unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
zesnd/cve-2017-12149
Create: 2024-12-21 09:38:36 +0000 UTC Push: 2024-12-21 09:38:36 +0000 UTC |
zesnd/CVE-2020-14882-POC
Create: 2024-12-21 09:36:18 +0000 UTC Push: 2024-12-21 09:36:18 +0000 UTC |
Sanandd/cve-2024-CVE-2024-41713
cve-2024-CVE-2024-41713
Create: 2024-12-21 09:35:12 +0000 UTC Push: 2024-12-21 09:35:13 +0000 UTC |
ph0ebus/Tomcat-CVE-2024-50379-Poc
RCE through a race condition in Apache Tomcat
Create: 2024-12-21 05:54:29 +0000 UTC Push: 2024-12-21 05:54:29 +0000 UTC |
zxj-hub/CVE-2024-41713POC
Mitel MiCollab 企业协作平台 任意文件读取漏洞(CVE-2024-41713)由于Mitel MiCollab软件的 NuPoint 统一消息 (NPM) 组件中存在身份验证绕过漏洞,并且输入验证不足,未经身份验证的远程攻击者可利用该漏洞执行路径遍历攻击,成功利用可能导致未授权访问、破坏或删除用户的数据和系统配置。影响范围:version < MiCollab 9.8 SP2 (9.8.2.12)
Create: 2024-12-21 02:26:26 +0000 UTC Push: 2024-12-21 02:26:27 +0000 UTC |
monke443/CVE-2023-40028-Ghost-Arbitrary-File-Read
Create: 2024-12-21 01:53:47 +0000 UTC Push: 2024-12-21 01:53:48 +0000 UTC |
Alchemist3dot14/CVE-2024-50379
CVE-2024-50379 is a critical vulnerability affecting multiple versions of Apache Tomcat, an open source web server and servlet container widely used for deploying Java-based web applications. The vulnerability arises from a Time-of-Use (TOCTOU) race condition that occurs when compiling JavaServer Pages (JSPs).
Create: 2024-12-20 21:30:49 +0000 UTC Push: 2024-12-20 21:30:50 +0000 UTC |
zxj-hub/CVE-2024-7954POC
SPIP 4.30-alpha2、4.2.13、4.1.16之前的版本使用的porte_plume插件存在任意代码执行漏洞,远程未经身份验证的攻击者可以通过发送精心设计的HTTP 请求以SPIP用户身份执行任意PHP代码。
Create: 2024-12-20 15:40:35 +0000 UTC Push: 2024-12-20 15:40:36 +0000 UTC |
7aRanchi/CVE-2024-27956-for-fscan
This is a yaml PoC rule for fscan.
Create: 2024-12-20 07:30:24 +0000 UTC Push: 2024-12-20 07:30:24 +0000 UTC |
iSee857/CVE-2024-50379-PoC
Apache Tomcat(CVE-2024-50379)条件竞争致远程代码执行漏洞批量检测脚本
Create: 2024-12-20 05:24:10 +0000 UTC Push: 2024-12-20 05:24:10 +0000 UTC |
JFOZ1010/Nuclei-Template-CVE-2024-50379
Repositorio para alojar un template de Nuclei para probar el CVE-2024-50379 (en fase de prueba)
Create: 2024-12-20 03:43:47 +0000 UTC Push: 2024-12-20 03:43:48 +0000 UTC |
Chocapikk/CVE-2024-56145
Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled
Create: 2024-12-20 03:34:01 +0000 UTC Push: 2024-12-20 03:34:01 +0000 UTC |
AbdullahAlmutawa/CVE-2024-50945
SimplCommerce is affected by a broken access control vulnerability in the review system, allowing unauthorized users to post reviews for products they have not purchased.
Create: 2024-12-20 00:43:18 +0000 UTC Push: 2024-12-20 00:43:19 +0000 UTC |
AbdullahAlmutawa/CVE-2024-53476
SimplCommerce is affected by a race condition vulnerability in the checkout logic, allowing multiple users to purchase more products than are in stock via simultaneous checkout requests.
Create: 2024-12-20 00:27:22 +0000 UTC Push: 2024-12-20 00:27:22 +0000 UTC |
AbdullahAlmutawa/CVE-2024-50944
Integer Overflow in Checkout Logic in SimplCommerce 1.0.0 allows remote attackers to manipulate product quantities and total prices via crafted inputs that exploit insufficient validation of the quantity parameter.
Create: 2024-12-19 23:33:21 +0000 UTC Push: 2024-12-19 23:33:22 +0000 UTC |
SpiralBL0CK/CVE-2022-32981
poc for CVE-2022-32981 under work
Create: 2024-12-19 21:15:39 +0000 UTC Push: 2024-12-19 21:15:40 +0000 UTC |
SpiralBL0CK/CVE-2024-35176
CVE-2024-35176 poc full
Create: 2024-12-19 19:01:53 +0000 UTC Push: 2024-12-19 19:01:54 +0000 UTC |
SpiralBL0CK/CVE-2024-39908
CVE-2024-39908 full poc
Create: 2024-12-19 18:59:52 +0000 UTC Push: 2024-12-19 19:00:03 +0000 UTC |
MAHajian/CVE-2024-10793
Create: 2024-12-19 15:50:53 +0000 UTC Push: 2024-12-19 15:51:21 +0000 UTC |
RandomRobbieBF/CVE-2024-54262
Import Export For WooCommerce <= 1.5 - Authenticated (Subscriber+) Arbitrary File Upload
Create: 2024-12-19 14:42:06 +0000 UTC Push: 2024-12-19 14:43:46 +0000 UTC |
Previous
0
1
2
3
4
5
6
7
Next