unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
ductan2/CVE-2023-22894
Create: 2024-05-23 09:23:49 +0000 UTC Push: 2024-05-23 09:23:50 +0000 UTC |
W01fh4cker/CVE-2024-21683-RCE
CVE-2024-21683 Post Auth RCE
Create: 2024-05-23 09:05:40 +0000 UTC Push: 2024-05-23 09:05:41 +0000 UTC |
SudoIndividual/CVE-2023-34152
POC for ImageMagick 6.9.6-4. This is a POC which was inspired by fullwaywang discovery of CVE-2023-34152.
Create: 2024-05-23 08:33:06 +0000 UTC Push: 2024-05-23 08:33:07 +0000 UTC |
cungts/CVE-2024-4956
CVE-2024-4956 Nuclei Template
Create: 2024-05-23 08:15:08 +0000 UTC Push: 2024-05-23 08:15:09 +0000 UTC |
xungzzz/CVE-2024-4956
CVE-2024-4956 Nuclei Template
Create: 2024-05-23 08:15:08 +0000 UTC Push: 2024-05-23 08:16:07 +0000 UTC |
fadhilthomas/poc-git-rce-cve-2024-32002
poc for git rce using CVE-2024-32002
Create: 2024-05-23 07:56:05 +0000 UTC Push: 2024-05-23 07:56:05 +0000 UTC |
fadhilthomas/poc-cve-2024-32002
poc for git rce using CVE-2024-32002
Create: 2024-05-23 07:56:05 +0000 UTC Push: 2024-05-24 10:16:57 +0000 UTC |
adhen13/CVE-2024-4956
Nexus Repository Manager 3 Unauthenticated Path Traversal
Create: 2024-05-23 06:47:13 +0000 UTC Push: 2024-05-23 06:47:13 +0000 UTC |
banditzCyber0x/CVE-2024-4956
Nexus Repository Manager 3 Unauthenticated Path Traversal
Create: 2024-05-23 06:47:13 +0000 UTC Push: 2024-05-23 07:00:27 +0000 UTC |
10cks/CVE-2024-32002-EXP
Create: 2024-05-23 04:25:51 +0000 UTC Push: 2024-05-23 04:25:51 +0000 UTC |
truonghuuphuc/CVE-2024-3495-Poc
CVE-2024-3495 Country State City Dropdown CF7 <= 2.7.2 - Unauthenticated SQL Injection
Create: 2024-05-23 02:41:15 +0000 UTC Push: 2024-05-23 02:41:16 +0000 UTC |
r00t7oo2jm/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server
This vulnerability allows an unauthenticated attacker to remotely execute arbitrary code on a vulnerable Confluence server. The vulnerability exists due to an improper validation of user-supplied input in the Confluence REST API. This allows an attacker to inject malicious code into the Confluence server, which can then be executed by the server
Create: 2024-05-23 02:10:24 +0000 UTC Push: 2024-05-22 22:15:52 +0000 UTC |
JJoosh/CVE-2024-32002-
This is the main repository for CVE 2024-32002, and requires recursive cloning because it contains the submodels necessary for execution.
Create: 2024-05-22 23:49:22 +0000 UTC Push: 2024-05-22 23:49:22 +0000 UTC |
Arbeys/CVE-2024-21683-PoC
Create: 2024-05-22 21:53:35 +0000 UTC Push: 2024-05-22 21:53:35 +0000 UTC |
JJoosh/CVE-2024-32002
Create: 2024-05-22 20:57:28 +0000 UTC Push: 2024-05-22 23:22:01 +0000 UTC |
LuxEndrith/CVE-2024-32002-Git
Create: 2024-05-22 19:37:44 +0000 UTC Push: 2024-05-22 19:37:44 +0000 UTC |
absholi7ly/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server
This vulnerability allows an unauthenticated attacker to remotely execute arbitrary code on a vulnerable Confluence server. The vulnerability exists due to an improper validation of user-supplied input in the Confluence REST API. This allows an attacker to inject malicious code into the Confluence server, which can then be executed by the server
Create: 2024-05-22 19:28:29 +0000 UTC Push: 2024-05-22 19:28:29 +0000 UTC |
vincepsh/CVE-2024-32002-hook
CVE-2024-32002-hook
Create: 2024-05-22 18:50:56 +0000 UTC Push: 2024-05-22 18:50:56 +0000 UTC |
vincepsh/CVE-2024-32002
Repo for testing CVE-2024-32002
Create: 2024-05-22 18:43:36 +0000 UTC Push: 2024-05-22 18:43:36 +0000 UTC |
spaceraccoon/detect-cve-2024-4367
YARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js
Create: 2024-05-22 18:05:47 +0000 UTC Push: 2024-05-22 18:05:48 +0000 UTC |
Previous
325
326
327
328
329
330
331
332
Next