unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
Ly4j/CVE-2025-31486
CVE-2025-31486 poc
Create: 2025-04-11 09:35:25 +0000 UTC Push: 2025-04-11 09:35:25 +0000 UTC |
helidem/CVE-2020-16012-PoC
Create: 2025-04-11 08:42:46 +0000 UTC Push: 2025-07-03 21:34:59 +0000 UTC |
ngyinkit/cve-2019-18634
Create: 2025-04-11 06:48:24 +0000 UTC Push: 2025-04-11 06:48:24 +0000 UTC |
bmth666/GeoServer-Tools-CVE-2024-36401
CVE-2024-36401 图形化利用工具,支持各个JDK版本以及回显、内存马实现
Create: 2025-04-11 04:36:34 +0000 UTC Push: 2025-04-11 04:36:34 +0000 UTC |
xploitnik/CVE-2024-36991-modified
The modified version of the original script can be described as a Proof of Concept (PoC) Exploit Script for CVE-2024-36991, designed to read sensitive files from a vulnerable Splunk Enterprise instance by leveraging path traversal techniques.
Create: 2025-04-11 02:33:42 +0000 UTC Push: 2025-04-11 02:33:43 +0000 UTC |
FishMan132/CVE-2023-20904
Create: 2025-04-11 02:29:07 +0000 UTC Push: 2025-04-11 02:29:07 +0000 UTC |
Mattb709/CVE-2019-15107-Webmin-RCE-PoC
todo
Create: 2025-04-11 00:09:18 +0000 UTC Push: 2025-04-11 00:09:40 +0000 UTC |
fdzdev/CVE-2025-XXXXX
Create: 2025-04-10 23:49:23 +0000 UTC Push: 2025-04-10 23:49:24 +0000 UTC |
ImTheCopilotNow/CVE-2025-4102025
Create: 2025-04-10 23:16:19 +0000 UTC Push: 2025-04-10 23:16:19 +0000 UTC |
Mattb709/Webmin-RCE-PoC-CVE-2019-15107
Webmin-RCE-PoC-CVE-2019-15107 is a Python-based scanner that detects vulnerable Webmin (1.890 - 1.920) servers affected by CVE-2019-15107, an unauthenticated remote code execution (RCE) vulnerability in the /password_change.cgi endpoint.
Create: 2025-04-10 20:46:47 +0000 UTC Push: 2025-04-10 20:47:43 +0000 UTC |
Mattb709/CVE-2019-15107-Scanner
Webmin-RCE-PoC-CVE-2019-15107 is a Python-based scanner that detects vulnerable Webmin (1.890 - 1.920) servers affected by CVE-2019-15107, an unauthenticated remote code execution (RCE) vulnerability in the /password_change.cgi endpoint.
Create: 2025-04-10 20:46:47 +0000 UTC Push: 2025-04-11 00:01:21 +0000 UTC |
static-web-apps-testing-org/swa2025041016pq8peskd9u3cves0k8kyu3
swa2025041016pq8peskd9u3cves0k8kyu3
Create: 2025-04-10 16:03:53 +0000 UTC Push: 2025-04-10 16:04:14 +0000 UTC |
incommatose/CVE-2023-6063-PoC
A Proof on Concept for CVE-2023-6063, a time-based blind SQL injection vulnerability in WP Fastest Cache ≤1.2.2.
Create: 2025-04-10 15:56:46 +0000 UTC Push: 2025-07-16 00:28:52 +0000 UTC |
incommatose/CVE-2023-6063
Create: 2025-04-10 15:56:46 +0000 UTC Push: 2025-04-10 15:56:47 +0000 UTC |
yxzrw/CVE-2025-29705
CVE-2025-29705
Create: 2025-04-10 15:56:06 +0000 UTC Push: 2025-04-10 15:56:06 +0000 UTC |
Franconyu/Poc_for_CVE-2025-24813
Create: 2025-04-10 14:49:14 +0000 UTC Push: 2025-04-10 14:49:14 +0000 UTC |
bazgab/CVEs-2024-API
API containing all active CVEs during the year of 2024
Create: 2025-04-10 14:35:49 +0000 UTC Push: 2025-04-10 14:35:49 +0000 UTC |
PuddinCat/CVE-2025-3248-POC
POC of CVE-2025-3248
Create: 2025-04-10 14:04:29 +0000 UTC Push: 2025-04-10 14:04:29 +0000 UTC |
groshi215/CVE-2024-48887-Exploit
Unverified Password Change (CWE-620)
Create: 2025-04-10 12:17:11 +0000 UTC Push: 2025-04-10 12:17:11 +0000 UTC |
deadlybangle/CVE-2024-4577-PHP-RCE
PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template cve-2024-4577, pentest, php, poc, rce-exploit, redteam
Create: 2025-04-10 12:09:28 +0000 UTC Push: 2025-04-10 12:09:30 +0000 UTC |
Previous
124
125
126
127
128
129
130
131
Next