unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
Smarttfoxx/CVE-2025--
Create: 2025-10-25 05:03:36 +0000 UTC Push: 2025-10-25 05:03:36 +0000 UTC |
Nxploited/CVE-2025-4796
Eventin <= 4.0.34 - Authenticated (Contributor+) Privilege Escalation via User Email Change/Account Takeover
Create: 2025-10-25 03:35:29 +0000 UTC Push: 2025-10-25 03:35:30 +0000 UTC |
jiansiting/CVE-2025-59287
WSUS Unauthenticated RCE
Create: 2025-10-25 02:30:07 +0000 UTC Push: 2025-10-25 02:30:08 +0000 UTC |
Mitchellzhou1/CVE-2025-48385-PoC
PoC for CVE-2025-48385.
Create: 2025-10-25 02:25:09 +0000 UTC Push: 2025-10-25 02:25:46 +0000 UTC |
djackreuter/CVE-2025-60349
CVE-2025-60349: Pxscan Arbitrary Process Termination
Create: 2025-10-24 19:43:31 +0000 UTC Push: 2025-10-24 19:50:41 +0000 UTC |
ChCh0i/cve-2025-1550
Create: 2025-10-24 19:02:33 +0000 UTC Push: 2025-10-24 19:02:33 +0000 UTC |
pollotherunner/CVE-2025-61155
Official public advisory for CVE-2025-61155
Create: 2025-10-24 18:35:43 +0000 UTC Push: 2025-10-24 19:22:45 +0000 UTC |
jlinebau/CVE-2025-55315-Scanner-Monitor
Quick and Simple Scripts to Scan for Vulnerable Servers and Packet Level Monitors
Create: 2025-10-24 14:19:43 +0000 UTC Push: 2025-10-24 14:19:43 +0000 UTC |
bambooqj/cve-2025-3248
Langflow 在对用户提交的“验证代码”做 AST 解析和编译时,在未做鉴权与沙箱限制的情况下调用了 Python 的 compile()/exec()(以及在编译阶段会评估函数默认参数与装饰器),攻击者可把恶意载荷放在参数默认值或装饰器里,借此在服务器上下文中执行任意语句(反弹 shell、下载器、横向移动等)
Create: 2025-10-24 13:08:17 +0000 UTC Push: 2025-10-24 13:08:18 +0000 UTC |
stuxbench/mlflow-cve-2020-11978
Create: 2025-10-24 10:58:16 +0000 UTC Push: 2025-10-24 10:58:16 +0000 UTC |
SCREAMBBY/CVE-2025-52099
an integer overflow in SQLite 3.50.0
Create: 2025-10-24 09:55:36 +0000 UTC Push: 2025-10-24 09:55:36 +0000 UTC |
Arkha-Corvus/LetsDefend-SOC235-Atlassian-Confluence-Broken-Access-Control-0-Day-CVE-2023-22515-EventID-197
I was presented with a high-severity alert indicating a potential exploit attempt of CVE-2023-22515, a zero-day vulnerability in Atlassian Confluence. The alert showed a suspicious GET request from an external IP targeting the Confluence server, suggesting an attempt to gain unauthorised admin access.
Create: 2025-10-24 06:38:17 +0000 UTC Push: 2025-10-24 09:32:26 +0000 UTC |
Mpokes/CVE-2025-59503-Poc
Create: 2025-10-24 05:20:50 +0000 UTC Push: 2025-10-24 05:20:51 +0000 UTC |
yawataa/CVE-2025-60749
SketchUp Desktop 2025 DLL Hijacking Vulnerability
Create: 2025-10-24 02:17:04 +0000 UTC Push: 2025-10-24 02:17:05 +0000 UTC |
flyskyfire/cve-2025-61984-poc
PoC for CVE-2025-61984
Create: 2025-10-24 01:31:48 +0000 UTC Push: 2025-10-24 01:31:48 +0000 UTC |
cyhe50/cve-2024-56800-poc
Create: 2025-10-23 23:36:16 +0000 UTC Push: 2025-10-23 23:36:17 +0000 UTC |
menashe12346/CVE-2019-18935
Exploit for CVE-2019-18935
Create: 2025-10-23 20:56:43 +0000 UTC Push: 2025-10-23 20:56:43 +0000 UTC |
callinston/CVE-2025-62481
Create: 2025-10-23 18:41:35 +0000 UTC Push: 2025-10-23 18:41:36 +0000 UTC |
mocred/cve-2025-8088
path traversal tool based on cve 2025 8088 vurnelability
Create: 2025-10-23 18:03:11 +0000 UTC Push: 2025-10-23 18:07:31 +0000 UTC |
allinsthon/CVE-2025-61932
Create: 2025-10-23 17:31:50 +0000 UTC Push: 2025-10-23 17:31:50 +0000 UTC |
Previous
18
19
20
21
22
23
24
25
Next