Publicly Disclosed
PoC Exploits

🔴 Alway take caution when working with PoC Exploits 🔴

Discovered just now...

PoC for CVE-2026-1529

Red HatRed Hat Build Of Keycl...8.1HIGH
Keycloak Vulnerability Allows Unauthorized Access via Invitation To...

A security flaw in Keycloak allows an attacker to exploit a weakness in the invitation token's JSON Web Token (JWT) payload. By modifying the organization ID and target email without proper cryptographic signature verification, an attacker can self-register into an unauthorized organization. This...

PoC for CVE-2026-20841

MicrosoftWindows Notepad8.8HIGH
Command Injection Vulnerability in Windows Notepad App by Microsoft

The Windows Notepad App has a vulnerability that allows attackers to exploit improper neutralization of special command elements. This security flaw can enable unauthorized users to execute arbitrary code over a network, posing significant risks to systems that rely on this application. Users are...

PoC for CVE-2025-6018

7.8HIGH
Local Privilege Escalation in Linux Pluggable Authentication Module...

A Local Privilege Escalation vulnerability exists in pam-config, part of the Linux Pluggable Authentication Modules (PAM). This flaw permits a local attacker, such as an SSH user, to escalate their privileges to those of a privileged console user. By exploiting this vulnerability, attackers can e...

Discovered 29 minutes ago

PoC for CVE-2025-15368

WordPressSportspress – Sports C...8.8HIGH
Local File Inclusion Vulnerability in SportsPress Plugin for WordPress

The SportsPress plugin for WordPress is susceptible to a Local File Inclusion vulnerability, which affects all versions up to and including 2.7.26. By manipulating the 'template_name' attribute within shortcodes, authenticated users with contributor-level permissions and higher can include and ex...

Discovered 2 hours ago

PoC for CVE-2024-21413

MicrosoftMicrosoft Office 2019🟣 EPSS 93%9.8CRITICAL
Remote Code Execution Vulnerability Affects Microsoft Outlook

A remote code execution vulnerability in Microsoft Outlook allows an attacker to run arbitrary code on a user's system. This can occur when the vulnerable version processes specially crafted email messages, which can result in unauthorized access or control over the affected system. Attackers can...

Discovered 3 hours ago

PoC for CVE-2026-1235

WordPressWP Ecommerce
PHP Object Injection Vulnerability in WP eCommerce Plugin

The WP eCommerce plugin for WordPress, up to version 3.15.1, contains a vulnerability that allows the unserialization of user input through ajax actions. This flaw can be exploited by unauthenticated users, potentially leading to PHP Object Injection if the right conditions are present. Attackers...

PoC for CVE-2025-15400

WordPressPix Para WooCommerce
Unauthorized AJAX Action Vulnerability in Pix for Woocommerce Plugi...

The Pix para Woocommerce plugin version 2.13.3 for WordPress allows any authenticated user to invoke AJAX actions without proper capability or nonce checks, enabling them to manipulate and reset payment gateway configuration settings. This significant flaw can lead to disruption of OpenPix paymen...

Discovered 4 hours ago

PoC for CVE-2025-54253

AdobeAdobe Experience Manager🟣 EPSS 44%10CRITICAL
Misconfiguration Vulnerability in Adobe Experience Manager

Adobe Experience Manager versions 6.5.23 and earlier contain a Misconfiguration vulnerability that allows attackers to execute arbitrary code. This security flaw can be exploited without user interaction, enabling attackers to bypass security measures easily and gain control over the affected sys...

Discovered 5 hours ago

PoC for CVE-2025-49132

PterodactylPanel🟣 EPSS 35%10CRITICAL
Remote Code Execution Vulnerability in Pterodactyl Game Server Mana...

Pterodactyl, a widely used free and open-source game server management panel, has a significant vulnerability that allows unauthorized remote code execution. This occurs through the /locales/locale.json endpoint when specific query parameters are manipulated. Attackers exploiting this flaw can ex...

Discovered 6 hours ago

PoC for CVE-2026-24858

FortinetFortiproxy9.4CRITICAL
Authentication Bypass in Fortinet FortiAnalyzer and FortiManager Pr...

