Publicly Disclosed
PoC Exploits

🔴 Alway take caution when working with PoC Exploits 🔴

Discovered just now...

PoC for CVE-2024-37054

MlflowMlflow8.8HIGH
Arbitrary Code Execution Vulnerability in MLflow Platform

A significant security vulnerability exists within the MLflow platform developed by Databricks. This issue arises from the deserialization of untrusted data in versions 0.9.0 and later. Attackers exploit this vulnerability by uploading a malicious PyFunc model that, once interacted with, can exec...

Discovered 8 minutes ago

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

Discovered 3 hours ago

PoC for CVE-2020-25042

MaracmsMaracms🟣 EPSS 77%7.2HIGH
Arbitrary File Upload Vulnerability in Mara CMS by Mara Studio

An arbitrary file upload vulnerability exists in Mara CMS version 7.5 that allows an authenticated attacker to upload malicious PHP scripts. This can be exploited by sending a request to codebase/dir.php?type=filenew while in a valid admin or manager session. Once the malicious file is uploaded, ...

PoC for CVE-2023-2825

GitlabGitlab🟣 EPSS 92%10CRITICAL
Path Traversal Vulnerability in GitLab CE/EE Versions

An exploit in GitLab CE/EE allows an unauthenticated user to leverage a path traversal vulnerability. This issue is particularly impactful in version 16.0.0, enabling attackers to read an arbitrary file on the server if the target file is associated with an attachment within a public project that...

Discovered 4 hours ago

PoC for CVE-2026-8782

Omec-projectAmf5.3MEDIUM
Null Pointer Dereference in OMEC Project AMF NGAP Message Handler

A vulnerability has been identified in the OMEC Project's AMF, specifically within the NGAP Message Handler component. This flaw allows for a null pointer dereference, which can lead to significant security risks, including potential remote exploitation. Attackers may utilize publicly available e...

PoC for CVE-2026-8781

Omec-projectAmf5.3MEDIUM
Null Pointer Dereference in omec-project AMF Affects Remote Access

A security flaw was identified in the omec-project's AMF up to version 2.1.3-dev, specifically within the RANConfiguration function in ngap/handler.go. This vulnerability allows for a null pointer dereference, which can facilitate remote exploitation by an attacker. The exploit's public release e...

PoC for CVE-2026-8780

Omec-projectAmf5.3MEDIUM
Memory Corruption Vulnerability in omec-project AMF by OMEC

A vulnerability has been identified in the omec-project AMF, specifically within the NGAP Message Handler component. This issue, located in the dispatcher.go file, can lead to memory corruption through manipulation. The attack can be executed remotely, posing a risk to security. Exploits for this...

PoC for CVE-2026-8779

Omec-projectAmf5.3MEDIUM
Memory Corruption Vulnerability in OMEC Project AMF from OMEC

A vulnerability has been identified in the OMEC Project AMF which affects the NGSetupRequest function found in the file ngap/handler.go. This issue can be exploited remotely through a manipulation of the InformationElement argument, resulting in memory corruption. This exploit has been publicly d...

Discovered 5 hours ago

PoC for CVE-2026-8777

EdimaxBr-6428ns5.3MEDIUM
Command Injection Vulnerability in Edimax BR-6428NS Network Device

A command injection vulnerability has been identified in the Edimax BR-6428NS router, specifically in the formStaDrvSetup function of the POST request handler. Attackers can exploit this vulnerability by manipulating the 'stadrv_ssid' argument, potentially allowing them to execute arbitrary comma...

PoC for CVE-2026-8776

EdimaxBr-6428ns8.7HIGH
Buffer Overflow Vulnerability in Edimax BR-6428NS Router

A buffer overflow vulnerability exists in the Edimax BR-6428NS router, specifically within the formPPTPSetup function of the POST Request Handler. This vulnerability is triggered by improper validation of the pptpUserName argument, potentially allowing remote attackers to manipulate the device. T...

PoC for CVE-2026-8775

EdimaxBr-6428ns8.7HIGH
Buffer Overflow Vulnerability in Edimax BR-6428NS Router

A buffer overflow vulnerability has been discovered in the Edimax BR-6428NS router with firmware version 1.10. The flaw resides in the POST Request Handler, specifically within the function formL2TPSetup. An attacker can exploit this vulnerability by manipulating the L2TPUserName argument, allowi...

