Publicly Disclosed
PoC Exploits

🔴 Alway take caution when working with PoC Exploits 🔴

Discovered 12 hours ago

PoC for CVE-2025-12030

WordPressAcf To Rest Api4.3MEDIUM
Insecure Direct Object Reference in ACF to REST API Plugin for Word...

The ACF to REST API plugin for WordPress is susceptible to Insecure Direct Object Reference, enabling attackers with Contributor-level access and above to manipulate ACF fields for posts they do not own. This security issue stems from inadequate capability checks within the update_item_permission...

Discovered 13 hours ago

PoC for CVE-2025-14719

WordPressRelevanssi
SQL Injection Vulnerability in Relevanssi WordPress Plugin by Never5

The Relevanssi plugin, including its premium version, prior to specified updates, fails to properly sanitize and escape user-supplied parameters in SQL statements. This flaw can be exploited by users with contributor roles or higher, allowing them to execute arbitrary SQL queries, potentially com...

PoC for CVE-2025-14804

WordPressFrontend File Manager ...7.7HIGH
Path Traversal Vulnerability in Frontend File Manager for WordPress

The Frontend File Manager Plugin for WordPress prior to version 23.5 is susceptible to a path traversal vulnerability. This issue arises from inadequate validation of a path parameter and the ownership of files. As a result, any authenticated user, including those with subscriber-level access, ma...

Discovered 14 hours ago

PoC for CVE-2025-55182

MetaReact-server-dom-webpack🟣 EPSS 51%10CRITICAL
Remote Code Execution Vulnerability in React Server Components by Meta

A remote code execution vulnerability found in React Server Components allows attackers to exploit improperly handled payloads. This issue affects versions 19.0.0 through 19.2.0, compromising server function endpoints through unsafe deserialization of HTTP request payloads. As a result, this flaw...

PoC for CVE-2025-15474

AuntyfeyAuntyfey Smart Combina...5.3MEDIUM
Denial of Service Vulnerability in AuntyFey Smart Combination Lock ...

The AuntyFey Smart Combination Lock firmware versions up to December 24, 2025, are susceptible to an exploit that enables an unauthenticated attacker within Bluetooth Low Energy (BLE) proximity to initiate an overwhelming number of BLE connection attempts. This barrage of connection requests can ...

PoC for CVE-2025-9611

MicrosoftPlaywright7.2HIGH
DNS Rebinding Vulnerability in Microsoft Playwright MCP Server

The Microsoft Playwright MCP Server, prior to version 0.0.40, is susceptible to a DNS rebinding vulnerability due to inadequate validation of the Origin header in incoming connections. This flaw could allow attackers to exploit a victim's web browser to send unauthorized requests, potentially cau...

Discovered 15 hours ago

PoC for CVE-2025-14847

MongoDBMongodb Server🟣 EPSS 68%8.7HIGH
Heap Memory Exposure in MongoDB Server Versions by MongoDB

The vulnerability arises from mismatched length fields in Zlib compressed protocol headers within MongoDB Server, potentially allowing an unauthenticated client to access uninitialized heap memory. This could lead to unauthorized information exposure, affecting versions of MongoDB Server across m...

Discovered 21 hours ago

PoC for CVE-2025-15472

TrendnetTew-811dru8.6HIGH
OS Command Injection Vulnerability in TRENDnet TEW-811DRU Router

A vulnerability exists in the TRENDnet TEW-811DRU router that allows for OS command injection through the manipulation of the setDeviceURL function in the uapply.cgi file. This flaw provides remote attackers the capability to execute arbitrary commands on the affected device, potentially compromi...

PoC for CVE-2025-15471

TrendnetTew-713re9.3CRITICAL
OS Command Injection Vulnerability in TRENDnet TEW-713RE Router

A security vulnerability exists in TRENDnet TEW-713RE version 1.02, specifically in the '/goformX/formFSrvX' file. This unknown function allows an attacker to manipulate the 'SZCMD' argument, leading to the possibility of remote OS command injection. The exploit methodology is now publicly availa...