Fortinet products, including FortiAnalyzer and FortiManager, are susceptible to a vulnerability that allows an attacker with a FortiCloud account to bypass authentication, granting unauthorized access to devices linked with different accounts. This issue can be exploited if FortiCloud SSO authent...

Discovered 8 hours ago

PoC for CVE-2024-45440

DrupalDrupal Core🟣 EPSS 86%5.3MEDIUM
File Path Disclosure Vulnerability in Drupal 11.x-dev

A vulnerability exists in the Drupal 11.x-dev platform that enables Full Path Disclosure (FPD) through the core/authorize.php script. This issue arises when the hash_salt value is derived from the file_get_contents function, utilizing a non-existent file. Consequently, even if error logging is di...

Discovered 10 hours ago

PoC for CVE-2026-1529

Red HatRed Hat Build Of Keycl...8.1HIGH
Keycloak Vulnerability Allows Unauthorized Access via Invitation To...

A security flaw in Keycloak allows an attacker to exploit a weakness in the invitation token's JSON Web Token (JWT) payload. By modifying the organization ID and target email without proper cryptographic signature verification, an attacker can self-register into an unauthorized organization. This...

PoC for CVE-2025-55182

MetaReact-server-dom-webpack🟣 EPSS 61%10CRITICAL
Remote Code Execution Vulnerability in React Server Components by Meta

A remote code execution vulnerability found in React Server Components allows attackers to exploit improperly handled payloads. This issue affects versions 19.0.0 through 19.2.0, compromising server function endpoints through unsafe deserialization of HTTP request payloads. As a result, this flaw...

Discovered 11 hours ago

PoC for CVE-2026-25872

Albrecht Jung Gmb...Jung Smart Panel 5.1 Knx6.9MEDIUM
Unauthenticated Path Traversal Vulnerability in JUNG Smart Panel Fi...

The JUNG Smart Panel KNX firmware versions up to L1.12.22 exhibit a vulnerability in the embedded web interface, allowing unauthorized users to exploit improper file path validation. This flaw can be exploited to access sensitive files residing on the filesystem accessible to the web server. Atta...

Discovered 13 hours ago

PoC for CVE-2026-2113

Yuan1994Tpadmin6.9MEDIUM
Deserialization Vulnerability in WebUploader Component of Yuan1994 ...

A security vulnerability has been identified in the WebUploader component of Yuan1994's Tpadmin software. Found in the file /public/static/admin/lib/webuploader/0.1.5/server/preview.php, this flaw enables deserialization of untrusted data. Attackers can exploit this vulnerability remotely, puttin...

PoC for CVE-2025-34085

WordPressSimple File List WordP...10CRITICAL
Unrestricted File Upload in WordPress Simple File List Plugin

A vulnerability exists in the WordPress Simple File List plugin which allows unauthenticated attackers to upload malicious files due to improper validation mechanisms. Specifically, the plugin mistakenly permits the upload of PHP code masquerading as image files. An attacker can exploit the uploa...

Discovered 14 hours ago

PoC for CVE-2026-25526

HubspotJinjava9.8CRITICAL
Arbitrary Java Execution Vulnerability in JinJava by HubSpot

JinJava, a template engine based on Django syntax for rendering Jinja templates, is susceptible to an arbitrary Java execution vulnerability via a bypass through the ForTag element. This flaw enables attackers to instantiate Java classes and access files, circumventing key sandbox restrictions. T...

Discovered 15 hours ago

PoC for CVE-2025-6019

7HIGH
Local Privilege Escalation Vulnerability in libblockdev Affects Red...

A Local Privilege Escalation vulnerability exists in libblockdev that allows a physically present user with 'allow_active' permissions to escalate privileges. By exploiting the interaction between libblockdev and the udisks daemon, an attacker can create a specially crafted XFS image, tricking ud...

Discovered 18 hours ago

PoC for CVE-2025-15572

wasm3 ProjectWasm34.8MEDIUM
Memory Leak Vulnerability in wasm3 by the wasm3 Project

A memory leak vulnerability exists in the wasm3 project affecting versions up to 0.5.0, specifically within the NewCodePage function. This flaw allows local attackers to exploit the vulnerability, resulting in unintended memory consumption. The public disclosure may lead to increased exploitation...

