unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
SiberianHacker/CVE-2024-6387-Finder
CVE-2024-6387 SSH finder
Create: 2024-07-05 15:15:41 +0000 UTC Push: 2024-07-05 15:15:41 +0000 UTC |
Ailenchick/CVE-2023-20945
Create: 2024-07-05 15:03:40 +0000 UTC Push: 2024-07-05 15:03:40 +0000 UTC |
Ailenchick/CVE-2023-20963
Create: 2024-07-05 15:02:07 +0000 UTC Push: 2024-07-05 15:02:39 +0000 UTC |
puckiestyle/CVE-2023-27532-RCE-Only
Create: 2024-07-05 14:00:48 +0000 UTC Push: 2024-07-05 14:00:49 +0000 UTC |
cybersagor/CVE-2024-4577
CVE-2024-4577 Exploits
Create: 2024-07-05 12:47:44 +0000 UTC Push: 2024-07-05 12:47:44 +0000 UTC |
saberdhaouadi/OpenSSH_CVE2024_Checking
This script used for Linux systems to check version of openSSH
Create: 2024-07-05 12:06:04 +0000 UTC Push: 2024-07-05 12:06:04 +0000 UTC |
DANO-AMP/CVE-2024-3094
SSH EXPLOIT BYPASS AUTH SSH
Create: 2024-07-05 12:02:10 +0000 UTC Push: 2024-07-05 12:02:12 +0000 UTC |
sardine-web/CVE-2024-6387-template
Quick regreSSHion checker (based on software version) for nuclei CVE-2024-6387
Create: 2024-07-05 11:05:26 +0000 UTC Push: 2024-07-05 11:05:26 +0000 UTC |
KRookieSec/CVE-2024-39210
Best house rental management system Local file contains vulnerability
Create: 2024-07-05 07:57:51 +0000 UTC Push: 2024-07-05 07:57:55 +0000 UTC |
Segurmatica/CVE-2024-6387-CHECK
CVE-2024-6387-Check es una herramienta ligera y eficiente diseñada para identificar servidores que ejecutan versiones vulnerables de OpenSSH, específicamente el fallo de seguridad conocido como regreSSHion (CVE-2024-6387). Este script facilita el análisis rápido de múltiples direcciones IP, nombres de dominio y rangos de red CIDR.
Create: 2024-07-05 07:51:04 +0000 UTC Push: 2024-07-05 07:51:05 +0000 UTC |
athulmur/CVE-2018-6574
Create: 2024-07-05 06:48:11 +0000 UTC Push: 2024-07-05 06:48:11 +0000 UTC |
truonghuuphuc/CVE-2024-39943-Poc
CVE-2024-39943 rejetto HFS (aka HTTP File Server) 3 before 0.52.10 on Linux, UNIX, and macOS allows OS command execution by remote authenticated users (if they have Upload permissions). This occurs because a shell is used to execute df (i.e., with execSync instead of spawnSync in child_process in Node.js).
Create: 2024-07-05 06:46:34 +0000 UTC Push: 2024-07-05 06:51:54 +0000 UTC |
entroychang/CVE-2024-4040
CVE-2024-4040 PoC
Create: 2024-07-05 05:46:56 +0000 UTC Push: 2024-07-05 05:47:49 +0000 UTC |
Niuwoo/CVE-2024-36401
POC
Create: 2024-07-05 03:02:30 +0000 UTC Push: 2024-07-05 03:02:30 +0000 UTC |
0x4D31/cve-2024-6387_hassh
HASSH fingerprints for identifying OpenSSH servers potentially vulnerable to CVE-2024-6387 (regreSSHion).
Create: 2024-07-05 02:46:57 +0000 UTC Push: 2024-07-05 03:40:53 +0000 UTC |
codeb0ss/CVE-2024-29972-PoC
CVE-2024-29972 - Exploit
Create: 2024-07-04 21:31:07 +0000 UTC Push: 2024-07-04 21:32:08 +0000 UTC |
sardine-web/CVE-2024-6387_Check
It Was Discovered That OpenSSH Incorrectly Handled Signal Management. A Remote Attacker Could Use This Issue To Bypass Authentication And Remotely Access Systems WithOut Proper Credentials.
Create: 2024-07-04 21:20:26 +0000 UTC Push: 2024-07-04 21:20:26 +0000 UTC |
aditibv/MOVEit-CVE-2023-34362-
Create: 2024-07-04 21:13:48 +0000 UTC Push: 2024-07-04 21:13:48 +0000 UTC |
aditibv/MOVEit-CVE-2023-34362
Create: 2024-07-04 21:13:48 +0000 UTC Push: 2024-07-04 21:17:13 +0000 UTC |
iamz24/CVE-2021-3493_CVE-2022-3357
Create: 2024-07-04 17:29:28 +0000 UTC Push: 2024-07-04 17:29:28 +0000 UTC |
Previous
84
85
86
87
88
89
90
91
Next