Publicly Disclosed
PoC Exploits

🔴 Alway take caution when working with PoC Exploits 🔴

Discovered just now...

PoC for CVE-2026-30952

HarttleLiquidjs8.7HIGH
Arbitrary File Access Vulnerability in LiquidJS Template Engine

LiquidJS is a versatile template engine that is primarily compatible with Shopify and GitHub Pages, designed to simplify the rendering of dynamic content. However, prior to version 10.25.0, it contained a vulnerability that allowed malicious users to exploit the layout, render, and include tags. ...

Discovered 2 hours ago

PoC for CVE-2026-3946

Unknown VendorPHPms5.1MEDIUM
Cross-Site Scripting Vulnerability in PHPEMS by Unknown Vendor

A cross-site scripting vulnerability exists in PHPEMS 11.0 that allows remote attackers to manipulate the 'askcontent' parameter in the /index.php?ask=app-ask file. This manipulation can lead to XSS attacks, where malicious scripts are injected into web pages viewed by other users. The exploit is...

Discovered 5 hours ago

PoC for CVE-2026-3944

ItsourcecodeUniversity Management ...6.9MEDIUM
SQL Injection Vulnerability in itsourcecode University Management S...

A SQL injection vulnerability exists in the itsourcecode University Management System 1.0, specifically within the argument handling of the /att_add.php file. This flaw allows attackers to manipulate inputs and execute arbitrary SQL queries remotely, potentially compromising the application's dat...

PoC for CVE-2026-3943

H3cAcg1000-ak2306.9MEDIUM
Command Injection Vulnerability in H3C ACG1000-AK230

A command injection vulnerability exists in H3C ACG1000-AK230 devices prior to version 20260227, specifically affecting the /webui/?aaa_portal_auth_local_submit interface. This flaw allows attackers to manipulate the 'suffix' argument and execute arbitrary commands remotely, potentially compromis...

PoC for CVE-2024-51482

ZoneminderZoneminder🟣 EPSS 52%10CRITICAL
ZoneMinder vulnerable to SQL Injection, fix released in 1.37.64

ZoneMinder, a popular open-source closed-circuit television software, has a vulnerability that exposes versions v1.37.* up to and including v1.37.64 to a boolean-based SQL injection attack through the web/ajax/event.php endpoint. This flaw can allow an attacker to manipulate SQL queries, potentia...

Discovered 7 hours ago

PoC for CVE-2015-9235

HackeroneJsonwebtoken Node Module🟣 EPSS 32%9.8CRITICAL
Asymmetric Key Bypass in jsonwebtoken Node Module by Auth0

The jsonwebtoken module before version 4.2.2 is susceptible to a security flaw where an attacker can bypass token verification. This occurs when the chamber facilitates the use of tokens signed with asymmetric keys but allows for substitution with tokens signed using symmetric algorithms. Consequ...

Discovered 11 hours ago

PoC for CVE-2025-27136

RobothyLocal-s35.5MEDIUM
XML External Entity Injection Vulnerability in LocalS3 by Robothy

LocalS3, an Amazon S3 mock service designed for testing and local development, has a vulnerability in its bucket creation endpoint that allows XML External Entity (XXE) injection. Before version 1.21, the service's XML parser resolves external entities without adequate validation. This misconfigu...

PoC for CVE-2026-2631

WordPressDatalogics Ecommerce D...9.8CRITICAL
Unauthenticated Modification Vulnerability in Datalogics Ecommerce ...

The Datalogics Ecommerce Delivery plugin for WordPress prior to version 2.6.60 has a significant vulnerability that exposes an unauthenticated REST endpoint. This vulnerability enables remote users to change the `datalogics_token` without any verification process. This token plays a crucial role ...

PoC for CVE-2026-2626

WordPressDivi-booster8.1HIGH
Unauthorized Access and PHP Object Injection in Divi-Booster Plugin

The Divi-Booster plugin for WordPress, prior to version 5.0.2, contains a flaw that allows unauthorized users to modify the plugin's settings due to a lack of authorization and CSRF checks. The vulnerability stems from using unserialize() on untrusted data, posing a risk of PHP Object Injection w...

PoC for CVE-2026-2466

WordPressDukapress7.1HIGH
Reflected Cross-Site Scripting Vulnerability in DukaPress WordPress...

