Publicly Disclosed
PoC Exploits
🔴 Alway take caution when working with PoC Exploits 🔴
Discovered 1 hour ago
PoC for CVE-2025-55182
A remote code execution vulnerability found in React Server Components allows attackers to exploit improperly handled payloads. This issue affects versions 19.0.0 through 19.2.0, compromising server function endpoints through unsafe deserialization of HTTP request payloads. As a result, this flaw...
Discovered 2 hours ago
PoC for CVE-2025-14940
A SQL injection vulnerability exists in Code-Projects Scholars Tracking System 1.0, specifically in the file /admin/delete_user.php. This vulnerability arises from improper handling of the argument ID, allowing attackers to manipulate SQL queries. An adversary can exploit this flaw remotely, enab...
PoC for CVE-2025-14939
A SQL injection vulnerability exists in the Online Appointment Booking System, specifically in the /admin/deletemanager.php file. This vulnerability allows attackers to manipulate the 'managername' argument, which could lead to unauthorized access and manipulation of the database. The exploit can...
PoC for CVE-2025-63353
A vulnerability in FiberHome GPON ONU HG6145F1 RP4423 allows attackers to predict the factory default Wi-Fi password. The device utilizes a deterministic algorithm that derives the pre-shared key from the SSID, enabling unauthorized individuals to gain access to the network simply by observing th...
PoC for CVE-2025-55182
A remote code execution vulnerability found in React Server Components allows attackers to exploit improperly handled payloads. This issue affects versions 19.0.0 through 19.2.0, compromising server function endpoints through unsafe deserialization of HTTP request payloads. As a result, this flaw...
Discovered 4 hours ago
PoC for CVE-2025-14910
A vulnerability has been identified in the Edimax BR-6208AC, specifically affecting the FTP Daemon Service within version 1.02. This issue allows for path traversal manipulation, which can be exploited remotely by an attacker. The manufacturer, Edimax, has discontinued this product and ceased all...
Discovered 5 hours ago
PoC for CVE-2025-14909
A security vulnerability has been identified in Jeecg Boot, specifically in the SysUserOnlineController function within the jeecg-boot project. This weakness allows attackers to manipulate user sessions remotely, potentially leading to unauthorized access and control over user accounts. The explo...
PoC for CVE-2025-14908
A security vulnerability has been identified in JeecgBoot due to flaws in the Multi-Tenant Management Module. This flaw allows an attacker to manipulate the argument ID within the SysTenantController.java file, leading to improper authentication. Given that the exploit can be executed remotely, i...
Discovered 8 hours ago
PoC for CVE-2025-34452
Versions of Streama from 1.10.0 to 1.10.5 are affected by a vulnerability that combines path traversal and server-side request forgery. This flaw allows authenticated attackers to exploit the subtitle download feature by manipulating user-controlled parameters to create unvalidated file paths. By...
Discovered 9 hours ago
PoC for CVE-2025-34451
Proxychains-ng versions up to and including 4.17 are susceptible to a stack-based buffer overflow within the proxy_from_string() function. This vulnerability occurs when the application processes maliciously crafted proxy configuration entries that include excessively lengthy username or password...
PoC for CVE-2025-34450
The merbanan/rtl_433 product has a vulnerability in the parse_rfraw() function located in src/rfraw.c, which can lead to a stack-based buffer overflow when handling crafted or excessively large raw RF input data. This flaw permits the application to write past the boundaries of a stack buffer, po...
PoC for CVE-2025-34449
A vulnerability exists in Genymobile's scrcpy, where versions up to 3.3.3 are susceptible to a global buffer overflow triggered by the sc_read32be function. This occurs during the processing of specially crafted device messages via the sc_device_msg_deserialize() and process_msgs() functions. Suc...
Discovered 10 hours ago
PoC for CVE-2025-14889
A security flaw exists in the Campcodes Advanced Voting Management System 1.0, specifically affecting the /admin/voters_edit.php file within the Password Handler component. This vulnerability allows for improper authorization when the argument ID is manipulated by an attacker. The nature of this ...
PoC for CVE-2023-53940
The Codigo Markdown Editor version 1.0.1 is prone to a vulnerability that allows for arbitrary code execution. This vulnerability is exploited by crafting a malicious markdown file containing an embedded video source with an 'onerror' event. When the file is opened, it triggers the execution of s...
PoC for CVE-2023-53937
Hubstaff 1.6.14 contains a vulnerability that allows attackers to exploit DLL search order hijacking by substituting a missing system32 wow64log.dll with a malicious library. This manipulation can lead to executing arbitrary code and obtaining a reverse shell during application startup, making it...
PoC for CVE-2023-53943
The GLPI 9.5.7 version contains a vulnerability in its password recovery system that allows attackers to perform username enumeration. By leveraging the lost password recovery functionality, malicious actors can submit various email addresses to the password reset endpoint. By analyzing the syste...
