2024-04-23 02:33:33 +02:00
[
{
2024-04-23 14:28:59 +02:00
"id" : 790656600 ,
2024-04-23 02:33:33 +02:00
"name" : "CVE-2024-4040" ,
2024-04-23 14:28:59 +02:00
"full_name" : "airbus-cert\/CVE-2024-4040" ,
2024-04-23 02:33:33 +02:00
"owner" : {
2024-04-23 14:28:59 +02:00
"login" : "airbus-cert" ,
"id" : 26453405 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/26453405?v=4" ,
"html_url" : "https:\/\/github.com\/airbus-cert"
2024-04-23 02:33:33 +02:00
} ,
2024-04-23 14:28:59 +02:00
"html_url" : "https:\/\/github.com\/airbus-cert\/CVE-2024-4040" ,
"description" : "Scanner for CVE-2024-4040" ,
2024-04-23 02:33:33 +02:00
"fork" : false ,
2024-04-23 14:28:59 +02:00
"created_at" : "2024-04-23T09:31:29Z" ,
2024-04-30 02:32:48 +02:00
"updated_at" : "2024-04-29T22:41:09Z" ,
2024-04-23 14:28:59 +02:00
"pushed_at" : "2024-04-23T09:45:57Z" ,
2024-04-30 02:32:48 +02:00
"stargazers_count" : 40 ,
"watchers_count" : 40 ,
2024-04-23 02:33:33 +02:00
"has_discussions" : false ,
2024-05-02 02:27:31 +02:00
"forks_count" : 6 ,
2024-04-23 02:33:33 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-05-02 02:27:31 +02:00
"forks" : 6 ,
2024-04-30 02:32:48 +02:00
"watchers" : 40 ,
2024-04-24 02:34:30 +02:00
"score" : 0 ,
2024-04-24 08:28:15 +02:00
"subscribers_count" : 7
2024-04-24 02:34:30 +02:00
} ,
2024-04-25 08:28:47 +02:00
{
"id" : 791624022 ,
"name" : "CVE-2024-4040-Scanner" ,
"full_name" : "tucommenceapousser\/CVE-2024-4040-Scanner" ,
"owner" : {
"login" : "tucommenceapousser" ,
"id" : 129875733 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/129875733?v=4" ,
"html_url" : "https:\/\/github.com\/tucommenceapousser"
} ,
"html_url" : "https:\/\/github.com\/tucommenceapousser\/CVE-2024-4040-Scanner" ,
"description" : "Scanner of vulnerability on crushftp instance" ,
"fork" : false ,
"created_at" : "2024-04-25T04:01:23Z" ,
2024-04-30 08:28:15 +02:00
"updated_at" : "2024-04-30T03:47:21Z" ,
2024-04-25 08:28:47 +02:00
"pushed_at" : "2024-04-25T04:31:08Z" ,
2024-04-24 02:34:30 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
2024-04-23 02:33:33 +02:00
"score" : 0 ,
2024-04-26 08:28:34 +02:00
"subscribers_count" : 1
2024-04-25 08:28:47 +02:00
} ,
{
"id" : 791636172 ,
"name" : "CVE-2024-4040" ,
"full_name" : "rbih-boulanouar\/CVE-2024-4040" ,
"owner" : {
"login" : "rbih-boulanouar" ,
"id" : 79673409 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/79673409?v=4" ,
"html_url" : "https:\/\/github.com\/rbih-boulanouar"
} ,
"html_url" : "https:\/\/github.com\/rbih-boulanouar\/CVE-2024-4040" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-04-25T04:45:38Z" ,
2024-04-29 20:38:44 +02:00
"updated_at" : "2024-04-29T14:40:31Z" ,
2024-04-25 08:28:47 +02:00
"pushed_at" : "2024-04-25T04:56:50Z" ,
2024-04-29 20:38:44 +02:00
"stargazers_count" : 13 ,
"watchers_count" : 13 ,
2024-04-25 08:28:47 +02:00
"has_discussions" : false ,
2024-04-25 20:28:56 +02:00
"forks_count" : 2 ,
2024-04-25 08:28:47 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-04-25 20:28:56 +02:00
"forks" : 2 ,
2024-04-29 20:38:44 +02:00
"watchers" : 13 ,
2024-04-25 08:28:47 +02:00
"score" : 0 ,
2024-04-26 08:28:34 +02:00
"subscribers_count" : 1
2024-04-25 08:28:47 +02:00
} ,
{
"id" : 791645744 ,
"name" : "CVE-2024-4040" ,
"full_name" : "Mufti22\/CVE-2024-4040" ,
"owner" : {
"login" : "Mufti22" ,
"id" : 75854478 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/75854478?v=4" ,
"html_url" : "https:\/\/github.com\/Mufti22"
} ,
"html_url" : "https:\/\/github.com\/Mufti22\/CVE-2024-4040" ,
"description" : "A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server." ,
"fork" : false ,
"created_at" : "2024-04-25T05:18:06Z" ,
2024-04-28 08:27:59 +02:00
"updated_at" : "2024-04-28T02:24:14Z" ,
2024-04-25 08:28:47 +02:00
"pushed_at" : "2024-04-25T05:21:26Z" ,
2024-04-28 08:27:59 +02:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2024-04-25 08:28:47 +02:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2024-04-28 08:27:59 +02:00
