Publicly Disclosed
PoC Exploits

🔴 Alway take caution when working with PoC Exploits 🔴

Discovered just now...

PoC for CVE-2026-41651

PackagekitPackagekit8.8HIGH
D-Bus Abstraction Layer Vulnerability in PackageKit from Vendor Pac...

A vulnerability exists in PackageKit, specifically in versions 1.0.2 to 1.3.4, allowing unprivileged users to exploit a time-of-check time-of-use (TOCTOU) race condition. This flaw enables attackers to manipulate transaction flags, facilitating the installation of arbitrary RPM packages as root w...

Discovered 3 hours ago

PoC for CVE-2025-55177

FacebookWhatSAPp Desktop For Mac5.4MEDIUM
Incomplete Authorization in WhatsApp for iOS and Mac Linked Device ...

A vulnerability in WhatsApp allows unauthorized users to exploit incomplete authorization of linked device synchronization messages. This affects multiple versions of WhatsApp on iOS and Mac, enabling attackers to potentially trigger the processing of content from arbitrary URLs on targeted devic...

Discovered 4 hours ago

PoC for CVE-2011-2523

VsftpdVsftpd🟣 EPSS 94%9.8CRITICAL
Backdoor Vulnerability in vsftpd 2.3.4 by Academy of Linux

A serious backdoor vulnerability was discovered in vsftpd 2.3.4, affecting downloads made between June 30 and July 3, 2011. This vulnerability allows an attacker to exploit the software and open a remote shell on port 6200/tcp, granting unauthorized access to the system. It poses significant risk...

PoC for CVE-2026-25895

FrangoteamFuxa9.5CRITICAL
Path Traversal Vulnerability in FUXA Process Visualization Software

FUXA, a web-based Process Visualization software, is vulnerable to a path traversal flaw that permits an unauthenticated attacker to write files to arbitrary locations on the server's filesystem. This allows malicious actors to potentially compromise server integrity and execute unauthorized acti...

Discovered 5 hours ago

PoC for CVE-2025-47812

WftpserverWing Ftp Server🟣 EPSS 92%10CRITICAL
Remote Code Execution Vulnerability in Wing FTP Server

In Wing FTP Server prior to version 7.4.4, both user and admin web interfaces improperly handle null ('\0') bytes, which can lead to the injection of arbitrary Lua code into user session files. This vulnerability enables attackers to execute arbitrary system commands with the privileges of the FT...

Discovered 14 hours ago

PoC for CVE-2026-41473

UsmannasirCyberpanel8.8HIGH
Authentication Bypass Vulnerability in CyberPanel by Etherparty

CyberPanel versions before 2.4.4 are exposed to an authentication bypass vulnerability that affects the AI Scanner worker API endpoints. This flaw enables unauthenticated remote attackers to gain unauthorized access and potentially write arbitrary data to the database. By manipulating requests se...

Discovered 15 hours ago

PoC for CVE-2026-41651

PackagekitPackagekit8.8HIGH
D-Bus Abstraction Layer Vulnerability in PackageKit from Vendor Pac...

A vulnerability exists in PackageKit, specifically in versions 1.0.2 to 1.3.4, allowing unprivileged users to exploit a time-of-check time-of-use (TOCTOU) race condition. This flaw enables attackers to manipulate transaction flags, facilitating the installation of arbitrary RPM packages as root w...

PoC for CVE-2026-3844

WordPressBreeze Cache9.8CRITICAL
Arbitrary File Upload Vulnerability in Breeze Cache Plugin for Word...

The Breeze Cache plugin for WordPress has a security flaw that allows unauthenticated attackers to perform arbitrary file uploads. This vulnerability is due to inadequate file type validation in the 'fetch_gravatar_from_remote' function. The risk is present in all versions up to 2.4.4, specifical...

Discovered 16 hours ago

PoC for CVE-2026-3844

WordPressBreeze Cache9.8CRITICAL
Arbitrary File Upload Vulnerability in Breeze Cache Plugin for Word...

The Breeze Cache plugin for WordPress has a security flaw that allows unauthenticated attackers to perform arbitrary file uploads. This vulnerability is due to inadequate file type validation in the 'fetch_gravatar_from_remote' function. The risk is present in all versions up to 2.4.4, specifical...

