尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Scanner for CVE-2024-4040 | https://github.com/airbus-cert/CVE-2024-4040 | POC详情 |
| 2 | CVE-2024-4040 (CrushFTP VFS escape) or (CrushFTP unauthenticated RCE) | https://github.com/tr4c3rs/CVE-2024-4040-RCE-POC | POC详情 |
| 3 | Scanner of vulnerability on crushftp instance | https://github.com/tucommenceapousser/CVE-2024-4040-Scanner | POC详情 |
| 4 | None | https://github.com/rbih-boulanouar/CVE-2024-4040 | POC详情 |
| 5 | A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server. | https://github.com/Mufti22/CVE-2024-4040 | POC详情 |
| 6 | CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support | https://github.com/Stuub/CVE-2024-4040-SSTI-LFI-PoC | POC详情 |
| 7 | Exploit for CVE-2024-4040 affecting CrushFTP server in all versions before 10.7.1 and 11.1.0 on all platforms | https://github.com/Praison001/CVE-2024-4040-CrushFTP-server | POC详情 |
| 8 | Exploit CrushFTP CVE-2024-4040 | https://github.com/Mohammaddvd/CVE-2024-4040 | POC详情 |
| 9 | None | https://github.com/jakabakos/CVE-2024-4040-CrushFTP-File-Read-vulnerability | POC详情 |
| 10 | A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server. | https://github.com/gotr00t0day/CVE-2024-4040 | POC详情 |
| 11 | A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server. | https://github.com/1ncendium/CVE-2024-4040 | POC详情 |
| 12 | CVE-2024-4040 PoC | https://github.com/olebris/CVE-2024-4040 | POC详情 |
| 13 | CVE-2024-4040 PoC | https://github.com/entroychang/CVE-2024-4040 | POC详情 |
| 14 | None | https://github.com/safeer-accuknox/CrushFTP-cve-2024-4040-poc | POC详情 |
| 15 | is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP | https://github.com/geniuszlyy/GenCrushSSTIExploit | POC详情 |
| 16 | None | https://github.com/rahisec/CVE-2024-4040 | POC详情 |
| 17 | exploit for CVE-2024-4040 | https://github.com/0xN7y/CVE-2024-4040 | POC详情 |
| 18 | is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP | https://github.com/geniuszly/GenCrushSSTIExploit | POC详情 |
| 19 | VFS Sandbox Escape in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows remote attackers with low privileges to read files from the filesystem outside of VFS Sandbox. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-4040.yaml | POC详情 |
| 20 | Exploit for CVE-2024-4040 – Authentication bypass in CrushFTP via CrushAuth cookie and AWS-style header spoofing. Stealthy Python PoC with secure token generation, SSL bypass, and improved output. | https://github.com/ill-deed/CrushFTP-CVE-2024-4040-illdeed | POC详情 |
| 21 | A Dockerized setup for running a vulnerable CrushFTP 10 server instance (CVE-2024-4040). | https://github.com/juanorts/CrushFTP10-Docker-CVE-2024-4040 | POC详情 |
| 22 | Exploit CrushFTP CVE-2024-4040 | https://github.com/dhammerg/CVE-2024-4040 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论