Publicly Disclosed
PoC Exploits
🔴 Alway take caution when working with PoC Exploits 🔴
Discovered 8 hours ago
PoC for CVE-2025-55182
A remote code execution vulnerability found in React Server Components allows attackers to exploit improperly handled payloads. This issue affects versions 19.0.0 through 19.2.0, compromising server function endpoints through unsafe deserialization of HTTP request payloads. As a result, this flaw...
Discovered 11 hours ago
PoC for CVE-2025-12820
The Pure WC Variation Swatches plugin for WordPress lacks proper authorization checks when updating settings. This oversight enables any authenticated user to modify plugin settings, potentially leading to unauthorized changes and security risks within the application. It is essential for users o...
Discovered 15 hours ago
PoC for CVE-2025-55184
This vulnerability affects multiple versions of React Server Components by allowing malicious payloads sent through HTTP requests to Server Function endpoints to be unsafely deserialized. This can result in an infinite loop that hangs the server process, effectively blocking future HTTP requests ...
Discovered 20 hours ago
PoC for CVE-2023-53953
WebsiteBaker 2.13.3 suffers from a stored cross-site scripting vulnerability that enables authenticated users to inject malicious scripts during the creation of web pages. Attackers can exploit this vulnerability by crafting infected page titles, which execute arbitrary JavaScript when the compro...
PoC for CVE-2023-53950
InnovaStudio WYSIWYG Editor 5.4 is vulnerable to an unrestricted file upload due to improper handling of file extensions, allowing attackers to manipulate filenames and upload malicious files. By employing null byte techniques and various file extensions, attackers can evade upload controls, lead...
PoC for CVE-2023-53959
The FileZilla Client version 3.63.1 is susceptible to a DLL hijacking vulnerability that permits attackers to execute arbitrary code. By strategically placing a manipulated TextShaping.dll file within the application directory, malicious actors can initiate a reverse shell payload. This vulnerabi...
PoC for CVE-2023-53958
The LDAP Tool Box Self Service Password version 1.5.2 is susceptible to a password reset vulnerability that enables attackers to exploit HTTP Host headers during the token generation process. By crafting malicious password reset requests, attackers can forge tokens and redirect them to their cont...
PoC for CVE-2023-53956
The Flatnux product version 2021-03.25 is susceptible to an authenticated file upload vulnerability that permits administrative users to upload arbitrary PHP files using the file manager. This flaw enables attackers with administrator access to upload potentially harmful PHP scripts to the web ro...
PoC for CVE-2023-53957
The Kimai 1.30.10 version features a vulnerability related to SameSite cookies that poses a risk of session hijacking. Attackers can exploit this flaw by tricking users into executing a malicious PHP script, which captures session cookie information and writes it to a file. This potential breach ...
PoC for CVE-2023-53954
ActFax 10.10 has a flaw that exposes it to potential local privilege escalation due to an improperly configured service path for ActiveFaxServiceNT. This vulnerability allows attackers who have write access to Program Files directories to place a malicious ActSrvNT.exe executable, which would be ...
PoC for CVE-2023-53952
Dotclear 2.25.3 has a vulnerability that enables authenticated attackers to exploit the blog post creation interface to upload malicious PHP files with the .phar extension. Once uploaded, these files can contain executable PHP system commands that run on the server when accessed. This flaw poses ...
PoC for CVE-2023-53949
AspEmail version 5.6.0.2 is affected by a binary permission vulnerability that could allow local users to escalate their privileges through manipulation of the Persits Software EmailAgent service. The vulnerability arises from excessive write permissions granted in the BIN directory, enabling mal...
PoC for CVE-2023-53951
The Ever Gauzy application version 0.281.9 exhibits a vulnerability in its JWT authentication system, primarily due to a weak implementation of the HMAC secret key. This flaw enables attackers to exploit the exposed JWT token, allowing them to authenticate themselves and gain administrative permi...
PoC for CVE-2023-53948
Lilac-Reloaded for Nagios version 2.0.8 is susceptible to a remote code execution flaw within its autodiscovery feature. This vulnerability allows attackers to inject arbitrary commands by exploiting the inadequate input filtering of the nmap_binary parameter. By sending a specially crafted POST ...
PoC for CVE-2023-53947
OCS Inventory NG version 2.3.0.0 is susceptible to an unquoted service path vulnerability. This flaw enables local attackers to gain elevated privileges by placing a malicious executable in the service's unquoted path. When the service is restarted, it may execute this malicious code, potentially...
PoC for CVE-2023-53946
ArcSoft PhotoStudio version 6.0.0.172 contains a vulnerability related to unquoted service paths in the ArcSoft Exchange Service. This flaw allows local attackers to exploit the service by placing a malicious executable within the unquoted path, which may lead to unauthorized privilege escalation...
