Publicly Disclosed
PoC Exploits
🔴 Alway take caution when working with PoC Exploits 🔴
Discovered 3 hours ago
PoC for CVE-2026-6874
A vulnerability exists in the Ericc-ch Copilot-API up to version 0.7.0, which affects the Header Handler component in the /token file. This issue allows an attacker to manipulate the Host argument, which may result in unintended reliance on reverse DNS resolution. Such an exploit can be executed ...
Discovered 4 hours ago
PoC for CVE-2026-40517
Radare2 versions prior to 6.1.4 are susceptible to a command injection flaw within the PDB parser’s print_gvars() function. This vulnerability arises when an attacker crafts a malicious PDB file that incorporates newline characters within the symbol names. Through this manipulation, arbitrary com...
Discovered 5 hours ago
PoC for CVE-2017-0144
The SMBv1 protocol in various Microsoft Windows operating systems contains a vulnerability that enables remote attackers to execute arbitrary code by sending specially crafted packets to the server. This issue affects multiple versions of Windows, including desktop and server editions, allowing e...
Discovered 7 hours ago
PoC for CVE-2019-15107
Webmin versions up to 1.920 are susceptible to a command injection vulnerability through the 'old' parameter in the password_change.cgi script. An unauthenticated attacker can exploit this flaw to execute arbitrary commands on the server. This may lead to unauthorized access or further compromise...
Discovered 8 hours ago
PoC for CVE-2026-41469
The Beghelli Sicuro24 SicuroWeb application lacks a robust Content Security Policy (CSP), which exposes it to significant security risks. This failure allows attackers to load unauthorized external JavaScript resources, potentially leading to the execution of arbitrary remote payloads. When combi...
PoC for CVE-2026-41469
The Beghelli Sicuro24 SicuroWeb application lacks a robust Content Security Policy (CSP), which exposes it to significant security risks. This failure allows attackers to load unauthorized external JavaScript resources, potentially leading to the execution of arbitrary remote payloads. When combi...
Discovered 9 hours ago
PoC for CVE-2019-2215
A use-after-free vulnerability exists in the Android Binder service, which could allow attackers to elevate privileges from an application to the Linux Kernel. Exploitation of this vulnerability does not require any interaction from the user; however, it necessitates either the installation of a ...
Discovered 11 hours ago
PoC for CVE-2024-58344
Carbon Forum version 5.9.0 is susceptible to a persistent cross-site scripting vulnerability. This flaw enables authenticated administrators to insert malicious JavaScript code via the Forum Name field within the dashboard settings. When the malicious script is stored, it can be executed in the b...
PoC for CVE-2018-25272
The ELBA5 version 5.8.0 contains a significant vulnerability that enables remote code execution through improper database access. Attackers can leverage default connector credentials to connect to the database, potentially retrieving sensitive information, such as database administrator passwords...
PoC for CVE-2018-25271
TextPad 8.1.2 contains a denial of service vulnerability that enables local attackers to crash the application by providing an overly long buffer string via the Run command interface. By submitting a 5000-byte payload into the Command field through Tools > Run, the application is susceptible to a...
PoC for CVE-2018-25270
ThinkPHP 5.0.23 has a vulnerability that allows unauthorized attackers to execute arbitrary PHP code remotely. This occurs through the manipulation of the routing parameters, where attackers can craft specific requests targeting the index.php endpoint. By supplying malicious function parameters, ...
PoC for CVE-2018-25269
ICEWARP version 11.0.0.0 is susceptible to a cross-site scripting (XSS) vulnerability that allows attackers to inject malicious HTML content into emails. By utilizing base64-encoded payloads embedded in object and embed tags, attackers can craft emails containing data URIs that execute embedded s...
PoC for CVE-2018-25268
LanSpy version 2.0.1.159 is susceptible to a local buffer overflow vulnerability. This issue arises when attackers provide oversized input to the scan field, allowing them to overwrite the instruction pointer. By crafting a specific payload composed of 688 bytes of padding followed by 4 bytes of ...
PoC for CVE-2018-25267
UltraISO 9.7.1.3519 is prone to a local buffer overflow vulnerability within the Output FileName field of the Make CD/DVD Image dialog. This flaw can be exploited by attackers who craft a malicious filename string containing 304 bytes of data followed by specially constructed SEH record overwrite...
PoC for CVE-2018-25266
Angry IP Scanner version 3.5.3 is susceptible to a buffer overflow vulnerability within its preferences dialog. This flaw enables local attackers to induce a denial of service by submitting an oversized string. The vulnerability can be exploited by creating a file filled with repeating characters...
PoC for CVE-2018-25265
LanSpy 2.0.1.159 has a local buffer overflow vulnerability in the scanning functionality that enables local attackers to execute arbitrary code. This is achieved through exploitation of the structured exception handling (SEH) mechanisms, allowing attackers to craft malicious payloads utilizing eg...
