unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
h3lye/CVE-2024-42448-RCE
Veeam Service Provider Console (VSPC) remote code execution.
Create: 2024-12-05 13:12:44 +0000 UTC Push: 2024-12-05 13:12:45 +0000 UTC |
Pr1or95/CVE-2023-4220-exploit
Carga de archivos sin restricciones en la funcionalidad de carga de archivos grandes en `/main/inc/lib/javascript/bigupload/inc/bigUpload.php` en Chamilo LMS en versiones <= 1.11.24 permite a atacantes no autenticados realizar ataques de Cross Site Scripting almacenados y obtener código remoto ejecución mediante la carga de web shell.
Create: 2024-12-05 12:45:13 +0000 UTC Push: 2024-12-05 12:45:13 +0000 UTC |
egilas/Watchguard-RCE-POC-CVE-2022-26318
PoC for Watchguard CVE-2022-26318 updated to Python3.12
Create: 2024-12-05 09:56:57 +0000 UTC Push: 2024-12-05 09:56:57 +0000 UTC |
watchtowrlabs/Mitel-MiCollab-Auth-Bypass_CVE-2024-41713
Create: 2024-12-05 06:13:57 +0000 UTC Push: 2024-12-05 07:55:04 +0000 UTC |
MikeyPPPPPPPP/CVE-2023-4220
Remote command execution exploit made for redteamers.
Create: 2024-12-04 22:16:12 +0000 UTC Push: 2024-12-04 22:16:51 +0000 UTC |
zetraxz/CVE-2024-42448
CVE-2024-42448
Create: 2024-12-04 20:49:07 +0000 UTC Push: 2024-12-04 20:49:08 +0000 UTC |
D3N14LD15K/CVE-2024-11680_PoC_Exploit
This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend. The exploit targets a Cross-Site Request Forgery (CSRF) flaw in combination with Privilege Misconfiguration issues.
Create: 2024-12-04 18:42:43 +0000 UTC Push: 2024-12-04 18:42:43 +0000 UTC |
LauLeysen/CVE-2024-46538
based on [EQSTLab](https://github.com/EQSTLab)
Create: 2024-12-04 15:51:40 +0000 UTC Push: 2024-12-04 15:51:40 +0000 UTC |
lamcodeofpwnosec/CVE-2022-1386
Fusion Builder < 3.6.2 - Unauthenticated SSRF
Create: 2024-12-04 12:48:53 +0000 UTC Push: 2024-12-04 12:48:54 +0000 UTC |
fuhei/CVE-2024-31317
CVE-2024-31317
Create: 2024-12-04 12:38:03 +0000 UTC Push: 2024-12-04 12:38:04 +0000 UTC |
dev0558/CVE-2023-32784-EXPLOIT-REPORT
Create: 2024-12-04 11:57:35 +0000 UTC Push: 2024-12-04 11:58:12 +0000 UTC |
Pablodiz/CVE-2023-50387
Create: 2024-12-04 11:27:11 +0000 UTC Push: 2024-12-04 11:27:11 +0000 UTC |
D1se0/CVE-2024-21413-Vulnerabilidad-Outlook-LAB
Create: 2024-12-04 10:26:37 +0000 UTC Push: 2024-12-04 10:26:37 +0000 UTC |
kota-yata/cve-2024-53259
Create: 2024-12-04 09:27:22 +0000 UTC Push: 2024-12-04 09:27:41 +0000 UTC |
Farzan-Kh/CVE-2024-5910
CVE-2024-5910 PoC
Create: 2024-12-04 07:06:44 +0000 UTC Push: 2024-12-04 07:06:45 +0000 UTC |
azhao1981/CVE-2021-29441
Create: 2024-12-04 06:55:24 +0000 UTC Push: 2024-12-04 06:56:10 +0000 UTC |
jahithoque/CVE-2024-10914-Exploit
CVE-2024-10914 is a critical vulnerability affecting the D-Link DNS-320, DNS-320LW, DNS-325, and DNS-340L up to version 20241028. The function cgi_user_add in the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add is the culprit, allowing attackers to inject operating system commands remotely.
Create: 2024-12-04 05:27:36 +0000 UTC Push: 2024-12-04 05:27:36 +0000 UTC |
p0et08/CVE-2024-50498
This is a exploit for CVE-2024-50498
Create: 2024-12-04 01:30:19 +0000 UTC Push: 2024-12-04 01:30:20 +0000 UTC |
saccles/CVE-2018-16763-Proof-of-Concept
Create: 2024-12-04 00:57:39 +0000 UTC Push: 2024-12-04 00:58:40 +0000 UTC |
nmmorette/CVE-2024-53470
Create: 2024-12-03 21:48:58 +0000 UTC Push: 2024-12-03 21:48:58 +0000 UTC |
Previous
199
200
201
202
203
204
205
206
Next