PoC for CVE-2026-8774

EdimaxBr-6228nc5.3MEDIUM
Command Injection Vulnerability in Edimax BR-6228NC Network Device

A command injection vulnerability exists in the Edimax BR-6228NC router, specifically affecting the 'mp' function within the POST Request Handler at /goform/mp. Manipulating the 'command' argument allows attackers to execute arbitrary commands remotely. This exploitation could lead to unauthorize...

Discovered 6 hours ago

PoC for CVE-2026-8772

LinlinjavaLitemall5.1MEDIUM
SQL Injection Vulnerability in linlinjava litemall Admin Endpoint

A vulnerability has been discovered in the linlinjava litemall product, particularly affecting its Admin Endpoint. This weakness allows for potential SQL injection attacks, which can be initiated remotely. The exploitation of this vulnerability could compromise the integrity of the database by ma...

PoC for CVE-2026-8771

LinlinjavaLitemall6.9MEDIUM
SQL Injection Vulnerability in Linlinjava Litemall Front-end WeChat...

A security flaw has been identified in the Linlinjava Litemall affecting the Front-end WeChat API. The vulnerability is located in the 'WxGoodsController' function of the component, allowing an attacker to exploit SQL injection techniques. This flaw can be remotely exploited, making it critical f...

PoC for CVE-2026-8770

ContinuedevContinue4.8MEDIUM
Path Traversal Vulnerability in Continuedev JSON-RPC Server from Co...

A path traversal vulnerability has been identified in the Continuedev Continue product, specifically in version 1.2.22. The issue exists within the lsTool function located in core/tools/implementations/lsTool.ts of the JSON-RPC Server. By manipulating the 'dirPath' argument, an attacker could pot...

Discovered 7 hours ago

PoC for CVE-2026-8769

VercelAi5.3MEDIUM
Uncontrolled Resource Consumption in Vercel AI Platform by Vercel

A vulnerability exists in Vercel AI affecting versions up to 3.0.97, specifically within the createJsonResponseHandler and createJsonErrorResponseHandler functions in the response-handler.ts file. This flaw can lead to uncontrolled resource consumption, allowing attackers to initiate an exploit r...

PoC for CVE-2026-8768

VercelAi6.9MEDIUM
Server-Side Request Forgery Vulnerability in Vercel AI by Vercel

A vulnerability has been identified in Vercel AI, affecting versions up to 3.0.97. This issue resides in the validateDownloadUrl function within the packages/provider-utils/src/download-blob.ts file. The vulnerability allows for server-side request forgery (SSRF), where an attacker can manipulate...

PoC for CVE-2025-59528

FlowiseaiFlowise🟣 EPSS 84%10CRITICAL
Remote Code Execution Vulnerability in Flowise by FlowiseAI

Flowise, a user-friendly platform for creating customized large language model flows, has a significant vulnerability in version 3.0.5 that allows for remote code execution. The flaw lies within the CustomMCP node, where user input is inadequately sanitized. Specifically, the mcpServerConfig stri...

PoC for CVE-2026-8767

VercelAi2.3LOW
OS Command Injection Vulnerability in Vercel AI Product

A vulnerability has been discovered in Vercel AI versions up to 3.0.97, specifically affecting the function run found in the .github/workflows/prettier-on-automerge.yml file. This flaw allows an attacker to manipulate the system through os command injection. The vulnerability can potentially be e...

PoC for CVE-2026-8766

Kilo-orgKilocode5.3MEDIUM
Information Disclosure in Kilo-Org Kilocode Environment Variable Ha...

A critical flaw has been detected in the Kilo-Org kilocode application, specifically in the Environment Variable Handler's Load function. This issue allows an attacker to manipulate the KILO_CONFIG_CONTENT argument, potentially leading to unauthorized information disclosure. The vulnerability can...

Discovered 8 hours ago

PoC for CVE-2026-8765

Kilo-orgKilocode5.3MEDIUM
Path Traversal Vulnerability in Kilo-Org kilocode File Diff API End...

