Publicly Disclosed
PoC Exploits

đź”´ Alway take caution when working with PoC Exploits đź”´

Discovered just now...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

Discovered 2 hours ago

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-7555

ItsourcecodeElectronic Judging System6.9MEDIUM
SQL Injection Vulnerability in itsourcecode Electronic Judging System

A SQL injection vulnerability has been identified in the itsourcecode Electronic Judging System 1.0, specifically within the login.php file. This vulnerability allows an attacker to manipulate the 'Username' argument to execute unauthorized SQL commands. The attack can be initiated remotely, maki...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

Discovered 3 hours ago

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-7554

D-linkM606.3MEDIUM
Password Recovery Weakness in D-Link M60 Router

A vulnerability exists in the D-Link M60 router which affects its password recovery functionality, allowing for potential remote exploitation. This weakness can be exploited through a manipulation of the router's web service, specifically within the /usr/bin/httpd file. Although the complexity of...

Discovered 4 hours ago

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-7553

Code-projectsGym Management System5.1MEDIUM
SQL Injection Vulnerability in Gym Management System by Code-Projects

A critical SQL injection vulnerability exists in the Gym Management System version 1.0, specifically within the file /admin/edit_exercises.php. By manipulating the edit_exercise parameter, an attacker can execute arbitrary SQL queries, potentially compromising the database and extracting sensitiv...

PoC for CVE-2026-7550

SourcecodesterPharmacy Sales And Inv...6.9MEDIUM
SQL Injection Vulnerability in SourceCodester Pharmacy Sales and In...

A SQL injection vulnerability exists in the SourceCodester Pharmacy Sales and Inventory System 1.0, specifically in the '/ajax.php?action=save_customer' endpoint. This vulnerability arises from improper handling of the 'ID' argument, allowing an attacker to manipulate requests and execute arbitra...

Discovered 5 hours ago

PoC for CVE-2026-7549

SourcecodesterPharmacy Sales And Inv...6.9MEDIUM
SQL Injection Vulnerability in SourceCodester Pharmacy Sales and In...

A vulnerability exists in SourceCodester Pharmacy Sales and Inventory System 1.0 that allows attackers to execute SQL commands through manipulated requests to the /ajax.php endpoint, specifically targeting the action=delete_customer function. By altering the ID parameter, an attacker can perform ...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

Discovered 6 hours ago

PoC for CVE-2026-29000

Pac4jPac4j-jwt9.3CRITICAL
Authentication Bypass in JwtAuthenticator of pac4j-jwt by pac4j

The pac4j-jwt library's JwtAuthenticator prior to versions 4.5.9, 5.7.9, and 6.3.3 is susceptible to an authentication bypass that could allow remote adversaries to create forged authentication tokens. By leveraging the server's RSA public key, attackers are able to craft a JWE-wrapped PlainJWT w...

PoC for CVE-2026-7548

TotolinkNr1800x8.7HIGH
Command Injection Vulnerability in Totolink NR1800X Router

A command injection vulnerability exists within the Totolink NR1800X router in version 9.1.0u.6279_B20210910. This vulnerability is located in the function sub_41A68C of the /cgi-bin/cstecgi.cgi file. An attacker can exploit this flaw by manipulating the argument 'setUssd' to execute arbitrary co...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-7546

TotolinkNr1800x9.3CRITICAL
Buffer Overflow Vulnerability in Totolink NR1800X Router

A vulnerability affecting Totolink NR1800X routers has been identified in the find_host_ip function of the lighttpd component. This issue can lead to a stack-based buffer overflow due to improper handling of the Host argument. The vulnerability allows for remote exploitation, posing a significant...

PoC for CVE-2026-7545

SourcecodesterAdvanced School Manage...6.9MEDIUM
SQL Injection Vulnerability in SourceCodester Advanced School Manag...

A weakness exists in the SourceCodester Advanced School Management System 1.0, specifically within the commonController.php file's checkEmail endpoint. This vulnerability allows for SQL injection attacks which can be exploited remotely. Attackers can manipulate input to execute arbitrary SQL quer...

