unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
BBSynapse/CVE-2023-40028
CVE-2023-40028 wirkt sich auf Ghost, ein Open-Source-Content-Management-System (CMS) aus.
Create: 2024-12-10 09:12:20 +0000 UTC Push: 2024-12-10 09:12:20 +0000 UTC |
CSIRTTrizna/CVE-2024-55587
Create: 2024-12-10 06:59:00 +0000 UTC Push: 2024-12-10 07:05:27 +0000 UTC |
MAWK0235/CVE-2024-23346
This is an exploit for chemistry Hack the Box machines that automates a "terminal" enviornment using CVE-2024-23346
Create: 2024-12-09 22:34:44 +0000 UTC Push: 2024-12-09 22:34:45 +0000 UTC |
mynameSumin/CVE-2021-21389
경희대 졸업프로젝트
Create: 2024-12-09 20:44:30 +0000 UTC Push: 2024-12-09 20:44:30 +0000 UTC |
Dit-Developers/CVE-2024-0044-
CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13
Create: 2024-12-09 19:05:57 +0000 UTC Push: 2024-12-09 19:05:58 +0000 UTC |
jk-mayne/CVE-2024-9441-Checker
A simple python script to test for CVE-2024-9441.
Create: 2024-12-09 17:49:37 +0000 UTC Push: 2024-12-09 17:49:37 +0000 UTC |
Proklinius897/CVE-2018-25031-tests
Testing for exploitation
Create: 2024-12-09 16:13:18 +0000 UTC Push: 2024-12-09 16:13:19 +0000 UTC |
RandomRobbieBF/CVE-2024-12270
Beautiful Taxonomy Filters <= 2.4.3 - Unauthenticated SQL Injection
Create: 2024-12-09 13:22:10 +0000 UTC Push: 2024-12-09 13:24:15 +0000 UTC |
RandomRobbieBF/CVE-2024-12209
WP Umbrella: Update Backup Restore & Monitoring <= 2.17.0 - Unauthenticated Local File Inclusion
Create: 2024-12-09 11:51:10 +0000 UTC Push: 2024-12-09 11:52:10 +0000 UTC |
Jimmy01240397/CVE-2012-1823-Analyze
Create: 2024-12-09 08:31:04 +0000 UTC Push: 2024-12-09 08:31:05 +0000 UTC |
Betan423/CVE-2024-23334-PoC
This repository is a proof of concept (POC) for CVE-2024-23334, demonstrating an attempt to replicate the bug in aiohttp that leads to Local File Inclusion (LFI).
Create: 2024-12-09 06:51:13 +0000 UTC Push: 2024-12-09 06:51:13 +0000 UTC |
JFOZ1010/CVE-2024-24549
Proof of concept of the CVE-2024-24549, Exploit in Python.
Create: 2024-12-09 04:59:07 +0000 UTC Push: 2024-12-09 04:59:07 +0000 UTC |
CyberCrowCC/CVE-2024-48990
Create: 2024-12-09 04:28:40 +0000 UTC Push: 2024-12-09 04:29:19 +0000 UTC |
Danyw24/CVE-2004-1561-Icecast-Header-Overwrite-buffer-overflow-RCE-2.0.1-Win32-
Create: 2024-12-09 00:10:16 +0000 UTC Push: 2024-12-09 00:10:16 +0000 UTC |
Xernary/CVE-2017-5638-POC
Proof of concept of CVE-2017-5638 including the whole setup of the Apache vulnerable server
Create: 2024-12-08 17:22:38 +0000 UTC Push: 2024-12-08 17:22:38 +0000 UTC |
thanhtung4102/CVE-2024-53450.
Create: 2024-12-08 15:26:51 +0000 UTC Push: 2024-12-08 15:26:52 +0000 UTC |
orangecza/CVE-2024-43093-43047
Create: 2024-12-08 13:06:32 +0000 UTC Push: 2024-12-08 13:06:32 +0000 UTC |
z3usx01/CVE-2021-23017-POC
The issue only affects nginx if the "resolver" directive is used in the configuration file. Further, the attack is only possible if an attacker is able to forge UDP packets from the DNS server.
Create: 2024-12-08 09:47:52 +0000 UTC Push: 2024-12-08 09:47:52 +0000 UTC |
D1se0/CVE-2024-23897-Vulnerabilidad-Jenkins
Create: 2024-12-08 08:13:34 +0000 UTC Push: 2024-12-08 08:13:34 +0000 UTC |
watchdog1337/CVE-2024-42327_Zabbix_SQLI
POC for CVE-2024-42327, an authenticated SQL Injection in Zabbix through the user.get API Method
Create: 2024-12-07 21:25:40 +0000 UTC Push: 2024-12-07 21:25:41 +0000 UTC |
Previous
6
7
8
9
10
11
12
13
Next