unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
calysteon/CVE-2025-43504
Create: 2025-11-17 03:15:57 +0000 UTC Push: 2025-11-25 20:52:20 +0000 UTC |
merlyn-1/CVE-2022-21587-Oracle-EBS
build cve 2022
Create: 2025-11-17 03:14:22 +0000 UTC Push: 2025-11-17 03:14:22 +0000 UTC |
ssandeep-pudi/CVE-2024-LAKEHOUSE
End-to-end Databricks medallion Architecture pipeline for 2024 CVE data
Create: 2025-11-17 02:28:23 +0000 UTC Push: 2025-11-17 02:28:24 +0000 UTC |
SaiM1710/CVE-2024-DeltaLake-Pipeline
Create: 2025-11-17 02:06:23 +0000 UTC Push: 2025-11-17 02:06:24 +0000 UTC |
ankitpandey383/roundcube-cve-2025-49113-lab
Hands-on exploitation lab for Roundcube Webmail CVE-2025-49113 (authenticated PHP object deserialization → RCE) to read /secret.txt.
Create: 2025-11-17 01:39:27 +0000 UTC Push: 2025-11-17 01:39:28 +0000 UTC |
pavanvoonn-glitch/CVE_2024
Create: 2025-11-16 23:52:04 +0000 UTC Push: 2025-11-16 23:52:04 +0000 UTC |
avivyap/CVE-2011-2523
Explotacion de la version 2.3.4 de vsftpd automatizada
Create: 2025-11-16 22:55:07 +0000 UTC Push: 2025-11-16 22:55:07 +0000 UTC |
stuxbench/dropbear-cve-2024-2873
Create: 2025-11-16 21:00:40 +0000 UTC Push: 2025-11-16 21:00:40 +0000 UTC |
Perseus99999/CVE-2019-9053-working-
CMS Made Simple < 2.2.10 - SQL Injection . Actual working version
Create: 2025-11-16 20:41:13 +0000 UTC Push: 2025-11-16 20:41:14 +0000 UTC |
callinston/CVE-2025-62220
Create: 2025-11-16 20:40:27 +0000 UTC Push: 2025-11-16 20:40:28 +0000 UTC |
Gtanikon/dic-cve2024-data-engineering-pipeline
End-to-end Databricks ETL pipeline for ingesting, validating, transforming, and analyzing 2024 CVE data using Bronze/Silver Delta Lake architecture.
Create: 2025-11-16 18:35:57 +0000 UTC Push: 2025-11-16 18:35:57 +0000 UTC |
honeyvig/CVE-2022-0847-DirtyPipe-Exploit
Create: 2025-11-16 18:34:47 +0000 UTC Push: 2025-11-16 18:34:48 +0000 UTC |
rana3333s/CVE-2025-48593
Create: 2025-11-16 16:59:20 +0000 UTC Push: 2025-11-16 16:59:20 +0000 UTC |
B1ack4sh/Blackash-CVE-2025-64484
CVE-2025-64484
Create: 2025-11-16 14:05:56 +0000 UTC Push: 2025-11-16 14:05:57 +0000 UTC |
elsevar11/CVE-2024-0670---CheckMK-Agent-Local-Privilege-Escalation-Exploit
This repository contains an exploit demonstration for CVE-2024-0670, a local privilege escalation vulnerability affecting the CheckMK Agent for Windows. The vulnerability allows a low-privileged user to obtain SYSTEM privileges by abusing writable file paths processed by the MSI repair mechanism.
Create: 2025-11-16 12:49:35 +0000 UTC Push: 2025-11-16 12:49:35 +0000 UTC |
elsevar11/CVE-2024-0670-CheckMK-Agent-Local-Privilege-Escalation-Exploit
This repository contains an exploit demonstration for CVE-2024-0670, a local privilege escalation vulnerability affecting the CheckMK Agent for Windows. The vulnerability allows a low-privileged user to obtain SYSTEM privileges by abusing writable file paths processed by the MSI repair mechanism.
Create: 2025-11-16 12:49:35 +0000 UTC Push: 2025-11-16 13:22:47 +0000 UTC |
magicrc/CVE-2024-0670
PoC for CVE-2024-0670
Create: 2025-11-16 11:36:23 +0000 UTC Push: 2025-11-16 11:36:24 +0000 UTC |
guard-wait/CVE-2023-2598_EXP
复现文章网上很多师傅有写,这里就不献丑了,本exploit交互使用的代码是kernel提供的做小改动,由于漏洞提供的原语比较强大,都能直接越界任意写一张内存页以上的空间,所以利用手法比较简单实用,选用的size是4k页大小,直接堆喷filp篡改/etc/passwd
Create: 2025-11-16 10:58:10 +0000 UTC Push: 2025-11-16 10:58:10 +0000 UTC |
mr-r3b00t/CVE-2025-5777
placeholder for CitrixBleed 2.0 CVE-2025-5777
Create: 2025-11-16 09:14:23 +0000 UTC Push: 2025-11-16 09:14:24 +0000 UTC |
saykino/CVE-2025-54320
Create: 2025-11-16 08:11:50 +0000 UTC Push: 2025-11-16 08:11:51 +0000 UTC |
Previous
46
47
48
49
50
51
52
53
Next