A vulnerability exists in Kilo-Org's kilocode up to version 7.0.47, specifically within the Bun.file function in the File Diff API Endpoint. This vulnerability allows attackers to perform a path traversal by manipulating the File argument, potentially leading to unauthorized access to sensitive f...

PoC for CVE-2026-8764

H3cMagic B38.6HIGH
Buffer Overflow in H3C Magic B3 Router by H3C Technologies

A security vulnerability has been identified in the H3C Magic B3 router, specifically in the UpdateWanParams function within the /goform/aspForm file. This flaw enables attackers to manipulate parameters, resulting in a potential buffer overflow. The attack can be executed remotely, posing a sign...

Discovered 9 hours ago

PoC for CVE-2026-28956

AppleiOS And iPad OS6.5MEDIUM
Memory Corruption Issue in Apple Products due to Malicious Media Files

This vulnerability involves a memory corruption issue that arises when processing specially crafted media files, which can lead to unintended app termination or memory corruption in affected Apple devices. Apple has addressed this flaw with enhanced input validation in the latest versions of thei...

Discovered 10 hours ago

PoC for CVE-2026-46333

LinuxLinux
Ptrace Vulnerability in Linux Kernel Affecting Memory Management

A vulnerability in the Linux kernel's ptrace functionality raises concerns regarding task memory image management. This issue relates to 'dumpability' checks for processes without an associated memory management structure (mm). The ptrace_may_access() function includes 'dumpable' checks for proce...

Discovered 14 hours ago

PoC for CVE-2026-46333

LinuxLinux
Ptrace Vulnerability in Linux Kernel Affecting Memory Management

A vulnerability in the Linux kernel's ptrace functionality raises concerns regarding task memory image management. This issue relates to 'dumpability' checks for processes without an associated memory management structure (mm). The ptrace_may_access() function includes 'dumpable' checks for proce...

Discovered 15 hours ago

PoC for CVE-2026-8759

XiandafuBeetl6.9MEDIUM
Expression Language Manipulation in xiandafu Beetl Product

A security vulnerability has been identified in the xiandafu Beetl framework, specifically within the SpELFunction component. The issue arises from the improper handling of special characters in expression language statements, allowing attackers to exploit the function remotely. Despite receiving...

Discovered 16 hours ago

PoC for CVE-2026-8758

Metasoft 美特软件Metacrm6.9MEDIUM
Unrestricted File Upload Vulnerability in Metasoft 美特软件 MetaCRM

A vulnerability exists in Metasoft 美特软件 MetaCRM versions up to 6.4.0 Beta06 that allows for the unrestricted upload of files through the /common/jsp/upload3.jsp endpoint. By manipulating the File argument, an attacker can upload a malicious file without appropriate restrictions. This vulnerabilit...

PoC for CVE-2026-8757

AdenhqHive6.9MEDIUM
Path Traversal Vulnerability in adenhq Hive Product

A path traversal vulnerability exists in adenhq Hive versions up to 0.11.0, specifically in the _read_events_tail function within the delete request handler component of routes_sessions.py. An attacker may exploit this vulnerability remotely to gain unauthorized access to files outside the restri...

Discovered 17 hours ago

PoC for CVE-2026-8756

FishaudioBert-vits26.9MEDIUM
Path Traversal Vulnerability in fishaudio Bert-VITS2 Gradio Interface

A path traversal vulnerability has been discovered in the fishaudio Bert-VITS2 Gradio interface, specifically within the generate_config function of the webui_preprocess.py file. This flaw allows attackers to manipulate the data_dir argument, potentially enabling unauthorized access to sensitive ...

PoC for CVE-2026-8755

FishaudioBert-vits26.9MEDIUM
Path Traversal Vulnerability in fishaudio Bert-VITS2 Model Handler

A significant vulnerability has been detected in the fishaudio Bert-VITS2 product within the Model Handler component, specifically the function _get_all_models in hiyoriUI.py. This flaw allows attackers to exploit path traversal remotely, potentially compromising the integrity and confidentiality...

PoC for CVE-2026-8754

AstrbotdevsAstrbot5.3MEDIUM
Path Traversal Vulnerability in AstrBot by AstrBotDevs

A path traversal vulnerability was identified in the AstrBot product up to version 4.23.5. The issue resides in the post_file function within astrbot/dashboard/routes/chat.py, where improper handling of the 'filename' argument allows remote attackers to manipulate file paths. This manipulation co...