Discovered 7 hours ago

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-7538

TotolinkA8000ru9.3CRITICAL
OS Command Injection in Totolink A8000RU by Totolink

A security flaw exists in the Totolink A8000RU router, specifically in the CGI Handler component located in the file /cgi-bin/cstecgi.cgi. This vulnerability allows an attacker to manipulate the argument 'proto', potentially leading to OS command injection. Remote attackers can exploit this issue...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-7536

Open5GSOpen5gs6.9MEDIUM
Denial of Service Vulnerability in Open5GS by Open5GS

A denial of service vulnerability exists in the Open5GS software, specifically within the BSF component's bsf_sess_add_by_ip_address function. This flaw, which affects versions up to 2.7.7, allows an attacker to manipulate the ipv4Addr argument, leading to potential disruptions in service. The ex...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

Discovered 8 hours ago

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-7513

UttHiper 1200gw8.7HIGH
Buffer Overflow Vulnerability in UTT HiPER 1200GW by UTT

A buffer overflow vulnerability exists in the function strcpy within the /goform/formRemoteControl file of UTT HiPER 1200GW devices. This flaw allows an attacker to execute arbitrary code remotely, potentially compromising the device's security. The issue affects versions of the product up to 2.5...

Discovered 9 hours ago

PoC for CVE-2026-7512

UttHiper 1200gw8.7HIGH
Buffer Overflow Vulnerability in UTT HiPER 1200GW by UTT

A vulnerability exists in the UTT HiPER 1200GW router, specifically in the strcpy function located in the /goform/formUser file. This flaw allows for a buffer overflow condition, which can be exploited by an attacker to execute remote code. Due to the nature of the exploit, it poses a significant...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-7510

OwapDefectdojo5.3MEDIUM
Authorization Bypass in OWASP DefectDojo Affects Remote Attackers

A vulnerability in OWASP DefectDojo affects versions up to 2.55.4, specifically within the Benchmark/Engagement/Product/Survey component. This vulnerability allows attackers to manipulate certain functions, resulting in the potential for an authorization bypass. The exploit can be executed remote...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-7508

BootstrapCms5.3MEDIUM
Code Injection Vulnerability in Bootstrap CMS Products

A vulnerability exists in Bootstrap CMS 0.9.0-alpha related to an insecure function in the Page Creation Handler. This vulnerability allows an attacker to manipulate the argument body, leading to potential code injection. Given that the project has not been maintained for many years, products rel...

Discovered 10 hours ago

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-7506

SourcecodesterHotel Management System6.9MEDIUM
SQL Injection Vulnerability in SourceCodester Hotel Management System

A SQL injection vulnerability has been identified in the SourceCodester Hotel Management System 1.0, specifically within the /index.php/reservation/check function. This flaw allows attackers to manipulate the 'room_type' argument to execute arbitrary SQL commands. The vulnerability can be exploit...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2025-48804

MicrosoftWindows 10 Version 15076.8MEDIUM
Security Bypass Vulnerability in Windows BitLocker by Microsoft

A vulnerability in Windows BitLocker allows attackers to exploit the acceptance of extraneous untrusted data alongside trusted data. This flaw can enable unauthorized access through a physical attack, effectively bypassing critical security features intended to protect data integrity and confiden...

PoC for CVE-2026-7505

NextlevelbuilderGoclaw6.9MEDIUM
Improper Authorization Vulnerability in nextlevelbuilder GoClaw and...

A flaw exists in nextlevelbuilder's GoClaw and GoClaw Lite applications, affecting versions up to 3.8.5. This vulnerability is tied to the RPC Handler component, which allows for improper authorization. An attacker can potentially exploit this vulnerability remotely, leading to unauthorized actio...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-7503

Code-projectsFor Plugin8.7HIGH
Buffer Overflow Vulnerability in Plugin from Code-Projects

A security flaw has been identified in Code-Projects' Plugin, specifically within the function setWiFiMultipleConfig located in the library /lib/cste_modules/wireless.so of the /cgi-bin/cstecgi.cgi file. This vulnerability allows an attacker to manipulate the argument wepkey2, resulting in a buff...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

Discovered 11 hours ago

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...