unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
happyloa/Site-Add-on-Watchdog
Site Add-on Watchdog 會監控你安裝的外掛版本與安全訊號。若版本落後、變更日誌提到安全修補,或在你提供 WPScan API 金鑰時偵測到 CVE,便會提醒你。可設定每天、每週、20 分鐘測試模式或手動掃描。所有掃描結果預設只留在本站,除非你主動設定通知/webhook,否則不會外傳外掛清單或站內資料。
Create: 2025-11-09 18:30:05 +0000 UTC Push: 2025-12-19 14:52:58 +0000 UTC |
0xNullComet/CVE-2016-10204_Webshell
A bash script demonstrating the manual exploitation of CVE-2016-10204 against a target endpoint, leading to upload of a php webshell.
Create: 2025-11-09 16:24:10 +0000 UTC Push: 2026-01-06 02:10:30 +0000 UTC |
dc-333-666/CVE-2016-10204_Webshell
A bash script demonstrating the manual exploitation of CVE-2016-10204 against a target endpoint, leading to upload of a php webshell.
Create: 2025-11-09 16:24:10 +0000 UTC Push: 2025-11-11 01:57:51 +0000 UTC |
letchupkt/CVE-2025-48593
Create: 2025-11-09 15:38:22 +0000 UTC Push: 2025-11-09 15:38:22 +0000 UTC |
rcrjr97/CVE-2016-10204_Webshell
A concrete POC bash script demonstrating the manual exploitation of CVE-2016-10204 against a target endpoint, leading to upload of a php webshell.
Create: 2025-11-09 15:34:10 +0000 UTC Push: 2025-11-09 15:34:11 +0000 UTC |
0xcucumbersalad/CVE-2025-12917-PoC
A vulnerability was identified in TOZED ZLT T10 T10PLUS_3.04.15. The affected element is an unknown function of the file /reqproc/proc_post of the component Reboot Handler.
Create: 2025-11-09 13:58:07 +0000 UTC Push: 2025-11-09 13:58:07 +0000 UTC |
faccimatteo/CVE-2022-4361
PoC for https://nvd.nist.gov/vuln/detail/CVE-2022-4361
Create: 2025-11-09 13:18:41 +0000 UTC Push: 2025-11-10 16:04:09 +0000 UTC |
xvk1t1/Open5GS-CVE-2025-41067-CVE-2025-41068-PoC
This repository contains the Proof-of-Concept (PoC) exploit scripts for two vulnerabilities, CVE-2025-41067 and CVE-2025-41068. These vulnerabilities affect the NRF (Network Repository Function) component of Open5GS in versions prior to 2.7.6 and can be triggered by an attacker to cause a Denial of Service (DoS).
Create: 2025-11-09 10:53:56 +0000 UTC Push: 2025-11-09 10:53:57 +0000 UTC |
callinston/CVE-2025-48593
Create: 2025-11-09 09:14:55 +0000 UTC Push: 2025-11-09 09:14:55 +0000 UTC |
ngtuonghung/nimbuspwn-CVE-2022-29800-CVE-2022-29799
Create: 2025-11-09 09:06:25 +0000 UTC Push: 2025-11-09 09:06:25 +0000 UTC |
n0m-d/CVE-2021-40438-POC
Create: 2025-11-09 05:19:09 +0000 UTC Push: 2025-11-09 05:19:59 +0000 UTC |
ngtuonghung/cve-2022-0324
Create: 2025-11-09 03:54:42 +0000 UTC Push: 2025-11-09 03:54:43 +0000 UTC |
DExplo1ted/CVE-2025-12907-Exploit
Authentication Bypass Using an Alternate Path or Channel (CWE-288)
Create: 2025-11-08 18:23:23 +0000 UTC Push: 2025-11-08 18:23:24 +0000 UTC |
TheCodeAddiction/CVE-2025-48384
Create: 2025-11-08 17:51:37 +0000 UTC Push: 2025-11-08 17:51:37 +0000 UTC |
logesh-GIT001/CVE-2025-48593
"A single malicious packet can own your device." — Android Security Team, Nov 2025
Create: 2025-11-08 15:55:25 +0000 UTC Push: 2025-11-08 15:55:26 +0000 UTC |
lagerhaker539/CVE-2025-12907-POC
Google Chrome DevTools Remote Code Execution Exploit (Full Chain)
Create: 2025-11-08 15:53:33 +0000 UTC Push: 2025-11-08 15:53:34 +0000 UTC |
captaincookie34/Vulnerability-Playground-CVE-2025-61922
Create: 2025-11-08 15:19:51 +0000 UTC Push: 2025-11-08 15:19:51 +0000 UTC |
bummie/CVE-2025-48384-submodule
AAAA
Create: 2025-11-08 14:42:56 +0000 UTC Push: 2025-11-08 14:42:56 +0000 UTC |
bummie/CVE-2025-48384
aaa
Create: 2025-11-08 14:41:23 +0000 UTC Push: 2025-11-08 14:41:23 +0000 UTC |
letsr00t/-CVE-2019-18634-sudo-pwfeedback
Create: 2025-11-08 11:23:26 +0000 UTC Push: 2025-11-08 11:23:27 +0000 UTC |
Previous
97
98
99
100
101
102
103
104
Next