The DukaPress plugin for WordPress versions up to 3.2.4 is vulnerable to a reflected cross-site scripting (XSS) attack. This vulnerability arises due to the plugin failing to adequately sanitize and escape user input, potentially allowing attackers to inject malicious scripts. The exploitation of...

PoC for CVE-2026-1867

WordPressGuest Posting / Fronte...5.9MEDIUM
Data Exposure in WordPress Plugin for Guest Posting

A vulnerability exists in the Guest Posting / Frontend Posting / Front Editor plugin for WordPress, specifically in versions prior to 5.0.6. This flaw allows an unauthenticated attacker to use a URL parameter to regenerate a .json file containing sensitive demo data, which could include the admin...

PoC for CVE-2026-1753

WordPressGutena Forms6.8MEDIUM
Vulnerability in Gutena Forms Plugin Allows Unauthorized Changes

The Gutena Forms plugin for WordPress, versions prior to 1.6.1, contains a flaw that allows users with contributor roles or higher to modify options without proper validation. This vulnerability permits unauthorized updates to critical boolean and array settings, such as 'users_can_register,' pot...

Discovered 12 hours ago

PoC for CVE-2025-66398

SignalkSignalk-server9.7CRITICAL
Unauthenticated Access Vulnerability in Signal K Server by Signal K

Signal K Server, a crucial application that serves as a central hub for maritime operations, harbors a vulnerability allowing unauthenticated attackers to manipulate the internal state via the `/skServer/validateBackup` endpoint. This weakness enables the attacker to exploit the server's 'Restore...

Discovered 17 hours ago

PoC for CVE-2014-6287

RejettoHttp File Server🟣 EPSS 94%9.8CRITICAL
Remote Code Execution Vulnerability in Rejetto HFS File Server

The findMacroMarker function in parserLib.pas of Rejetto HTTP File Server (HFS) versions 2.3x prior to 2.3c is susceptible to a remote code execution vulnerability. An attacker could exploit this flaw by crafting a search action that utilizes a %00 sequence, which allows execution of arbitrary pr...

Discovered 18 hours ago

PoC for CVE-2026-27944

0xjackyNginx-ui9.8CRITICAL
Authentication Bypass in Nginx UI Affects Nginx Web Server

Nginx UI, a web interface for the Nginx web server, has a critical security flaw where the /api/backup endpoint is accessible without authentication. This vulnerability allows unauthenticated attackers to retrieve a complete system backup that includes sensitive information such as user credentia...

Discovered 21 hours ago

PoC for CVE-2026-27944

0xjackyNginx-ui9.8CRITICAL
Authentication Bypass in Nginx UI Affects Nginx Web Server

Nginx UI, a web interface for the Nginx web server, has a critical security flaw where the /api/backup endpoint is accessible without authentication. This vulnerability allows unauthenticated attackers to retrieve a complete system backup that includes sensitive information such as user credentia...

Discovered 1 day ago

PoC for CVE-2024-34064

PalletsJinja5.4MEDIUM
Jinja Templating Engine Vulnerable to XSS Attacks

Jinja is an extensible templating engine. The `xmlattr` filter in affected versions of Jinja accepts keys containing non-attribute characters. XML/HTML attributes cannot contain spaces, `/`, `>`, or `=`, as each would then be interpreted as starting a separate attribute. If an application accepts...

PoC for CVE-2024-34064

PalletsJinja5.4MEDIUM
Jinja Templating Engine Vulnerable to XSS Attacks

Jinja is an extensible templating engine. The `xmlattr` filter in affected versions of Jinja accepts keys containing non-attribute characters. XML/HTML attributes cannot contain spaces, `/`, `>`, or `=`, as each would then be interpreted as starting a separate attribute. If an application accepts...

PoC for CVE-2026-3288

KubernetesIngress-nginx8.8HIGH
Arbitrary Code Execution Vulnerability in Ingress-Nginx by Kubernetes

A security issue in ingress-nginx was identified where the annotation 'nginx.ingress.kubernetes.io/rewrite-target' can be exploited to inject malicious configuration into the nginx controller. This vulnerability may allow attackers to execute arbitrary code within the ingress-nginx controller’s c...

