关联漏洞
描述
Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker
介绍
# Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker
Automatic Mass Tool for checking vulnerability in Apache (Linux) 2.4.49/50<br>Using GNU Parallel. You must have parallel for running this tool
# Install Parallel
Linux : <br>
<b>command</b> <br># <i>apt-get install parallel -y</i><br>
Windows : <br>
You can install WSL (windows subsystem linux) then do install like linux<br>if you want use windows, install <a href="https://git-scm.com/download/win">GitBash</a><br>
<b>command</b> <br># <i>curl pi.dk/3/ > install.sh <br># sha1sum install.sh | grep 12345678 <br># md5sum install.sh <br># sha512sum install.sh <br># bash install.sh</i><br>
# How To Use
<i>bash apachrot.sh yourlist.txt thread</i>
# Reference
https://www.youtube.com/watch?v=WSVcuV2Wc58<br>
https://www.youtube.com/watch?v=MFBUuJyWPkk<br>
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41773<br>
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42013<br>
# Donate
BTC : 1KW2RmVwjEF99TFptRH7mABykGYgX2iuSP
文件快照
[4.0K] /data/pocs/ff6899aedc5ee4d2df88cd96de94a6ea086a76e3
├── [1.3K] apachrot.sh
├── [ 5] notvuln.txt
├── [1008] README.md
└── [ 5] vuln.txt
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。