Discovered 1 day ago

PoC for CVE-2020-36917

Guangzhou Yeroo T...Ids6 Dsspro Digital Si...8.6HIGH
Sensitive Information Disclosure in iDS6 DSSPro Digital Signage Sys...

The iDS6 DSSPro Digital Signage System version 6.2 is susceptible to a sensitive information disclosure flaw. This vulnerability enables remote attackers to intercept essential authentication credentials transmitted in cleartext through cookies. By exploiting the autoSave feature, attackers can c...

PoC for CVE-2020-36914

Shenzhen Xingmeng...Qihang Media Web (qh.a...8.6HIGH
Sensitive Information Disclosure in QiHang Media Web Digital Signag...

The QiHang Media Web Digital Signage version 3.0.9 is affected by a vulnerability that allows remote attackers to intercept user authentication credentials. This exploitation results from cleartext cookie transmission, which can facilitate man-in-the-middle attacks, enabling attackers to capture ...

PoC for CVE-2020-36925

Arteco-globalArteco Web Client Dvr/nvr8.7HIGH
Session Hijacking Vulnerability in Arteco Web Client DVR/NVR

The Arteco Web Client DVR/NVR is susceptible to a session hijacking vulnerability, which arises from insufficient complexity in session IDs. This flaw permits remote attackers to conduct brute force attacks within a specific numeric range, enabling them to guess valid session IDs. Once compromise...

PoC for CVE-2020-36925

Arteco-globalArteco Web Client Dvr/nvr8.7HIGH
Session Hijacking Vulnerability in Arteco Web Client DVR/NVR

The Arteco Web Client DVR/NVR is susceptible to a session hijacking vulnerability, which arises from insufficient complexity in session IDs. This flaw permits remote attackers to conduct brute force attacks within a specific numeric range, enabling them to guess valid session IDs. Once compromise...

PoC for CVE-2020-36924

Pro-braviaSony Bravia Digital Si...5.3MEDIUM
Remote File Inclusion Vulnerability in Sony BRAVIA Digital Signage

The Sony BRAVIA Digital Signage version 1.7.8 exhibits a significant vulnerability related to remote file inclusion. This flaw allows unauthorized users to inject arbitrary client-side scripts via the content material URL parameter. By exploiting this vulnerability, attackers can potentially hija...

PoC for CVE-2020-36924

Pro-braviaSony Bravia Digital Si...5.3MEDIUM
Remote File Inclusion Vulnerability in Sony BRAVIA Digital Signage

The Sony BRAVIA Digital Signage version 1.7.8 exhibits a significant vulnerability related to remote file inclusion. This flaw allows unauthorized users to inject arbitrary client-side scripts via the content material URL parameter. By exploiting this vulnerability, attackers can potentially hija...

PoC for CVE-2020-36925

Arteco-globalArteco Web Client Dvr/nvr8.7HIGH
Session Hijacking Vulnerability in Arteco Web Client DVR/NVR

The Arteco Web Client DVR/NVR is susceptible to a session hijacking vulnerability, which arises from insufficient complexity in session IDs. This flaw permits remote attackers to conduct brute force attacks within a specific numeric range, enabling them to guess valid session IDs. Once compromise...

PoC for CVE-2020-36924

Pro-braviaSony Bravia Digital Si...5.3MEDIUM
Remote File Inclusion Vulnerability in Sony BRAVIA Digital Signage

The Sony BRAVIA Digital Signage version 1.7.8 exhibits a significant vulnerability related to remote file inclusion. This flaw allows unauthorized users to inject arbitrary client-side scripts via the content material URL parameter. By exploiting this vulnerability, attackers can potentially hija...

PoC for CVE-2020-36922

Pro-braviaSony Bravia Digital Si...6.9MEDIUM
Information Disclosure Vulnerability in Sony BRAVIA Digital Signage...