Discovered 19 hours ago

PoC for CVE-2025-15571

CkolivasLrzip4.8MEDIUM
Null Pointer Dereference in ckolivas lrzip Up to 0.651

A local security vulnerability has been found in the ckolivas lrzip, specifically in the ucompthread function of stream.c. This flaw allows for a null pointer dereference, which can lead to potential application crashes or unstable behavior. The issue can be exploited only from a local environmen...

Discovered 20 hours ago

PoC for CVE-2025-15570

CkolivasLrzip4.8MEDIUM
Use After Free Vulnerability in ckolivas lrzip Product

A use after free vulnerability has been identified in the ckolivas lrzip software, specifically within the lzma_decompress_buf function in stream.c. This issue arises from improper handling of memory, leading to potential exploitation if a local attacker manipulates the system. Although the probl...

Discovered 23 hours ago

PoC for CVE-2025-69516

AmidawareTactical RMM8.8HIGH
Server-Side Template Injection in Amidaware Tactical RMM

A security flaw in the Amidaware Tactical RMM allows low-privileged users with Report Viewer or Report Manager permissions to execute arbitrary commands on the server. This vulnerability arises from inadequate sanitization of the template_md parameter, leading to potential exploitation through Ji...

Discovered 1 day ago

PoC for CVE-2023-44487

IetfHttp🟣 EPSS 94%7.5HIGH
HTTP/2 Protocol Vulnerability Allows for Rapid Stream Cancellation ...

The HTTP/2 protocol is susceptible to a denial of service vulnerability that can be exploited via rapid stream resets. This allows attackers to overwhelm servers by rapidly canceling requests, leading to significant resource consumption and potential service disruption. Exploitation of this vulne...

PoC for CVE-2026-21962

OracleOracle Http Server, Or...10CRITICAL
Vulnerability in Oracle HTTP Server and Weblogic Server Proxy Plug-in

An easily exploitable vulnerability in the Oracle HTTP Server and Oracle Weblogic Server Proxy Plug-in may allow unauthenticated attackers to gain access via HTTP. Attackers can compromise the server and potentially impact data integrity and confidentiality. This vulnerability can lead to unautho...

PoC for CVE-2026-22187

Open Microscopy E...Bio-formats6.8MEDIUM
Unsafe Java Deserialization in Bio-Formats Affects Open Microscopy ...

Bio-Formats versions up to and including 8.3.0 are susceptible to a vulnerability in the loci.formats.Memoizer class, which performs unsafe Java deserialization of .bfmemo files. This occurs during image processing when the application automatically loads and deserializes these memo files without...

PoC for CVE-2026-20404

MediaTekMt2735, Mt2737, Mt6813...7.5HIGH
Denial of Service Vulnerability in Modem by MediaTek

In MediaTek's modem, a security flaw exists due to insufficient input validation, which could allow attackers to induce a system crash. This vulnerability particularly arises when a User Equipment (UE) connects to a maliciously controlled rogue base station. Notably, the exploitation of this flaw...

PoC for CVE-2025-6018

7.8HIGH
Local Privilege Escalation in Linux Pluggable Authentication Module...

A Local Privilege Escalation vulnerability exists in pam-config, part of the Linux Pluggable Authentication Modules (PAM). This flaw permits a local attacker, such as an SSH user, to escalate their privileges to those of a privileged console user. By exploiting this vulnerability, attackers can e...

PoC for CVE-2026-2260

D-linkDcs-931l8.6HIGH
Command Injection Vulnerability in D-Link DCS-931L Camera

A command injection vulnerability exists in the D-Link DCS-931L camera model up to version 1.13.0, affecting the /goform/setSysAdmin endpoint. By manipulating the AdminID argument, an attacker can execute arbitrary OS commands remotely. This vulnerability is particularly concerning as it affects ...

PoC for CVE-2026-2259

AardappelLobster4.8MEDIUM
Memory Corruption in Aardappel Lobster Parsing Function

Aardappel Lobster has a vulnerability within the lobster::Parser::ParseStatements function in the library dev/src/lobster/parser.h. This flaw, which affects versions up to 2025.4, allows for memory corruption triggered from a local environment. The public disclosure of this vulnerability raises t...

PoC for CVE-2026-2258

AardappelLobster4.8MEDIUM
Memory Corruption Flaw in aardappel lobster Library Affects Local E...

