unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
xungzzz/CVE-2024-4956
CVE-2024-4956 Nuclei Template
Create: 2024-05-23 08:15:08 +0000 UTC Push: 2024-05-23 08:16:07 +0000 UTC |
fadhilthomas/poc-git-rce-cve-2024-32002
poc for git rce using CVE-2024-32002
Create: 2024-05-23 07:56:05 +0000 UTC Push: 2024-05-23 07:56:05 +0000 UTC |
fadhilthomas/poc-cve-2024-32002
poc for git rce using CVE-2024-32002
Create: 2024-05-23 07:56:05 +0000 UTC Push: 2024-05-24 10:16:57 +0000 UTC |
adhen13/CVE-2024-4956
Nexus Repository Manager 3 Unauthenticated Path Traversal
Create: 2024-05-23 06:47:13 +0000 UTC Push: 2024-05-23 06:47:13 +0000 UTC |
banditzCyber0x/CVE-2024-4956
Nexus Repository Manager 3 Unauthenticated Path Traversal
Create: 2024-05-23 06:47:13 +0000 UTC Push: 2024-05-23 07:00:27 +0000 UTC |
10cks/CVE-2024-32002-EXP
Create: 2024-05-23 04:25:51 +0000 UTC Push: 2024-05-23 04:25:51 +0000 UTC |
truonghuuphuc/CVE-2024-3495-Poc
CVE-2024-3495 Country State City Dropdown CF7 <= 2.7.2 - Unauthenticated SQL Injection
Create: 2024-05-23 02:41:15 +0000 UTC Push: 2024-05-23 02:41:16 +0000 UTC |
r00t7oo2jm/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server
This vulnerability allows an unauthenticated attacker to remotely execute arbitrary code on a vulnerable Confluence server. The vulnerability exists due to an improper validation of user-supplied input in the Confluence REST API. This allows an attacker to inject malicious code into the Confluence server, which can then be executed by the server
Create: 2024-05-23 02:10:24 +0000 UTC Push: 2024-05-22 22:15:52 +0000 UTC |
JJoosh/CVE-2024-32002-
This is the main repository for CVE 2024-32002, and requires recursive cloning because it contains the submodels necessary for execution.
Create: 2024-05-22 23:49:22 +0000 UTC Push: 2024-05-22 23:49:22 +0000 UTC |
Arbeys/CVE-2024-21683-PoC
Create: 2024-05-22 21:53:35 +0000 UTC Push: 2024-05-22 21:53:35 +0000 UTC |
JJoosh/CVE-2024-32002
Create: 2024-05-22 20:57:28 +0000 UTC Push: 2024-05-22 23:22:01 +0000 UTC |
LuxEndrith/CVE-2024-32002-Git
Create: 2024-05-22 19:37:44 +0000 UTC Push: 2024-05-22 19:37:44 +0000 UTC |
absholi7ly/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server
This vulnerability allows an unauthenticated attacker to remotely execute arbitrary code on a vulnerable Confluence server. The vulnerability exists due to an improper validation of user-supplied input in the Confluence REST API. This allows an attacker to inject malicious code into the Confluence server, which can then be executed by the server
Create: 2024-05-22 19:28:29 +0000 UTC Push: 2024-05-22 19:28:29 +0000 UTC |
vincepsh/CVE-2024-32002-hook
CVE-2024-32002-hook
Create: 2024-05-22 18:50:56 +0000 UTC Push: 2024-05-22 18:50:56 +0000 UTC |
vincepsh/CVE-2024-32002
Repo for testing CVE-2024-32002
Create: 2024-05-22 18:43:36 +0000 UTC Push: 2024-05-22 18:43:36 +0000 UTC |
spaceraccoon/detect-cve-2024-4367
YARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js
Create: 2024-05-22 18:05:47 +0000 UTC Push: 2024-05-22 18:05:48 +0000 UTC |
carsonchan12345/CVE-2024-35475
Create: 2024-05-22 14:21:48 +0000 UTC Push: 2024-05-22 14:21:48 +0000 UTC |
ycdxsb/CVE-2024-32002-smash
Create: 2024-05-22 11:28:05 +0000 UTC Push: 2024-05-22 11:28:05 +0000 UTC |
ycdxsb/CVE-2024-32002-submod
Create: 2024-05-22 11:27:14 +0000 UTC Push: 2024-05-22 11:27:14 +0000 UTC |
ycdxsb/CVE-2024-32002-hulk
Create: 2024-05-22 11:26:30 +0000 UTC Push: 2024-05-22 11:26:30 +0000 UTC |
Previous
133
134
135
136
137
138
139
140
Next