Publicly Disclosed
PoC Exploits

🔴 Alway take caution when working with PoC Exploits 🔴

Discovered just now...

PoC for CVE-2024-21907

7.5HIGH
Vulnerability in Newtonsoft.Json Affects Denial of Service

Prior to version 13.0.1, Newtonsoft.Json is susceptible to a vulnerability related to improper handling of exceptional conditions. An unauthenticated remote attacker can exploit the JsonConvert.DeserializeObject method by passing carefully crafted data, potentially leading to a StackOverflow exce...

PoC for CVE-2021-21425

GetgravGrav-plugin-admin🟣 EPSS 92%9.3CRITICAL
Unauthenticated Arbitrary YAML Write/Update leads to Code Execution

Grav Admin Plugin is an HTML user interface that provides a way to configure Grav and create and modify pages. In versions 1.10.7 and earlier, an unauthenticated user can execute some methods of administrator controller without needing any credentials. Particular method execution will result in a...

Discovered 2 hours ago

PoC for CVE-2026-20224

CiscoCisco Catalyst Sd-wan ...8.6HIGH
XML External Entity Exposure in Cisco Catalyst SD-WAN Manager

A vulnerability in the web UI of Cisco Catalyst SD-WAN Manager could enable a remote, unauthenticated attacker to read arbitrary files on the affected system. This issue arises from inadequate handling of XML External Entities (XXE) during XML file parsing. An attacker can exploit this flaw by se...

Discovered 4 hours ago

PoC for CVE-2023-44487

IetfHttp🟣 EPSS 94%7.5HIGH
HTTP/2 Protocol Vulnerability Allows for Rapid Stream Cancellation ...

The HTTP/2 protocol is susceptible to a denial of service vulnerability that can be exploited via rapid stream resets. This allows attackers to overwhelm servers by rapidly canceling requests, leading to significant resource consumption and potential service disruption. Exploitation of this vulne...

Discovered 8 hours ago

PoC for CVE-2021-47968

PodcastgeneratorPodcast Generator5.1MEDIUM
Persistent Cross-Site Scripting Vulnerability in Podcast Generator ...

Podcast Generator version 3.1 contains a vulnerability that allows authenticated users to inject malicious JavaScript code via the long_description parameter. By exploiting this flaw, attackers can formulate episode creation or editing requests that execute arbitrary scripts when other users acce...

PoC for CVE-2021-47967

TimeclockPHP Timeclock5.1MEDIUM
Cross-Site Scripting Vulnerabilities in PHP Timeclock by SourceForge

PHP Timeclock version 1.04 has multiple vulnerabilities that enable unauthenticated individuals to exploit cross-site scripting (XSS) weaknesses. Attackers can manipulate URL paths and POST parameters to inject arbitrary JavaScript into various endpoints, such as login.php, timeclock.php, audit.p...

PoC for CVE-2021-47966

TimeclockPHP Timeclock8.8HIGH
SQL Injection Vulnerability in PHP Timeclock by SourceForge

PHP Timeclock 1.04 is vulnerable to time-based and boolean-based blind SQL injection due to insufficient input validation in the login_userid parameter of login.php. This allows unauthenticated attackers to execute crafted SQL queries, enabling them to retrieve sensitive information from the data...

PoC for CVE-2021-47965

WordPressWP Super Edit9.3CRITICAL
Unrestricted File Upload Vulnerability in WP Super Edit by WordPress

The WP Super Edit plugin versions 2.5.4 and earlier for WordPress is susceptible to an unrestricted file upload vulnerability in the FCKeditor component. This security flaw allows unauthorized users to upload potentially malicious files to the server via the filemanager upload endpoint. The lack ...

PoC for CVE-2021-47964

SchlixSchlix Cms8.7HIGH
Remote Code Execution Vulnerability in Schlix CMS by Schlix

Schlix CMS version 2.2.6-6 is susceptible to a remote code execution flaw that can be exploited by authenticated attackers. By uploading specially crafted ZIP files containing malicious PHP code via the block manager, attackers can execute arbitrary code. This is triggered when the malicious code...