PoC for CVE-2023-53945
BrainyCP 1.0 is vulnerable to authenticated remote code execution due to improper handling of commands through the crontab configuration interface. This vulnerability allows logged-in users to exploit the crontab endpoint, enabling the injection of arbitrary commands, which can include launching ...
Discovered 21 hours ago
PoC for CVE-2025-14968
An SQL injection vulnerability exists in the Simple Stock System version 1.0, specifically within the /market/update.php file. The flaw arises from improper handling of the 'email' parameter, allowing an attacker to manipulate input to execute arbitrary SQL queries. This weakness can be exploited...
Discovered 22 hours ago
PoC for CVE-2025-13486
The Advanced Custom Fields: Extended plugin for WordPress contains a vulnerability that allows unauthenticated attackers to execute arbitrary code on the server. This occurs due to improper validation within the prepare_form() function, which processes user input through call_user_func_array() wi...
PoC for CVE-2025-14967
A vulnerability exists in the itsourcecode Student Management System that allows for SQL injection through the manipulation of the 'school_year' parameter in the /candidates_report.php file. This can lead to unauthorized access to the underlying database, allowing attackers to execute arbitrary S...
PoC for CVE-2025-14966
A SQL injection vulnerability exists in FastAdmin versions up to 1.7.0.20250506, specifically within the selectpage function of the Backend Controller component. This flaw arises from improper handling of the 'custom/searchField' argument, allowing attackers to manipulate database queries execute...
PoC for CVE-2025-55182
A remote code execution vulnerability found in React Server Components allows attackers to exploit improperly handled payloads. This issue affects versions 19.0.0 through 19.2.0, compromising server function endpoints through unsafe deserialization of HTTP request payloads. As a result, this flaw...
PoC for CVE-2025-68055
A SQL Injection vulnerability has been identified in the Themefic Hydra Booking plugin, which allows attackers to manipulate SQL queries executed by the application. This issue can lead to unauthorized access to sensitive data, including user information and administrative functionalities. The vu...
Discovered 23 hours ago
PoC for CVE-2025-14962
A cross-site scripting (XSS) vulnerability has been identified in the Simple Stock System version 1.0 developed by Code-Projects. This flaw resides within an unspecified function in the /market/chatuser.php file, allowing remote attackers to execute malicious scripts in the context of users inter...
PoC for CVE-2025-14961
A SQL injection vulnerability exists in the Simple Blood Donor Management System 1.0, specifically within the /editedcampaign.php file. An attacker can manipulate the campaignname parameter, potentially leading to unauthorized access to the database. This vulnerability allows remote execution of ...
PoC for CVE-2025-14960
A security vulnerability has been identified in the Simple Blood Donor Management System version 1.0, particularly impacting the /editeddonor.php file. An attacker can exploit this vulnerability through manipulation of the 'Name' argument, potentially leading to SQL injection attacks. This flaw a...
PoC for CVE-2025-14959
A vulnerability has been discovered in Simple Stock System 1.0 that allows remote attackers to exploit a SQL injection issue through improper processing of user input in the /market/signup.php file. This critical weakness permits unauthorized manipulation of the Username argument, facilitating po...
Discovered 1 day ago
PoC for CVE-2025-14958
A significant security flaw has been identified within the floooh Sokol library, specifically in the _sg_pipeline_common_init function located in sokol_gfx.h. This vulnerability manifests as a heap-based buffer overflow, which could potentially be exploited by attackers with local access to the s...
PoC for CVE-2025-14957
A vulnerability has been discovered in the WebAssembly Binaryen that allows for a null pointer dereference due to improper handling of the arguments within the IRBuilder components. Specifically, the functions IRBuilder::makeLocalGet, IRBuilder::makeLocalSet, and IRBuilder::makeLocalTee can be af...
PoC for CVE-2025-14956
A vulnerability exists in WebAssembly Binaryen, specifically within the WasmBinaryReader::readExport function of the wasm-binary.cpp file. This issue can lead to a heap-based buffer overflow, which may allow an attacker to execute malicious code on the local host. This vulnerability has been publ...
PoC for CVE-2025-14955
A vulnerability exists in the PFCP component of Open5GS, specifically within the ogs_pfcp_handle_create_pdr function. This flaw leads to improper initialization, which can be exploited remotely. Although the attack exhibits high complexity and poses significant challenges for exploitation, it rem...
PoC for CVE-2025-14954
A reachable assertion vulnerability has been identified in the Open5GS library lib/pfcp/context.c, specifically within the functions ogs_pfcp_pdr_find_or_add, ogs_pfcp_far_find_or_add, ogs_pfcp_urr_find_or_add, and ogs_pfcp_qer_find_or_add. This flaw potentially allows remote attackers to manipul...
PoC for CVE-2025-14953
A null pointer dereference vulnerability has been identified in Open5GS versions up to 2.7.5, specifically in the function ogs_pfcp_handle_create_pdr within the FAR-ID Handler module. This flaw allows remote attackers to manipulate specific inputs, which can result in application crashes or unexp...