PoC for CVE-2023-53944
The EasyPHP Webserver 14.1 is susceptible to a path traversal vulnerability that enables remote users with minimal privileges to circumvent SecurityManager safeguards. By crafting GET requests containing encoded directory traversal sequences, such as /..%5c..%5c, attackers can access sensitive fi...
PoC for CVE-2023-53942
File Thingie version 2.5.7 is susceptible to an authenticated file upload vulnerability that can be exploited by remote attackers. By leveraging this flaw, attackers can upload malicious PHP zip archives to the web server. Once the PHP payload is on the server, it can be executed to run arbitrary...
PoC for CVE-2023-53939
TinyWebGallery v2.5 is susceptible to stored cross-site scripting (XSS) attacks, allowing authenticated users to insert malicious scripts via the folder name parameter. This vulnerability enables attackers to manipulate album folder names, embedding script tags that may execute arbitrary JavaScri...
PoC for CVE-2023-53938
RockMongo version 1.1.7 is susceptible to a stored cross-site scripting vulnerability that permits attackers to inject malicious JavaScript through multiple unencoded input parameters. By crafting specific payloads within the database, collection, or login parameters, an attacker can execute arbi...
PoC for CVE-2023-53936
The Cameleon CMS version 2.7.4 contains a persistent cross-site scripting vulnerability that enables authenticated administrators to inject malicious scripts into post titles. Attackers can craft posts that contain embedded SVG scripts. When other users hover over the post title, these scripts ex...
PoC for CVE-2023-53935
The WBiz Desk Help Desk System version 1.2 is susceptible to a SQL injection vulnerability via the 'tk' parameter in ticket.php. This flaw enables non-admin users to execute malicious SQL queries that can manipulate the underlying database and potentially extract sensitive information. By leverag...
Discovered 12 hours ago
PoC for CVE-2025-33053
A vulnerability exists within the Web Distributed Authoring and Versioning (WebDAV) feature that allows an unauthorized attacker to gain control of file names or paths. By exploiting this flaw, attackers could execute arbitrary code over a network, thereby posing significant risks to affected sys...
Discovered 13 hours ago
PoC for CVE-2025-55182
A remote code execution vulnerability found in React Server Components allows attackers to exploit improperly handled payloads. This issue affects versions 19.0.0 through 19.2.0, compromising server function endpoints through unsafe deserialization of HTTP request payloads. As a result, this flaw...
PoC for CVE-2025-14884
A security flaw has been identified in the D-Link DIR-605, specifically affecting the Firmware Update Service. This vulnerability allows for command injection, enabling an attacker to execute arbitrary commands on the affected device remotely. The issue primarily impacts devices that are no longe...
PoC for CVE-2025-14879
A vulnerability has been detected in the Tenda WH450 router, specifically in the HTTP request handling function for the argument ssid_index. This weakness can lead to a stack-based buffer overflow, which can be exploited remotely by an attacker. The vulnerability allows unauthorized access via ma...
Discovered 14 hours ago
PoC for CVE-2025-14878
A security vulnerability has been identified in the Tenda WH450 wireless router, specifically in the /goform/wirelessRestart component of the HTTP Request Handler. This flaw allows an attacker to manipulate a critical argument, leading to a stack-based buffer overflow. The vulnerability can be ex...
PoC for CVE-2025-14877
A SQL injection vulnerability exists in the Campcodes Supplier Management System version 1.0, specifically within the /admin/add_retailer.php file. This flaw arises from improper handling of the cmbAreaCode parameter, allowing attackers to manipulate database queries. Since this vulnerability can...
Discovered 15 hours ago
PoC for CVE-2025-65011
The WODESYS WD-R608U router, also marketed as WDR122B V2.0 and WDR28, is susceptible to an improper access control vulnerability that enables unauthorized users to access sensitive configuration files through direct resource referencing. While the vendor has been alerted about this concern, they ...
Discovered 18 hours ago
PoC for CVE-2021-29447
Wordpress is an open source CMS. A user with the ability to upload files (like an Author) can exploit an XML parsing issue in the Media Library leading to XXE attacks. This requires WordPress installation to be using PHP 8. Access to internal files is possible in a successful XXE attack. This has...
Discovered 1 day ago
PoC for CVE-2025-54988
A vulnerability in the Apache Tika PDF parsing module allows for XML External Entity (XXE) injection through specially crafted XFA files embedded in PDF documents. This flaw can lead to unauthorized access to sensitive data or the ability to execute malicious requests against internal servers or ...
PoC for CVE-2025-14700
An input neutralization flaw in the Webhook Template component of Crafty Controller allows authenticated attackers to execute arbitrary code remotely via Server Side Template Injection. This vulnerability can lead to significant security risks, enabling malicious actors to potentially manipulate ...
PoC for CVE-2025-55182
A remote code execution vulnerability found in React Server Components allows attackers to exploit improperly handled payloads. This issue affects versions 19.0.0 through 19.2.0, compromising server function endpoints through unsafe deserialization of HTTP request payloads. As a result, this flaw...
