unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
xaitax/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability
Microsoft-Outlook-Remote-Code-Execution-Vulnerability
Create: 2024-02-16 15:17:59 +0000 UTC Push: 2024-02-16 15:36:26 +0000 UTC |
M54S/Slient-Url-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
Create: 2024-02-16 13:46:01 +0000 UTC Push: 2024-02-16 13:48:29 +0000 UTC |
M54S/Hta-Exploit-Builder-Slient-Builder-Exploit-Database-Cve-2023-Malware
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
Create: 2024-02-16 13:46:01 +0000 UTC Push: 2024-02-16 13:48:19 +0000 UTC |
M54S/Slient-PDF-FUD-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
Create: 2024-02-16 13:46:01 +0000 UTC Push: 2024-02-16 13:48:07 +0000 UTC |
M54S/Jpg-Png-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
Create: 2024-02-16 13:46:00 +0000 UTC Push: 2024-02-16 13:48:10 +0000 UTC |
codeb0ss/CVE-2024-25735-PoC
CVE-2024-25735 - WyreStorm Apollo VX20 - Information Disclosure
Create: 2024-02-16 12:03:20 +0000 UTC Push: 2024-02-16 12:03:20 +0000 UTC |
Trackflaw/CVE-2023-25203
CVE-2023-25203: Application Vulnerable to SSRF (Server Side Request Forgery) Attacks
Create: 2024-02-16 08:29:25 +0000 UTC Push: 2024-02-16 08:29:25 +0000 UTC |
Trackflaw/CVE-2023-25202
CVE-2023-25202: Insecure file upload mechanism
Create: 2024-02-16 08:22:48 +0000 UTC Push: 2024-02-16 08:22:48 +0000 UTC |
colaoo123/cve-2022-22555
Create: 2024-02-16 07:45:51 +0000 UTC Push: 2024-02-16 07:47:10 +0000 UTC |
godylockz/CVE-2024-23897
POC for CVE-2024-23897 Jenkins File-Read
Create: 2024-02-16 07:16:04 +0000 UTC Push: 2024-02-16 07:16:05 +0000 UTC |
hackervegas001/CVE-2024-26521
Html Injection vulnearbility
Create: 2024-02-16 05:40:33 +0000 UTC Push: 2024-02-26 15:44:31 +0000 UTC |
supportmango/CVE-2024-23222-patch
Create: 2024-02-16 04:40:46 +0000 UTC Push: 2024-02-16 04:40:46 +0000 UTC |
imhunterand/CVE-2023-36845
Juniper - Remote Code Execution (CVE-2023-36845) PreAuth-RCE Exploits
Create: 2024-02-15 20:17:33 +0000 UTC Push: 2024-02-15 20:17:33 +0000 UTC |
duy-31/CVE-2024-21413
Microsoft Outlook Remote Code Execution Vulnerability
Create: 2024-02-15 19:57:38 +0000 UTC Push: 2024-02-15 19:57:38 +0000 UTC |
druxter-x/PHP-CVE-2023-2023-2640-POC-Escalation
Create: 2024-02-15 16:35:59 +0000 UTC Push: 2024-02-15 16:35:59 +0000 UTC |
nnotwen/Script-For-CVE-2024-20666
PowerShell script that can help you automate updating the Windows Recovery Environment (WinRE) on deployed devices to address the security vulnerabilities in [CVE-2024-20666](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20666).
Create: 2024-02-15 13:53:21 +0000 UTC Push: 2024-02-15 13:53:21 +0000 UTC |
abdomagdy0/CVE-2024-23897-htb
Create: 2024-02-15 12:37:34 +0000 UTC Push: 2024-02-15 12:37:34 +0000 UTC |
FixedOctocat/CVE-2024-25466
Description for CVE-2024-25466
Create: 2024-02-15 07:47:14 +0000 UTC Push: 2024-02-15 07:47:14 +0000 UTC |
letsr00t/CVE-2022-0847
Create: 2024-02-15 02:27:27 +0000 UTC Push: 2024-02-15 02:27:28 +0000 UTC |
ST3G4N05/ExploitScript-CVE-2023-46604
Create: 2024-02-14 18:39:49 +0000 UTC Push: 2024-02-14 18:39:49 +0000 UTC |
Previous
203
204
205
206
207
208
209
210
Next