unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
rvizx/CVE-2025-24893
Create: 2025-10-25 22:07:31 +0000 UTC Push: 2025-10-25 22:07:32 +0000 UTC |
vinodwick/CVE-2025-4334
The Simple User Registration plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 6.3. This is due to insufficient restrictions on user meta values that can be supplied during registration. This makes it possible for unauthenticated attackers to register as an administrator.
Create: 2025-10-25 16:12:02 +0000 UTC Push: 2025-10-25 16:12:03 +0000 UTC |
Theethat-Thamwasin/CVE-2025-63307
Create: 2025-10-25 15:34:17 +0000 UTC Push: 2025-11-05 14:27:43 +0000 UTC |
garvitv14/CVE-2025-59287
It is an Working exploit of new CVE found in WSUS.
Create: 2025-10-25 15:18:21 +0000 UTC Push: 2025-10-25 15:18:22 +0000 UTC |
0xSigSegv0x00/cve-2024-12084
heap overflow to execute arbitary commands
Create: 2025-10-25 14:28:45 +0000 UTC Push: 2025-10-25 14:28:46 +0000 UTC |
pentastic-be/CVE-2025-61304
OS command injection vulnerability in Dynatrace ActiveGate ping extension up to 1.016 via crafted ip address
Create: 2025-10-25 12:42:09 +0000 UTC Push: 2025-10-25 12:42:10 +0000 UTC |
terribleMOTHMAN/my_CVE-2021-3156
Create: 2025-10-25 12:28:47 +0000 UTC Push: 2025-10-25 12:35:11 +0000 UTC |
CaelumIsMe/CVE-2019-7069-POC
Create: 2025-10-25 11:16:19 +0000 UTC Push: 2025-10-25 11:16:19 +0000 UTC |
Smarttfoxx/CVE-2025--
Create: 2025-10-25 05:03:36 +0000 UTC Push: 2025-10-25 05:03:36 +0000 UTC |
Nxploited/CVE-2025-4796
Eventin <= 4.0.34 - Authenticated (Contributor+) Privilege Escalation via User Email Change/Account Takeover
Create: 2025-10-25 03:35:29 +0000 UTC Push: 2025-10-25 03:35:30 +0000 UTC |
jiansiting/CVE-2025-59287
WSUS Unauthenticated RCE
Create: 2025-10-25 02:30:07 +0000 UTC Push: 2025-10-25 02:30:08 +0000 UTC |
Mitchellzhou1/CVE-2025-48385-PoC
PoC for CVE-2025-48385.
Create: 2025-10-25 02:25:09 +0000 UTC Push: 2025-10-25 02:25:46 +0000 UTC |
djackreuter/CVE-2025-60349
CVE-2025-60349: Pxscan Arbitrary Process Termination
Create: 2025-10-24 19:43:31 +0000 UTC Push: 2025-10-24 19:50:41 +0000 UTC |
ChCh0i/cve-2025-1550
Create: 2025-10-24 19:02:33 +0000 UTC Push: 2025-10-24 19:02:33 +0000 UTC |
pollotherunner/CVE-2025-61155
Official public advisory for CVE-2025-61155
Create: 2025-10-24 18:35:43 +0000 UTC Push: 2025-10-24 19:22:45 +0000 UTC |
jlinebau/CVE-2025-55315-Scanner-Monitor
Quick and Simple Scripts to Scan for Vulnerable Servers and Packet Level Monitors
Create: 2025-10-24 14:19:43 +0000 UTC Push: 2025-10-24 14:19:43 +0000 UTC |
bambooqj/cve-2025-3248
Langflow 在对用户提交的“验证代码”做 AST 解析和编译时,在未做鉴权与沙箱限制的情况下调用了 Python 的 compile()/exec()(以及在编译阶段会评估函数默认参数与装饰器),攻击者可把恶意载荷放在参数默认值或装饰器里,借此在服务器上下文中执行任意语句(反弹 shell、下载器、横向移动等)
Create: 2025-10-24 13:08:17 +0000 UTC Push: 2025-10-24 13:08:18 +0000 UTC |
stuxbench/mlflow-cve-2020-11978
Create: 2025-10-24 10:58:16 +0000 UTC Push: 2025-10-24 10:58:16 +0000 UTC |
SCREAMBBY/CVE-2025-52099
an integer overflow in SQLite 3.50.0
Create: 2025-10-24 09:55:36 +0000 UTC Push: 2025-10-24 09:55:36 +0000 UTC |
Arkha-Corvus/LetsDefend-SOC235-Atlassian-Confluence-Broken-Access-Control-0-Day-CVE-2023-22515-EventID-197
I was presented with a high-severity alert indicating a potential exploit attempt of CVE-2023-22515, a zero-day vulnerability in Atlassian Confluence. The alert showed a suspicious GET request from an external IP targeting the Confluence server, suggesting an attempt to gain unauthorised admin access.
Create: 2025-10-24 06:38:17 +0000 UTC Push: 2025-10-24 09:32:26 +0000 UTC |
Previous
15
16
17
18
19
20
21
22
Next