A memory corruption vulnerability exists in the aardappel lobster library, affecting versions up to 2025.4. The issue lies within the function WaveFunctionCollapse located in dev/src/lobster/wfc.h. This vulnerability can only be exploited locally, allowing an attacker to manipulate the function a...

PoC for CVE-2017-7921

HikvisionHikvision Cameras🟣 EPSS 94%10CRITICAL
Improper Authentication Vulnerability in Hikvision Network Cameras

Hikvision network camera devices suffer from an improper authentication vulnerability, which arises when the system fails to adequately authenticate users. This deficiency could enable an attacker to escalate privileges and obtain sensitive information, risking the integrity and confidentiality o...

Discovered 2 days ago

PoC for CVE-2025-9074

DockerDocker Desktop9.3CRITICAL
Docker Desktop Vulnerability Allows Unauthorized Access to Docker E...

A security issue in Docker Desktop has been discovered, enabling local running Linux containers to communicate with the Docker Engine API through the default Docker subnet. This issue can arise irrespective of whether Enhanced Container Isolation (ECI) is active or if the 'Expose daemon on tcp://...

PoC for CVE-2026-2246

AprilroboticsApriltag4.8MEDIUM
Memory Corruption Vulnerability in AprilRobotics' Apriltag

A memory corruption vulnerability has been identified in the function apriltag_detector_detect of the Apriltag library. This issue allows for potential local exploitation, which may lead to unexpected behavior and security risks. Attackers with local access could manipulate the affected function,...

PoC for CVE-2026-2245

CCExtractorCcextractor4.8MEDIUM
Out-of-bounds Read Vulnerability in CCExtractor MPEG-TS File Parser

A vulnerability exists in CCExtractor affecting versions up to 183, specifically in the parse_PAT and parse_PMT functions within the MPEG-TS File Parser component. This issue arises from improper handling of input, leading to potential out-of-bounds read conditions. The exploit requires a local e...

PoC for CVE-2026-2242

Janet-langJanet4.8MEDIUM
Out-of-Bounds Read Vulnerability in Janet by Janet-lang

A vulnerability has been identified in Janet, the programming language developed by Janet-lang, where a flaw in the 'janetc_if' function within 'src/core/specials.c' could allow for an out-of-bounds read. This security issue requires local execution for exploitation and has been publicly disclose...

PoC for CVE-2025-6018

7.8HIGH
Local Privilege Escalation in Linux Pluggable Authentication Module...

A Local Privilege Escalation vulnerability exists in pam-config, part of the Linux Pluggable Authentication Modules (PAM). This flaw permits a local attacker, such as an SSH user, to escalate their privileges to those of a privileged console user. By exploiting this vulnerability, attackers can e...

PoC for CVE-2026-25049

N8n-ioN8n9.4CRITICAL
Workflow Automation Platform Vulnerability in n8n

n8n, the open-source workflow automation platform, has a vulnerability that allows authenticated users who can create or modify workflows to manipulate expressions in workflow parameters. This could lead to unintended command execution on the host system running n8n, posing a significant security...

PoC for CVE-2026-2241

Janet-langJanet4.8MEDIUM
Out-of-Bounds Read Vulnerability in Janet Language by Janet-lang

A vulnerability has been identified in Janet Language versions prior to 1.40.1, specifically within the os_strftime function of the src/core/os.c file. This flaw allows local attackers to perform manipulations that could result in out-of-bounds reads. Such vulnerabilities can lead to unauthorized...

PoC for CVE-2026-2240

Janet-langJanet4.8MEDIUM
Out-of-Bounds Read Vulnerability in Janet Programming Language by J...

A vulnerability exists in the Janet programming language, specifically in the janetc_pop_funcdef function located in src/core/compile.c. This issue allows for out-of-bounds read operations, potentially exposing sensitive data when exploited. The attack must be executed locally. It is crucial for ...

PoC for CVE-2025-6018

7.8HIGH
Local Privilege Escalation in Linux Pluggable Authentication Module...

A Local Privilege Escalation vulnerability exists in pam-config, part of the Linux Pluggable Authentication Modules (PAM). This flaw permits a local attacker, such as an SSH user, to escalate their privileges to those of a privileged console user. By exploiting this vulnerability, attackers can e...

