gotr00t0day / CVE-2024-4040Links
A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.
☆8Updated last year
Alternatives and similar repositories for CVE-2024-4040
Users that are interested in CVE-2024-4040 are comparing it to the libraries listed below
Sorting:
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆9Updated last year
- ☆14Updated 2 months ago
- Automated enumeration for red teamers☆7Updated 2 years ago
- Rockyou for web fuzzing☆14Updated 3 years ago
- crawl a website for links and expose all the vulnerable parameters.☆12Updated 2 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- Strumenti per Domini - Whois - IP - Data Breach - Email☆16Updated 7 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Automate Blind SQL Injection with Python.☆22Updated 2 years ago
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Updated 4 months ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- xdebug 2.5.5 RCE exploit☆30Updated 4 months ago
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆18Updated last year
- A small and efficient tool to find open redirect vulnerabilities.☆16Updated 3 years ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated 11 months ago
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆16Updated 2 years ago
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆17Updated last year
- my own 2fa bypass methodolgy☆24Updated last year
- This tool will help in generating reverse shells easily for all types of OS.☆20Updated last year
- ☆12Updated 3 years ago
- XSS payloads for exploiting Markdown syntax☆8Updated 4 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆36Updated last year
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆11Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆17Updated last year
- Small python or powershell script to look for potential subdomain takeover vulnerabilities via vulnerable Alias.☆8Updated 3 years ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆12Updated 6 months ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆25Updated 2 years ago