The Sony BRAVIA Digital Signage version 1.7.8 has a vulnerability that enables unauthenticated attackers to exploit exposed API endpoints. This flaw allows unauthorized access to sensitive system details, including but not limited to network interface information, server configurations, and cruci...

PoC for CVE-2020-36922

Pro-braviaSony Bravia Digital Si...6.9MEDIUM
Information Disclosure Vulnerability in Sony BRAVIA Digital Signage...

The Sony BRAVIA Digital Signage version 1.7.8 has a vulnerability that enables unauthenticated attackers to exploit exposed API endpoints. This flaw allows unauthorized access to sensitive system details, including but not limited to network interface information, server configurations, and cruci...

PoC for CVE-2020-36922

Pro-braviaSony Bravia Digital Si...6.9MEDIUM
Information Disclosure Vulnerability in Sony BRAVIA Digital Signage...

The Sony BRAVIA Digital Signage version 1.7.8 has a vulnerability that enables unauthenticated attackers to exploit exposed API endpoints. This flaw allows unauthorized access to sensitive system details, including but not limited to network interface information, server configurations, and cruci...

PoC for CVE-2020-36923

Sony Electronics ...Sony Bravia Digital Si...6.9MEDIUM
Insecure Direct Object Reference Vulnerability in Sony BRAVIA Digit...

Sony BRAVIA Digital Signage version 1.7.8 is susceptible to an insecure direct object reference issue, which permits attackers to circumvent authorization controls. This vulnerability can be exploited to gain unauthorized access to hidden system resources, including the '/#/content-creation' path...

PoC for CVE-2020-36920

YerootechIds6 Dsspro Digital Si...8.7HIGH
Improper Access Control in iDS6 DSSPro Digital Signage System by Ye...

The iDS6 DSSPro Digital Signage System version 6.2 is susceptible to an improper access control vulnerability, allowing authenticated users to elevate their privileges. By exploiting insecure direct object references through console JavaScript functions, attackers can gain the ability to create n...

PoC for CVE-2020-36921

RedRed-v Super Digital Si...6.9MEDIUM
Information Disclosure Vulnerability in RED-V Super Digital Signage...

The RED-V Super Digital Signage System version 5.1.1 is susceptible to an information disclosure vulnerability that permits unauthenticated attackers to access sensitive webserver log files. By exploiting this flaw, attackers can navigate various endpoints to extract critical system resources and...

PoC for CVE-2020-36920

YerootechIds6 Dsspro Digital Si...8.7HIGH
Improper Access Control in iDS6 DSSPro Digital Signage System by Ye...

The iDS6 DSSPro Digital Signage System version 6.2 is susceptible to an improper access control vulnerability, allowing authenticated users to elevate their privileges. By exploiting insecure direct object references through console JavaScript functions, attackers can gain the ability to create n...

PoC for CVE-2020-36920

YerootechIds6 Dsspro Digital Si...8.7HIGH
Improper Access Control in iDS6 DSSPro Digital Signage System by Ye...

The iDS6 DSSPro Digital Signage System version 6.2 is susceptible to an improper access control vulnerability, allowing authenticated users to elevate their privileges. By exploiting insecure direct object references through console JavaScript functions, attackers can gain the ability to create n...

PoC for CVE-2020-36918

YerootechIds6 Dsspro Digital Si...5.1MEDIUM
Cross-Site Request Forgery in iDS6 DSSPro Digital Signage System by...

The iDS6 DSSPro Digital Signage System version 6.2 is susceptible to a cross-site request forgery (CSRF) issue that permits attackers to execute administrative functions without proper request validation. This vulnerability arises from insufficient CSRF protections, which allows malicious actors ...

PoC for CVE-2020-36918

YerootechIds6 Dsspro Digital Si...5.1MEDIUM
Cross-Site Request Forgery in iDS6 DSSPro Digital Signage System by...

The iDS6 DSSPro Digital Signage System version 6.2 is susceptible to a cross-site request forgery (CSRF) issue that permits attackers to execute administrative functions without proper request validation. This vulnerability arises from insufficient CSRF protections, which allows malicious actors ...

