unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
ShadowByte1/CVE-2024-53345
Critical 0 Day in Car Rental Management System Versions 1.0 - 1.3
Create: 2024-12-23 08:48:51 +0000 UTC Push: 2024-12-23 08:48:51 +0000 UTC |
SleepingBag945/CVE-2024-50379
tomcat CVE-2024-50379 条件竞争文件上传exp
Create: 2024-12-23 07:20:47 +0000 UTC Push: 2024-12-23 07:20:47 +0000 UTC |
tequilasunsh1ne/CVE_2024_51228
Create: 2024-12-23 02:36:54 +0000 UTC Push: 2024-12-23 02:36:54 +0000 UTC |
mightysai1997/CVE-2024-53677
Create: 2024-12-23 02:35:24 +0000 UTC Push: 2024-12-23 02:35:42 +0000 UTC |
xpltive/CVE-2023-50564
Create: 2024-12-22 12:41:05 +0000 UTC Push: 2024-12-22 12:41:08 +0000 UTC |
xpltive/CVE-2023-41425
Create: 2024-12-22 11:53:14 +0000 UTC Push: 2024-12-22 11:53:18 +0000 UTC |
Sachinart/CVE-2024-56145-craftcms-rce
CVE-2024-56145 SSTI to RCE - twig templates
Create: 2024-12-22 11:53:04 +0000 UTC Push: 2024-12-22 11:53:48 +0000 UTC |
jamesbishop785/CVE-2024-38063
Vulnerability Research
Create: 2024-12-22 03:23:49 +0000 UTC Push: 2024-12-22 03:23:49 +0000 UTC |
GCatt-AS/CVE-2024-48197
Reflected XSS in AudioCodes MP-202b
Create: 2024-12-21 13:07:51 +0000 UTC Push: 2024-12-21 13:07:51 +0000 UTC |
zesnd/cve-2017-12149
Create: 2024-12-21 09:38:36 +0000 UTC Push: 2024-12-21 09:38:36 +0000 UTC |
zesnd/CVE-2020-14882-POC
Create: 2024-12-21 09:36:18 +0000 UTC Push: 2024-12-21 09:36:18 +0000 UTC |
Sanandd/cve-2024-CVE-2024-41713
cve-2024-CVE-2024-41713
Create: 2024-12-21 09:35:12 +0000 UTC Push: 2024-12-21 09:35:13 +0000 UTC |
ph0ebus/Tomcat-CVE-2024-50379-Poc
RCE through a race condition in Apache Tomcat
Create: 2024-12-21 05:54:29 +0000 UTC Push: 2024-12-21 05:54:29 +0000 UTC |
zxj-hub/CVE-2024-41713POC
Mitel MiCollab 企业协作平台 任意文件读取漏洞(CVE-2024-41713)由于Mitel MiCollab软件的 NuPoint 统一消息 (NPM) 组件中存在身份验证绕过漏洞,并且输入验证不足,未经身份验证的远程攻击者可利用该漏洞执行路径遍历攻击,成功利用可能导致未授权访问、破坏或删除用户的数据和系统配置。影响范围:version < MiCollab 9.8 SP2 (9.8.2.12)
Create: 2024-12-21 02:26:26 +0000 UTC Push: 2024-12-21 02:26:27 +0000 UTC |
monke443/CVE-2023-40028-Ghost-Arbitrary-File-Read
Create: 2024-12-21 01:53:47 +0000 UTC Push: 2024-12-21 01:53:48 +0000 UTC |
Alchemist3dot14/CVE-2024-50379
CVE-2024-50379 is a critical vulnerability affecting multiple versions of Apache Tomcat, an open source web server and servlet container widely used for deploying Java-based web applications. The vulnerability arises from a Time-of-Use (TOCTOU) race condition that occurs when compiling JavaServer Pages (JSPs).
Create: 2024-12-20 21:30:49 +0000 UTC Push: 2024-12-20 21:30:50 +0000 UTC |
zxj-hub/CVE-2024-7954POC
SPIP 4.30-alpha2、4.2.13、4.1.16之前的版本使用的porte_plume插件存在任意代码执行漏洞,远程未经身份验证的攻击者可以通过发送精心设计的HTTP 请求以SPIP用户身份执行任意PHP代码。
Create: 2024-12-20 15:40:35 +0000 UTC Push: 2024-12-20 15:40:36 +0000 UTC |
7aRanchi/CVE-2024-27956-for-fscan
This is a yaml PoC rule for fscan.
Create: 2024-12-20 07:30:24 +0000 UTC Push: 2024-12-20 07:30:24 +0000 UTC |
iSee857/CVE-2024-50379-PoC
Apache Tomcat(CVE-2024-50379)条件竞争致远程代码执行漏洞批量检测脚本
Create: 2024-12-20 05:24:10 +0000 UTC Push: 2024-12-20 05:24:10 +0000 UTC |
JFOZ1010/Nuclei-Template-CVE-2024-50379
Repositorio para alojar un template de Nuclei para probar el CVE-2024-50379 (en fase de prueba)
Create: 2024-12-20 03:43:47 +0000 UTC Push: 2024-12-20 03:43:48 +0000 UTC |
Previous
-8
-7
-6
-5
-4
-3
-2
-1
Next