PoC for CVE-2026-29780

Govcert-luEml Parser5.5MEDIUM
Path Traversal Vulnerability in eml_parser Python Module

The eml_parser Python module, used for parsing email files, contains a path traversal vulnerability in the example script 'examples/recursively_extract_attachments.py'. This allows an attacker to exploit the module by providing maliciously crafted filenames that lead to arbitrary file writing out...

PoC for CVE-2024-34064

PalletsJinja5.4MEDIUM
Jinja Templating Engine Vulnerable to XSS Attacks

Jinja is an extensible templating engine. The `xmlattr` filter in affected versions of Jinja accepts keys containing non-attribute characters. XML/HTML attributes cannot contain spaces, `/`, `>`, or `=`, as each would then be interpreted as starting a separate attribute. If an application accepts...

PoC for CVE-2024-34064

PalletsJinja5.4MEDIUM
Jinja Templating Engine Vulnerable to XSS Attacks

Jinja is an extensible templating engine. The `xmlattr` filter in affected versions of Jinja accepts keys containing non-attribute characters. XML/HTML attributes cannot contain spaces, `/`, `>`, or `=`, as each would then be interpreted as starting a separate attribute. If an application accepts...

PoC for CVE-2024-34064

PalletsJinja5.4MEDIUM
Jinja Templating Engine Vulnerable to XSS Attacks

Jinja is an extensible templating engine. The `xmlattr` filter in affected versions of Jinja accepts keys containing non-attribute characters. XML/HTML attributes cannot contain spaces, `/`, `>`, or `=`, as each would then be interpreted as starting a separate attribute. If an application accepts...

PoC for CVE-2024-34064

PalletsJinja5.4MEDIUM
Jinja Templating Engine Vulnerable to XSS Attacks

Jinja is an extensible templating engine. The `xmlattr` filter in affected versions of Jinja accepts keys containing non-attribute characters. XML/HTML attributes cannot contain spaces, `/`, `>`, or `=`, as each would then be interpreted as starting a separate attribute. If an application accepts...

PoC for CVE-2024-34064

PalletsJinja5.4MEDIUM
Jinja Templating Engine Vulnerable to XSS Attacks

Jinja is an extensible templating engine. The `xmlattr` filter in affected versions of Jinja accepts keys containing non-attribute characters. XML/HTML attributes cannot contain spaces, `/`, `>`, or `=`, as each would then be interpreted as starting a separate attribute. If an application accepts...

PoC for CVE-2026-21533

MicrosoftWindows 10 Version 16077.8HIGH
Privilege Escalation Vulnerability in Windows Remote Desktop by Mic...

An improper privilege management issue in Windows Remote Desktop Services enables a local attacker with valid access to elevate their access privileges. This vulnerability can lead to unauthorized actions being performed with higher user rights, presenting significant security risks. Microsoft pr...

PoC for CVE-2026-1508

WordPressCourt Reservation4.3MEDIUM
Cross-Site Request Forgery Flaw in Court Reservation Plugin for Wor...

The Court Reservation WordPress plugin versions prior to 1.10.9 are susceptible to a Cross-Site Request Forgery (CSRF) vulnerability. This flaw enables attackers to trick an authenticated administrator into sending a request that deletes events without their consent. By exploiting this weakness, ...

Discovered 2 days ago

PoC for CVE-2024-31317

GoogleAndroid7.8HIGH
Unpatched Deserialization Vulnerability in ZygoteProcess.java Could...

A vulnerability has been identified in the Android Framework that allows potential code execution through unsafe deserialization in multiple functions of ZygoteProcess.java. This flaw enables local privilege escalation, requiring user execution privileges but eliminating the need for user interac...

PoC for CVE-2025-64459

DjangoprojectDjango9.1CRITICAL
SQL Injection Vulnerability in Django Software by Django

An SQL injection vulnerability exists in specific versions of Django prior to 5.1.14, 4.2.26, and 5.2.8. Through the use of specially crafted dictionaries, attackers can exploit the `QuerySet.filter()`, `QuerySet.exclude()`, and `QuerySet.get()` methods, as well as the `Q()` class, when utilizing...

PoC for CVE-2025-15603

Unknown VendorOpen-webui6.3MEDIUM
Insufficiently Random Value Vulnerability in open-webui by Unknown ...

