unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
firdavsxy-png/ninja-forms-cve-2025
ninja-forms-object-injection
Create: 2025-12-18 15:01:24 +0000 UTC Push: 2025-12-18 15:01:41 +0000 UTC |
rxerium/CVE-2025-37164
Detection for CVE-2025-37164
Create: 2025-12-18 13:41:52 +0000 UTC Push: 2025-12-18 13:42:31 +0000 UTC |
cyberok-org/CVE-2025-67887
Create: 2025-12-18 13:07:46 +0000 UTC Push: 2025-12-18 13:35:26 +0000 UTC |
b1gchoi/CVE-2025-20393
Create: 2025-12-18 12:29:38 +0000 UTC Push: 2025-12-18 12:29:39 +0000 UTC |
KingHacker353/CVE-2025-20393
Create: 2025-12-18 12:10:51 +0000 UTC Push: 2025-12-18 12:11:46 +0000 UTC |
Satirush/CVE-2025-14174-Poc
Proof-of-Concept exploit for CVE-2025-14174 (EUVD-2025-203113) - Memory corruption in ANGLE allowing out-of-bounds access and RCE in web browsers. Reliable on iOS/Android/Windows, including patched systems with incomplete fixes.
Create: 2025-12-18 11:58:23 +0000 UTC Push: 2025-12-18 11:58:24 +0000 UTC |
0xthem7/CVE-2025-67294
Create: 2025-12-18 11:34:17 +0000 UTC Push: 2025-12-18 11:34:17 +0000 UTC |
secdongle/POC_CVE-2025-14700
Proof of Concept for Authenticated RCE in Crafty Controller
Create: 2025-12-18 11:10:38 +0000 UTC Push: 2025-12-18 11:10:38 +0000 UTC |
cyberleelawat/CVE-2025-20393
Cisco is aware of a potential vulnerability. Cisco is currently investigating and will update these details as appropriate as more information becomes available.
Create: 2025-12-18 10:02:51 +0000 UTC Push: 2025-12-18 10:02:52 +0000 UTC |
reewardius/CVE-2025-67888
Control Web Panel <= 0.9.8.1208 (admin/index.php) OS Command Injection Vulnerability • Software Link:
Create: 2025-12-18 09:04:23 +0000 UTC Push: 2025-12-18 09:04:24 +0000 UTC |
reewardius/CVE-2025-67886
Bitrix24 <= 25.100.300 (Translate Module) Remote Code Execution Vulnerability
Create: 2025-12-18 09:02:48 +0000 UTC Push: 2025-12-18 09:03:06 +0000 UTC |
Cyberw1ng/CVE-2025-33053-POC
POC for CVE-2025-33053 WebDav Exploit, demonstrating how the vulnerability can be triggered in a real environment. This repository focuses on hands-on exploitation steps, reproducible test cases, and observable impact, helping security researchers and defenders understand the issue and validate fixes.
Create: 2025-12-18 09:00:54 +0000 UTC Push: 2025-12-18 09:00:55 +0000 UTC |
reewardius/CVE-2025-67887
1C-Bitrix <= 25.100.500 (Translate Module) Remote Code Execution Vulnerability
Create: 2025-12-18 09:00:12 +0000 UTC Push: 2025-12-18 09:00:13 +0000 UTC |
r4j3sh-com/CVE-2025-55182
Lightweight Go toolkit plus a Dockerized Next.js lab to explore and triage CVE-2025-55182.
Create: 2025-12-18 08:19:37 +0000 UTC Push: 2025-12-18 08:19:38 +0000 UTC |
96613686/CVE-2025-62470
Create: 2025-12-18 08:01:46 +0000 UTC Push: 2025-12-18 08:01:46 +0000 UTC |
96613686/CVE-2025-62454
Create: 2025-12-18 07:56:32 +0000 UTC Push: 2025-12-18 07:56:32 +0000 UTC |
rxerium/CVE-2025-40602
Detection for CVE-2025-40602
Create: 2025-12-18 07:32:56 +0000 UTC Push: 2025-12-18 07:32:58 +0000 UTC |
thesystemowner/CVE-2025-20393-POC
This scanner detects Cisco SEG/SEWM appliances vulnerable to CVE-2025-20393, a critical unauthenticated RCE vulnerability in Cisco AsyncOS affecting devices with Spam Quarantine feature exposed to the internet. CVSS Score: 10.0 (Critical)
Create: 2025-12-18 07:25:25 +0000 UTC Push: 2025-12-18 07:25:25 +0000 UTC |
MoisesTapia/cve-2022-3218
Create: 2025-12-18 05:54:12 +0000 UTC Push: 2025-12-18 05:54:12 +0000 UTC |
davids52/cve-2021-29447_auto-script
This repo describes about cve-2021-29447 and a small script for exploiting automatically
Create: 2025-12-18 02:36:40 +0000 UTC Push: 2025-12-18 02:36:41 +0000 UTC |
Previous
-6
-5
-4
-3
-2
-1
0
1
Next