unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
EQSTSeminar/CVE-2024-5932
Create: 2024-08-25 11:51:36 +0000 UTC Push: 2024-08-25 11:51:36 +0000 UTC |
PumpkinBridge/Chrome-CVE-2024-2887-RCE-Poc
Chrome-RCE-Poc
Create: 2024-08-25 07:27:21 +0000 UTC Push: 2024-08-25 07:27:21 +0000 UTC |
thefizzyfish/CVE-2023-50564-pluck
CVE-2023-50564 An arbitrary file upload vulnerability in the component /inc/modules_install.php of Pluck-CMS v4.7.18 allows attackers to execute arbitrary code via uploading a crafted ZIP file.
Create: 2024-08-24 19:09:21 +0000 UTC Push: 2024-08-24 19:09:21 +0000 UTC |
ynwarcs/CVE-2024-38063
poc for CVE-2024-38063 (RCE in tcpip.sys)
Create: 2024-08-24 18:25:46 +0000 UTC Push: 2024-08-24 19:13:29 +0000 UTC |
FlojBoj/CVE-2023-42793
TeamCity CVE-2023-42793 RCE (Remote Code Execution)
Create: 2024-08-24 17:17:21 +0000 UTC Push: 2024-08-24 17:17:21 +0000 UTC |
gotr00t0day/CVE-2024-28995
SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine.
Create: 2024-08-24 17:05:48 +0000 UTC Push: 2024-08-24 17:05:48 +0000 UTC |
thefizzyfish/CVE-2023-4220
Python exploit for Chamilo Unrestricted File Upload Vuln - CVE-2023-4220
Create: 2024-08-24 15:25:28 +0000 UTC Push: 2024-08-24 15:25:29 +0000 UTC |
haroonawanofficial/CVE-2024-38063-Research-Tool
Looks like an exploit is theoretical as there is no integar underflow happens.
Create: 2024-08-24 15:04:54 +0000 UTC Push: 2024-08-24 15:04:54 +0000 UTC |
jimmychanii/CVE-2024-31317
Create: 2024-08-24 14:41:55 +0000 UTC Push: 2024-08-24 14:41:55 +0000 UTC |
fa-rrel/CVE-2024-4358.py
Telerik Report Server deserialization and authentication bypass exploit chain for CVE-2024-4358/CVE-2024-1800
Create: 2024-08-24 10:09:09 +0000 UTC Push: 2024-08-24 10:09:26 +0000 UTC |
fa-rrel/CVE-2024-4358
Telerik Report Server deserialization and authentication bypass exploit chain for CVE-2024-4358/CVE-2024-1800
Create: 2024-08-24 10:09:09 +0000 UTC Push: 2024-08-24 10:30:29 +0000 UTC |
Useems/CVE-2024-28000-PoC
Proof of Concept, CVE-2024-28000
Create: 2024-08-24 08:08:36 +0000 UTC Push: 2024-08-24 08:08:36 +0000 UTC |
VanishedPeople/CVE-2023-4220
Create: 2024-08-24 05:32:31 +0000 UTC Push: 2024-08-24 05:32:31 +0000 UTC |
Alucard0x1/CVE-2024-28000
LiteSpeed Cache Privilege Escalation PoC
Create: 2024-08-24 05:12:56 +0000 UTC Push: 2024-08-24 05:13:23 +0000 UTC |
CyberSec-Supra/CVE-2024-42834
Create: 2024-08-24 02:21:33 +0000 UTC Push: 2024-08-24 02:21:33 +0000 UTC |
fj016/CVE-2024-41992-PoC
PoC for the CVE-2024-41992 (RCE on devices running WiFi-TestSuite-DUT)
Create: 2024-08-23 23:48:01 +0000 UTC Push: 2024-08-23 23:48:01 +0000 UTC |
juliourena/CVE-2019-19470-RedTeamRD
Este repositorio contiene el código y las instrucciones para replicar el exploit CVE-2019-19470 descubierto por CODEWHITE. Aquí se encuentran el código fuente de los ejemplos que utilicé en el meetup de HackTheBox para explicar mi proceso de aprendizaje y creación de este exploit.
Create: 2024-08-23 22:40:58 +0000 UTC Push: 2024-08-23 22:40:58 +0000 UTC |
convisolabs/CVE-2024-43044-jenkins
Exploit for the vulnerability CVE-2024-43044 in Jenkins
Create: 2024-08-23 20:26:26 +0000 UTC Push: 2024-08-29 14:52:51 +0000 UTC |
th3gokul/CVE-2024-7928
Create: 2024-08-23 15:50:30 +0000 UTC Push: 2024-08-23 15:50:58 +0000 UTC |
salvadornakamura/CVE-2024-21689
CVE-2024–21689 RCE Bamboo Data Center and Server Atlassian POC
Create: 2024-08-23 15:32:50 +0000 UTC Push: 2024-08-23 15:33:13 +0000 UTC |
Previous
72
73
74
75
76
77
78
79
Next