PoC for CVE-2021-47963

AnothernoteAnote5.1MEDIUM
Persistent Cross-Site Scripting in Anote Product by AnotherNote

Anote 1.0 suffers from a persistent cross-site scripting vulnerability that enables attackers to inject malicious JavaScript payloads into markdown files stored within the application. When these files are accessed, the malicious code can execute arbitrary commands on the victim’s system, leading...

PoC for CVE-2021-47962

SavsoftsSavsoft Quiz5.1MEDIUM
Persistent Cross-Site Scripting in Savsoft Quiz 5.0

Savsoft Quiz 5.0 is vulnerable to a persistent cross-site scripting flaw in the user account settings page. This security issue allows authenticated attackers to inject harmful HTML and JavaScript code into user profile fields via the edit_user endpoint. As a result, malicious script payloads can...

PoC for CVE-2021-47959

WordPressWPgraphql8.7HIGH
Denial of Service Vulnerability in WPGraphQL Plugin for WordPress

The WPGraphQL Plugin, specifically version 1.3.5, is susceptible to a denial of service vulnerability. This flaw enables unauthenticated attackers to deplete server resources using maliciously crafted batched GraphQL queries with duplicate fields. By sending POST requests that exploit field dupli...

PoC for CVE-2021-47958

CouchcmsCouchcms5.3MEDIUM
Server-Side Request Forgery Vulnerability in CouchCMS by CouchCMS

CouchCMS 2.2.1 contains a vulnerability that enables authenticated attackers to exploit server-side request forgery through the malicious upload of SVG files. By leveraging the browse.php endpoint, attackers can upload SVG files that include external entity references, allowing unauthorized HTTP ...

PoC for CVE-2026-8181

WordPressBurst Statistics – Pri...9.8CRITICAL
Authentication Bypass Vulnerability in Burst Statistics Plugin for ...

The Burst Statistics plugin for WordPress contains a security flaw that allows unauthenticated attackers to exploit incorrect handling of return values in the authentication process. This leads to a vulnerability in the `is_mainwp_authenticated()` function, enabling attackers who know an administ...

Discovered 10 hours ago

PoC for CVE-2026-0745

WordPressUser Language Switch5.5MEDIUM
Server-Side Request Forgery Vulnerability in User Language Switch P...

The User Language Switch plugin for WordPress allows authenticated users with Administrator-level access or higher to exploit a vulnerability in the 'download_language()' function. Due to insufficient URL validation, attackers can perform Server-Side Request Forgery, enabling them to initiate web...

Discovered 13 hours ago

PoC for CVE-2026-44578

VercelNext.js8.6HIGH
Server-Side Request Forgery Vulnerability in Next.js Framework by V...

The Next.js framework, utilized for building web applications, is exposed to a server-side request forgery vulnerability when using versions from 13.4.13 up to but not including 15.5.16 and 16.2.5. This flaw arises when self-hosted applications that employ the built-in Node.js server allow attack...

Discovered 15 hours ago

PoC for CVE-2026-42154

PrometheusPrometheus7.5HIGH
Memory Allocation Vulnerability in Prometheus Monitoring System

Prometheus, a widely used open-source monitoring system and time series database, had a vulnerability in its remote read endpoint (/api/v1/read) prior to versions 3.5.3 and 3.11.3. This issue stemmed from a lack of validation for the declared decoded length in snappy-compressed request bodies. As...

Discovered 16 hours ago

PoC for CVE-2026-44338

MervinpraisonPraisonai7.3HIGH
Flask API Server Vulnerability in PraisonAI from Multi-Agent Teams ...

PraisonAI, a multi-agent teams system, includes a legacy Flask API server with authentication disabled by default in versions 2.5.6 through 4.6.34. This vulnerability allows unauthorized users who can access the server to view and trigger workflows via the /agents endpoint and the /chat interface...

