unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
benedixX0/Discord-Image-Token-Password-Grabber-Exploit-Cve-2022
Browsers founded on the bedrock of Firefox (consisting of databases, cookies, historical imprints, and cherished bookmarks), Envoys of the Internet (a.k.a. Internet Explorer/Edge) harboring the secrets of passwords.
Create: 2023-08-23 22:48:10 +0000 UTC Push: 2023-08-23 22:51:20 +0000 UTC |
afine-com/CVE-2023-39062
Spipu Html2Pdf < 5.2.8 - XSS vulnerabilities in example files
Create: 2023-08-23 21:07:24 +0000 UTC Push: 2023-08-23 21:07:24 +0000 UTC |
horizon3ai/CVE-2023-38035
Ivanti Sentry CVE-2023-38035
Create: 2023-08-23 17:34:36 +0000 UTC Push: 2023-08-23 18:42:37 +0000 UTC |
sromanhu/CVE-2023-41436-CSZ-CMS-Stored-XSS---Pages-Content
CSZ CMS 1.3.0 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Additional Meta Tag parameter in the Pages Content Menu.
Create: 2023-08-23 11:34:30 +0000 UTC Push: 2023-09-22 12:19:40 +0000 UTC |
Wh04m1001/CVE-2023-36874
Create: 2023-08-23 10:09:40 +0000 UTC Push: 2023-08-23 10:09:40 +0000 UTC |
wowlolx/RASPAP-2.80-Research-CVE-2022-39986
Create: 2023-08-23 07:41:52 +0000 UTC Push: 2023-08-23 07:41:52 +0000 UTC |
wowlolx/RaspAP-Version-2.86---CVE-2022-39986-research
Create: 2023-08-23 07:39:24 +0000 UTC Push: 2023-08-23 07:39:25 +0000 UTC |
sgwgsw/LAB-CVE-2023-25725
Lab environment to test CVE-2023-25725
Create: 2023-08-23 04:32:54 +0000 UTC Push: 2023-08-23 05:18:06 +0000 UTC |
whypet/CVE-2023-31320
Proof of concept code for CVE-2023-31320
Create: 2023-08-22 21:15:46 +0000 UTC Push: 2023-11-14 21:41:34 +0000 UTC |
RandomRobbieBF/CVE-2019-15896
LifterLMS <= 3.34.5 - Unauthenticated Options Import
Create: 2023-08-22 18:56:09 +0000 UTC Push: 2023-08-22 18:56:10 +0000 UTC |
crisprss/CVE-2023-36874
CVE-2023-36874 Proof of Concept
Create: 2023-08-22 16:27:30 +0000 UTC Push: 2023-08-22 10:39:40 +0000 UTC |
0xRyuk/CVE-2022-24637
Open Web Analytics 1.7.3 - Remote Code Execution Exploit v2
Create: 2023-08-22 16:25:52 +0000 UTC Push: 2023-08-22 16:25:52 +0000 UTC |
wudidike/CVE-2023-4741
Create: 2023-08-22 06:00:57 +0000 UTC Push: 2023-09-05 03:34:13 +0000 UTC |
hipnesspatten/CVE-2023-33157
POC Microsoft SharePoint Remote Code Execution Vulnerability
Create: 2023-08-22 02:01:04 +0000 UTC Push: 2023-08-22 02:01:05 +0000 UTC |
hipnesspatten/CVE-2023-33160
POC Microsoft SharePoint Server Remote Code Execution Vulnerability
Create: 2023-08-22 02:00:13 +0000 UTC Push: 2023-08-22 02:00:36 +0000 UTC |
knitteruntil0s/CVE-2023-3519
POC Citrix vulnerability scanner. Auto Exploit
Create: 2023-08-22 01:33:01 +0000 UTC Push: 2023-08-22 01:33:01 +0000 UTC |
whalersplonk/CVE-2023-40477
POC WinRAR vulnerable to remote code execution,
Create: 2023-08-22 01:10:53 +0000 UTC Push: 2023-08-22 01:11:02 +0000 UTC |
c4m3l-security/CVE-2023-36874
CVE-2023-36874 Proof of Concept
Create: 2023-08-21 22:04:28 +0000 UTC Push: 2023-08-21 22:04:29 +0000 UTC |
N0tHarbor/LowOrbit_IAVM_Cannon
A recreation to the Tenible Nessus IAVM mapping feature writen in Powershell. Intended for ACAS systems going through onboarding that are manually mapping IAVM's to CVE's. Often ACAS Suite plugins are managed by lazy and unresponsive admins. This TEMPORARY solution saves the 20-30 man hours of manually mapping IVAM's to CVE's
Create: 2023-08-21 21:10:40 +0000 UTC Push: 2023-08-21 21:10:41 +0000 UTC |
mateusz834/CVE-2023-29409
Create: 2023-08-21 15:59:26 +0000 UTC Push: 2023-08-21 15:59:27 +0000 UTC |
Previous
273
274
275
276
277
278
279
280
Next