| 3859 |
2026-05-19T23:22:25Z |
copy-fail-CVE-2026-31431 |
https://github.com/theori-io/copy-fail-CVE-2026-31431 |
Copy Fail (CVE-2026-31431): 9-year-old Linux kernel LPE found by Theori's Xint Code |
| 733 |
2026-05-20T02:25:37Z |
Nginx-Rift |
https://github.com/DepthFirstDisclosures/Nginx-Rift |
exploit for CVE-2026-42945 |
| 558 |
2026-05-17T15:50:22Z |
cve_2026_31431 |
https://github.com/rootsecdev/cve_2026_31431 |
Exploit POC for CVE_2026_31431 |
| 150 |
2026-05-19T10:45:29Z |
next-16.2.4-pocs |
https://github.com/dwisiswant0/next-16.2.4-pocs |
Next.js v16.2.4 Security PoC Collection (CVE-2026-23870, CVE-2026-44575, CVE-2026-44579, CVE-2026-44574, CVE-2026-44578, CVE-2026-44573, CVE-2026-44581, CVE-2026-44580, CVE-2026-44577, CVE-2026-44576, CVE-2026-44582, CVE-2026-44572) |
| 257 |
2026-05-16T20:20:56Z |
CVE-2026-21858 |
https://github.com/Chocapikk/CVE-2026-21858 |
n8n Ni8mare - Unauthenticated Arbitrary File Read to RCE Chain (CVSS 10.0) |
| 208 |
2026-05-11T14:09:37Z |
CVE-2026-24061 |
https://github.com/SafeBreach-Labs/CVE-2026-24061 |
Exploitation of CVE-2026-24061 |
| 69 |
2026-05-14T00:06:26Z |
cve-2026-31431 |
https://github.com/adysec/cve-2026-31431 |
CVE-2026-31431: Copy Fail |
| 348 |
2026-05-18T22:06:22Z |
copyfail-go |
https://github.com/badsectorlabs/copyfail-go |
A Go implementation of copyfail (CVE-2026-31431) |
| 420 |
2026-05-20T01:06:59Z |
cPanelSniper |
https://github.com/ynsmroztas/cPanelSniper |
CVE-2026-41940 — cPanel & WHM Authentication Bypass via Session-File CRLF Injection |
| 125 |
2026-05-19T15:16:55Z |
CVE-2026-20817 |
https://github.com/oxfemale/CVE-2026-20817 |
Windows Error Reporting ALPC Elevation of Privilege (CVE-2026-20817) - Proof-of-Concept exploit demonstrating local privilege escalation via WER service. |
| 117 |
2026-05-20T02:40:21Z |
CVE-2026-40369-EXPLOIT |
https://github.com/orinimron123/CVE-2026-40369-EXPLOIT |
Full exploit code for CVE-2026-40369 - A Windows kernel arbitrary write vulnerability that allows browser sandbox escape from all browsers render process sandbox |
| 99 |
2026-05-18T10:07:17Z |
CVE-2026-31431-Advanced-Exploit |
https://github.com/Sndav/CVE-2026-31431-Advanced-Exploit |
CVE-2026-31431 纯文件利用 |
| 85 |
2026-05-19T10:44:48Z |
CVE-2026-41651 |
https://github.com/Vozec/CVE-2026-41651 |
|
| 403 |
2026-05-19T07:41:55Z |
copy-fail-c |
https://github.com/tgies/copy-fail-c |
Cross-platform C port of the Copy Fail Linux LPE (CVE-2026-31431). Disclosed 2026-04-29 by Theori / Xint. |
| 141 |
2026-05-03T06:45:07Z |
CVE-2026-20841-PoC |
https://github.com/BTtea/CVE-2026-20841-PoC |
PoC |
| 123 |
2026-04-18T16:23:05Z |
CVE-2026-2441-PoC |
https://github.com/huseyinstif/CVE-2026-2441-PoC |
|
| 65 |
2026-05-19T15:18:07Z |
CVE-2026-34486 |
https://github.com/striga-ai/CVE-2026-34486 |
Apache Tomcat Tribes EncryptInterceptor fail-open bypass, unauthenticated RCE PoC |
| 93 |
2026-05-18T08:29:51Z |
Copy-Fail-Exploit-CVE-2026-31431 |
https://github.com/painoob/Copy-Fail-Exploit-CVE-2026-31431 |
Most Linux LPEs need a race window or a kernel-specific offset. Copy Fail is a straight-line logic flaw, it needs neither. The same 732-byte Python script (or .c elf) roots every Linux distribution shipped since 2017. |
| 67 |
2026-05-19T23:42:32Z |
CVE-2026-0073-Android-adbd-authentication-bypass-POC |
https://github.com/SecTestAnnaQuinn/CVE-2026-0073-Android-adbd-authentication-bypass-POC |
|
| 140 |
2026-05-19T22:48:59Z |
Copy-Fail-CVE-2026-31431-Kubernetes-PoC |
https://github.com/Percivalll/Copy-Fail-CVE-2026-31431-Kubernetes-PoC |
PoC: fully unprivileged container escape to node-level code execution on Kubernetes via CVE-2026-31431 page-cache corruption + shared image layers. Validated on Alibaba Cloud ACK, Amazon EKS and Google GKE. |
| 10 |
2026-05-15T09:42:03Z |
Ashwesker-CVE-2026-21509 |
https://github.com/kimstars/Ashwesker-CVE-2026-21509 |
CVE-2026-21509 |
| 31 |
2026-05-15T01:56:58Z |
CVE-2026-31431 |
https://github.com/0xShe/CVE-2026-31431 |
|
| 50 |
2026-05-15T07:03:48Z |
CVE-2026-31431-Linux-Copy-Fail |
https://github.com/iss4cf0ng/CVE-2026-31431-Linux-Copy-Fail |
Rust implementation Exploit/PoC of CVE-2026-31431-Linux-Copy-Fail, allow executing customized shellcode (such as Meterpreter). |
| 29 |
2026-05-08T23:27:48Z |
cve-2026-41940-poc |
https://github.com/adriyansyah-mf/cve-2026-41940-poc |
|
| 66 |
2026-04-17T19:08:51Z |
CVE-2026-24061-POC |
https://github.com/JayGLXR/CVE-2026-24061-POC |
|
| 26 |
2026-04-09T13:59:05Z |
cve-2026-32746 |
https://github.com/jeffaf/cve-2026-32746 |
CVE-2026-32746 - GNU InetUtils telnetd LINEMODE SLC Buffer Overflow PoC (pre-auth RCE, CVSS 9.8) |
| 63 |
2026-05-17T14:36:08Z |
poc-cpanel-cve-2026-41940 |
https://github.com/XsanFlip/poc-cpanel-cve-2026-41940 |
|
| 27 |
2026-05-16T01:51:50Z |
CVE-2026-34159 |
https://github.com/casp3r0x0/CVE-2026-34159 |
0 Click RCE exploit for CVE-2026-34159 Lama.cpp RPC server |
| 26 |
2026-05-10T11:58:54Z |
CVE-2026-21508_POC |
https://github.com/0xc4r/CVE-2026-21508_POC |
|
| 31 |
2026-05-12T11:30:53Z |
CVE-2026-35616 |
https://github.com/Alaatk/CVE-2026-35616 |
Fortinet FortiClientEMS improper access control |