unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
verylazytech/CVE-2025-3248
Create: 2025-04-16 14:00:02 +0000 UTC Push: 2025-04-16 14:00:03 +0000 UTC |
cwjchoi01/CVE-2024-57394
Create: 2025-04-16 13:32:54 +0000 UTC Push: 2025-04-16 13:32:54 +0000 UTC |
Anton-ai111/CVE-2025-30967
CVE-2025-30967
Create: 2025-04-16 13:06:50 +0000 UTC Push: 2025-04-16 13:07:03 +0000 UTC |
been22426/CVE-2024-3094
CVE-2024-3094 실습 환경 구축 및 보고
Create: 2025-04-16 12:58:27 +0000 UTC Push: 2025-04-16 12:58:27 +0000 UTC |
ohnahee/ActiveMQ-CVE-2023-46604-poc-
Create: 2025-04-16 11:51:46 +0000 UTC Push: 2025-04-16 11:51:47 +0000 UTC |
ohnahee/ActiveMQ_CVE-2023_46604_poc
Create: 2025-04-16 11:51:46 +0000 UTC Push: 2025-04-16 11:51:47 +0000 UTC |
ohnahee/CVE_2023_46604_poc
Create: 2025-04-16 11:51:46 +0000 UTC Push: 2025-04-16 11:51:47 +0000 UTC |
gunzf0x/CVE-2020-0665
Proof of Concept for CVE-2020-0665, a.k.a. SID Filter Bypass.
Create: 2025-04-16 10:41:02 +0000 UTC Push: 2025-04-16 10:41:02 +0000 UTC |
mhamzakhattak/CVE-2025-29927
Create: 2025-04-16 10:28:16 +0000 UTC Push: 2025-04-16 10:28:17 +0000 UTC |
yggcwhat/CVE-2025-46080
Details
Create: 2025-04-16 08:29:18 +0000 UTC Push: 2025-05-29 02:18:46 +0000 UTC |
Knotsecurity/CVE-2025-29927-NextJs-Middleware-Vulnerability
Simulates CVE-2025-29927, a critical Next.js vulnerability allowing attackers to bypass middleware authorization by exploiting the internal x-middleware-subrequest HTTP header. Demonstrates unauthorized access to protected routes and provides mitigation strategies.
Create: 2025-04-16 07:33:54 +0000 UTC Push: 2025-04-16 07:33:55 +0000 UTC |
Knotsecurity/CVE-2025-29927-NextJs-Middleware-Simulation
Simulates CVE-2025-29927, a critical Next.js vulnerability allowing attackers to bypass middleware authorization by exploiting the internal x-middleware-subrequest HTTP header. Demonstrates unauthorized access to protected routes and provides mitigation strategies.
Create: 2025-04-16 07:33:54 +0000 UTC Push: 2025-04-16 07:33:55 +0000 UTC |
Naman2701B/CVE-2020-1054
This is a modified version of CVE 2020 1054 PoC
Create: 2025-04-16 03:38:02 +0000 UTC Push: 2025-04-16 03:38:02 +0000 UTC |
Leeziao/CVE-2015-6420
Create: 2025-04-16 03:03:28 +0000 UTC Push: 2025-04-16 03:03:32 +0000 UTC |
0xBl4nk/CVE-2025-29275
POC
Create: 2025-04-15 23:22:40 +0000 UTC Push: 2025-04-15 23:22:40 +0000 UTC |
0xBl4nk/CVE-2025-29276
Create: 2025-04-15 23:13:30 +0000 UTC Push: 2025-04-15 23:13:30 +0000 UTC |
0xBl4nk/CVE-2025-29277
POC
Create: 2025-04-15 23:08:52 +0000 UTC Push: 2025-04-15 23:08:53 +0000 UTC |
0xBl4nk/CVE-2025-29278
Create: 2025-04-15 23:03:27 +0000 UTC Push: 2025-04-15 23:03:28 +0000 UTC |
0xBl4nk/CVE-2025-29279
POC
Create: 2025-04-15 22:54:20 +0000 UTC Push: 2025-04-15 22:54:21 +0000 UTC |
bronsoneaver/CVE-2025-30406
Use of Hard-coded Cryptographic Key (CWE-321)
Create: 2025-04-15 21:48:55 +0000 UTC Push: 2025-04-15 21:48:55 +0000 UTC |
Previous
119
120
121
122
123
124
125
126
Next