Discovered 17 hours ago

PoC for CVE-2026-42945

F5Nginx Plus9.2CRITICAL
Heap Buffer Overflow in NGINX Plus and NGINX Open Source Affecting ...

A vulnerability exists in the ngx_http_rewrite_module of NGINX Plus and NGINX Open Source, triggered when a rewrite directive is followed by an if or set directive that includes a Perl-Compatible Regular Expression (PCRE) capture and a replacement string with a question mark. Attackers can exploi...

Discovered 21 hours ago

PoC for CVE-2023-23752

JoomlaJoomla! Cms🟣 EPSS 95%5.3MEDIUM
Unauthorized Access to Webservice Endpoints in Joomla 4.0.0 through...

An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.

PoC for CVE-2020-17103

MicrosoftWindows 10 Version 20h27HIGH
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulne...

Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17134, CVE-2020-17136.

Discovered 1 day ago

PoC for CVE-2026-1814

Rapid7Insightvm/nexpose6.8MEDIUM
Insufficient Entropy in Rapid7 Nexpose Affects Password Security

Rapid7 Nexpose versions 6.4.50 and later are affected by an insufficient entropy vulnerability in the CredentialsKeyStorePassword.generateRandomPassword() method. When legacy keystore passwords are updated, the application generates a new password that is inadequately protected, with a length of ...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-6145

WordPressUser Registration & Me...5.3MEDIUM
User Registration & Membership Plugin Vulnerability in WordPress

The User Registration & Membership plugin for WordPress is susceptible to a Missing Authorization vulnerability. This flaw arises from the is_admin_creation_process() method, which solely depends on the action=createuser parameter present in the $_REQUEST superglobal. It lacks any authentication ...

PoC for CVE-2026-42945

F5Nginx Plus9.2CRITICAL
Heap Buffer Overflow in NGINX Plus and NGINX Open Source Affecting ...

A vulnerability exists in the ngx_http_rewrite_module of NGINX Plus and NGINX Open Source, triggered when a rewrite directive is followed by an if or set directive that includes a Perl-Compatible Regular Expression (PCRE) capture and a replacement string with a question mark. Attackers can exploi...

PoC for CVE-2026-8181

WordPressBurst Statistics – Pri...9.8CRITICAL
Authentication Bypass Vulnerability in Burst Statistics Plugin for ...

The Burst Statistics plugin for WordPress contains a security flaw that allows unauthenticated attackers to exploit incorrect handling of return values in the authentication process. This leads to a vulnerability in the `is_mainwp_authenticated()` function, enabling attackers who know an administ...

PoC for CVE-2021-22204

ExiftoolExiftool🟣 EPSS 93%6.8MEDIUM
Arbitrary Code Execution Vulnerability in ExifTool's DjVu Module

A significant vulnerability exists in ExifTool versions 7.44 and later, where the improper handling of user data within the DjVu file format enables arbitrary code execution. This can occur when malicious images crafted to exploit this flaw are parsed, potentially allowing attackers to execute ha...

PoC for CVE-2026-42945

F5Nginx Plus9.2CRITICAL
Heap Buffer Overflow in NGINX Plus and NGINX Open Source Affecting ...

A vulnerability exists in the ngx_http_rewrite_module of NGINX Plus and NGINX Open Source, triggered when a rewrite directive is followed by an if or set directive that includes a Perl-Compatible Regular Expression (PCRE) capture and a replacement string with a question mark. Attackers can exploi...

PoC for CVE-2026-42945

F5Nginx Plus9.2CRITICAL
Heap Buffer Overflow in NGINX Plus and NGINX Open Source Affecting ...

A vulnerability exists in the ngx_http_rewrite_module of NGINX Plus and NGINX Open Source, triggered when a rewrite directive is followed by an if or set directive that includes a Perl-Compatible Regular Expression (PCRE) capture and a replacement string with a question mark. Attackers can exploi...