PoC for CVE-2018-25339

BylancerZechat8.8HIGH
SQL Injection Vulnerability in Zechat 1.5 by Bylancer

Zechat 1.5 has a SQL injection vulnerability in the 'v' parameter, allowing unauthenticated attackers to exploit the system via time-based blind techniques. This SQL injection flaw enables the extraction of sensitive database information by employing sleep-based blind injection scenarios to confi...

PoC for CVE-2018-25336

JoomlaextensionsJoomla! Extension Jcar...6.9MEDIUM
Cross-Site Request Forgery Vulnerability in Joomla jCart for OpenCart

Joomla jCart for OpenCart version 2.3.0.2 is susceptible to a cross-site request forgery vulnerability that enables attackers to alter user account details illicitly. By crafting malicious HTML forms targeting specific endpoints, unauthorized individuals can modify user credentials, passwords, an...

PoC for CVE-2018-25337

JoomlaextensionsJoomla! Extension Joom...5.3MEDIUM
Cross-Site Request Forgery in Joomla JoomOCShop by Joomla

Joomla JoomOCShop 1.0 is susceptible to a cross-site request forgery vulnerability. This flaw allows attackers to exploit the trust established between authenticated users and the application. By crafting malicious HTML forms targeting specific account endpoints, such as /joomoc2/?route=account/e...

PoC for CVE-2018-25335

WordPressPeugeot Music9.3CRITICAL
Arbitrary File Upload Vulnerability in Peugeot Music Plugin for Wor...

The Peugeot Music Plugin version 1.0 for WordPress is vulnerable to an arbitrary file upload issue, allowing unauthenticated attackers to upload malicious files. By exploiting the upload.php endpoint, attackers can manipulate the 'name' parameter within POST requests to bypass security measures a...

PoC for CVE-2018-25333

Nordex-onlineN149 Wind Turbine Web ...8.8HIGH
SQL Injection Vulnerability in Nordex N149/4.0-4.5 Wind Turbine Web...

The Nordex N149/4.0-4.5 Wind Turbine Web Server version 4.0 is susceptible to an SQL injection vulnerability that enables unauthenticated attackers to craft malicious SQL queries. By exploiting this weakness through carefully structured POST requests targeting the login.php page, attackers can by...

PoC for CVE-2018-25331

ZenarZenar Content Manageme...5.1MEDIUM
Cross-Site Scripting Vulnerability in Zenar Content Management System

The Zenar Content Management System has a vulnerability that allows unauthenticated attackers to inject malicious scripts via the current_page parameter in POST requests sent to the ajax.php endpoint. This vulnerability reflects unsanitized user input in the response HTML, enabling attackers to e...

PoC for CVE-2018-25332

GitbucketGitbucket9.3CRITICAL
Unauthenticated Remote Code Execution in GitBucket by Exploiting We...

GitBucket 4.23.1 is susceptible to an unauthenticated remote code execution vulnerability that can be exploited by attackers to execute arbitrary commands. This vulnerability arises from the use of weak secret token generation and insecure file upload functionality. Attackers may potentially brut...

PoC for CVE-2018-25330

JoomlaextensionsJoomla! Extension Ekri...8.8HIGH
Persistent Cross-Site Scripting and SQL Injection in EkRishta 2.10 ...

The EkRishta 2.10 extension for Joomla! has been identified to contain serious security vulnerabilities, specifically persistent cross-site scripting (XSS) and SQL injection flaws. These vulnerabilities can be exploited by attackers who insert malicious code into user profile fields, such as the ...

PoC for CVE-2018-25329

WordPressWP With Spritz8.7HIGH
Remote File Inclusion Vulnerability in WP with Spritz by WordPress

The WP with Spritz plugin version 1.0 for WordPress is susceptible to a remote file inclusion vulnerability, enabling unauthenticated attackers to access sensitive files on the server. By manipulating the URL parameter in GET requests directed at wp.spritz.content.filter.php, attackers can potent...

PoC for CVE-2018-25328

VxsearchVx Search8.6HIGH
Local Buffer Overflow in VX Search 10.6.18 by VX Search

VX Search version 10.6.18 is susceptible to a local buffer overflow vulnerability that enables an attacker to overwrite the instruction pointer. By providing an oversized string in the directory field, attackers can craft an input file containing 271 bytes of junk data followed by a tailored retu...

