unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
phanthibichtram12/CVE-2022-1565
Create: 2024-06-21 11:08:26 +0000 UTC Push: 2024-06-21 11:08:26 +0000 UTC |
phanthibichtram12/CVE-2022-1329
Create: 2024-06-21 10:05:03 +0000 UTC Push: 2024-06-21 10:05:03 +0000 UTC |
Scivous/CVE-2024-4367-npm
CVE-2024-4367复现
Create: 2024-06-21 08:16:42 +0000 UTC Push: 2024-06-21 08:16:42 +0000 UTC |
p0et08/CVE-2024-29973
This is a Poc for CVE-2024-29973
Create: 2024-06-21 06:38:50 +0000 UTC Push: 2024-06-21 06:38:50 +0000 UTC |
Alchemist3dot14/CVE-2024-30270-PoC
The script exploits Mailcow vulnerabilities via XSS and RCE, emphasizing the need for robust security measures and responsible usage to enhance web application security.
Create: 2024-06-21 04:47:48 +0000 UTC Push: 2024-06-21 04:47:48 +0000 UTC |
CYBER-WARRIOR-SEC/CVE-2024-28397-js2py-Sandbox-Escape
Create: 2024-06-21 04:43:21 +0000 UTC Push: 2024-06-21 04:43:21 +0000 UTC |
crumbledwall/CVE-2024-37759_PoC
PoC of CVE-2024-37759
Create: 2024-06-21 02:58:40 +0000 UTC Push: 2024-06-21 02:58:40 +0000 UTC |
g4nkd/CVE-2023-30253-PoC
This is my PoC for the CVE-2023-30253 (Dolibarr 17.0.0 PHP Code Injection), when the CMS Website plugin (core) is enabled, an authenticated attacker can obtain remote command execution via php code injection bypassing the application restrictions.
Create: 2024-06-21 01:41:34 +0000 UTC Push: 2024-06-21 01:41:34 +0000 UTC |
Eteblue/CVE-2024-37742
This repository contains a proof-of-concept (PoC) for exploiting CVE-2024-37742, a vulnerability in Safe Exam Browser (SEB) ≤ 3.5.0 on Windows. The vulnerability enables unauthorized clipboard data sharing between SEB's kiosk mode and the underlying system, compromising the integrity of exams.
Create: 2024-06-20 21:01:28 +0000 UTC Push: 2024-06-20 22:58:52 +0000 UTC |
cc3305/CVE-2023-2825
CVE-2023-2825 exploit script
Create: 2024-06-20 20:22:01 +0000 UTC Push: 2024-06-20 20:22:37 +0000 UTC |
Mr-r00t11/CVE-2024-34470
Create: 2024-06-20 16:47:28 +0000 UTC Push: 2024-06-20 16:47:29 +0000 UTC |
CamillaFranceschini/CVE-2023-4357
Create: 2024-06-20 13:20:43 +0000 UTC Push: 2024-06-20 13:20:53 +0000 UTC |
junnythemarksman/CVE-2024-24590
Deserialization of untrusted data can occur in versions 0.17.0 to 1.14.2 of the client SDK of Allegro AI’s ClearML platform, enabling a maliciously uploaded artifact to run arbitrary code on an end user’s system when interacted with.
Create: 2024-06-20 11:23:56 +0000 UTC Push: 2024-06-20 11:23:56 +0000 UTC |
WanLiChangChengWanLiChang/CVE-2024-29972
Create: 2024-06-20 11:12:52 +0000 UTC Push: 2024-06-20 11:12:52 +0000 UTC |
AkashicYiTai/CVE-2019-6250-libzmq
Create: 2024-06-20 10:56:43 +0000 UTC Push: 2024-06-20 10:56:44 +0000 UTC |
josemlwdf/CVE-2019-13272
This is a Python 3 version of this exploit. Hope it works!!!
Create: 2024-06-20 10:04:13 +0000 UTC Push: 2024-06-20 10:04:13 +0000 UTC |
bigb0x/CVE-2024-36527
POC for CVE-2024-36527: puppeteer-renderer v.3.2.0 and before is vulnerable to Directory Traversal
Create: 2024-06-20 09:42:07 +0000 UTC Push: 2024-06-20 09:42:07 +0000 UTC |
marcocarolasec/CVE-2016-2004-Exploit
Adaptation of the adipinto exploit, to python3
Create: 2024-06-20 08:12:43 +0000 UTC Push: 2024-06-20 08:12:44 +0000 UTC |
bonnettheo/CVE-2024-32002
exploit for CVE-2024-32002
Create: 2024-06-20 07:37:09 +0000 UTC Push: 2024-06-20 07:37:10 +0000 UTC |
blkph0x/CVE_2024_30078_POC_WIFI
basic concept for the latest windows wifi driver CVE
Create: 2024-06-20 05:58:45 +0000 UTC Push: 2024-06-20 05:58:45 +0000 UTC |
Previous
96
97
98
99
100
101
102
103
Next