A security vulnerability has been identified in the open-webui product, specifically affecting the JWT Key Handler component. The issue emerges from a flaw in the backend/start_windows.bat file where manipulation of the WEBUI_SECRET_KEY leads to insufficiently random values. This weakness has the...

PoC for CVE-2025-5548

FreefloatFtp Server6.9MEDIUM
Buffer Overflow Vulnerability in FreeFloat FTP Server

A vulnerability in FreeFloat FTP Server 1.0 affects the NOOP Command Handler, allowing for remote buffer overflow attacks. This flaw can be exploited, leading to unauthorized data access and potential control of the affected system. The issue has been publicly disclosed, emphasizing the need for ...

PoC for CVE-2025-70330

EasyEasy Grade Pro3.3LOW
File Parsing Logic Flaw in Easy Grade Pro by Easy

Easy Grade Pro 4.1.0.2 exhibits a flaw in its file parsing logic, particularly when handling proprietary .EGP gradebook files. An attacker can exploit this vulnerability by crafting a specific .EGP file with altered fields at designated offsets. When the compromised file is processed by the appli...

PoC for CVE-2026-3818

TiandyEasy7 Cms Windows6.9MEDIUM
SQL Injection Vulnerability in Tiandy Easy7 CMS Platform

A vulnerability exists in the Tiandy Easy7 CMS version 7.17.0, specifically in the WebService component of the application. The issue arises from inadequate validation of input, allowing an attacker to manipulate the 'strTBName' argument in the GetDBData.jsp file. This flaw permits the execution ...

PoC for CVE-2025-3194

no2chemBigint-buffer8.7HIGH
Buffer Overflow Vulnerability in bigint-buffer by no2chem

The bigint-buffer package is susceptible to a buffer overflow vulnerability in its toBigIntLE() function. This exploitation can lead to application crashes, allowing attackers to disrupt service and potentially execute arbitrary code. Users of this package should evaluate their current versions a...

PoC for CVE-2026-3817

SourcecodesterPatients Waiting Area ...6.9MEDIUM
Improper Authorization Vulnerability in SourceCodester Patients Wai...

A vulnerability has been identified in the SourceCodester Patients Waiting Area Queue Management System 1.0, specifically concerning the file /patient-search.php. This flaw allows for improper authorization, potentially enabling unauthorized users to access restricted features or data within the ...

PoC for CVE-2026-3816

OwaspDefectdojo5.3MEDIUM
Denial of Service Vulnerability in OWASP DefectDojo by OWASP

A security vulnerability has been identified in OWASP DefectDojo affecting versions up to 2.55.4. Specifically, the issue resides in the 'input_zip.read' function within the SonarQubeParser/MSDefenderParser component's parser.py file. This flaw can allow a remote attacker to initiate a denial of ...

PoC for CVE-2026-3815

UttHiper 810g8.7HIGH
Buffer Overflow Vulnerability in UTT HiPER 810G by UTT

A critical weakness has been discovered in UTT HiPER 810G versions up to 1.7.7-1711, specifically affecting the strcpy function within the /goform/formApMail file. This vulnerability could allow attackers to manipulate the software remotely, leading to potential buffer overflow attacks. The explo...

PoC for CVE-2026-3814

UttHiper 810g8.7HIGH
Buffer Overflow Vulnerability in UTT HiPER 810G Product by UTT

A security flaw has been identified in the UTT HiPER 810G, specifically concerning the function strcpy located in /goform/getOneApConfTempEntry. This vulnerability enables an attacker to manipulate the system and trigger a buffer overflow. As a result, it allows for the potential execution of arb...

PoC for CVE-2026-3813

OpenccJflow5.3MEDIUM
JFlow Vulnerability in OpenCC Allows Remote Code Execution

A significant vulnerability has been found in the JFlow application developed by OpenCC, specifically within the Calculate function located in the WF_CCForm.java file. This flaw allows for remote code execution through injection attacks, which can be exploited by malicious actors over the interne...

PoC for CVE-2026-3812

ItsourcecodePayroll Management System5.3MEDIUM
Cross Site Scripting Vulnerability in itsourcecode Payroll Manageme...

