unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
truonghuuphuc/CVE-2024-4898-Poc
CVE-2024-4898 InstaWP Connect – 1-click WP Staging & Migration <= 0.1.0.38 - Missing Authorization to Unauthenticated API setup/Arbitrary Options Update/Administrative User Creation
Create: 2024-06-12 10:03:14 +0000 UTC Push: 2024-06-12 10:23:05 +0000 UTC |
karthi-the-hacker/CVE-2024-0352
Likeshop < 2.5.7.20210311 - Arbitrary File Upload
Create: 2024-06-12 09:46:26 +0000 UTC Push: 2024-06-12 09:46:26 +0000 UTC |
Cappricio-Securities/CVE-2024-0352
Likeshop < 2.5.7.20210311 - Arbitrary File Upload
Create: 2024-06-12 09:46:26 +0000 UTC Push: 2024-06-12 09:48:13 +0000 UTC |
HPT-Intern-Task-Submission/CVE-2022-46169
Create: 2024-06-12 08:24:30 +0000 UTC Push: 2024-06-12 08:24:30 +0000 UTC |
jakabakos/CVE-2024-27348-Apache-HugeGraph-RCE
Create: 2024-06-12 08:14:39 +0000 UTC Push: 2024-06-12 08:14:40 +0000 UTC |
truonghuuphuc/CVE-2024-3922-Poc
Dokan Pro <= 3.10.3 - Unauthenticated SQL Injection
Create: 2024-06-12 07:42:10 +0000 UTC Push: 2024-06-12 07:42:10 +0000 UTC |
Entropt/CVE-2024-4577_Analysis
Create: 2024-06-12 07:33:41 +0000 UTC Push: 2024-06-12 07:33:41 +0000 UTC |
d3ck4/Shodan-CVE-2024-4577
POC for CVE-2024-4577 with Shodan integration
Create: 2024-06-12 06:45:08 +0000 UTC Push: 2024-06-12 06:45:08 +0000 UTC |
raytran54/CVE-2018-7600
Create: 2024-06-12 06:40:17 +0000 UTC Push: 2024-06-12 06:40:17 +0000 UTC |
ISH2YU/CVE-2023-11518
Procedure to Recreate the Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver
Create: 2024-06-12 06:19:50 +0000 UTC Push: 2024-06-12 06:19:50 +0000 UTC |
ISH2YU/CVE-2023-36802
Procedure to Recreate the Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver
Create: 2024-06-12 06:19:50 +0000 UTC Push: 2024-06-15 04:29:11 +0000 UTC |
aaddmin1122345/cve-2024-4577
CVE-2024-4577
Create: 2024-06-12 04:50:25 +0000 UTC Push: 2024-06-12 04:50:25 +0000 UTC |
aaddmin1122345/CVE-2024-4577-POC
CVE-2024-4577
Create: 2024-06-12 04:50:25 +0000 UTC Push: 2024-06-12 04:54:22 +0000 UTC |
nemu1k5ma/CVE-2024-4577
php-cgi RCE快速检测
Create: 2024-06-12 02:16:09 +0000 UTC Push: 2024-06-12 02:16:09 +0000 UTC |
OxyDeV2/PoC-CVE-2024-24590
Proof of concept for CVE-2024-24590
Create: 2024-06-11 22:30:26 +0000 UTC Push: 2024-06-11 22:31:07 +0000 UTC |
OxyDeV2/ClearML-CVE-2024-24590
Proof of concept for CVE-2024-24590
Create: 2024-06-11 22:30:26 +0000 UTC Push: 2024-06-12 08:58:59 +0000 UTC |
H4rk3nz0/CVE-2023-20598-PDFWKRNL
CVE-2023-20598 Kernel Driver - Elevation of Privilege
Create: 2024-06-11 22:03:51 +0000 UTC Push: 2024-06-11 22:03:51 +0000 UTC |
LordVileOnX/-POC-CVE-2024-24590-Pickle-Load-on-Artifact-Get.-ClearML
Create: 2024-06-11 17:33:36 +0000 UTC Push: 2024-06-11 17:33:36 +0000 UTC |
LordVileOnX/ClearML-vulnerability-exploit-RCE-2024-CVE-2024-24590-
Create: 2024-06-11 17:33:36 +0000 UTC Push: 2024-06-11 23:10:10 +0000 UTC |
HexDoesRandomShit/ClearML-vulnerability-exploit-RCE-2024-CVE-2024-24590-
Here is an exploit in python to exploit the CVE-2024-24590, which is an upload pickle in a ClearML, which leads to arbitrary code execution... Enjoy :D
Create: 2024-06-11 17:33:36 +0000 UTC Push: 2024-07-16 15:23:02 +0000 UTC |
Previous
103
104
105
106
107
108
109
110
Next