PoC for CVE-2025-14856
A significant security flaw has been identified in the RuoYi management system, specifically in versions up to 4.8.1. The vulnerability resides in an unspecified function within the /monitor/cache/getnames file, where improper handling of input can lead to code injection. This allows attackers to...
PoC for CVE-2025-65945
The node-jws library by Auth0 suffers from an improper signature verification flaw, particularly when employing the HS256 algorithm under certain conditions. This vulnerability arises in applications that utilize the jws.createVerify() function for HMAC algorithms while allowing user-provided dat...
PoC for CVE-2025-55182
A remote code execution vulnerability found in React Server Components allows attackers to exploit improperly handled payloads. This issue affects versions 19.0.0 through 19.2.0, compromising server function endpoints through unsafe deserialization of HTTP request payloads. As a result, this flaw...
PoC for CVE-2021-3560
A flaw in Polkit allows an unprivileged local attacker to bypass credential checks for D-Bus requests. This can lead to the elevation of privileges to that of the root user, enabling the attacker to execute commands with elevated permissions. This vulnerability poses a significant threat to the c...
PoC for CVE-2025-14837
A code injection vulnerability exists in the Backend Website Settings Module of ZZCMS 2025, specifically within the 'stripfxg' function of the '/admin/siteconfig.php' file. Malicious manipulation of the 'icp' argument can allow attackers to inject and execute arbitrary code remotely. This vulnera...
PoC for CVE-2025-14836
A significant flaw exists in the ZZCMS 2025 platform affecting the User Data Storage Module, specifically within the /reg/user_save.php file. This vulnerability enables the potential for cleartext storage of sensitive data on disk, posing a severe risk of unauthorized access to user information. ...
PoC for CVE-2025-14834
A vulnerability has been detected in the Code-Projects Simple Stock System version 1.0, specifically within the /checkuser.php file. This weakness arises when the Username argument is manipulated, potentially allowing an attacker to execute SQL commands through the application's interface. The ex...
PoC for CVE-2023-53917
The Affiliate Me plugin version 5.0.1 suffers from a SQL injection vulnerability that affects the admin.php endpoint. Authenticated administrators can unknowingly expose sensitive user data by interacting with the 'id' parameter, which is susceptible to crafted union-based SQL queries. This weakn...
PoC for CVE-2023-53932
Serendipity version 2.4.0 is susceptible to a stored cross-site scripting flaw that enables authenticated users to inject harmful scripts into blog entries. This vulnerability allows attackers to create malicious blog entries containing JavaScript payloads that execute when other users view these...
PoC for CVE-2023-53933
A remote code execution vulnerability exists in Serendipity version 2.4.0, where authenticated users can exploit the system through an insecure media upload feature. By uploading malicious PHP files with the .phar extension, attackers may execute arbitrary commands on the server. This flaw unders...
PoC for CVE-2023-53931
Revive Adserver version 5.4.1 is susceptible to a cross-site scripting (XSS) vulnerability through its banner advanced configuration page. An attacker can exploit this vulnerability by crafting a malicious link to the 'banner-advanced.php' endpoint, injecting malicious scripts into the 'prepend' ...
PoC for CVE-2023-53930
ProjectSend version r1605 is affected by an insecure direct object reference vulnerability that enables unauthenticated attackers to download private files. By manipulating the 'id' parameter in the download request to process.php, attackers can gain unauthorized access to any user's private file...
PoC for CVE-2023-53929
The phpMyFAQ version 3.1.12 is susceptible to CSV injection, where authenticated users can exploit the system by injecting malicious formulas into their profile names. This vulnerability allows an attacker to craft a profile name with payloads such as 'calc|a!z|', leading to potential code execut...
PoC for CVE-2023-53927
PHPJabbers Simple CMS 5.0 is susceptible to a stored cross-site scripting vulnerability that permits attackers with authentication access to inject harmful scripts via section name parameters. This flaw allows malicious actors to create sections containing JavaScript payloads that can be executed...
PoC for CVE-2023-53928
PHPFusion version 9.10.30 is vulnerable to stored cross-site scripting (XSS) due to inadequate validation of uploaded files in its file manager. Malicious actors can upload SVG files containing embedded JavaScript, which can execute upon being viewed. This vulnerability poses a significant risk, ...
PoC for CVE-2023-53925
UliCMS 2023.1 is affected by a stored cross-site scripting vulnerability that allows attackers to upload malicious SVG files containing executable JavaScript. By exploiting this issue, attackers can inject harmful scripts that execute when other users view the affected files, posing a significant...
PoC for CVE-2023-53926
PHPJabbers Simple CMS 5.0 is vulnerable to a SQL injection flaw that arises from improper handling of the 'column' parameter in the index.php endpoint. This weakness allows remote attackers to inject malicious SQL queries, potentially leading to unauthorized access to sensitive database informati...