[ { "id": 790656600, "name": "CVE-2024-4040", "full_name": "airbus-cert\/CVE-2024-4040", "owner": { "login": "airbus-cert", "id": 26453405, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26453405?v=4", "html_url": "https:\/\/github.com\/airbus-cert", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/airbus-cert\/CVE-2024-4040", "description": "Scanner for CVE-2024-4040", "fork": false, "created_at": "2024-04-23T09:31:29Z", "updated_at": "2024-12-06T09:40:39Z", "pushed_at": "2024-05-17T06:48:43Z", "stargazers_count": 47, "watchers_count": 47, "has_discussions": false, "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 8, "watchers": 47, "score": 0, "subscribers_count": 8 }, { "id": 791624022, "name": "CVE-2024-4040-Scanner", "full_name": "tucommenceapousser\/CVE-2024-4040-Scanner", "owner": { "login": "tucommenceapousser", "id": 129875733, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129875733?v=4", "html_url": "https:\/\/github.com\/tucommenceapousser", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/tucommenceapousser\/CVE-2024-4040-Scanner", "description": "Scanner of vulnerability on crushftp instance", "fork": false, "created_at": "2024-04-25T04:01:23Z", "updated_at": "2024-05-19T22:49:33Z", "pushed_at": "2024-04-25T04:31:08Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 791636172, "name": "CVE-2024-4040", "full_name": "rbih-boulanouar\/CVE-2024-4040", "owner": { "login": "rbih-boulanouar", "id": 79673409, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79673409?v=4", "html_url": "https:\/\/github.com\/rbih-boulanouar", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/rbih-boulanouar\/CVE-2024-4040", "description": null, "fork": false, "created_at": "2024-04-25T04:45:38Z", "updated_at": "2024-07-30T16:14:52Z", "pushed_at": "2024-04-25T04:56:50Z", "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 13, "score": 0, "subscribers_count": 1 }, { "id": 791645744, "name": "CVE-2024-4040", "full_name": "Mufti22\/CVE-2024-4040", "owner": { "login": "Mufti22", "id": 75854478, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75854478?v=4", "html_url": "https:\/\/github.com\/Mufti22", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Mufti22\/CVE-2024-4040", "description": "A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.", "fork": false, "created_at": "2024-04-25T05:18:06Z", "updated_at": "2024-06-21T00:12:21Z", "pushed_at": "2024-04-25T05:21:26Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 792008958, "name": "CVE-2024-4040-SSTI-LFI-PoC", "full_name": "Stuub\/CVE-2024-4040-SSTI-LFI-PoC", "owner": { "login": "Stuub", "id": 60468836, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60468836?v=4", "html_url": "https:\/\/github.com\/Stuub", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Stuub\/CVE-2024-4040-SSTI-LFI-PoC", "description": "CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support", "fork": false, "created_at": "2024-04-25T19:51:38Z", "updated_at": "2024-12-15T22:44:40Z", "pushed_at": "2024-07-07T23:47:58Z", "stargazers_count": 56, "watchers_count": 56, "has_discussions": false, "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "0day", "arbitrary-file-read", "crushftp", "crushftp0day", "cve", "cve-2024-4040", "cve-2024-4040-exploit", "cve-2024-4040-poc", "cve2024-4040", "lfi", "owasp", "python", "rce", "sftp" ], "visibility": "public", "forks": 7, "watchers": 56, "score": 0, "subscribers_count": 2 }, { "id": 793110572, "name": "CVE-2024-4040", "full_name": "0xN7y\/CVE-2024-4040", "owner": { "login": "0xN7y", "id": 70061541, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70061541?v=4", "html_url": "https:\/\/github.com\/0xN7y", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xN7y\/CVE-2024-4040", "description": "exploit for CVE-2024-4040", "fork": false, "created_at": "2024-04-28T13:06:01Z", "updated_at": "2024-10-23T13:17:06Z", "pushed_at": "2024-04-28T13:06:01Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 793492567, "name": "CVE-2024-4040-CrushFTP-server", "full_name": "Praison001\/CVE-2024-4040-CrushFTP-server", "owner": { "login": "Praison001", "id": 60835238, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4", "html_url": "https:\/\/github.com\/Praison001", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Praison001\/CVE-2024-4040-CrushFTP-server", "description": "Exploit for CVE-2024-4040 affecting CrushFTP server in all versions before 10.7.1 and 11.1.0 on all platforms", "fork": false, "created_at": "2024-04-29T10:21:53Z", "updated_at": "2024-04-29T10:27:07Z", "pushed_at": "2024-04-29T10:27:03Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 794110110, "name": "CVE-2024-4040", "full_name": "Mohammaddvd\/CVE-2024-4040", "owner": { "login": "Mohammaddvd", "id": 108727157, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108727157?v=4", "html_url": "https:\/\/github.com\/Mohammaddvd", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Mohammaddvd\/CVE-2024-4040", "description": "Exploit CrushFTP CVE-2024-4040", "fork": false, "created_at": "2024-04-30T13:27:34Z", "updated_at": "2024-09-18T08:50:19Z", "pushed_at": "2024-04-30T13:36:33Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 