unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
abuyazeen/CVE-2021-43798-Grafana-path-traversal-tester
Automated path traversal testing tool for Grafana plugin endpoints using curl and Bash.
Create: 2025-05-19 08:19:30 +0000 UTC Push: 2025-05-19 08:19:30 +0000 UTC |
AndreyFreitax/CVE-2011-0762
Create: 2025-05-19 03:15:24 +0000 UTC Push: 2025-05-19 03:16:01 +0000 UTC |
Wa1nut4/CVE-2025-2135
Create: 2025-05-19 02:12:54 +0000 UTC Push: 2025-05-19 02:12:54 +0000 UTC |
Loucy1231/Nexus-Repository-Manager3-EL-CVE-2018-16621-https-www.cve.org-CVERecord-id-CVE-2018-16621-
Create: 2025-05-19 00:43:04 +0000 UTC Push: 2025-05-19 00:43:05 +0000 UTC |
doomygloom/CVE-2025-4428
CVE-2025-4428
Create: 2025-05-18 22:02:37 +0000 UTC Push: 2025-05-18 22:02:37 +0000 UTC |
missaels235/POC-CVE-2025-24104-Py
Create: 2025-05-18 18:11:27 +0000 UTC Push: 2025-05-18 18:11:27 +0000 UTC |
exfil0/CVE-2025-32756-POC
Designed for Demonstration of Deep Exploitation.
Create: 2025-05-18 09:46:15 +0000 UTC Push: 2025-05-18 09:46:15 +0000 UTC |
gunyakit/CVE-2024-41713-PoC-exploit
Mitel MiCollab Authentication Bypass to Arbitrary File Read
Create: 2025-05-18 08:12:40 +0000 UTC Push: 2025-05-18 08:12:40 +0000 UTC |
HossamEAhmed/wp-ulike-cve-2023-32259-poc
In affected versions of the WP ULike plugin, there is no proper authorization check before allowing certain AJAX actions or vote manipulations. This allows unauthenticated users to interact with the plugin in ways only logged-in users should be able to — potentially skewing votes or injecting misleading data.
Create: 2025-05-18 02:09:39 +0000 UTC Push: 2025-05-18 02:14:15 +0000 UTC |
HossamEAhmed/wp-ulike-cve-2025-32259-poc
In affected versions of the WP ULike plugin, there is no proper authorization check before allowing certain AJAX actions or vote manipulations. This allows unauthenticated users to interact with the plugin in ways only logged-in users should be able to — potentially skewing votes or injecting misleading data.
Create: 2025-05-18 02:09:39 +0000 UTC Push: 2025-05-18 02:14:15 +0000 UTC |
doomygloom/CVE-2025-4664
CVE-2025-4664
Create: 2025-05-18 02:06:40 +0000 UTC Push: 2025-05-18 02:06:40 +0000 UTC |
doomygloom/CVE-2025-4921
CVE-2025-4921
Create: 2025-05-18 02:05:34 +0000 UTC Push: 2025-05-18 02:05:35 +0000 UTC |
HossamEAhmed/CVE-2023-32259---WP-ULike-4.7.9.1-Missing-Authorization-to-Unauthenticated-Content-Spoof
In affected versions of the WP ULike plugin, there is no proper authorization check before allowing certain AJAX actions or vote manipulations. This allows unauthenticated users to interact with the plugin in ways only logged-in users should be able to — potentially skewing votes or injecting misleading data.
Create: 2025-05-18 02:02:07 +0000 UTC Push: 2025-05-18 02:02:07 +0000 UTC |
HossamEAhmed/CVE-2023-32259-WP-ULike-4.7.9.1-Missing-Authorization-to-Unauthenticated-Content-Spoof
In affected versions of the WP ULike plugin, there is no proper authorization check before allowing certain AJAX actions or vote manipulations. This allows unauthenticated users to interact with the plugin in ways only logged-in users should be able to — potentially skewing votes or injecting misleading data.
Create: 2025-05-18 02:02:07 +0000 UTC Push: 2025-05-18 02:05:54 +0000 UTC |
missaels235/POC-CVE-2024-44258-Py
Create: 2025-05-18 01:18:48 +0000 UTC Push: 2025-05-18 01:18:48 +0000 UTC |
JGoyd/CVE-2025-31200-iOS-AudioConverter-RCE
Public disclosure of CVE-2025-31200 – Zero-click RCE in iOS 18.X via AudioConverterService and malicious audio file.
Create: 2025-05-17 23:03:56 +0000 UTC Push: 2025-05-17 23:03:56 +0000 UTC |
Nxploited/CVE-2025-47539
Eventin <= 4.0.26 - Missing Authorization to Unauthenticated Privilege Escalation
Create: 2025-05-17 21:02:31 +0000 UTC Push: 2025-05-17 21:02:32 +0000 UTC |
strivepan/cve-2025-252513
temp
Create: 2025-05-17 17:02:34 +0000 UTC Push: 2025-05-17 17:02:35 +0000 UTC |
Taonauz/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.
Create: 2025-05-17 15:15:44 +0000 UTC Push: 2025-05-17 15:16:40 +0000 UTC |
tdevworks/CVE-2020-1472-ZeroLogon-Demo-Detection-Mitigation
Create: 2025-05-17 12:40:24 +0000 UTC Push: 2025-05-30 09:57:50 +0000 UTC |
Previous
93
94
95
96
97
98
99
100
Next