unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
imzanggg/CVE-2025-24055-OAuth-Langfuse
Create: 2026-05-14 03:59:23 +0000 UTC Push: 2026-05-14 03:59:24 +0000 UTC |
materaj2/cve-2026-45185-detection-script
These detection scripts are property of the SECPlayground Platform. Two safe detection scripts. Neither drives the close_notify-mid-BDAT trigger, so they will not crash the daemon or leave panic-log entries. Both verdicts are "likely vulnerable" — distinguishing GnuTLS from OpenSSL builds remotely is not reliable without exploitation.
Create: 2026-05-14 03:57:22 +0000 UTC Push: 2026-05-14 03:57:23 +0000 UTC |
bradyjmcl/cve-2026-46391
Proof of Concept exploit for CVE-2026-46391
Create: 2026-05-14 03:43:36 +0000 UTC Push: 2026-05-14 03:43:37 +0000 UTC |
RyosukeDTomita/CVE-2026-42945
Create: 2026-05-14 03:24:36 +0000 UTC Push: 2026-05-14 03:24:37 +0000 UTC |
ydking0911/CVE-2026-4060-PoC
Create: 2026-05-14 02:10:43 +0000 UTC Push: 2026-05-14 02:10:44 +0000 UTC |
Sebastian294/cve-2026-31431
Analísis - POC - Mitigación
Create: 2026-05-13 23:49:20 +0000 UTC Push: 2026-05-13 23:49:21 +0000 UTC |
orinimron123/CVE-2026-40369-EXPLOIT
Full exploit code for CVE-2026-40369 - A Windows kernel arbitrary write vulnerability that allows browser sandbox escape from all browsers render process sandbox
Create: 2026-05-13 20:56:15 +0000 UTC Push: 2026-05-13 21:13:36 +0000 UTC |
pixelotes/lab-cve-2023-4863
Create: 2026-05-13 18:50:19 +0000 UTC Push: 2026-05-13 18:50:23 +0000 UTC |
FrosterDL/CVE-2026-43284
Create: 2026-05-13 15:59:20 +0000 UTC Push: 2026-05-13 15:59:21 +0000 UTC |
FrosterDL/CVE-2026-43284-Dirty-Frag
Create: 2026-05-13 15:34:46 +0000 UTC Push: 2026-05-13 15:34:47 +0000 UTC |
var77/CVE-2026-2005
PoC for CVE-2026-2005
Create: 2026-05-13 15:29:43 +0000 UTC Push: 2026-05-13 15:31:10 +0000 UTC |
emresandikci/nextjs-cve-2026-23870-checker
Create: 2026-05-13 14:47:03 +0000 UTC Push: 2026-05-13 14:47:20 +0000 UTC |
SilverRuler/copy-fail-CVE-2026-31431
copy-fail-CVE-2026-31431
Create: 2026-05-13 14:43:00 +0000 UTC Push: 2026-05-13 14:43:45 +0000 UTC |
Diktrome/-cve_2026_31431_python3-5
Create: 2026-05-13 14:29:49 +0000 UTC Push: 2026-05-13 14:30:04 +0000 UTC |
tc4dy/CVE-2026-0073-PoC-Exploit
🚀 CVE-2026-0073 - Android ADB Wireless Debugging Exploit (CVSS 8.8) 🔓 Zero-click authentication bypass via TLS type confusion. Gain interactive shell, execute commands, scan networks. Educational red-team tool. 🐚⚡
Create: 2026-05-13 14:28:00 +0000 UTC Push: 2026-05-13 14:28:01 +0000 UTC |
0xBlackash/CVE-2026-44277
CVE-2026-44277
Create: 2026-05-13 14:15:37 +0000 UTC Push: 2026-05-13 14:15:39 +0000 UTC |
elvinsuleymanov/CVE-2026-45616
Stored XSS in Vvveb CMS
Create: 2026-05-13 13:42:10 +0000 UTC Push: 2026-05-13 13:42:11 +0000 UTC |
jcaz2378/CVE-2025-67303
Git CVE-2025-67303 payload
Create: 2026-05-13 12:23:22 +0000 UTC Push: 2026-05-13 12:23:40 +0000 UTC |
kuniyal08/Copy-Fail-CVE-2026-31431-Lab
Create: 2026-05-13 11:36:00 +0000 UTC Push: 2026-05-13 11:36:01 +0000 UTC |
unicorn-hyh/CVE-2026-31156
There is a path injection vulnerability in OpenPLC-v3, which arises from the program not performing any validity checks on the file path parameters passed in from the command line. Attackers can read any readable file by constructing malicious paths, posing a risk of information leakage.
Create: 2026-05-13 08:34:45 +0000 UTC Push: 2026-05-13 08:34:45 +0000 UTC |
Previous
1
2
3
4
5
6
7
8
Next