"html_url": "https://github.com/creadpag/CVE-2021-41773-POC",
|
|
"description": "CVE-2021-41773",
|
|
"stargazers_count": 8,
|
|
"forks_count": 5,
|
|
"created_at": "2021-10-06T05:34:48Z"
|
|
},
|
|
{
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "0xRar/CVE-2021-41773",
|
|
"html_url": "https://github.com/0xRar/CVE-2021-41773",
|
|
"description": "Exploit for Apache 2.4.49",
|
|
"stargazers_count": 7,
|
|
"forks_count": 12,
|
|
"created_at": "2021-10-08T04:26:31Z"
|
|
},
|
|
{
|
|
"name": "py-CVE-2021-41773",
|
|
"full_name": "aqiao-jashell/py-CVE-2021-41773",
|
|
"html_url": "https://github.com/aqiao-jashell/py-CVE-2021-41773",
|
|
"description": "python编写的apache路径穿越poc&exp",
|
|
"stargazers_count": 7,
|
|
"forks_count": 0,
|
|
"created_at": "2022-11-01T09:17:03Z"
|
|
},
|
|
{
|
|
"name": "POC-CVE-2021-41773",
|
|
"full_name": "TishcaTpx/POC-CVE-2021-41773",
|
|
"html_url": "https://github.com/TishcaTpx/POC-CVE-2021-41773",
|
|
"description": "Poc.py ",
|
|
"stargazers_count": 6,
|
|
"forks_count": 3,
|
|
"created_at": "2021-10-05T20:41:34Z"
|
|
},
|
|
{
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "noflowpls/CVE-2021-41773",
|
|
"html_url": "https://github.com/noflowpls/CVE-2021-41773",
|
|
"description": "CVE-2021-41773",
|
|
"stargazers_count": 6,
|
|
"forks_count": 1,
|
|
"created_at": "2021-10-07T12:30:13Z"
|
|
},
|
|
{
|
|
"name": "CVE-2021-41773-MSF",
|
|
"full_name": "belajarqywok/CVE-2021-41773-MSF",
|
|
"html_url": "https://github.com/belajarqywok/CVE-2021-41773-MSF",
|
|
"description": "Simple Metasploit-Framework module for conducting website penetration tests (CVE-2021-41773).",
|
|
"stargazers_count": 6,
|
|
"forks_count": 0,
|
|
"created_at": "2023-08-11T12:12:09Z"
|
|
},
|
|
{
|
|
"name": "CVE-2021-41773-Playground",
|
|
"full_name": "Hydragyrum/CVE-2021-41773-Playground",
|
|
"html_url": "https://github.com/Hydragyrum/CVE-2021-41773-Playground",
|
|
"description": "Some docker images to play with CVE-2021-41773 and CVE-2021-42013",
|
|
"stargazers_count": 6,
|
|
"forks_count": 1,
|
|
"created_at": "2021-11-04T22:52:44Z"
|
|
},
|
|
{
|
|
"name": "cve_2021_41773",
|
|
"full_name": "Undefind404/cve_2021_41773",
|
|
"html_url": "https://github.com/Undefind404/cve_2021_41773",
|
|
"description": null,
|
|
"stargazers_count": 5,
|
|
"forks_count": 0,
|
|
"created_at": "2022-11-02T09:31:31Z"
|
|
},
|
|
{
|
|
"name": "CVE-2021-41773",
|
|
"full_name": "jbovet/CVE-2021-41773",
|
|
"html_url": "https://github.com/jbovet/CVE-2021-41773",
|
|
"description": "Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49 (CVE-2021-41773)",
|
|
"stargazers_count": 4,
|
|
"forks_count": 5,
|
|
"created_at": "2021-10-06T13:39:57Z"
|
|
},
|
|
{
|
|
"name": "CVE-2021-41773-PoC",
|
|
"full_name": "habibiefaried/CVE-2021-41773-PoC",
|
|
"html_url": "https://github.com/habibiefaried/CVE-2021-41773-PoC",
|
|
"description": "PoC for CVE-2021-41773 with docker to demonstrate",
|
|
"stargazers_count": 4,
|
|
"forks_count": 4,
|
|
"created_at": "2021-10-06T03:01:41Z"
|
|
},
|
|
{
|
|
"name": "cve-2021-41773",
|
|
"full_name": "twseptian/cve-2021-41773",
|
|
"html_url": "https://github.com/twseptian/cve-2021-41773",
|
|
"description": "CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited",
|
|
"stargazers_count": 4,
|
|
"forks_count": 3,
|
|
"created_at": "2021-10-07T11:55:10Z"
|
|
},
|
|
{
|
|
"name": "CVE-2021-41773_CVE-2021-42013_Exploits",
|
|
"full_name": "OfriOuzan/CVE-2021-41773_CVE-2021-42013_Exploits",
|
|
"html_url": "https://github.com/OfriOuzan/CVE-2021-41773_CVE-2021-42013_Exploits",
|
|
"description": "Exploit CVE-2021-41773 and CVE-2021-42013",
|
|
"stargazers_count": 4,
|
|
"forks_count": 1,
|
|
"created_at": "2023-08-02T09:50:10Z"
|
|
}
|
|
] |