unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
nikn0laty/Exploit-for-Dolibarr-17.0.0-CVE-2023-30253
Reverse Shell POC exploit for Dolibarr <= 17.0.0 (CVE-2023-30253), PHP Code Injection
Create: 2024-05-27 15:10:12 +0000 UTC Push: 2024-05-27 15:10:12 +0000 UTC |
Cappricio-Securities/CVE-2018-11784
Apache Tomcat - Open Redirect
Create: 2024-05-27 14:28:30 +0000 UTC Push: 2024-05-27 14:29:05 +0000 UTC |
eoslvs/CVE-2024-4956
Create: 2024-05-27 13:48:15 +0000 UTC Push: 2024-05-27 13:48:15 +0000 UTC |
phucrio/CVE-2024-21683-RCE
Create: 2024-05-27 11:14:54 +0000 UTC Push: 2024-05-27 11:14:59 +0000 UTC |
04Shivam/CVE-2023-30253
Poc for CVE-2023-30253
Create: 2024-05-27 11:00:43 +0000 UTC Push: 2024-05-27 11:01:29 +0000 UTC |
04Shivam/CVE-2023-30253-Exploit
Poc for CVE-2023-30253
Create: 2024-05-27 11:00:43 +0000 UTC Push: 2024-05-27 11:01:29 +0000 UTC |
junnythemarksman/CVE-2023-42793
TeamCity CVE-2023-42793 exploit written in Rust
Create: 2024-05-27 03:31:57 +0000 UTC Push: 2024-05-27 03:31:57 +0000 UTC |
thinhap/CVE-2024-4956-PoC
Create: 2024-05-27 03:09:36 +0000 UTC Push: 2024-05-27 03:09:36 +0000 UTC |
kaikai145154/CVE-2024
Create: 2024-05-27 01:48:39 +0000 UTC Push: 2024-05-27 01:48:39 +0000 UTC |
pulentoski/CVE-2023-51467-and-CVE-2023-49070
Apache OFBiz Authentication Bypass Vulnerability (CVE-2023-51467 and CVE-2023-49070)
Create: 2024-05-27 01:40:50 +0000 UTC Push: 2024-05-27 01:40:50 +0000 UTC |
zcrosman/cve-2024-32651
changedetection rce though ssti
Create: 2024-05-26 21:24:14 +0000 UTC Push: 2024-05-26 21:24:14 +0000 UTC |
truonghuuphuc/CVE-2024-4443-Poc
CVE-2024-4443 Business Directory Plugin – Easy Listing Directories for WordPress <= 6.4.2 - Unauthenticated SQL Injection via listingfields Parameter
Create: 2024-05-26 16:34:58 +0000 UTC Push: 2024-05-26 16:34:59 +0000 UTC |
Rubikcuv5/cve-2023-30253
Dolibarr before 17.0.1 allows remote code execution by an authenticated user via an uppercase manipulation: <?PHP instead of <?php in injected data.
Create: 2024-05-26 15:43:08 +0000 UTC Push: 2024-05-26 15:43:08 +0000 UTC |
Cappricio-Securities/CVE-2015-7297
Joomla! Core SQL Injection
Create: 2024-05-26 15:06:24 +0000 UTC Push: 2024-05-26 15:06:25 +0000 UTC |
sn130hk/CVE-2023-44487
Create: 2024-05-26 13:01:01 +0000 UTC Push: 2024-05-26 13:01:01 +0000 UTC |
Surko888/Surko-Exploit-Jenkys-CVE-2024-23897
Un exploit con el que puedes aprovecharte de la vulnerabilidad (CVE-2024-23897)
Create: 2024-05-26 09:35:54 +0000 UTC Push: 2024-05-26 09:35:55 +0000 UTC |
Surko888/Surko-Exploit-Jenkins-CVE-2024-23897
Un exploit con el que puedes aprovecharte de la vulnerabilidad (CVE-2024-23897)
Create: 2024-05-26 09:35:54 +0000 UTC Push: 2024-05-26 09:37:49 +0000 UTC |
Cappricio-Securities/CVE-2023-24044
Plesk Obsidian <=18.0.49 - Open Redirect
Create: 2024-05-26 06:56:05 +0000 UTC Push: 2024-05-26 06:56:05 +0000 UTC |
ifconfig-me/CVE-2024-4956-Bulk-Scanner
[CVE-2024-4956] Unauthenticated Path Traversal Bulk Scanner
Create: 2024-05-26 06:50:48 +0000 UTC Push: 2024-05-26 06:50:49 +0000 UTC |
alien-keric/CVE-2023-4197
this is a simple script from CVE-2023-4197 that was little bit modified since because it didn't work at first time with broadlight machine from HTB which means that we have to modify the script a little bit and then use it as how the ducumentation says
Create: 2024-05-25 23:45:30 +0000 UTC Push: 2024-05-25 23:45:31 +0000 UTC |
Previous
323
324
325
326
327
328
329
330
Next