unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
codeb0ss/CVE-2024-33896-PoC
Proof of concept CVE-2024-33896
Create: 2024-08-20 13:49:15 +0000 UTC Push: 2024-08-20 13:49:15 +0000 UTC |
vwilzz/CVE-2024-38189
Create: 2024-08-20 12:41:57 +0000 UTC Push: 2024-08-20 12:41:57 +0000 UTC |
vx7z/CVE-2024-38189
Create: 2024-08-20 12:41:57 +0000 UTC Push: 2024-08-20 13:00:44 +0000 UTC |
wh6amiGit/CVE-2024-25600
Unauthenticated Remote Code Execution – Bricks
Create: 2024-08-20 12:18:58 +0000 UTC Push: 2024-08-20 12:18:58 +0000 UTC |
fa-rrel/CVE-2024-7928
CVE-2024-7928 fastadmin vulnerability POC & Scanning
Create: 2024-08-20 12:15:48 +0000 UTC Push: 2024-08-20 12:15:48 +0000 UTC |
Skim1k/CVE-2024-38063-local-POC
Create: 2024-08-20 10:28:13 +0000 UTC Push: 2024-08-20 10:28:14 +0000 UTC |
Skim1k/CVE-2024-38063
Create: 2024-08-20 10:28:13 +0000 UTC Push: 2024-08-20 10:34:02 +0000 UTC |
almogopp/OpenSSH-CVE-2024-6387-Fix
A Bash script to mitigate the CVE-2024-6387 vulnerability in OpenSSH by providing an option to upgrade to a secure version or apply a temporary workaround. This repository helps secure systems against potential remote code execution risks associated with affected OpenSSH versions.
Create: 2024-08-20 09:57:24 +0000 UTC Push: 2024-08-20 09:57:25 +0000 UTC |
almogopp/Disable-IPv6-CVE-2024-38063-Fix
A PowerShell script to temporarily mitigate the CVE-2024-38063 vulnerability by disabling IPv6 on Windows systems. This workaround modifies the registry to reduce the risk of exploitation without needing the immediate installation of the official Microsoft KB update. Intended as a temporary fix
Create: 2024-08-20 08:48:08 +0000 UTC Push: 2024-08-20 08:48:09 +0000 UTC |
bigb0x/CVE-2024-7928
Will attempt to retrieve DB details for FastAdmin instances
Create: 2024-08-20 03:09:47 +0000 UTC Push: 2024-08-20 03:09:47 +0000 UTC |
fa-rrel/-CVE-2024-4577-RCE
PHP CGI Argument Injection (CVE-2024-4577) RCE
Create: 2024-08-20 02:56:03 +0000 UTC Push: 2024-08-20 02:56:27 +0000 UTC |
fa-rrel/CVE-2024-4577-RCE
PHP CGI Argument Injection (CVE-2024-4577) RCE
Create: 2024-08-20 02:56:03 +0000 UTC Push: 2024-08-20 02:57:39 +0000 UTC |
Featherw1t/CVE-2023-51385_test
Create: 2024-08-20 02:25:58 +0000 UTC Push: 2024-08-20 02:25:58 +0000 UTC |
JohnHammond/CVE-2036-69420
uwu
Create: 2024-08-19 20:57:16 +0000 UTC Push: 2024-08-19 20:57:16 +0000 UTC |
jeyabalaji711/CVE-2024-42919
Create: 2024-08-19 19:50:50 +0000 UTC Push: 2024-08-19 19:50:50 +0000 UTC |
dweger-scripts/CVE-2024-38063-Remediation
Create: 2024-08-19 19:44:37 +0000 UTC Push: 2024-08-19 19:44:37 +0000 UTC |
Jhonsonwannaa/CVE-2024-34102
Create: 2024-08-19 19:25:48 +0000 UTC Push: 2024-08-19 19:25:49 +0000 UTC |
dream434/CVE-2024-34102
adobe commerce
Create: 2024-08-19 19:25:48 +0000 UTC Push: 2024-10-09 13:47:14 +0000 UTC |
dgndrn/CVE-2023-4590
Create: 2024-08-19 19:08:18 +0000 UTC Push: 2024-08-19 19:08:18 +0000 UTC |
s1d6point7bugcrowd/CVE-2024-6387-Race-Condition-in-Signal-Handling-for-OpenSSH
Create: 2024-08-19 16:45:53 +0000 UTC Push: 2024-08-19 16:46:15 +0000 UTC |
Previous
59
60
61
62
63
64
65
66
Next