unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
identity-threat-labs/Article-RegreSSHion-CVE-2024-6387
In an era where digital security is crucial, a new vulnerability in OpenSSH, identified as CVE-2024-6387, has drawn the attention of system administrators and security professionals worldwide. Named "regreSSHion," this severe security flaw allows remote code execution (RCE) and could significant threat to the integrity of vulnerable systems.
Create: 2024-08-29 15:00:56 +0000 UTC Push: 2024-08-29 15:06:16 +0000 UTC |
NasrallahBaadi/CVE-2019-15107
CVE-2019-15107 Webmin unauthenticated RCE
Create: 2024-08-29 13:58:36 +0000 UTC Push: 2024-08-29 13:58:36 +0000 UTC |
LuisMateo1/Arbitrary-File-Read-CVE-2024-24919
Create: 2024-08-29 12:59:40 +0000 UTC Push: 2024-08-29 13:35:55 +0000 UTC |
mistymntncop/CVE-2024-5274
Create: 2024-08-29 11:58:25 +0000 UTC Push: 2024-08-29 12:01:58 +0000 UTC |
StopThatTalace/CVE-2024-25641-CACTI-RCE-1.2.26
Fully automated PoC - CVE-2024-25641 - RCE - Cacti < v1.2.26 🌵
Create: 2024-08-29 06:27:25 +0000 UTC Push: 2024-08-29 06:27:28 +0000 UTC |
Wa1nut4/CVE-2024-26230
LPE of CVE-2024-26230
Create: 2024-08-28 16:31:26 +0000 UTC Push: 2024-08-28 16:31:26 +0000 UTC |
AdminPentester/CVE-2024-38063-
Remotely Exploiting The Kernel Via IPv6
Create: 2024-08-28 15:28:14 +0000 UTC Push: 2024-08-28 15:28:14 +0000 UTC |
bigb0x/CVE-2024-7954
This exploit will attempt to execute system commands on SPIP targets.
Create: 2024-08-28 14:54:56 +0000 UTC Push: 2024-08-28 14:54:57 +0000 UTC |
D0rDa4aN919/CVE-2023-22809-Exploiter
Create: 2024-08-28 14:22:53 +0000 UTC Push: 2024-08-28 15:32:45 +0000 UTC |
identity-threat-labs/CVE-2024-6387-Vulnerability-Checker
This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, and ports. The script can also read addresses from a file.
Create: 2024-08-28 13:28:08 +0000 UTC Push: 2024-08-28 13:28:08 +0000 UTC |
PanAdamski/CVE-2022-44268-automated
Create: 2024-08-28 11:28:34 +0000 UTC Push: 2024-08-28 11:28:34 +0000 UTC |
rxerium/CVE-2024-7593
ncorrect implementation of an authentication algorithm in Ivanti vTM other than versions 22.2R1 or 22.7R2 allows a remote unauthenticated attacker to bypass authentication of the admin panel.
Create: 2024-08-28 10:02:05 +0000 UTC Push: 2024-08-28 10:02:08 +0000 UTC |
EQSTLab/CVE-2024-5932-PoC
Proof-of-Concept for CVE-2024-5932
Create: 2024-08-28 09:56:52 +0000 UTC Push: 2024-08-28 09:57:19 +0000 UTC |
zenzue/CVE-2024-38063-POC
potential memory corruption vulnerabilities in IPv6 networks.
Create: 2024-08-28 08:57:23 +0000 UTC Push: 2024-08-28 08:57:23 +0000 UTC |
eddieeyyang/CVE-2000-0666
Create: 2024-08-28 08:08:08 +0000 UTC Push: 2024-08-28 08:08:08 +0000 UTC |
m1erphy/CVE-2022-20073
arbitrary file upload em routers cisco com payloads encodificados para bypassar proteções XSS-PROTECTION e CSP.
Create: 2024-08-28 07:29:45 +0000 UTC Push: 2024-08-28 07:29:45 +0000 UTC |
BBD-YZZ/CVE-2024-38856-RCE
Create: 2024-08-28 03:17:22 +0000 UTC Push: 2024-08-28 03:17:23 +0000 UTC |
aztec-eagle/cve-2016-20012
Create: 2024-08-28 03:12:27 +0000 UTC Push: 2024-08-28 03:12:27 +0000 UTC |
PumpkinBridge/Windows-TCP-IP-IPv6-CVE-2024-38063-
P/IP IPv6(CVE-2024-38063)
Create: 2024-08-28 01:46:44 +0000 UTC Push: 2024-08-28 01:46:44 +0000 UTC |
PumpkinBridge/Windows-CVE-2024-38063
P/IP IPv6(CVE-2024-38063)
Create: 2024-08-28 01:46:44 +0000 UTC Push: 2024-08-28 01:46:44 +0000 UTC |
Previous
10
11
12
13
14
15
16
17
Next