Discovered 19 hours ago

PoC for CVE-2026-39920

Bridgehead SoftwareFilestore9.3CRITICAL
Remote Command Execution Vulnerability in BridgeHead FileStore by B...

BridgeHead FileStore versions prior to 24A are vulnerable due to the exposure of the Apache Axis2 administration module on network-accessible endpoints using default credentials. This allows unauthenticated attackers to gain access to the admin console, upload malicious Java archives as web servi...

PoC for CVE-2026-31429

LinuxLinux
Memory Management Vulnerability in Linux Kernel Affecting skb Heads

In the Linux kernel, a notable vulnerability related to memory management has been identified within the skb (socket buffer) heads concerning allocation and deallocation. The flaw arises when KFENCE is activated, leading to misclassification during the free path of allocated memory objects. Speci...

Discovered 21 hours ago

PoC for CVE-2025-55292

MeshtasticFirmware8.2HIGH
Authentication Bypass Vulnerability in Meshtastic Networking Soluti...

The Meshtastic networking solution presents an authentication bypass vulnerability due to its architecture, where a Node is identified by a NodeID derived from the MAC address instead of its public key. This weakness allows an attacker to exploit the HAM mode, which lacks encryption, and forge No...

Discovered 23 hours ago

PoC for CVE-2023-44487

IetfHttp🟣 EPSS 94%7.5HIGH
HTTP/2 Protocol Vulnerability Allows for Rapid Stream Cancellation ...

The HTTP/2 protocol is susceptible to a denial of service vulnerability that can be exploited via rapid stream resets. This allows attackers to overwhelm servers by rapidly canceling requests, leading to significant resource consumption and potential service disruption. Exploitation of this vulne...

PoC for CVE-2026-3844

WordPressBreeze Cache9.8CRITICAL
Arbitrary File Upload Vulnerability in Breeze Cache Plugin for Word...

The Breeze Cache plugin for WordPress has a security flaw that allows unauthenticated attackers to perform arbitrary file uploads. This vulnerability is due to inadequate file type validation in the 'fetch_gravatar_from_remote' function. The risk is present in all versions up to 2.4.4, specifical...

Discovered 1 day ago

PoC for CVE-2026-34159

Ggml-orgLlama.cpp9.8CRITICAL
Remote Code Execution in llama.cpp - Affected by Insecure RPC Backend

The llama.cpp product has a critical vulnerability in its RPC backend where the deserialize_tensor() function fails to perform proper bounds validation if a tensor's buffer field is set to zero. This oversight allows unauthenticated attackers to exploit the system by reading and writing arbitrary...

PoC for CVE-2025-5880

Whistle TechnologiesWhistle5.3MEDIUM
Path Traversal Vulnerability in Whistle by Whistle Technologies

A vulnerability exists in Whistle version 2.9.98, located in the file /cgi-bin/sessions/get-temp-file, which allows attackers to manipulate the filename argument. This leads to a path traversal issue that may enable unauthorized access to sensitive files on the server. Although the vendor was not...

PoC for CVE-2026-29145

ApacheApache Tomcat9.1CRITICAL
Authentication Flaw in Apache Tomcat and Tomcat Native Software

An authentication flaw exists in Apache Tomcat and Apache Tomcat Native, where the CLIENT_CERT authentication process does not fail as expected under certain configurations when soft fail is disabled. This vulnerability potentially allows unauthorized access in scenarios where proper validation i...

Discovered 2 days ago

PoC for CVE-2026-26210

Kvcache-aiKtransformers9.3CRITICAL
Unsafe Deserialization in KTransformers Affects Backend Security

KTransformers version 0.5.3 and earlier contains a serious vulnerability in its balance_serve backend that allows unsafe deserialization through the scheduler RPC server. The ZMQ ROUTER socket is bound to all network interfaces without proper authentication, enabling attackers to exploit this fla...

PoC for CVE-2026-6942

RadareorgRadare29.3CRITICAL
OS Command Injection Vulnerability in radare2-mcp Software by Radar...

The radare2-mcp software, specifically version 1.6.0 and earlier, is susceptible to an os command injection vulnerability that allows remote attackers to execute arbitrary commands. This is done by circumventing command filters through the use of shell metacharacters within user-controlled input ...