PoC for CVE-2018-25327

JoomskyJs Jobs6.9MEDIUM
Cross-Site Request Forgery in Joomla! Component Js Jobs by Joomla

The Joomla! Component Js Jobs version 1.2.0 is susceptible to a cross-site request forgery (CSRF) vulnerability. This flaw can be exploited by attackers to perform unauthorized actions by tricking administrators into visiting maliciously crafted web pages. By exploiting this vulnerability, attack...

PoC for CVE-2018-25326

WordPressGoogle Drive8.7HIGH
Path Traversal Vulnerability in Google Drive for WordPress by Google

Google Drive for WordPress version 2.2 is affected by a path traversal vulnerability that enables unauthenticated attackers to read arbitrary files on the server. By exploiting this vulnerability, attackers can make specially crafted POST requests to the gdrive-ajaxs.php endpoint, using the ajaxs...

PoC for CVE-2018-25325

WooCommerce-csvim...WooCommerce Csv-importer8.7HIGH
Path Traversal Vulnerability in Woocommerce CSV Importer by WooComm...

The Woocommerce CSV Importer version 3.3.6 is vulnerable to path traversal attacks, enabling authenticated users to delete arbitrary files. By exploiting the delete_export_file AJAX action, attackers can submit specially crafted POST requests containing directory traversal sequences in the filena...

PoC for CVE-2018-25324

WordPressSimple Fields6.9MEDIUM
Local File Inclusion Vulnerability in Simple Fields WordPress Plugin

The Simple Fields plugin versions 0.2 to 0.3.5 for WordPress contains a local file inclusion vulnerability. Unauthenticated attackers can exploit this weakness by injecting null bytes into the wp_abspath parameter, allowing them to read sensitive files on the server, such as /etc/passwd. This vul...

PoC for CVE-2018-25323

AlloksoftAllok Avi Divx Mpeg To...8.6HIGH
Buffer Overflow in Allok AVI DivX MPEG to DVD Converter by Allok Soft

Allok AVI DivX MPEG to DVD Converter 2.6.1217 is susceptible to a structured exception handler (SEH) buffer overflow, enabling local attackers to execute arbitrary code. This vulnerability arises when a malicious user crafts a text file containing a specially formatted buffer, along with shellcod...

PoC for CVE-2018-25322

AlloksoftFast Avi Mpeg Splitter8.6HIGH
Stack Based Buffer Overflow in Allok Fast AVI MPEG Splitter by Allo...

Allok Fast AVI MPEG Splitter 1.2 is susceptible to a stack based buffer overflow that can be exploited by local attackers. By crafting a malicious payload, an attacker can input a specially-formatted license name string, which includes a sequence of junk data followed by structured shellcode. Thi...

PoC for CVE-2018-25321

Tp-linkTl-wr720nmbps Wireless...5.3MEDIUM
Cross-Site Request Forgery Vulnerability in TP-Link TL-WR720N Router

The TP-Link TL-WR720N wireless router is susceptible to a Cross-Site Request Forgery (CSRF) vulnerability that enables attackers to execute unauthorized administrative actions. By tricking authenticated users into visiting malicious web pages, attackers can alter critical settings, such as modify...

PoC for CVE-2018-25320

AclAcl Analytics9.3CRITICAL
Arbitrary Code Execution Vulnerability in ACL Analytics by ACL Serv...

ACL Analytics versions 11.x through 13.0.0.579 are susceptible to an arbitrary code execution vulnerability that enables attackers to run arbitrary commands. By exploiting the EXECUTE function, attackers can utilize bitsadmin to download and execute malicious PowerShell scripts with system privil...

PoC for CVE-2018-25319

Wende60Redaxo Cms Addon Myevents7.1HIGH
SQL Injection Vulnerability in Redaxo CMS Addon by Wende60

The Redaxo CMS Addon MyEvents version 2.2.1 is susceptible to an SQL injection vulnerability, enabling authenticated attackers to craft malicious SQL queries through the myevents_id parameter. By sending specially constructed GET requests to the event_add.php page, attackers can manipulate the un...