unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
shoucheng3/fabric8io__kubernetes-client_CVE-2021-4178_5-0-2
Create: 2025-08-17 09:20:25 +0000 UTC Push: 2025-08-17 09:20:26 +0000 UTC |
shoucheng3/joniles__mpxj_CVE-2020-35460_8-3-4
Create: 2025-08-17 09:10:07 +0000 UTC Push: 2025-08-17 09:10:07 +0000 UTC |
shoucheng3/SpringSource__spring-security-oauth_CVE-2018-1260_2-3-2-RELEASE
Create: 2025-08-17 08:44:59 +0000 UTC Push: 2025-08-17 08:45:00 +0000 UTC |
shoucheng3/apache__uima-uimaj_CVE-2022-32287_3-3-0
Create: 2025-08-17 08:16:54 +0000 UTC Push: 2025-08-17 08:16:54 +0000 UTC |
shoucheng3/apache__nifi_CVE-2022-33140_1-16-2
Create: 2025-08-17 08:04:19 +0000 UTC Push: 2025-08-17 08:04:19 +0000 UTC |
shoucheng3/spring-cloud__spring-cloud-config_CVE-2020-5410_2-1-8-RELEASE
Create: 2025-08-17 07:21:03 +0000 UTC Push: 2025-08-17 07:21:03 +0000 UTC |
shoucheng3/codecentric__spring-boot-admin_CVE-2022-46166_2-6-9
Create: 2025-08-17 07:15:15 +0000 UTC Push: 2025-08-17 07:15:15 +0000 UTC |
shoucheng3/apache__incubator-dubbo_CVE-2021-30181_2-6-8
Create: 2025-08-17 06:56:17 +0000 UTC Push: 2025-08-17 06:56:58 +0000 UTC |
shoucheng3/jenkinsci__workflow-cps-plugin_CVE-2022-25173_2646-v6ed3b5b01ff1
Create: 2025-08-17 06:40:10 +0000 UTC Push: 2025-08-17 06:40:11 +0000 UTC |
pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC
Proof-of-Concept for CVE-2025-8088 vulnerability in WinRAR (path traversal via ADS)
Create: 2025-08-17 06:31:47 +0000 UTC Push: 2025-08-17 06:31:48 +0000 UTC |
00xCanelo/CVE-2025-32778
Create: 2025-08-17 06:29:21 +0000 UTC Push: 2025-08-17 06:29:21 +0000 UTC |
shoucheng3/nahsra__antisamy_CVE-2022-29577_1-6-6-1
Create: 2025-08-17 06:23:20 +0000 UTC Push: 2025-08-17 06:24:03 +0000 UTC |
shoucheng3/yamcs__yamcs_CVE-2023-45277_5-8-6
Create: 2025-08-17 06:23:12 +0000 UTC Push: 2025-08-17 06:23:13 +0000 UTC |
waleed-hassan569/CVE-2024-28397-command-execution-poc
This vulnerability arises from incomplete sandboxing in js2py, where crafted JavaScript can traverse Python’s internal object model and access dangerous classes like subprocess.Popen, leading to arbitrary command execution.
Create: 2025-08-17 04:00:59 +0000 UTC Push: 2025-08-17 04:00:59 +0000 UTC |
Drew-Alleman/CVE-2019-12185
eLabFTW 1.8.5 Python3 Exploit POC
Create: 2025-08-17 03:16:11 +0000 UTC Push: 2025-08-17 03:16:12 +0000 UTC |
allinsthon/CVE-2025-50165
Create: 2025-08-16 20:20:41 +0000 UTC Push: 2025-08-16 20:20:42 +0000 UTC |
shoucheng3/asf__cxf_CVE-2016-6812_3-0-11
Create: 2025-08-16 15:52:21 +0000 UTC Push: 2025-08-16 15:53:41 +0000 UTC |
shoucheng3/xwiki__xwiki-rendering_CVE-2023-37908_14-10-3
Create: 2025-08-16 14:34:03 +0000 UTC Push: 2025-08-16 14:34:03 +0000 UTC |
shoucheng3/xwiki__xwiki-commons_CVE-2023-36471_14-10-5
Create: 2025-08-16 14:32:44 +0000 UTC Push: 2025-08-16 14:32:44 +0000 UTC |
shoucheng3/DSpace__DSpace_CVE-2022-31192_5-10
Create: 2025-08-16 14:01:23 +0000 UTC Push: 2025-08-16 14:01:24 +0000 UTC |
Previous
60
61
62
63
64
65
66
67
Next