unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
m474r5/CVE-2023-27997-POC
Create: 2023-10-15 09:18:17 +0000 UTC Push: 2023-10-15 09:18:18 +0000 UTC |
codeb0ss/CVE-2023-45603-PoC
Mass Exploit - CVE-2023-45603 - Wordpress/plugin/user-submitted-posts < Unauthenticated Arbitrary File Upload/Exploit
Create: 2023-10-15 01:57:25 +0000 UTC Push: 2023-10-15 01:57:26 +0000 UTC |
Pyr0sec/CVE-2023-38646
Exploit script for Pre-Auth RCE in Metabase (CVE-2023-38646)
Create: 2023-10-15 01:29:37 +0000 UTC Push: 2023-10-15 01:29:38 +0000 UTC |
GameProfOrg/Discord-Image-Token-Password-Grabber-Exploit-Cve-2022
Chromium based browsers (passwords, credit cards, cookies, history, autofill, bookmarks) Firefox based browsers (db files, cookies, history, bookmarks) Internet explorer/Edge (passwords) Saved wifi networks & scan networks around device (SSID, BSSID) s File grabber (Documents, Images, Source codes, Databases, USB)
Create: 2023-10-14 21:54:34 +0000 UTC Push: 2023-10-14 21:56:12 +0000 UTC |
GameProfOrg/Jpg-Png-Exploit-Downloader-Fud-Cryter-Malware-Builder-Cve-2022
package commonly used by web services to process Exploit JPG File. One of the vulnerabilities can lead to remote code execution (RCE) if you process user submitted JPG. The exploit for this vulnerability is being used in the wild.Why Are You Disclosing A Exploit JPG
Create: 2023-10-14 21:52:05 +0000 UTC Push: 2023-10-14 21:53:31 +0000 UTC |
CwEeR313/CVE-2023-3710
exploit for CVE-2023-3710
Create: 2023-10-14 18:21:29 +0000 UTC Push: 2023-10-14 18:21:29 +0000 UTC |
asepsaepdin/CVE-2023-38646
Create: 2023-10-14 15:56:18 +0000 UTC Push: 2023-10-14 15:56:18 +0000 UTC |
itsAptx/CVE-2023-45471
Create: 2023-10-14 15:20:37 +0000 UTC Push: 2023-10-14 16:38:37 +0000 UTC |
Mahdi22228/CVE-2023-3710
Create: 2023-10-14 12:18:15 +0000 UTC Push: 2023-10-14 12:18:15 +0000 UTC |
guffre/CVE-2023-4911
PoC for CVE-2023-4911 LooneyTuneables
Create: 2023-10-14 02:24:52 +0000 UTC Push: 2023-10-14 02:24:52 +0000 UTC |
Pegasus0xx/CVE-2023-43144
Assets Management System 1.0 is vulnerable to an SQL injection via the id parameter in delete.php
Create: 2023-10-13 18:04:13 +0000 UTC Push: 2023-10-13 18:04:14 +0000 UTC |
Vagebondcur/IMAGE-MAGICK-CVE-2022-44268
Create: 2023-10-13 15:43:49 +0000 UTC Push: 2023-10-13 15:43:49 +0000 UTC |
Jnnshschl/CVE-2023-38146
PoC for the ThemeBleed Windows 11 CVE-2023-38146 written in python using impacket
Create: 2023-10-13 15:33:42 +0000 UTC Push: 2023-10-13 15:33:43 +0000 UTC |
Vagebondcur/IMAGEMAGICK-CVE-2022-44268
Create: 2023-10-13 14:27:17 +0000 UTC Push: 2023-10-13 14:27:18 +0000 UTC |
iveresk/CVE-2023-22515
iveresk-CVE-2023-22515
Create: 2023-10-13 08:36:21 +0000 UTC Push: 2023-10-13 08:36:22 +0000 UTC |
JawadPy/CVE-2023-30861-Exploit
Explaining how to exploit CVE-2023-30861
Create: 2023-10-13 08:27:03 +0000 UTC Push: 2023-10-13 08:27:04 +0000 UTC |
Vulnmachines/confluence-cve-2023-22515
Confluence Broken Access Control
Create: 2023-10-13 08:19:07 +0000 UTC Push: 2023-10-13 08:19:07 +0000 UTC |
JawadPy/CVE-2023-43804-
Example of how CVE-2023-43804 works with real python code.
Create: 2023-10-13 06:15:45 +0000 UTC Push: 2023-10-13 06:15:45 +0000 UTC |
JawadPy/CVE-2023-43804
Example of how CVE-2023-43804 works with real python code.
Create: 2023-10-13 06:15:45 +0000 UTC Push: 2023-10-13 06:16:26 +0000 UTC |
JawadPy/CVE-2023-43804-Exploit
Example of how CVE-2023-43804 works with real python code.
Create: 2023-10-13 06:15:45 +0000 UTC Push: 2023-10-13 06:26:40 +0000 UTC |
Previous
247
248
249
250
251
252
253
254
Next