unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
SimoesCTT/CTT-Exchange-RCE-v1.0---Microsoft-Exchange-Exploit-CVSS-10.0-CRITICAL-CVE-2021-26855-CVE-2021-27065
CTT-enhanced version of the Microsoft Exchange Server SSRF to RCE exploit (ProxyShell/ProxyLogon), another CVSS 10.0 critical vulnerability that affected hundreds of thousands of organizations worldwide.
Create: 2026-01-28 08:45:23 +0000 UTC Push: 2026-01-28 08:45:24 +0000 UTC |
hilwa24/CVE-2026-24061
Tell Me Root (Batch Scanning Tool for the CVE-2026-24061 Telnet Authentication Bypass)
Create: 2026-01-28 07:05:56 +0000 UTC Push: 2026-01-28 07:12:03 +0000 UTC |
mrk336/Inside-CVE-2026-20805-How-a-Windows-DWM-Flaw-Exposed-Sensitive-Data
CVE‑2026‑20805: A Windows Desktop Window Manager flaw causing local information disclosure. Requires low privileges, no user interaction. Rated CVSS 5.5 (Medium). Actively exploited and listed in CISA KEV; patch released January 2026.
Create: 2026-01-28 03:50:36 +0000 UTC Push: 2026-01-28 03:50:36 +0000 UTC |
SimoesCTT/Convergent-Time-Theory-Enhanced-iOS-Safari-RCE-CVE-2025-43529-
CTT-Enhanced iOS Safari Exploit (based on CVE-2025-43529)
Create: 2026-01-28 03:50:01 +0000 UTC Push: 2026-01-28 03:50:02 +0000 UTC |
MY0723/GNU-Inetutils-telnet-CVE-2026-24061-
GNU Inetutils telnet远程认证绕过漏洞(CVE-2026-24061),该漏洞源于 GNU Inetutils telnetd 组件中对环境变量处理不当,攻击者可利用该漏洞,通过构造恶意的 USER 环境变量并发送至受影响的 telnet 服务,触发认证绕过机制,进而实现无需密码直接获取root权限。
Create: 2026-01-28 02:54:23 +0000 UTC Push: 2026-01-28 02:55:15 +0000 UTC |
Gabs-hub/CVE-2026-24061_Lab
Create: 2026-01-28 00:27:09 +0000 UTC Push: 2026-01-28 00:27:12 +0000 UTC |
androidteacher/CVE-2024-50498-wpquery
Create: 2026-01-27 22:19:22 +0000 UTC Push: 2026-01-27 22:19:23 +0000 UTC |
novitahk/Exploit-CVE-2026-24061
Payload CVE-2026-24061
Create: 2026-01-27 20:04:40 +0000 UTC Push: 2026-01-27 20:04:40 +0000 UTC |
notbside/CVE-2021-43798-PoC
Simple and effective PoC for CVE-2021-43798 Grafana Path Traversal
Create: 2026-01-27 16:50:59 +0000 UTC Push: 2026-01-27 16:50:59 +0000 UTC |
androidteacher/CVE-2026-24061-PoC-Telnetd
Create: 2026-01-27 14:24:19 +0000 UTC Push: 2026-01-27 14:24:20 +0000 UTC |
nicole2ilodl/CVE-2026-21509-PoC
CVE-2026-21509
Create: 2026-01-27 13:56:27 +0000 UTC Push: 2026-01-27 14:47:58 +0000 UTC |
0xLittleSpidy/CVE-2025-54309
Create: 2026-01-27 12:10:28 +0000 UTC Push: 2026-01-27 12:10:59 +0000 UTC |
PentHertz/CVE-2025-36911-exploit
Exploit of the CVE-2025-36911 vulnerability in Python
Create: 2026-01-27 10:18:07 +0000 UTC Push: 2026-01-27 10:58:48 +0000 UTC |
r00tSe7en/CVE-2024-42327-ZabbixServerSQLInjectionToRCE
修改版,添加列出主机,删除创建的item功能
Create: 2026-01-27 10:01:28 +0000 UTC Push: 2026-01-27 10:01:29 +0000 UTC |
Ashwesker/Ashwesker-CVE-2026-21509
CVE-2026-21509
Create: 2026-01-27 09:26:41 +0000 UTC Push: 2026-01-27 09:26:42 +0000 UTC |
JoakimBulow/CVE-2026-24688
CVE-2026-24688 - pypdf - DoS - POC
Create: 2026-01-27 08:44:59 +0000 UTC Push: 2026-01-27 08:45:00 +0000 UTC |
FurkanKAYAPINAR/CVE-2026-24061-telnet2root
Create: 2026-01-27 08:32:42 +0000 UTC Push: 2026-01-27 08:32:42 +0000 UTC |
Sn0wBaall/CVE-2024-23334-PoC
Create: 2026-01-27 03:22:29 +0000 UTC Push: 2026-01-27 03:22:30 +0000 UTC |
null-event/CVE-2024-11467
VMWare Horizon client for macOS LPE due to an XPC logic flaw. Belated POC for an 0-day I responsibly disclosed to Omnissa.
Create: 2026-01-27 02:27:05 +0000 UTC Push: 2026-01-27 02:27:06 +0000 UTC |
LucasPDiniz/CVE-2026-24061
Vulnerability in GNU InetUtils telnetd Enables Remote Root Access
Create: 2026-01-26 20:46:49 +0000 UTC Push: 2026-01-26 20:46:50 +0000 UTC |
Previous
6
7
8
9
10
11
12
13
Next