unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
pwn3z/CVE-2021-41773-Apache-RCE
A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.
Create: 2022-06-17 21:36:42 +0000 UTC Push: 2022-06-17 21:37:52 +0000 UTC |
psw01/CVE-2019-15107_webminRCE
unauthorized RcE exploit for webnin < 1.920
Create: 2022-06-17 20:04:38 +0000 UTC Push: 2022-06-17 20:04:39 +0000 UTC |
Exploitables/CVE-2010-4502
Integer overflow in KmxSbx.sys 6.2.0.22 in CA Internet Security Suite Plus 2010 allows local users to cause a denial of service (pool corruption) and execute arbitrary code via crafted arguments to the 0x88000080 IOCTL, which triggers a buffer overflow.
Create: 2022-06-17 10:39:13 +0000 UTC Push: 2022-06-17 10:39:14 +0000 UTC |
omair2084/CVE-2022-26937
Windows Network File System Crash PoC
Create: 2022-06-17 09:42:55 +0000 UTC Push: 2022-06-17 09:42:56 +0000 UTC |
oturu/CVE-2022-30136-RCE
CVE-2022-30136 # details:
Create: 2022-06-17 05:05:22 +0000 UTC Push: 2022-06-17 05:05:23 +0000 UTC |
rorganic/Nft-Grabber-Stealer-Exploit-Cve-2022-Steal-BlockHain-Hack-Nft
This repo provides a nice and easy way for linking an existing NFT smart contract to this minting dapp. There are two ways of using this repo, you can go the simple route or the more complex one. The simple route is so simple, all you need to do is download the build folder on the release page and change the configuration to fit your needs. (Follow the video for a walk through). The more complex route allows you to add additional functionality if you are comfortable with coding in react.js. (Follow the below instructions for a walk through).
Create: 2022-06-17 03:52:25 +0000 UTC Push: 2022-06-17 03:53:55 +0000 UTC |
VortexRadiation/Jpg-Png-Exploit-Downloader-Fud-Cryter-Malware-Builder-Cve-2022
Vulnerability Disclosure Timeline Closer inspection of the Exploit JPG content reveals the malicious link as well as the URL Download and Execute of the tool used to generate the Exploit JPG from Python encrypted code content which we also implement in couple of our builders.Silent JPG Exploit There are multiple Exploit JPG in Silent JPG Exploit, a package commonly used by web services to process Exploit JPG File. One of the vulnerabilities can lead to remote code execution (RCE) if you process user submitted JPG. The exploit for this vulnerability is being used in the wild.Why Are You Disclosing A Exploit JPG
Create: 2022-06-17 03:43:58 +0000 UTC Push: 2022-06-17 03:45:47 +0000 UTC |
VortexRadiation/Discord-Image-Token-Password-Grabber-Exploit-Cve-2022
Get system info (Version, CPU, GPU, RAM, IPs, BSSID, Location, Screen metrics, Installed apps) Chromium based browsers (passwords, credit cards, cookies, history, autofill, bookmarks) Firefox based browsers (db files, cookies, history, bookmarks) Internet explorer/Edge (passwords) Saved wifi networks & scan networks around device (SSID, BSSID) s File grabber (Documents, Images, Source codes, Databases, USB) Detect banking & cryptocurrency services in browsers Steam, Uplay, Battle.Net, Minecraft session Install keylogger & clipper Desktop & Webcam screenshot
Create: 2022-06-17 03:43:00 +0000 UTC Push: 2022-06-17 03:44:41 +0000 UTC |
Invertebr4do/cve-2017-9841
RCE from phpunit 5.6.2
Create: 2022-06-16 14:22:03 +0000 UTC Push: 2022-06-16 14:22:04 +0000 UTC |
0xF331-D3AD/CVE-2012-2982
Create: 2022-06-16 09:59:28 +0000 UTC Push: 2022-06-16 09:59:28 +0000 UTC |
Cerebrovinny/follina-CVE-2022-30190
follina zero day vulnerability to help Microsoft to mitigate the attack
Create: 2022-06-16 06:49:21 +0000 UTC Push: 2022-06-16 06:49:21 +0000 UTC |
Haniwa0x01/CVE-2022-30023
Create: 2022-06-16 00:00:33 +0000 UTC Push: 2022-06-16 00:00:33 +0000 UTC |
bl4ckmenace/CVE-2022-30709
Reflected XSS on /link.cgi/ in Latest Webmin (1.994)
Create: 2022-06-15 23:25:32 +0000 UTC Push: 2022-06-15 23:25:33 +0000 UTC |
Rocha0x01/CVE-2022-30023
Create: 2022-06-15 23:06:05 +0000 UTC Push: 2022-06-15 23:06:05 +0000 UTC |
bengisugun/CVE-2022-22972-
IOC List
Create: 2022-06-15 20:34:20 +0000 UTC Push: 2022-06-15 20:34:21 +0000 UTC |
bengisugun/CVE-2022-22972
IOC List
Create: 2022-06-15 20:32:10 +0000 UTC Push: 2022-06-15 20:32:11 +0000 UTC |
notherealhazard/follina-CVE-2022-30190
Create: 2022-06-15 17:13:05 +0000 UTC Push: 2022-06-15 17:13:06 +0000 UTC |
VinuKalana/CVE-2019-6447-Android-Vulnerability-in-ES-File-Explorer
This repository is developed to understand CVE-2019-6447
Create: 2022-06-15 13:32:34 +0000 UTC Push: 2022-06-15 13:32:35 +0000 UTC |
p4tq/hikvision_CVE-2017-7921_auth_bypass_config_decryptor
Create: 2022-06-15 11:49:05 +0000 UTC Push: 2022-06-15 11:49:05 +0000 UTC |
kmeps4/CVE-2022-22620
CVE-2022-22620: Use-after-free in Safari
Create: 2022-06-15 06:08:14 +0000 UTC Push: 2022-06-15 06:08:14 +0000 UTC |
Previous
1619
1620
1621
1622
1623
1624
1625
1626
Next