PoC for CVE-2026-44403

Wing Ftp ServerWing Ftp Server8.6HIGH
Authenticated Remote Code Execution in Wing FTP Server by Wing FTP

Wing FTP Server version 8.1.2 is impacted by a remote code execution vulnerability resulting from unsafe session serialization. Authenticated administrators can exploit this flaw by injecting arbitrary Lua code through the domain admin mydirectory field. The vulnerability arises because the sessi...

Discovered 2 days ago

PoC for CVE-2026-42945

F5Nginx Plus9.2CRITICAL
Heap Buffer Overflow in NGINX Plus and NGINX Open Source Affecting ...

A vulnerability exists in the ngx_http_rewrite_module of NGINX Plus and NGINX Open Source, triggered when a rewrite directive is followed by an if or set directive that includes a Perl-Compatible Regular Expression (PCRE) capture and a replacement string with a question mark. Attackers can exploi...

PoC for CVE-2026-43644

StefanprodanPodinfo5.1MEDIUM
Reflected Cross-Site Scripting Vulnerability in Podinfo by Stefan P...

Podinfo versions up to 6.11.2 are vulnerable to a reflected cross-site scripting (XSS) flaw in the /echo and /api/echo endpoints. The vulnerability arises from the echoHandler writing request body content directly to the response without the appropriate Content-Type or X-Content-Type-Options head...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-40369

MicrosoftWindows 11 Version 24h27.8HIGH
Windows Kernel Elevation of Privilege Vulnerability in Microsoft Pr...

A vulnerability in the Windows Kernel allows an authorized attacker to exploit an untrusted pointer dereference, potentially enabling them to gain higher privileges on the affected system. This could lead to unauthorized access to sensitive data and administrative functionalities. It's critical f...

PoC for CVE-2026-43284

LinuxLinux8.8HIGH
Vulnerability in Linux Kernel Affects Shared skb Fragments

A vulnerability exists in the Linux kernel that concerns the handling of shared skb fragments during the decryption process in ESP-in-UDP packets. When pages are attached from a pipe directly to an skb using MSG_SPLICE_PAGES, the kernel marked these SKBs with SKBFL_SHARED_FRAG, which plays a cruc...

PoC for CVE-2026-2005

PostgreSQLPostgresql8.8HIGH
Heap Buffer Overflow in PostgreSQL pgcrypto Affects Multiple Versions

The pgcrypto module in PostgreSQL contains a heap buffer overflow vulnerability that can be exploited by a ciphertext provider. This vulnerability allows an attacker to execute arbitrary code within the context of the operating system user that is running the database. Importantly, this affects v...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-0073

GoogleAndroid8.8HIGH
Logic Error in Wireless ADB Authentication in Android Products

A significant logic error in the adbd_tls_verify_cert function of auth.cpp in various Android versions permits a bypass of the wireless ADB mutual authentication process. This flaw can lead to unauthorized remote code execution by exploiting the vulnerability as the shell user without requiring a...

PoC for CVE-2026-8196

JeecgJeecgboot6.3MEDIUM
Authorization Bypass Vulnerability in JeecgBoot by Jeecg

A vulnerability has been identified in JeecgBoot 3.9.1 involving an unknown function in the LoginController, specifically related to the mLogin Endpoint. This flaw enables an attacker to bypass authorization mechanisms, allowing for unauthorized access. The vulnerability can be exploited remotely...

PoC for CVE-2026-44578

VercelNext.js8.6HIGH
Server-Side Request Forgery Vulnerability in Next.js Framework by V...

The Next.js framework, utilized for building web applications, is exposed to a server-side request forgery vulnerability when using versions from 13.4.13 up to but not including 15.5.16 and 16.2.5. This flaw arises when self-hosted applications that employ the built-in Node.js server allow attack...

Discovered 3 days ago

PoC for CVE-2020-37226

JoomskyJ2 Jobs7.1HIGH
Authenticated SQL Injection Vulnerability in Joomla J2 JOBS by Joomla

Joomla J2 JOBS version 1.3.0 is susceptible to an authenticated SQL injection vulnerability that enables authenticated users to alter database queries. This can be achieved through the manipulation of the 'sortby' parameter in POST requests directed at the administrator index. By injecting malici...