PoC for CVE-2026-23723

LabredescefetrjWegia7.2HIGH
Authenticated SQL Injection in WeGIA Web Manager for Charitable Ins...

The WeGIA Web Manager for charitable institutions contains an authenticated SQL Injection vulnerability in the Atendido_ocorrenciaControle endpoint, specifically through the id_memorando parameter. This security flaw can lead to full database exfiltration, exposing sensitive Personally Identifiab...

PoC for CVE-2026-2227

D-linkDcs-931l5.1MEDIUM
Command Injection Vulnerability in D-Link DCS-931L Camera Firmware

A command injection vulnerability exists in the D-Link DCS-931L camera's firmware, specifically in the 'doSystem' function located in the '/setSystemAdmin' file. This issue arises from improper handling of the 'AdminID' argument, allowing remote attackers to execute arbitrary commands. This vulne...

PoC for CVE-2025-55182

MetaReact-server-dom-webpack🟣 EPSS 61%10CRITICAL
Remote Code Execution Vulnerability in React Server Components by Meta

A remote code execution vulnerability found in React Server Components allows attackers to exploit improperly handled payloads. This issue affects versions 19.0.0 through 19.2.0, compromising server function endpoints through unsafe deserialization of HTTP request payloads. As a result, this flaw...

PoC for CVE-2026-2226

Zhangzhou Douke N...DouPHP5.1MEDIUM
Unrestricted File Upload Vulnerability in DouPHP by Zhangzhou Douke...

A significant vulnerability exists in DouPHP affecting versions up to 1.9, linked to improper handling of input in the file /admin/file.php, specifically concerning the ZIP File Handler. This flaw allows an attacker to manipulate the sql_filename argument, facilitating unrestricted file uploads. ...

PoC for CVE-2026-2225

ItsourcecodeNews Portal Project6.9MEDIUM
SQL Injection Vulnerability in itsourcecode News Portal Project Adm...

A significant SQL injection vulnerability exists within the itsourcecode News Portal Project version 1.0. This flaw specifically targets the Administrator Login component, where improper handling of user input in the email argument of the /admin/index.php file allows attackers to manipulate SQL q...

PoC for CVE-2026-2224

Code-projectsOnline Reviewer System5.1MEDIUM
Cross Site Scripting Vulnerability in Online Reviewer System by Cod...

A security flaw has been identified in the Online Reviewer System version 1.0 developed by Code-Projects that enables attackers to exploit the application through cross site scripting (XSS). The vulnerability specifically affects the file /system/system/admins/manage/users/btn_functions.php, wher...

PoC for CVE-2026-2223

Code-projectsOnline Reviewer System6.9MEDIUM
SQL Injection Vulnerability in Code-Projects Online Reviewer System...

A security vulnerability has been identified within the Online Reviewer System version 1.0 by Code-Projects. This issue is associated with a particular functionality in the file located at /system/system/students/assessments/pretest/take/index.php. An unvalidated manipulation of the argument ID c...

PoC for CVE-2026-2221

Code-projectsOnline Reviewer System6.9MEDIUM
SQL Injection Vulnerability in Code-Projects Online Reviewer System...

A vulnerability identified in Code-Projects' Online Reviewer System 1.0 can be exploited via the /login/index.php file. By manipulating the Username argument, attackers can execute SQL injection attacks remotely, potentially compromising the system's integrity. This security flaw has been made pu...

PoC for CVE-2026-2220

Code-projectsOnline Reviewer System6.9MEDIUM
SQL Injection Vulnerability in Code-Projects Online Reviewer System...

A vulnerability exists in the Code-Projects Online Reviewer System 1.0, specifically in the /system/system/admins/assessments/pretest/btn_functions.php file. This flaw can be exploited through remote manipulation of the difficulty_id parameter, enabling attackers to execute SQL injection attacks....

PoC for CVE-2026-2218

D-linkDcs-933l5.3MEDIUM
Command Injection Vulnerability in D-Link DCS-933L Products

A command injection vulnerability exists in D-Link DCS-933L firmware versions up to 1.14.11 due to improper handling of parameters in the '/setSystemAdmin' functionality of the alphapd component. This flaw allows an attacker to remotely execute arbitrary commands by manipulating the AdminID argum...