unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
BTtea/CVE-2026-20841-PoC
PoC
Create: 2026-02-11 02:39:30 +0000 UTC Push: 2026-02-11 02:39:30 +0000 UTC |
BTtea/CVE-2026-20841---PoC
CVE-2026-20841 - PoC
Create: 2026-02-11 02:08:17 +0000 UTC Push: 2026-02-11 02:08:17 +0000 UTC |
derekyjj/CVE-2025-65480
Create: 2026-02-11 01:36:36 +0000 UTC Push: 2026-02-11 01:36:37 +0000 UTC |
EQSTLab/CVE-2026-21858
Create: 2026-02-11 01:01:03 +0000 UTC Push: 2026-02-11 01:01:03 +0000 UTC |
matesz44/CVE-2025-6018-19
CVE-2025-6018 (pam LPE unpriv->allow_active), CVE-2025-6019 (udisks LPE allow_active->root) in sh
Create: 2026-02-11 00:51:31 +0000 UTC Push: 2026-02-11 00:51:53 +0000 UTC |
Ismael-20223/CVE-2025-8088
Create: 2026-02-11 00:29:19 +0000 UTC Push: 2026-02-11 00:29:20 +0000 UTC |
kazehere4you/CVE-2025-15368-Exploit
Exploit tool for SportsPress Plugin LFI & RCE (CVE-2025-15368) - Proof of Concept
Create: 2026-02-10 23:45:13 +0000 UTC Push: 2026-02-10 23:45:28 +0000 UTC |
0xc4r/CVE-2026-21508_POC
Create: 2026-02-10 22:57:22 +0000 UTC Push: 2026-02-11 09:52:34 +0000 UTC |
SallocinAvalcante/Laborat-rio-SMB-Responder-CVE-2024-21413-
Laboratorio criado para PenTest da Vuln CVE 2024-214113(MONIKER LINK)
Create: 2026-02-10 22:06:32 +0000 UTC Push: 2026-02-10 22:06:33 +0000 UTC |
SallocinAvalcante/lab-SMB-responder-CVE-2024-21413
Laboratorio criado para PenTest da Vuln CVE 2024-214113(MONIKER LINK)
Create: 2026-02-10 22:06:32 +0000 UTC Push: 2026-02-10 22:23:58 +0000 UTC |
Z3YR0xX/CVE-2026-1560-Authenticated-Remote-Code-Execution-in-Lazy-Blocks-4.2.0
A critical security vulnerability was identified in the Lazy Blocks WordPress plugin affecting versions up to and including **4.2.0**
Create: 2026-02-10 21:11:52 +0000 UTC Push: 2026-02-10 21:11:53 +0000 UTC |
itsismarcos/Exploit-CVE-2026-1357
Exploit CVE-2026-1357
Create: 2026-02-10 19:38:36 +0000 UTC Push: 2026-02-10 19:40:36 +0000 UTC |
matesz44/CVE-2025-49132
CVE-2025-49132: Pterodactyl Panel LFI to RCE (w/ pearcmd)
Create: 2026-02-10 19:29:07 +0000 UTC Push: 2026-02-10 19:29:29 +0000 UTC |
jakovtodorovic/openSSH-agent-forwarding-vulnerability-analysis-CVE-2023-38408
Create: 2026-02-10 19:10:40 +0000 UTC Push: 2026-02-10 19:10:41 +0000 UTC |
gagaltotal/cve-2026-24858
CVE-2026-24858 - Administrative FortiCloud SSO authentication bypass
Create: 2026-02-10 17:51:07 +0000 UTC Push: 2026-02-10 17:51:08 +0000 UTC |
zoomdbz/CVE-2024-45440
Enumeration tool for CVE-2024-45440
Create: 2026-02-10 16:18:16 +0000 UTC Push: 2026-02-10 16:18:17 +0000 UTC |
z3r0h3ro/CVE-2026-1731-exp
Create: 2026-02-10 15:53:02 +0000 UTC Push: 2026-02-10 15:53:03 +0000 UTC |
compfaculty/cve-2026-oracle
Create: 2026-02-10 15:40:34 +0000 UTC Push: 2026-02-10 15:40:35 +0000 UTC |
ninjazan420/CVE-2026-1529-PoC-keycloak-unauthorized-registration-via-improper-invitation-token-validation
CVE-2026-1529 (PoC) is a critical vulnerability in Keycloak that allows unauthorized organization registration through improper invitation token validation. This exploit tool demonstrates the vulnerability by manipulating JWT tokens to register users in unauthorized organizations.
Create: 2026-02-10 14:31:22 +0000 UTC Push: 2026-02-10 14:31:23 +0000 UTC |
Ahmedf000/-CVE-2025-49132_Pterodactyl-_HTB-Season-10
Create: 2026-02-10 14:21:02 +0000 UTC Push: 2026-02-10 14:21:03 +0000 UTC |
Previous
71
72
73
74
75
76
77
78
Next