PoC for CVE-2026-6941

RadareorgRadare26.9MEDIUM
Path Traversal Vulnerability in radare2 Affects Project Notes Handling

radare2, prior to version 6.1.4, is susceptible to a path traversal vulnerability affecting its project notes handling feature. By exploiting a crafted .zrp archive containing a symlinked notes.txt file, an attacker can circumvent directory confinement measures. This can lead to unauthorized file...

PoC for CVE-2026-6940

RadareorgRadare26.9MEDIUM
Path Traversal Vulnerability in radare2 by radareorg

The radare2 tool, prior to version 6.1.4, contains a path traversal vulnerability related to project deletion. This flaw enables local attackers to exploit absolute paths, allowing for the recursive deletion of directories outside the configured project storage boundary. By manipulating the proje...

PoC for CVE-2026-25874

Hugging FaceLerobot9.3CRITICAL
Unsafe Deserialization Issue in LeRobot by Hugging Face

LeRobot has a vulnerability that allows attackers to exploit unsafe deserialization within its async inference pipeline. The misuse of pickle.loads() for data deserialization over unauthenticated gRPC channels poses a significant risk. Attackers can send maliciously crafted pickle payloads throug...

PoC for CVE-2026-23751

Tungsten AutomationKofax Capture9.3CRITICAL
Unprotected .NET Remoting Channel in Kofax Capture by Tungsten Auto...

Kofax Capture exposes a deprecated .NET Remoting HTTP channel on port 2424, accessible without authentication. This vulnerability allows an unauthenticated remote attacker to utilize .NET Remoting techniques to manipulate various system objects. By leveraging these techniques, attackers may read ...

PoC for CVE-2026-32201

MicrosoftMicrosoft Sharepoint E...6.5MEDIUM
Spoofing Vulnerability in Microsoft Office SharePoint

An input validation issue in Microsoft Office SharePoint facilitates unauthorized spoofing attacks over the network. Attackers can exploit this vulnerability to impersonate legitimate users, potentially leading to unauthorized access and data breaches. Proper validation mechanisms must be in plac...

PoC for CVE-2026-4512

WordPressRecaptcha By Webdesignby3.5LOW
Cross-Site Scripting in reCaptcha Plugin for WordPress by WebDesignBy

The reCaptcha plugin developed by WebDesignBy for WordPress prior to version 2.0 is vulnerable to Cross-Site Scripting (XSS). The vulnerability arises from improper sanitization and escaping of the Site Key setting, which is outputted directly in a JavaScript context within the grecaptcha_js() fu...

PoC for CVE-2026-4106

WordPressHt Mega Addons For Ele...5.3MEDIUM
Unauthenticated Data Exposure in HT Mega Addons for Elementor Plugin

The HT Mega Addons for Elementor plugin prior to version 3.0.7 contains a vulnerability where an unauthenticated AJAX action exposes personally identifiable information (PII) of customers who have made orders within the last week. This includes sensitive information such as full names, city, stat...

PoC for CVE-2026-6878

BytedanceVerl6.3MEDIUM
Sandbox Vulnerability in ByteDance Product Versions

A vulnerability exists in the ByteDance verl product versions up to 0.7.0, specifically within the 'math_equal' function located in 'prime_math/grader.py'. This flaw allows for a potential sandbox escape, which could be exploited remotely. Although the complexity of executing an attack is relativ...

PoC for CVE-2026-6874

Ericc-chCopilot-api5.3MEDIUM
DNS Rebinding Vulnerability in Ericc-ch Copilot-API up to Version 0...

A vulnerability exists in the Ericc-ch Copilot-API up to version 0.7.0, which affects the Header Handler component in the /token file. This issue allows an attacker to manipulate the Host argument, which may result in unintended reliance on reverse DNS resolution. Such an exploit can be executed ...

Discovered 3 days ago

PoC for CVE-2026-40517

RadareorgRadare28.4HIGH
Command Injection in Radare2 PDB Parser Affecting Radare2 Software

Radare2 versions prior to 6.1.4 are susceptible to a command injection flaw within the PDB parser’s print_gvars() function. This vulnerability arises when an attacker crafts a malicious PDB file that incorporates newline characters within the symbol names. Through this manipulation, arbitrary com...

