unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
SecG3ek/2024_CVEs
All 2024 CVEs as of 6/17/2024
Create: 2024-06-17 18:05:08 +0000 UTC Push: 2024-06-17 18:08:18 +0000 UTC |
VictorShem/CVE-2024-4577
CVE-2024-4577 POC
Create: 2024-06-17 17:53:31 +0000 UTC Push: 2024-06-17 17:54:14 +0000 UTC |
52by/CVE-2024-30078
Create: 2024-06-17 17:48:23 +0000 UTC Push: 2024-06-17 17:48:23 +0000 UTC |
binaryninja/CVE-2024-23334
Expolit for CVE-2024-23334 (aiohttp >= 1.0.5> && <=3.9.1)
Create: 2024-06-17 16:28:35 +0000 UTC Push: 2024-06-17 16:37:11 +0000 UTC |
N00BS3c/CVE-2024-30078
Create: 2024-06-17 14:49:19 +0000 UTC Push: 2024-06-17 14:50:06 +0000 UTC |
BBD-YZZ/CVE-2024-23692
Create: 2024-06-17 08:34:16 +0000 UTC Push: 2024-06-17 08:34:16 +0000 UTC |
BBD-YZZ/CVE-2024-23691
Create: 2024-06-17 08:15:32 +0000 UTC Push: 2024-06-17 08:15:32 +0000 UTC |
ggfzx/CVE-2024-36104
Create: 2024-06-17 07:57:58 +0000 UTC Push: 2024-06-17 07:57:59 +0000 UTC |
hunThubSpace/CVE-2024-0757-Exploit
A PoC Exploit for CVE-2024-0757 - Insert or Embed Articulate Content into WordPress Remote Code Execution (RCE)
Create: 2024-06-17 07:46:21 +0000 UTC Push: 2024-06-17 07:46:22 +0000 UTC |
imbyter/imbyter-WinRAR_CVE-2023-38831
WinRAR漏洞测试复现。详参:https://flowus.cn/a3b35db0-ab5e-4abc-b8d3-5ff284e82e7b
Create: 2024-06-17 07:30:47 +0000 UTC Push: 2024-06-17 07:30:47 +0000 UTC |
hunThubSpace/CVE-2024-0757
Create: 2024-06-17 06:55:34 +0000 UTC Push: 2024-06-17 06:55:35 +0000 UTC |
imbyter/WinRAR_CVE-2023-38831
Create: 2024-06-17 06:14:51 +0000 UTC Push: 2024-06-17 06:14:52 +0000 UTC |
uname-s/CVE-2024-37889
Create: 2024-06-17 04:50:00 +0000 UTC Push: 2024-06-17 04:50:01 +0000 UTC |
rootkalilocalhost/CVE-2023-2640-CVE-2023-32629
Create: 2024-06-16 22:17:04 +0000 UTC Push: 2024-06-16 22:17:19 +0000 UTC |
Vulmatch/CVE-2023-28252
The TL;DR for the learnings of Windows Vulnerability CVE-2023-28252
Create: 2024-06-16 12:33:45 +0000 UTC Push: 2024-06-16 12:33:45 +0000 UTC |
Pylonet/CVE-2023-23607
Create: 2024-06-16 10:50:32 +0000 UTC Push: 2024-06-16 10:50:59 +0000 UTC |
vin01/poc-cve-2024-38396
PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution
Create: 2024-06-16 09:43:46 +0000 UTC Push: 2024-06-16 09:51:05 +0000 UTC |
lvyitian/CVE-2024-30078-
CVE-2024-30078 Detection and Command Execution Script
Create: 2024-06-16 08:06:03 +0000 UTC Push: 2024-06-15 20:21:26 +0000 UTC |
Tupler/CVE-2024-23692-exp
CVE-2024-23692 exp
Create: 2024-06-16 07:04:01 +0000 UTC Push: 2024-06-16 07:04:22 +0000 UTC |
team-MineDEV/CVE-2024-26229
Windows CSC服务特权提升漏洞。 当程序向缓冲区写入的数据超出其处理能力时,就会发生基于堆的缓冲区溢出,从而导致多余的数据溢出到相邻的内存区域。这种溢出会损坏内存,并可能使攻击者能够执行任意代码或未经授权访问系统。本质上,攻击者可以编写触发溢出的恶意代码或输入,从而控制受影响的系统、执行任意命令、安装恶意软件或访问敏感数据。 微软已发出警告成功利用此漏洞的攻击者可以获得 SYSTEM 权限,这是 Windows 系统上的最高访问级别。这增加了与 CVE-2024-26229 相关的风险,使其成为恶意行为者的主要目标。
Create: 2024-06-16 05:06:31 +0000 UTC Push: 2024-06-16 05:06:31 +0000 UTC |
Previous
99
100
101
102
103
104
105
106
Next