unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
bigherocenter/CVE-2024-7029-EXPLOIT
Create: 2024-08-30 07:58:27 +0000 UTC Push: 2024-08-29 17:41:35 +0000 UTC |
mellow-hype/cve-2024-20017
exploits for CVE-2024-20017
Create: 2024-08-30 05:54:36 +0000 UTC Push: 2024-08-30 05:55:20 +0000 UTC |
fa-rrel/CVE-2024-1071-SQL-Injection
Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited
Create: 2024-08-30 04:23:04 +0000 UTC Push: 2024-08-30 04:23:17 +0000 UTC |
kkll5875/CVE-2024-42913
Create: 2024-08-30 02:54:30 +0000 UTC Push: 2024-08-30 02:54:30 +0000 UTC |
0romos/CVE-2024-45163
Remote Dos Exploit in Mirai Botnets by Jacob Masse (Rewrite)
Create: 2024-08-30 00:28:11 +0000 UTC Push: 2024-08-30 00:28:11 +0000 UTC |
r0binak/CVE-2024-7646
PoC CVE-2024-7646
Create: 2024-08-29 18:48:21 +0000 UTC Push: 2024-08-29 18:48:21 +0000 UTC |
K3ysTr0K3R/CVE-2024-7029-EXPLOIT
Create: 2024-08-29 16:52:01 +0000 UTC Push: 2024-08-29 16:52:01 +0000 UTC |
fortra/CVE-2024-6769
Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)
Create: 2024-08-29 16:40:49 +0000 UTC Push: 2024-09-25 12:00:31 +0000 UTC |
identity-threat-labs/Article-RegreSSHion-CVE-2024-6387
In an era where digital security is crucial, a new vulnerability in OpenSSH, identified as CVE-2024-6387, has drawn the attention of system administrators and security professionals worldwide. Named "regreSSHion," this severe security flaw allows remote code execution (RCE) and could significant threat to the integrity of vulnerable systems.
Create: 2024-08-29 15:00:56 +0000 UTC Push: 2024-08-29 15:06:16 +0000 UTC |
NasrallahBaadi/CVE-2019-15107
CVE-2019-15107 Webmin unauthenticated RCE
Create: 2024-08-29 13:58:36 +0000 UTC Push: 2024-08-29 13:58:36 +0000 UTC |
LuisMateo1/Arbitrary-File-Read-CVE-2024-24919
Create: 2024-08-29 12:59:40 +0000 UTC Push: 2024-08-29 13:35:55 +0000 UTC |
mistymntncop/CVE-2024-5274
Create: 2024-08-29 11:58:25 +0000 UTC Push: 2024-08-29 12:01:58 +0000 UTC |
StopThatTalace/CVE-2024-25641-CACTI-RCE-1.2.26
Fully automated PoC - CVE-2024-25641 - RCE - Cacti < v1.2.26 🌵
Create: 2024-08-29 06:27:25 +0000 UTC Push: 2024-08-29 06:27:28 +0000 UTC |
UwUtisum/FiveM-CVE-2024-46310-POC
POC for CVE------ For FXServer version's v9601 and prior
Create: 2024-08-28 19:36:52 +0000 UTC Push: 2024-10-07 04:16:43 +0000 UTC |
UwUtisum/CVE-2024-46310
POC for CVE-2024-46310 For FXServer version's v9601 and prior, Incorrect Access Control in FXServer version's v9601 and prior, for CFX.re FiveM, allows unauthenticated users to modify and read userdata via exposed api endpoint
Create: 2024-08-28 19:36:52 +0000 UTC Push: 2024-10-07 13:09:33 +0000 UTC |
Wa1nut4/CVE-2024-26230
LPE of CVE-2024-26230
Create: 2024-08-28 16:31:26 +0000 UTC Push: 2024-08-28 16:31:26 +0000 UTC |
AdminPentester/CVE-2024-38063-
Remotely Exploiting The Kernel Via IPv6
Create: 2024-08-28 15:28:14 +0000 UTC Push: 2024-08-28 15:28:14 +0000 UTC |
bigb0x/CVE-2024-7954
This exploit will attempt to execute system commands on SPIP targets.
Create: 2024-08-28 14:54:56 +0000 UTC Push: 2024-08-28 14:54:57 +0000 UTC |
D0rDa4aN919/CVE-2023-22809-Exploiter
Create: 2024-08-28 14:22:53 +0000 UTC Push: 2024-08-28 15:32:45 +0000 UTC |
identity-threat-labs/CVE-2024-6387-Vulnerability-Checker
This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, and ports. The script can also read addresses from a file.
Create: 2024-08-28 13:28:08 +0000 UTC Push: 2024-08-28 13:28:08 +0000 UTC |
Previous
53
54
55
56
57
58
59
60
Next