unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
pwndorei/CVE-2024-38080
poc code for CVE-2024-38080
Create: 2024-09-01 11:25:22 +0000 UTC Push: 2024-09-01 11:35:25 +0000 UTC |
fa-rrel/CVE-2024-7954-RCE-
Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12
Create: 2024-09-01 10:59:45 +0000 UTC Push: 2024-09-01 10:59:45 +0000 UTC |
fa-rrel/CVE-2024-7954-RCE
Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12
Create: 2024-09-01 10:59:45 +0000 UTC Push: 2024-09-01 11:00:34 +0000 UTC |
KernelKraze/CVE-2024-38063_PoC
This is a C language program designed to test the Windows TCP/IP Remote Code Execution Vulnerability (CVE-2024-38063). It sends specially crafted IPv6 packets with embedded shellcode to exploit the vulnerability.
Create: 2024-09-01 09:20:02 +0000 UTC Push: 2024-09-01 09:20:03 +0000 UTC |
Shareoks/Jpg-Png-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
Create: 2024-09-01 09:12:25 +0000 UTC Push: 2024-09-01 09:15:45 +0000 UTC |
kxnsiz/CVE-2023-VULN
cve-2023 vuln certify
Create: 2024-08-31 21:43:56 +0000 UTC Push: 2024-08-31 21:44:06 +0000 UTC |
2aqu/CVE-2023-VULN
cve-2023 vuln certify
Create: 2024-08-31 21:43:56 +0000 UTC Push: 2024-08-31 21:44:06 +0000 UTC |
Yowise/CVE-2022-26923
Create: 2024-08-31 20:13:47 +0000 UTC Push: 2024-08-31 22:50:05 +0000 UTC |
0xDivyanshu-new/CVE-2023-29360-
POC for CVE-2023–29360
Create: 2024-08-31 18:01:46 +0000 UTC Push: 2024-08-31 18:01:47 +0000 UTC |
0xDivyanshu-new/CVE-2023-29360
POC for CVE-2023–29360
Create: 2024-08-31 18:01:46 +0000 UTC Push: 2024-08-31 18:09:37 +0000 UTC |
AhmedMansour93/Event-ID-263-Rule-Name-SOC287---Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919-
🔍 Just wrapped up an incident report on a Phishing Alert (Event ID 257, SOC282). Enhancing my expertise in email threat detection and response! 🚨 #Cybersecurity #SOCAnalyst #LetsDefend
Create: 2024-08-31 16:57:06 +0000 UTC Push: 2024-08-31 16:57:06 +0000 UTC |
b1u3st0rm/CVE-2024-44812-PoC
Proof of Concept Exploit for CVE-2024-44812 - SQL Injection Authentication Bypass vulnerability in Online Complaint Site v1.0
Create: 2024-08-31 15:20:27 +0000 UTC Push: 2024-08-31 15:21:12 +0000 UTC |
ThemeHackers/CVE-2024-38063.py
CVE-2024-38063 is a critical security vulnerability in the Windows TCP/IP stack that allows for remote code execution (RCE)
Create: 2024-08-31 13:56:26 +0000 UTC Push: 2024-08-31 13:56:27 +0000 UTC |
ThemeHackers/CVE-2024-38063
CVE-2024-38063 is a critical security vulnerability in the Windows TCP/IP stack that allows for remote code execution (RCE)
Create: 2024-08-31 13:56:26 +0000 UTC Push: 2024-08-31 13:59:34 +0000 UTC |
ThemeHackers/CVE-2024-21413
CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability PoC
Create: 2024-08-31 13:18:43 +0000 UTC Push: 2024-08-31 13:18:43 +0000 UTC |
nitinronge91/Extracting-User-credentials-For-Web-portal-and-WiFi-AP-For-Hathway-Router-CVE-2024-44815-
CVE-2024-44815
Create: 2024-08-31 10:17:11 +0000 UTC Push: 2024-09-09 07:54:57 +0000 UTC |
cainiao159357/CVE-2023-2598
Create: 2024-08-31 09:14:53 +0000 UTC Push: 2024-08-31 09:14:54 +0000 UTC |
fa-rrel/CVE-2024-0195-SpiderFlow
CVE-2024-0195 Improper Control of Generation of Code ('Code Injection')
Create: 2024-08-31 07:37:55 +0000 UTC Push: 2024-08-31 07:37:55 +0000 UTC |
0xbhsu/CVE-2024-45058
PoC for CVE-2024-45058 Broken Access Control, allowing any user with view permission in the user configuration section to become an administrator.
Create: 2024-08-30 18:44:05 +0000 UTC Push: 2024-08-30 18:44:05 +0000 UTC |
VL4DR/CVE-2024-42642
Create: 2024-08-30 17:24:58 +0000 UTC Push: 2024-08-31 19:25:38 +0000 UTC |
Previous
67
68
69
70
71
72
73
74
Next