794593495, "name": "CVE-2024-4040-CrushFTP-File-Read-vulnerability", "full_name": "jakabakos\/CVE-2024-4040-CrushFTP-File-Read-vulnerability", "owner": { "login": "jakabakos", "id": 42498816, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4", "html_url": "https:\/\/github.com\/jakabakos", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jakabakos\/CVE-2024-4040-CrushFTP-File-Read-vulnerability", "description": null, "fork": false, "created_at": "2024-05-01T14:42:39Z", "updated_at": "2024-06-06T11:58:36Z", "pushed_at": "2024-05-02T09:58:21Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 795736659, "name": "CVE-2024-4040", "full_name": "gotr00t0day\/CVE-2024-4040", "owner": { "login": "gotr00t0day", "id": 48636787, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48636787?v=4", "html_url": "https:\/\/github.com\/gotr00t0day", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/gotr00t0day\/CVE-2024-4040", "description": "A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.", "fork": false, "created_at": "2024-05-03T23:29:53Z", "updated_at": "2024-12-06T09:40:40Z", "pushed_at": "2024-05-04T00:05:16Z", "stargazers_count": 10, "watchers_count": 10, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 10, "score": 0, "subscribers_count": 1 }, { "id": 800094876, "name": "CVE-2024-4040", "full_name": "1ncendium\/CVE-2024-4040", "owner": { "login": "1ncendium", "id": 50025292, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50025292?v=4", "html_url": "https:\/\/github.com\/1ncendium", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/1ncendium\/CVE-2024-4040", "description": "A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server. ", "fork": false, "created_at": "2024-05-13T17:33:36Z", "updated_at": "2024-05-13T17:33:41Z", "pushed_at": "2024-05-13T17:33:37Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 821345624, "name": "CVE-2024-4040", "full_name": "olebris\/CVE-2024-4040", "owner": { "login": "olebris", "id": 78493240, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78493240?v=4", "html_url": "https:\/\/github.com\/olebris", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/olebris\/CVE-2024-4040", "description": "CVE-2024-4040 PoC", "fork": false, "created_at": "2024-06-28T10:32:51Z", "updated_at": "2024-06-28T11:50:56Z", "pushed_at": "2024-06-28T10:33:06Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 824427234, "name": "CVE-2024-4040", "full_name": "entroychang\/CVE-2024-4040", "owner": { "login": "entroychang", "id": 56551382, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56551382?v=4", "html_url": "https:\/\/github.com\/entroychang", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/entroychang\/CVE-2024-4040", "description": "CVE-2024-4040 PoC", "fork": false, "created_at": "2024-07-05T05:46:56Z", "updated_at": "2024-12-06T09:40:42Z", "pushed_at": "2024-07-09T09:48:17Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "cve-2024-4040", "exploit" ], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 859098985, "name": "CrushFTP-cve-2024-4040-poc", "full_name": "safeer-accuknox\/CrushFTP-cve-2024-4040-poc", "owner": { "login": "safeer-accuknox", "id": 180378107, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/180378107?v=4", "html_url": "https:\/\/github.com\/safeer-accuknox", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/safeer-accuknox\/CrushFTP-cve-2024-4040-poc", "description": null, "fork": false, "created_at": "2024-09-18T04:45:54Z", "updated_at": "2024-10-16T07:21:52Z", "pushed_at": "2024-10-16T07:21:48Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 865497094, "name": "GenCrushSSTIExploit", "full_name": "geniuszlyy\/GenCrushSSTIExploit", "owner": { "login": "geniuszlyy", "id": 137893386, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4", "html_url": "https:\/\/github.com\/geniuszlyy", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/geniuszlyy\/GenCrushSSTIExploit", "description": "is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP", "fork": false, "created_at": "2024-09-30T16:18:07Z", "updated_at": "2024-11-20T16:31:06Z", "pushed_at": "2024-09-30T16:19:24Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "crush", "crush-ssti", "cve", "cve-2024-4040", "cybersecurity", "ethical-hacking", "exploit", "exploit-development", "gencrushsstiexploit", "penetration-testing", "security", "server-side-template-injection", "ssti", "vulnerability", "web-security" ], "visibility": "public", "forks": 1, "watchers": 7, "score": 0, "subscribers_count": 1 }, { "id": 877132815, "name": "CVE-2024-4040", "full_name": "rahisec\/CVE-2024-4040", "owner": { "login": "rahisec", "id": 35906436, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35906436?v=4", "html_url": "https:\/\/github.com\/rahisec", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/rahisec\/CVE-2024-4040", "description": null, "fork": false, "created_at": "2024-10-23T06:29:19Z", "updated_at": "2024-10-23T06:31:12Z", "pushed_at": "2024-10-23T06:31:09Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 } ]