PoC for CVE-2018-25262
Angry IP Scanner for Linux version 3.5.3 has a denial of service vulnerability that can be exploited by local attackers. By inputting a specially crafted malicious string into the port selection field within the application, an attacker can trigger a buffer overflow, leading to an unexpected appl...
PoC for CVE-2018-25261
Iperius Backup 5.8.1 features a local buffer overflow vulnerability in its structured exception handling (SEH) mechanism. This vulnerability allows local attackers to execute arbitrary code by providing a manipulated file path. By crafting a specific payload in the external file location field wh...
PoC for CVE-2018-25259
Terminal Services Manager 3.1 has a stack-based buffer overflow vulnerability in the computer names field, which can be exploited by local attackers. By crafting a specially formatted input file containing shellcode and jump instructions, attackers can overwrite the structured exception handler (...
PoC for CVE-2018-25260
MAGIX Music Editor 3.1 is susceptible to a buffer overflow vulnerability in its FreeDB Proxy Options dialog. This vulnerability allows local attackers to execute arbitrary code through misuse of structured exception handling. By crafting a malicious payload and entering it into the Server field v...
Discovered 16 hours ago
PoC for CVE-2026-25604
A vulnerability exists in AWS Auth Manager where the SAML authentication origin is utilized as provided by the client, without verification against the actual instance URL. This flaw potentially allows unauthorized access to different instances that may enforce diverse access controls, as attacke...
Discovered 19 hours ago
PoC for CVE-2026-39808
An OS command injection vulnerability exists in Fortinet FortiSandbox versions 4.4.0 through 4.4.8. This flaw arises from improper neutralization of special elements used in operating system commands. An attacker can exploit this vulnerability to execute unauthorized commands, potentially comprom...
Discovered 1 day ago
PoC for CVE-2026-6799
A security flaw has been identified in the Comfast CF-N1-S 2.6.0.1 involving the file /cgi-bin/mbox-config?method=SET§ion=ping_config. This vulnerability allows an attacker to manipulate the argument 'destination', resulting in command injection. The exploit can be executed remotely, posing a...
PoC for CVE-2024-2997
The first article discusses a vulnerability in the Bdtask Multi-Store Inventory Management System, which is susceptible to cross-site scripting. The vulnerability allows for remote attack through manipulation of certain arguments. The vendor has not responded to the disclosure, and the exploit ha...
PoC for CVE-2026-6745
A vulnerability exists in the Custom Scripts Handler component of Bagisto, affecting versions up to 2.3.15. This flaw allows for cross site scripting, enabling remote attackers to execute unauthorized scripts in the context of a user’s session. The issue has been publicly disclosed, and exploitat...
PoC for CVE-2026-41456
A reflected cross-site scripting vulnerability exists in the search plugin of Bludit CMS prior to the commit 6732dde. This issue allows unauthenticated attackers to craft malicious search queries that inject arbitrary JavaScript. When users visit impacted URLs, these scripts can be executed in th...
PoC for CVE-2026-6744
A security issue has been identified in Bagisto, specifically affecting the Downloadable Link Handler component. This vulnerability allows an attacker to perform server-side request forgery (SSRF) attacks, which can be exploited remotely. The flaw allows malicious users to send crafted requests t...
PoC for CVE-2026-6743
A cross site scripting vulnerability was identified in the Calendar component of WebSystems WebTOTUM 2026. This issue allows attackers to execute malicious scripts in the context of the user's session, potentially leading to data theft or session hijacking. The attack can be initiated remotely, m...
PoC for CVE-2019-25714
Seeyon OA A8 is vulnerable to an unauthenticated arbitrary file write issue within the /seeyon/htmlofficeservlet endpoint. This vulnerability allows remote attackers to send specially crafted POST requests containing base64-encoded payloads, enabling them to write arbitrary files to the web appli...
PoC for CVE-2019-25714
Seeyon OA A8 is vulnerable to an unauthenticated arbitrary file write issue within the /seeyon/htmlofficeservlet endpoint. This vulnerability allows remote attackers to send specially crafted POST requests containing base64-encoded payloads, enabling them to write arbitrary files to the web appli...
Discovered 2 days ago
PoC for CVE-2026-2600
The ElementsKit Elementor Addons and Templates plugin for WordPress is susceptible to a stored Cross-Site Scripting vulnerability due to insufficient input sanitization and output escaping on the 'ekit_tab_title' parameter within the Simple Tab widget. Authenticated users with contributor-level a...
PoC for CVE-2025-68999
A significant SQL injection vulnerability exists in the Happy Addons for Elementor plugin developed by HappyMonster. This flaw enables attackers to potentially execute unauthorized SQL commands by exploiting improper neutralization of special elements in SQL queries. Affected versions include all...
PoC for CVE-2026-6662
A vulnerability in the ericc-ch copilot-api prior to version 0.7.0 affects the CORS function in the Token Endpoint, found in the src/server.ts file. This flaw allows for a permissive cross-domain policy that can be exploited by untrusted domains, enabling remote attacks. Attackers can manipulate ...
