unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
MikeyPPPPPPPP/CVE-2023-4220
Remote command execution exploit made for redteamers.
Create: 2024-12-04 22:16:12 +0000 UTC Push: 2024-12-04 22:16:51 +0000 UTC |
zetraxz/CVE-2024-42448
CVE-2024-42448
Create: 2024-12-04 20:49:07 +0000 UTC Push: 2024-12-04 20:49:08 +0000 UTC |
D3N14LD15K/CVE-2024-11680_PoC_Exploit
This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend. The exploit targets a Cross-Site Request Forgery (CSRF) flaw in combination with Privilege Misconfiguration issues.
Create: 2024-12-04 18:42:43 +0000 UTC Push: 2024-12-04 18:42:43 +0000 UTC |
LauLeysen/CVE-2024-46538
based on [EQSTLab](https://github.com/EQSTLab)
Create: 2024-12-04 15:51:40 +0000 UTC Push: 2024-12-04 15:51:40 +0000 UTC |
lamcodeofpwnosec/CVE-2022-1386
Fusion Builder < 3.6.2 - Unauthenticated SSRF
Create: 2024-12-04 12:48:53 +0000 UTC Push: 2024-12-04 12:48:54 +0000 UTC |
fuhei/CVE-2024-31317
CVE-2024-31317
Create: 2024-12-04 12:38:03 +0000 UTC Push: 2024-12-04 12:38:04 +0000 UTC |
dev0558/CVE-2023-32784-EXPLOIT-REPORT
Create: 2024-12-04 11:57:35 +0000 UTC Push: 2024-12-04 11:58:12 +0000 UTC |
Pablodiz/CVE-2023-50387
Create: 2024-12-04 11:27:11 +0000 UTC Push: 2024-12-04 11:27:11 +0000 UTC |
D1se0/CVE-2024-21413-Vulnerabilidad-Outlook-LAB
Create: 2024-12-04 10:26:37 +0000 UTC Push: 2024-12-04 10:26:37 +0000 UTC |
kota-yata/cve-2024-53259
Create: 2024-12-04 09:27:22 +0000 UTC Push: 2024-12-04 09:27:41 +0000 UTC |
Farzan-Kh/CVE-2024-5910
CVE-2024-5910 PoC
Create: 2024-12-04 07:06:44 +0000 UTC Push: 2024-12-04 07:06:45 +0000 UTC |
azhao1981/CVE-2021-29441
Create: 2024-12-04 06:55:24 +0000 UTC Push: 2024-12-04 06:56:10 +0000 UTC |
jahithoque/CVE-2024-10914-Exploit
CVE-2024-10914 is a critical vulnerability affecting the D-Link DNS-320, DNS-320LW, DNS-325, and DNS-340L up to version 20241028. The function cgi_user_add in the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add is the culprit, allowing attackers to inject operating system commands remotely.
Create: 2024-12-04 05:27:36 +0000 UTC Push: 2024-12-04 05:27:36 +0000 UTC |
p0et08/CVE-2024-50498
This is a exploit for CVE-2024-50498
Create: 2024-12-04 01:30:19 +0000 UTC Push: 2024-12-04 01:30:20 +0000 UTC |
saccles/CVE-2018-16763-Proof-of-Concept
Create: 2024-12-04 00:57:39 +0000 UTC Push: 2024-12-04 00:58:40 +0000 UTC |
nmmorette/CVE-2024-53470
Create: 2024-12-03 21:48:58 +0000 UTC Push: 2024-12-03 21:48:58 +0000 UTC |
threatlabindonesia/CVE-2023-44487-HTTP-2-Rapid-Reset-Exploit-PoC
Create: 2024-12-03 14:54:21 +0000 UTC Push: 2024-12-03 14:54:21 +0000 UTC |
specializzazione-cyber-security/demo-CVE-2021-29447-lezione
Create: 2024-12-03 13:56:00 +0000 UTC Push: 2024-12-03 13:56:00 +0000 UTC |
Hunt3r850/CVE-2024-10924-Wordpress-Docker
Create: 2024-12-03 13:12:58 +0000 UTC Push: 2024-12-03 13:12:58 +0000 UTC |
Hunt3r850/CVE-2024-10924-PoC
Create: 2024-12-03 13:09:46 +0000 UTC Push: 2024-12-03 13:09:46 +0000 UTC |
Previous
-4
-3
-2
-1
0
1
2
3
Next