A cross site scripting vulnerability was identified in the itsourcecode Payroll Management System 1.0. The issue arises from an insecure function within the file /manage_employee_allowances.php, where the manipulation of the argument ID allows attackers to execute scripts in the context of the vi...

PoC for CVE-2026-3811

TendaFh12028.7HIGH
Stack-Based Buffer Overflow in Tenda FH1202 Router

A stack-based buffer overflow vulnerability exists in the Tenda FH1202 router, specifically within the P2pListFilter function. This issue is triggered by manipulating the 'page' argument in the /goform/P2pListFilter file, which could allow remote attackers to execute their own code leading to una...

PoC for CVE-2026-3810

TendaFh12028.7HIGH
Stack-Based Buffer Overflow in Tenda FH1202 Router

A stack-based buffer overflow vulnerability exists in the Tenda FH1202 router, specifically in the fromDhcpListClient function located in the /goform/DhcpListClient endpoint. By manipulating the 'page' argument, an attacker can potentially exploit this vulnerability to execute unauthorized action...

PoC for CVE-2026-3809

TendaFh12028.7HIGH
Stack-Based Buffer Overflow in Tenda FH1202 Router by Tenda

A stack-based buffer overflow vulnerability exists in the Tenda FH1202's fromNatStaticSetting function. By manipulating the argument page within the /goform/NatSaticSetting file, an attacker can exploit this flaw remotely, potentially compromising the device's integrity. This vulnerability poses ...

PoC for CVE-2026-3808

TendaFh12028.7HIGH
Stack-Based Buffer Overflow in Tenda FH1202 Router by Tenda

A stack-based buffer overflow vulnerability exists in the webtypelibrary function of Tenda FH1202 routers. An attacker can exploit this flaw by manipulating the webSiteId parameter, potentially allowing remote code execution. The affected version is V1.2.0.14(408), and this vulnerability is now p...

PoC for CVE-2026-3807

TendaFh12028.7HIGH
Stack-Based Buffer Overflow in Tenda FH1202 Device

A security vulnerability has been identified in the Tenda FH1202 device, specifically involving the formWrlsafeset function located in the /goform/AdvSetWrlsafeset file. The manipulation of arguments such as mit_ssid and mit_ssid_index can lead to a stack-based buffer overflow, potentially allowi...

PoC for CVE-2026-3806

SourcecodesterResort Reservation System5.3MEDIUM
SQL Injection Vulnerability in SourceCodester Janobe Resort Reserva...

A security weakness has been identified in the janobe Resort Reservation System, where manipulation of the 'q' argument in the /room_rates.php file can lead to SQL injection. This vulnerability allows attackers to execute arbitrary SQL queries, potentially compromising sensitive data. The exploit...

PoC for CVE-2026-3804

TendaI38.7HIGH
Stack-Based Buffer Overflow in Tenda i3 Router

A security flaw has been identified in the Tenda i3 router version 1.0.0.6(2204), specifically within the function formWifiMacFilterSet located in the /goform/WifiMacFilterSet file. This vulnerability allows for manipulation of the argument index, leading to a stack-based buffer overflow conditio...

Discovered 3 days ago

PoC for CVE-2026-3803

TendaI38.7HIGH
Stack-Based Buffer Overflow in Tenda i3 Router

A vulnerability exists in the Tenda i3 router version 1.0.0.6 (2204) related to the function formWifiMacFilterGet. An attacker can manipulate an argument index to trigger a stack-based buffer overflow. This exploit can be executed remotely, exposing the router to potential attacks. As details of ...

PoC for CVE-2024-56348

JetBrainsTeamcity4.3MEDIUM
Improper Access Control Vulnerability in JetBrains TeamCity

CVE-2024-56348 is a critical security vulnerability found in JetBrains TeamCity versions prior to 2024.12. The flaw arises from improper access control mechanisms that permit unauthorized users to view sensitive information related to agents that should be restricted. This vulnerability poses a s...

PoC for CVE-2026-3802

TendaI38.7HIGH
Stack-based Buffer Overflow in Tenda i3 Router

A vulnerability exists in the Tenda i3 router's execution command function located at /goform/exeCommand. By manipulating the input argument 'cmdinput', an attacker can trigger a stack-based buffer overflow. This flaw allows for remote exploitation, potentially giving malicious actors control ove...