PoC for CVE-2025-14952
A vulnerability has been identified in Campcodes Supplier Management System version 1.0, specifically within the /admin/add_category.php file. This issue arises from improper handling of the txtCategoryName parameter, which allows attackers to perform SQL injection attacks remotely. The exploit c...
PoC for CVE-2025-14951
A security vulnerability has been identified in the Scholars Tracking System 1.0, specifically within an unknown function of the file /home.php. A remote attacker could exploit this weakness by manipulating the post_content argument, allowing for SQL injection attacks. This vulnerability has been...
PoC for CVE-2025-14950
A vulnerability has been identified in Code-Projects' Scholars Tracking System version 1.0, specifically in the /delete_post.php file. This issue arises from improper handling of the argument ID, allowing for SQL injection attacks. Exploitation can be performed remotely, potentially compromising ...
PoC for CVE-2025-13307
The Ocean Modal Window plugin for WordPress prior to version 2.3.3 is susceptible to a critical vulnerability that allows remote code execution. This exploit arises from the modal display logic, which can be manipulated under conditions defined by users with editing capabilities, such as Editors ...
Discovered 2 days ago
PoC for CVE-2025-55182
A remote code execution vulnerability found in React Server Components allows attackers to exploit improperly handled payloads. This issue affects versions 19.0.0 through 19.2.0, compromising server function endpoints through unsafe deserialization of HTTP request payloads. As a result, this flaw...
PoC for CVE-2025-14940
A SQL injection vulnerability exists in Code-Projects Scholars Tracking System 1.0, specifically in the file /admin/delete_user.php. This vulnerability arises from improper handling of the argument ID, allowing attackers to manipulate SQL queries. An adversary can exploit this flaw remotely, enab...
PoC for CVE-2025-14939
A SQL injection vulnerability exists in the Online Appointment Booking System, specifically in the /admin/deletemanager.php file. This vulnerability allows attackers to manipulate the 'managername' argument, which could lead to unauthorized access and manipulation of the database. The exploit can...
PoC for CVE-2025-63353
A vulnerability in FiberHome GPON ONU HG6145F1 RP4423 allows attackers to predict the factory default Wi-Fi password. The device utilizes a deterministic algorithm that derives the pre-shared key from the SSID, enabling unauthorized individuals to gain access to the network simply by observing th...
PoC for CVE-2025-55182
A remote code execution vulnerability found in React Server Components allows attackers to exploit improperly handled payloads. This issue affects versions 19.0.0 through 19.2.0, compromising server function endpoints through unsafe deserialization of HTTP request payloads. As a result, this flaw...
PoC for CVE-2025-14910
A vulnerability has been identified in the Edimax BR-6208AC, specifically affecting the FTP Daemon Service within version 1.02. This issue allows for path traversal manipulation, which can be exploited remotely by an attacker. The manufacturer, Edimax, has discontinued this product and ceased all...
PoC for CVE-2025-14909
A security vulnerability has been identified in Jeecg Boot, specifically in the SysUserOnlineController function within the jeecg-boot project. This weakness allows attackers to manipulate user sessions remotely, potentially leading to unauthorized access and control over user accounts. The explo...
PoC for CVE-2025-14908
A security vulnerability has been identified in JeecgBoot due to flaws in the Multi-Tenant Management Module. This flaw allows an attacker to manipulate the argument ID within the SysTenantController.java file, leading to improper authentication. Given that the exploit can be executed remotely, i...
PoC for CVE-2025-14900
A security flaw has been identified in the CodeAstro Real Estate Management System, specifically within the Administrator Endpoint component, located in the /admin/userdelete.php file. This vulnerability is linked to an insecure manipulation of the argument ID, which may allow remote attackers to...
PoC for CVE-2025-14899
A vulnerability in the CodeAstro Real Estate Management System 1.0 has been identified, specifically affecting the Administrator Endpoint component found in the file /admin/stateadd.php. This vulnerability allows for SQL injection, which enables an attacker to manipulate database queries. The att...
PoC for CVE-2025-14898
A security flaw has been identified in the CodeAstro Real Estate Management System version 1.0, specifically within the /admin/userbuilderdelete.php file related to the Administrator Endpoint. This vulnerability enables remote attackers to manipulate input, leading to SQL injection. This flaw can...
PoC for CVE-2025-14897
A vulnerability was discovered in the CodeAstro Real Estate Management System version 1.0, specifically within an unidentified function in the /admin/useragentdelete.php file associated with the Administrator Endpoint. This weakness allows for SQL injection attacks, which can be executed remotely...
PoC for CVE-2025-34452
Versions of Streama from 1.10.0 to 1.10.5 are affected by a vulnerability that combines path traversal and server-side request forgery. This flaw allows authenticated attackers to exploit the subtitle download feature by manipulating user-controlled parameters to create unvalidated file paths. By...