unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
filipzag/CVE-2024-10220
Create: 2024-12-13 08:59:23 +0000 UTC Push: 2024-12-13 08:59:24 +0000 UTC |
TranKuBao/winrar_CVE2023-38831
Create: 2024-12-13 08:02:38 +0000 UTC Push: 2024-12-13 08:02:38 +0000 UTC |
saketh-osmsec/CVE-2024-36117
Create: 2024-12-13 07:23:35 +0000 UTC Push: 2024-12-13 07:24:02 +0000 UTC |
JAckLosingHeart/CVE-2024-55875
CVE-2024-55875/GHSA-7mj5-hjjj-8rgw/http4k first CVE
Create: 2024-12-13 06:21:36 +0000 UTC Push: 2024-12-13 06:22:08 +0000 UTC |
AlbedoPrime/PP_CVE-2024-38998
Uma vulnerabilidade (CVE-2024-38998) foi identificada na versão 2.3.6 do módulo JavaScript requirejs. Ela explora prototype pollution na função config, permitindo que invasores modifiquem Object.prototype com entradas maliciosas. Isso pode causar DoS, execução remota de código (RCE) ou XSS. A gravidade é crítica (CVSS 9.8).
Create: 2024-12-12 23:19:44 +0000 UTC Push: 2024-12-12 23:19:45 +0000 UTC |
0xDTC/Ghost-5.58-Arbitrary-File-Read-CVE-2023-40028
CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to upload files that are symlinks. This can be exploited to perform an arbitrary file read of any file on the host operating system.
Create: 2024-12-12 18:50:58 +0000 UTC Push: 2024-12-12 18:50:59 +0000 UTC |
soltanali0/CVE-2024-38475
exploit CVE-2024-38475(mod_rewrite weakness with filesystem path matching)
Create: 2024-12-12 10:23:32 +0000 UTC Push: 2024-12-12 10:24:18 +0000 UTC |
cloudwafs/s2-067-CVE-2024-53677
s2-067(CVE-2024-53677)
Create: 2024-12-12 08:30:14 +0000 UTC Push: 2024-12-12 08:30:48 +0000 UTC |
XiaomingX/cve-2024-4956
CVE-2024-4956 Python exploitation utility
Create: 2024-12-12 04:05:10 +0000 UTC Push: 2024-12-12 04:05:11 +0000 UTC |
igorbf495/CVE-2024-42327
writeup cve-2024-42327
Create: 2024-12-12 01:32:26 +0000 UTC Push: 2024-12-12 01:32:26 +0000 UTC |
TalatumLabs/CVE-2024-0012_CVE-2024-9474_PoC
This PoC is targeting vulnerabilities in Palo Alto PAN-OS, specifically CVE-2024-0012 and CVE-2024-9474. This script automates the exploitation process, including payload creation, chunked delivery, and seamless command execution.
Create: 2024-12-11 18:13:32 +0000 UTC Push: 2024-12-11 18:13:32 +0000 UTC |
watchtowrlabs/CVE-2024-50623
Cleo Unrestricted file upload and download PoC (CVE-2024-50623)
Create: 2024-12-11 14:19:55 +0000 UTC Push: 2024-12-11 14:23:19 +0000 UTC |
l0w3/CVE-2019-18634
This repo contains both the exploit and the explaination of how this vulnerability is exploited
Create: 2024-12-11 13:33:42 +0000 UTC Push: 2024-12-11 13:33:42 +0000 UTC |
samogod/CVE-2024-11728
KiviCare – Clinic & Patient Management System (EHR) WordPress Plugin Unauthenticated SQL Injection PoC
Create: 2024-12-11 12:33:46 +0000 UTC Push: 2024-12-11 12:33:47 +0000 UTC |
TranKuBao/CVE-20233460
Cái này dựng lên với mục đích cho ae tham khảo, chê thì đừng có xem. :))))
Create: 2024-12-11 07:38:22 +0000 UTC Push: 2024-12-11 07:38:22 +0000 UTC |
TranKuBao/CVE-2023-3460_FIX
Cái này dựng lên với mục đích cho ae tham khảo, chê thì đừng có xem. :))))
Create: 2024-12-11 07:38:22 +0000 UTC Push: 2024-12-12 01:03:43 +0000 UTC |
jolibb55/CVE-2024-32002_RCE
An example of a repo that would make use of the CVE-2024-32002
Create: 2024-12-11 07:22:59 +0000 UTC Push: 2024-12-11 07:22:59 +0000 UTC |
nutcr4ck3r/CVE-2024-26229
Create: 2024-12-11 05:45:37 +0000 UTC Push: 2024-12-11 05:45:38 +0000 UTC |
coskper-papa/PAN-OS_CVE-2024-9474
Palo Alto Networks PAN-OS(CVE-2024-9474) POC
Create: 2024-12-11 03:10:41 +0000 UTC Push: 2024-12-11 03:10:42 +0000 UTC |
chaos198800/Windows-xia-SSL-zheng-shu-zhi-zuo-gong-ju--CVE-2004-2761-lou-dong-xiu-fu
Windows下SSL证书制作工具-CVE-2004-2761漏洞修复
Create: 2024-12-11 00:48:30 +0000 UTC Push: 2024-12-11 00:48:30 +0000 UTC |
Previous
1
2
3
4
5
6
7
8
Next