PoC for CVE-2020-37225

PowieWhois Domain Check5.1MEDIUM
Persistent Cross-Site Scripting in Powie's WHOIS Domain Check Plugin

Powie's WHOIS Domain Check version 0.9.31 suffers from a persistent cross-site scripting vulnerability, allowing authenticated attackers to inject arbitrary JavaScript into the plugin's settings. By exploiting unsanitized input fields on the pwhois_settings.php configuration page, attackers can s...

PoC for CVE-2020-37224

JoomskyJ2 Jobs7.1HIGH
Authenticated SQL Injection in Joomla J2 JOBS by Joomla

The Joomla J2 JOBS 1.3.0 has a vulnerability that permits authenticated attackers to perform SQL injection through the 'sortby' parameter. By sending crafted POST requests with manipulated 'sortby' values to the administrator index, these attackers can execute unauthorized SQL commands, potential...

PoC for CVE-2020-37223

IobitIobit Uninstaller8.5HIGH
Unquoted Service Path Vulnerability in IObit Uninstaller by IObit

The IObit Uninstaller 9.5.0.15 contains a vulnerability due to its unquoted service path in the IObitUnSvr service. This flaw allows local attackers to exploit the system by placing a malicious executable named 'IObit.exe' in the default installation directory. By restarting the service, attacker...

PoC for CVE-2020-37222

KuicmsKuicms PHP Ee5.1MEDIUM
Persistent Cross-Site Scripting in Kuicms Php EE 2.0

Kuicms Php EE 2.0 features a vulnerability that allows attackers to exploit a persistent cross-site scripting flaw. This vulnerability enables unauthenticated users to inject malicious scripts into the system by crafting specific content submitted through the bbs reply endpoint. When a POST reque...

PoC for CVE-2020-37220

Www.huawei.comHuawei Hg630 Router8.7HIGH
Authentication Bypass Weakness in Huawei HG630 V2 Router

The Huawei HG630 V2 router is susceptible to an authentication bypass flaw that permits unauthenticated attackers to gain administrative control without proper credentials. This is achieved by accessing the device's /api/system/deviceinfo endpoint, which reveals the device's serial number. Malici...

PoC for CVE-2020-37221

Drive-softwareAtomic Alarm Clock8.6HIGH
Stack Overflow Vulnerability in Atomic Alarm Clock by Atomic Software

Atomic Alarm Clock 6.3 has a stack overflow vulnerability that could be exploited by local attackers. By supplying a specially crafted string in the Time Zones Clock configuration's display name textbox, attackers can manipulate the buffer and trigger a structured exception handling overwrite. Th...

PoC for CVE-2020-37219

FabrikarCom Fabrik8.7HIGH
Directory Traversal Vulnerability in Joomla com_fabrik by Fabrikar

The directory traversal vulnerability in Joomla com_fabrik 3.9.11 enables unauthenticated attackers to perform file enumeration. By exploiting the 'onAjax_files' method and manipulating the folder parameter in GET requests, attackers can gain access to system files located outside the designated ...

PoC for CVE-2020-37217

Easy2pilot-v7Easy2pilot5.1MEDIUM
Cross-Site Request Forgery Vulnerability in Easy2Pilot 7 by Easy2Pilot

Easy2Pilot 7 is susceptible to a cross-site request forgery vulnerability that enables attackers to trick authenticated administrators into inadvertently creating new user accounts. By crafting malicious pages with tailored HTML forms that submit POST requests to the admin.php?action=add_user end...

PoC for CVE-2020-37218

HdWPlayerCom HdWPlayer8.8HIGH
SQL Injection Vulnerability in Joomla com_hdwplayer by Joomla

The com_hdwplayer 4.2 component for Joomla is susceptible to an SQL injection flaw located in the search.php file. This vulnerability permits unauthenticated attackers to carry out arbitrary SQL queries through the hdwplayersearch parameter by crafting malicious POST requests. Exploitation of thi...