"watchers" : 1 ,
2024-04-25 08:28:47 +02:00
"score" : 0 ,
2024-04-26 08:28:34 +02:00
"subscribers_count" : 1
2024-04-26 02:27:56 +02:00
} ,
{
"id" : 792008958 ,
2024-04-26 20:28:41 +02:00
"name" : "CVE-2024-4040-SSTI-LFI-PoC" ,
"full_name" : "Stuub\/CVE-2024-4040-SSTI-LFI-PoC" ,
2024-04-26 02:27:56 +02:00
"owner" : {
"login" : "Stuub" ,
"id" : 60468836 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/60468836?v=4" ,
"html_url" : "https:\/\/github.com\/Stuub"
} ,
2024-04-26 20:28:41 +02:00
"html_url" : "https:\/\/github.com\/Stuub\/CVE-2024-4040-SSTI-LFI-PoC" ,
"description" : "CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support" ,
2024-04-26 02:27:56 +02:00
"fork" : false ,
"created_at" : "2024-04-25T19:51:38Z" ,
2024-05-01 14:28:04 +02:00
"updated_at" : "2024-05-01T10:21:50Z" ,
2024-04-29 08:30:41 +02:00
"pushed_at" : "2024-04-29T00:59:40Z" ,
2024-05-01 14:28:04 +02:00
"stargazers_count" : 11 ,
"watchers_count" : 11 ,
2024-04-26 02:27:56 +02:00
"has_discussions" : false ,
2024-04-30 14:35:02 +02:00
"forks_count" : 3 ,
2024-04-26 02:27:56 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
2024-04-26 20:28:41 +02:00
"0day" ,
2024-04-29 08:30:41 +02:00
"arbitrary-file-read" ,
2024-04-26 02:27:56 +02:00
"crushftp" ,
2024-04-29 08:30:41 +02:00
"crushftp0day" ,
2024-04-26 02:27:56 +02:00
"cve" ,
"cve-2024-4040" ,
2024-04-29 08:30:41 +02:00
"cve-2024-4040-exploit" ,
2024-04-26 20:28:41 +02:00
"cve-2024-4040-poc" ,
2024-04-26 02:27:56 +02:00
"cve2024-4040" ,
"lfi" ,
"owasp" ,
"python" ,
"rce" ,
"sftp"
] ,
"visibility" : "public" ,
2024-04-30 14:35:02 +02:00
"forks" : 3 ,
2024-05-01 14:28:04 +02:00
"watchers" : 11 ,
2024-04-26 02:27:56 +02:00
"score" : 0 ,
2024-04-26 08:28:34 +02:00
"subscribers_count" : 1
2024-04-29 14:30:40 +02:00
} ,
{
"id" : 793492567 ,
"name" : "CVE-2024-4040-CrushFTP-server" ,
"full_name" : "Praison001\/CVE-2024-4040-CrushFTP-server" ,
"owner" : {
"login" : "Praison001" ,
"id" : 60835238 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4" ,
"html_url" : "https:\/\/github.com\/Praison001"
} ,
"html_url" : "https:\/\/github.com\/Praison001\/CVE-2024-4040-CrushFTP-server" ,
"description" : "Exploit for CVE-2024-4040 affecting CrushFTP server in all versions before 10.7.1 and 11.1.0 on all platforms" ,
"fork" : false ,
"created_at" : "2024-04-29T10:21:53Z" ,
"updated_at" : "2024-04-29T10:27:07Z" ,
"pushed_at" : "2024-04-29T10:27:03Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
2024-04-30 08:28:15 +02:00
"subscribers_count" : 1
2024-04-30 20:28:15 +02:00
} ,
{
"id" : 794110110 ,
"name" : "CVE-2024-4040" ,
"full_name" : "Mohammaddvd\/CVE-2024-4040" ,
"owner" : {
"login" : "Mohammaddvd" ,
"id" : 108727157 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/108727157?v=4" ,
"html_url" : "https:\/\/github.com\/Mohammaddvd"
} ,
"html_url" : "https:\/\/github.com\/Mohammaddvd\/CVE-2024-4040" ,
"description" : "Exploit CrushFTP CVE-2024-4040" ,
"fork" : false ,
"created_at" : "2024-04-30T13:27:34Z" ,
"updated_at" : "2024-04-30T13:47:22Z" ,
"pushed_at" : "2024-04-30T13:36:33Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
2024-05-01 08:27:34 +02:00
"subscribers_count" : 1
2024-05-01 20:28:18 +02:00
} ,
{
"id" : 794593495 ,
"name" : "CVE-2024-4040-CrushFTP-File-Read-vulnerability" ,
"full_name" : "jakabakos\/CVE-2024-4040-CrushFTP-File-Read-vulnerability" ,
"owner" : {
"login" : "jakabakos" ,
"id" : 42498816 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4" ,
"html_url" : "https:\/\/github.com\/jakabakos"
} ,
"html_url" : "https:\/\/github.com\/jakabakos\/CVE-2024-4040-CrushFTP-File-Read-vulnerability" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-05-01T14:42:39Z" ,
"updated_at" : "2024-05-01T14:42:39Z" ,
"pushed_at" : "2024-05-01T14:42:39Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
2024-05-02 08:27:51 +02:00
"subscribers_count" : 1
2024-04-23 02:33:33 +02:00
}
]