PoC for CVE-2017-0144

MicrosoftWindows Smb🟣 EPSS 94%8.8HIGH
Remote Code Execution Vulnerability in Microsoft Windows SMBv1

The SMBv1 protocol in various Microsoft Windows operating systems contains a vulnerability that enables remote attackers to execute arbitrary code by sending specially crafted packets to the server. This issue affects multiple versions of Windows, including desktop and server editions, allowing e...

PoC for CVE-2019-15107

WebminWebmin🟣 EPSS 94%9.8CRITICAL
Command Injection Vulnerability in Webmin by Guildford Software

Webmin versions up to 1.920 are susceptible to a command injection vulnerability through the 'old' parameter in the password_change.cgi script. An unauthenticated attacker can exploit this flaw to execute arbitrary commands on the server. This may lead to unauthorized access or further compromise...

PoC for CVE-2026-41459

ThexerteprojectXerteonlinetoolkits6.9MEDIUM
Information Disclosure Vulnerability in Xerte Online Toolkits by Xerte

Xerte Online Toolkits versions 3.15 and earlier are susceptible to an information disclosure flaw that permits unauthorized users to obtain the complete server-side filesystem path of the application root. By issuing a GET request to the /setup endpoint, attackers can exploit this vulnerability t...

PoC for CVE-2026-41469

BeghelliSicuroweb (sicuro24)5.1MEDIUM
Content Security Policy Bypass in Beghelli Sicuro24 SicuroWeb

The Beghelli Sicuro24 SicuroWeb application lacks a robust Content Security Policy (CSP), which exposes it to significant security risks. This failure allows attackers to load unauthorized external JavaScript resources, potentially leading to the execution of arbitrary remote payloads. When combi...

PoC for CVE-2026-41469

BeghelliSicuroweb (sicuro24)5.1MEDIUM
Content Security Policy Bypass in Beghelli Sicuro24 SicuroWeb

The Beghelli Sicuro24 SicuroWeb application lacks a robust Content Security Policy (CSP), which exposes it to significant security risks. This failure allows attackers to load unauthorized external JavaScript resources, potentially leading to the execution of arbitrary remote payloads. When combi...

PoC for CVE-2019-2215

GoogleAndroid🟣 EPSS 51%7.8HIGH
Use-After-Free Vulnerability in Android Binder Leading to Elevation...

A use-after-free vulnerability exists in the Android Binder service, which could allow attackers to elevate privileges from an application to the Linux Kernel. Exploitation of this vulnerability does not require any interaction from the user; however, it necessitates either the installation of a ...

PoC for CVE-2024-58344

94cbCarbon Forum5.1MEDIUM
Persistent Cross-Site Scripting in Carbon Forum 5.9.0 by Carbon Forum

Carbon Forum version 5.9.0 is susceptible to a persistent cross-site scripting vulnerability. This flaw enables authenticated administrators to insert malicious JavaScript code via the Forum Name field within the dashboard settings. When the malicious script is stored, it can be executed in the b...

PoC for CVE-2018-25272

ElbaElba59.3CRITICAL
Remote Code Execution Vulnerability in ELBA5 by ELBA

The ELBA5 version 5.8.0 contains a significant vulnerability that enables remote code execution through improper database access. Attackers can leverage default connector credentials to connect to the database, potentially retrieving sensitive information, such as database administrator passwords...

PoC for CVE-2018-25271

TextpadTextpad6.9MEDIUM
Denial of Service in TextPad 8.1.2 by Long Buffer Input

TextPad 8.1.2 contains a denial of service vulnerability that enables local attackers to crash the application by providing an overly long buffer string via the Run command interface. By submitting a 5000-byte payload into the Command field through Tools > Run, the application is susceptible to a...

PoC for CVE-2018-25270

ThinkPHPThinkPHP9.3CRITICAL
Remote Code Execution Vulnerability in ThinkPHP 5.0.23 by TopThink

ThinkPHP 5.0.23 has a vulnerability that allows unauthorized attackers to execute arbitrary PHP code remotely. This occurs through the manipulation of the routing parameters, where attackers can craft specific requests targeting the index.php endpoint. By supplying malicious function parameters, ...

PoC for CVE-2018-25269

IcewarpIcewarp Client5.1MEDIUM
Cross-Site Scripting Vulnerability in ICEWARP Email Client

ICEWARP version 11.0.0.0 is susceptible to a cross-site scripting (XSS) vulnerability that allows attackers to inject malicious HTML content into emails. By utilizing base64-encoded payloads embedded in object and embed tags, attackers can craft emails containing data URIs that execute embedded s...