PoC for CVE-2025-32711
The M365 Copilot product from Microsoft is susceptible to an information disclosure vulnerability that permits unauthorized attackers to disclose sensitive information over a network. This defect stems from a command injection flaw within the AI functionalities of M365 Copilot, emphasizing the ne...
PoC for CVE-2026-6650
A vulnerability has been identified in Z-BlogPHP version 1.7.5, specifically in the App::UnPack function within the app_upload.php file of the ZBA File Handler component. This flaw permits an attacker to upload files without any restriction, which can lead to serious security breaches. The vulner...
Discovered 3 days ago
PoC for CVE-2026-34429
The Vvveb product prior to version 1.0.8.1 contains a stored cross-site scripting vulnerability. This issue allows authenticated users with media upload and rename permissions to exploit the application by executing arbitrary JavaScript. The vulnerability arises from the ability to bypass MIME ty...
PoC for CVE-2026-6649
A vulnerability exists in Qibo CMS 1.0 that enables an attacker to exploit the system through manipulated arguments to the /index/image/headers file. This can lead to server-side request forgery, allowing unauthorized remote access to internal services not intended for exposure. The vulnerability...
PoC for CVE-2026-6648
A security vulnerability has been discovered in the Internal Message Module of Qibo CMS 1.0, which allows for potential cross-site scripting (XSS) attacks. This vulnerability enables remote attackers to execute arbitrary scripts in the context of a user's session. The exploit has been publicly di...
PoC for CVE-2026-6636
A path traversal vulnerability has been identified in the p2r3 Convert API, specifically within the Bun.serve function of the buildCache.js file. This vulnerability is triggered by manipulating the pathname argument, allowing attackers to exploit the system remotely. The exploit has been made pub...
PoC for CVE-2026-6635
A vulnerability has been identified in Rowboat Labs' Rowboat, specifically in the tools_webhook component. The issue lies within the tool_call function in the apps/experimental/tools_webhook/app.py file, where manipulation of the X-Tools-JWE argument can lead to improper authentication. This coul...
PoC for CVE-2015-5254
Apache ActiveMQ versions prior to 5.13.0 contain a vulnerability that permits remote attackers to execute arbitrary code. This occurs due to inadequate restrictions on the classes that may be serialized within the broker, specifically through a crafted serialized Java Message Service (JMS) Object...
PoC for CVE-2026-6634
A vulnerability exists in Usememos Memos versions up to 0.22.1 due to improper authorization in the memos_access_token function located in the UpdateInstanceSetting component (src/App.tsx). This weakness allows attackers to manipulate arguments such as additionalStyle and additionalScript, enabli...
PoC for CVE-2026-6633
A security issue has been identified in Yifang CMS versions up to 2.0.5, specifically within the Extended Management Module. This vulnerability resides in the 'store' function found in 'plugins/yifang_backend_account/logic/admin/L_rbac_admin.php'. Attackers can exploit this flaw to execute cross-...
PoC for CVE-2026-6632
A vulnerability exists in the Tenda F451 router affecting the SafeClientFilter functionality. Specifically, the fromSafeClientFilter function located in /goform/SafeClientFilter is susceptible to a buffer overflow due to improper handling of the 'menufacturer/Go' argument. This vulnerability perm...
PoC for CVE-2026-6631
A buffer overflow vulnerability exists in the Tenda F451 Router, specifically in the httpd component's fromwebExcptypemanFilter function. This vulnerability arises from improper handling of the 'page' argument, allowing attackers to manipulate it and potentially execute arbitrary code. The exploi...
PoC for CVE-2026-6630
A buffer overflow vulnerability exists in the Tenda F451 router due to improper handling of the 'dips' argument in the fromGstDhcpSetSer function within the httpd component. Attackers can exploit this vulnerability remotely, which may lead to unauthorized access and manipulation of the affected r...
PoC for CVE-2026-6629
A SQL injection vulnerability exists in the Metasoft 美特软件 MetaCRM within the function Statement.executeUpdate in sql.jsp. This issue allows attackers to manipulate SQL commands through the application, potentially leading to unauthorized access to sensitive data. The flaw can be exploited remotel...
PoC for CVE-2026-6628
A security flaw exists in phili67 Ecclesia CRM versions up to 8.0.0, impacting the ValidateInput function located in the /v2/query/view/ path of the Query Viewer Component. By manipulating the 'custom' parameter, an attacker can exploit this vulnerability to execute SQL injection attacks. This ex...
PoC for CVE-2026-6626
A significant vulnerability has been identified in Cockpit-HQ Cockpit versions up to 2.13.5, specifically within the Asset Handler and Aggregate Handler components. This flaw involves improper neutralization within data query logic, which could potentially be exploited by remote attackers. Despit...
PoC for CVE-2026-6625
A vulnerability has been identified in Mogu Blog v2 up to version 5.2, specifically in the LocalFileServiceImpl.uploadPictureByUrl function. This flaw allows attackers to exploit the Picture Storage Service, potentially initiating a server-side request forgery (SSRF) attack remotely. The nature o...