unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
brains93/CVE-2024-24576-PoC-Python
Create: 2024-04-10 10:27:55 +0000 UTC Push: 2024-04-10 16:52:25 +0000 UTC |
dorser/cve-2024-21626
Create: 2024-04-10 09:12:06 +0000 UTC Push: 2024-04-10 09:12:11 +0000 UTC |
FireWolfWang/CVE-2023-6019
Ray OS Command Injection RCE(Unauthorized)
Create: 2024-04-10 08:54:04 +0000 UTC Push: 2024-04-10 08:54:05 +0000 UTC |
ii4gsp/CVE-2020-27786
Create: 2024-04-10 07:25:24 +0000 UTC Push: 2024-04-10 07:25:24 +0000 UTC |
karlemilnikka/CVE-2024-0710
Unauthenticated Form Submission Unique ID Modification
Create: 2024-04-10 07:23:11 +0000 UTC Push: 2024-04-10 07:23:12 +0000 UTC |
ThatNotEasy/CVE-2024-3273
D-Link NAS Command Execution Exploit
Create: 2024-04-10 00:27:02 +0000 UTC Push: 2024-04-10 00:27:02 +0000 UTC |
alien-keric/CVE-2022-30190
The script is from https://github.com/JohnHammond/msdt-follina, just make it simple for me to use it and this script aim at generating the payload for more information refer the johnn hammond link
Create: 2024-04-09 22:40:09 +0000 UTC Push: 2024-04-09 22:40:10 +0000 UTC |
churamanib/CVE-2023-36664-Ghostscript-command-injection
Create: 2024-04-09 22:05:29 +0000 UTC Push: 2024-04-09 22:05:30 +0000 UTC |
frostb1ten/CVE-2024-24576
Example of CVE-2024-24576 use case.
Create: 2024-04-09 21:17:15 +0000 UTC Push: 2024-04-09 21:17:15 +0000 UTC |
frostb1ten/CVE-2024-24576-PoC
Example of CVE-2024-24576 use case.
Create: 2024-04-09 21:17:15 +0000 UTC Push: 2024-04-09 21:38:14 +0000 UTC |
ThaySolis/CVE-2024-29296
CVE-2024-29296 - User enumeration on Portainer CE - 2.19.4
Create: 2024-04-09 20:36:03 +0000 UTC Push: 2024-04-09 20:36:03 +0000 UTC |
Trigii/CVE-2023-42860
Exploit for CVE-2023-42860
Create: 2024-04-09 14:53:46 +0000 UTC Push: 2024-05-06 10:01:37 +0000 UTC |
sanskaros/CVE-2021-41773-Exploit-Environment
This document provides a step-by-step guide to configuring a vulnerable Apache HTTP Server environment on Ubuntu 20.04 for educational purposes, specifically to demonstrate CVE-2021-41773. The setup detailed below is intended solely for use in controlled, secure, and isolated test environments.
Create: 2024-04-09 12:33:34 +0000 UTC Push: 2024-04-09 12:33:34 +0000 UTC |
K3ysTr0K3R/CVE-2024-3273-EXPLOIT
Create: 2024-04-09 12:26:37 +0000 UTC Push: 2024-04-09 12:26:38 +0000 UTC |
mrobsidian1/CVE-2023-48788-Proof-of-concept-SQLinj
Create: 2024-04-09 10:54:31 +0000 UTC Push: 2024-04-09 10:54:33 +0000 UTC |
MrSecby/CVE-2024-26198-Exchange-RCE
Create: 2024-04-09 10:54:28 +0000 UTC Push: 2024-04-09 10:54:30 +0000 UTC |
Alexandre-Bartel/CVE-2022-21340
PoC for CVE-2022-21340
Create: 2024-04-09 10:41:12 +0000 UTC Push: 2024-04-09 10:41:13 +0000 UTC |
Trinadh465/CVE-2023-40127
Create: 2024-04-09 09:35:25 +0000 UTC Push: 2024-04-09 09:35:26 +0000 UTC |
RenukaSelvar/kernel_rt_CVE_2023_1077
Create: 2024-04-09 08:27:58 +0000 UTC Push: 2024-04-09 08:27:59 +0000 UTC |
lockness-Ko/CVE-2024-27316
A proof of concept for CVE-2024-27316 (tested), CVE-2024-31309 (untested), CVE-2024-30255 (untested), CVE-2024-28182 (untested), CVE-2024-2653 (untested) and CVE-2024-27919 (untested)
Create: 2024-04-09 07:56:43 +0000 UTC Push: 2024-04-09 07:56:43 +0000 UTC |
Previous
145
146
147
148
149
150
151
152
Next