PoC for CVE-2018-25268

LizardsystemsLanspy8.6HIGH
Local Buffer Overflow in LanSpy 2.0.1.159 by Lizard Systems

LanSpy version 2.0.1.159 is susceptible to a local buffer overflow vulnerability. This issue arises when attackers provide oversized input to the scan field, allowing them to overwrite the instruction pointer. By crafting a specific payload composed of 688 bytes of padding followed by 4 bytes of ...

PoC for CVE-2018-25267

UltraisoUltraiso6.9MEDIUM
Local Buffer Overflow in UltraISO by UltraISO Development Team

UltraISO 9.7.1.3519 is prone to a local buffer overflow vulnerability within the Output FileName field of the Make CD/DVD Image dialog. This flaw can be exploited by attackers who craft a malicious filename string containing 304 bytes of data followed by specially constructed SEH record overwrite...

PoC for CVE-2018-25266

AngryipAngry Ip Scanner6.9MEDIUM
Buffer Overflow Vulnerability in Angry IP Scanner by Angry IP

Angry IP Scanner version 3.5.3 is susceptible to a buffer overflow vulnerability within its preferences dialog. This flaw enables local attackers to induce a denial of service by submitting an oversized string. The vulnerability can be exploited by creating a file filled with repeating characters...

PoC for CVE-2018-25265

LizardsystemsLanspy8.6HIGH
Local Buffer Overflow Vulnerability in LanSpy by Lizard Systems

LanSpy 2.0.1.159 has a local buffer overflow vulnerability in the scanning functionality that enables local attackers to execute arbitrary code. This is achieved through exploitation of the structured exception handling (SEH) mechanisms, allowing attackers to craft malicious payloads utilizing eg...

PoC for CVE-2018-25262

AngryipAngry Ip Scanner For L...6.9MEDIUM
Denial of Service Vulnerability in Angry IP Scanner for Linux

Angry IP Scanner for Linux version 3.5.3 has a denial of service vulnerability that can be exploited by local attackers. By inputting a specially crafted malicious string into the port selection field within the application, an attacker can trigger a buffer overflow, leading to an unexpected appl...

PoC for CVE-2018-25261

IperiusbackupIperius Backup8.6HIGH
Local Buffer Overflow in Iperius Backup by Iperius

Iperius Backup 5.8.1 features a local buffer overflow vulnerability in its structured exception handling (SEH) mechanism. This vulnerability allows local attackers to execute arbitrary code by providing a manipulated file path. By crafting a specific payload in the external file location field wh...

PoC for CVE-2018-25260

MagixMagix Music Editor8.6HIGH
Buffer Overflow Vulnerability in MAGIX Music Editor by MAGIX

MAGIX Music Editor 3.1 is susceptible to a buffer overflow vulnerability in its FreeDB Proxy Options dialog. This vulnerability allows local attackers to execute arbitrary code through misuse of structured exception handling. By crafting a malicious payload and entering it into the Server field v...

PoC for CVE-2018-25259

LizardsystemsTerminal Services Manager8.6HIGH
Stack-Based Buffer Overflow in Terminal Services Manager by LizardS...

Terminal Services Manager 3.1 has a stack-based buffer overflow vulnerability in the computer names field, which can be exploited by local attackers. By crafting a specially formatted input file containing shellcode and jump instructions, attackers can overwrite the structured exception handler (...

PoC for CVE-2026-30368

Lightspeed SystemsLightspeed Classroom
Client-Side Authorization Flaw in Lightspeed Classroom by Lightspee...

A significant client-side authorization flaw in Lightspeed Classroom version 5.1.2.1763770643 allows unauthenticated attackers to exploit weaknesses in integrity checks. By abusing client-generated authorization tokens, these attackers can impersonate legitimate users, resulting in unauthorized c...

PoC for CVE-2026-25604

ApacheApache Airflow Provide...5.4MEDIUM
SAML Authentication Bypass in AWS Auth Manager by Apache

A vulnerability exists in AWS Auth Manager where the SAML authentication origin is utilized as provided by the client, without verification against the actual instance URL. This flaw potentially allows unauthorized access to different instances that may enforce diverse access controls, as attacke...