PoC for CVE-2020-36918

YerootechIds6 Dsspro Digital Si...5.1MEDIUM
Cross-Site Request Forgery in iDS6 DSSPro Digital Signage System by...

The iDS6 DSSPro Digital Signage System version 6.2 is susceptible to a cross-site request forgery (CSRF) issue that permits attackers to execute administrative functions without proper request validation. This vulnerability arises from insufficient CSRF protections, which allows malicious actors ...

PoC for CVE-2020-36916

TdmsignageTdm Digital Signage Pc...8.5HIGH
Elevation of Privileges Vulnerability in TDM Digital Signage PC Pla...

The TDM Digital Signage PC Player version 4.1.0.4 contains a vulnerability that permits authenticated users to modify executable files due to improper permissions. This flaw can be exploited by attackers who, after gaining access to an account, can replace legitimate executables with malicious bi...

PoC for CVE-2020-36916

TdmsignageTdm Digital Signage Pc...8.5HIGH
Elevation of Privileges Vulnerability in TDM Digital Signage PC Pla...

The TDM Digital Signage PC Player version 4.1.0.4 contains a vulnerability that permits authenticated users to modify executable files due to improper permissions. This flaw can be exploited by attackers who, after gaining access to an account, can replace legitimate executables with malicious bi...

PoC for CVE-2020-36915

AdtecdigitalSignedje Digital Signa...8.7HIGH
Default Credentials Vulnerability in Adtec Digital SignEdje Digital...

Adtec Digital SignEdje Digital Signage Player v2.08.28 is vulnerable due to multiple hardcoded default credentials. This design flaw enables unauthenticated remote access to the web, telnet, and SSH interfaces. Malicious actors can exploit these hardcoded credentials to gain root-level access, po...

PoC for CVE-2020-36915

AdtecdigitalSignedje Digital Signa...8.7HIGH
Default Credentials Vulnerability in Adtec Digital SignEdje Digital...

Adtec Digital SignEdje Digital Signage Player v2.08.28 is vulnerable due to multiple hardcoded default credentials. This design flaw enables unauthenticated remote access to the web, telnet, and SSH interfaces. Malicious actors can exploit these hardcoded credentials to gain root-level access, po...

PoC for CVE-2020-36912

PlexusPlexus Anblick Digital...5.1MEDIUM
Open Redirect Vulnerability in Plexus anblick Digital Signage Manag...

The Plexus anblick Digital Signage Management version 3.1.13 contains a significant open redirect vulnerability within the 'PantallaLogin' script. This flaw arises from inadequate validation of the 'pagina' GET parameter, enabling attackers to forge malicious links. Such manipulation can redirect...

PoC for CVE-2020-36913

All-dynamics Soft...Enlogic:show Digital S...8.5HIGH
Session Fixation Vulnerability in All-Dynamics Software enlogic:show

The enlogic:show version 2.0.2 from All-Dynamics Software is susceptible to a session fixation vulnerability. This issue allows attackers to manipulate the PHP session identifier during the user login process. By sending specially crafted HTTP GET requests to welcome.php with a custom session tok...

PoC for CVE-2020-36909

Secure ComputingSnapgear Management Co...8.7HIGH
File Manipulation Vulnerability in SnapGear Management Console by S...

The SnapGear Management Console SG560 version 3.1.5 is affected by a file manipulation vulnerability that permits authenticated users to perform unauthorized actions such as reading, writing, and deleting files. This vulnerability arises from flaws in the edit_config_files CGI script, which can b...

PoC for CVE-2020-36910

Cayin TechnologySmp-8000qd8.7HIGH
Authenticated Remote Command Injection in Cayin Signage Media Playe...

Cayin Signage Media Player 3.0 is susceptible to an authenticated remote command injection vulnerability impacting the system.cgi and wizard_system.cgi pages. This flaw allows attackers to exploit the 'NTP_Server_IP' parameter while using default credentials, enabling them to execute arbitrary sh...

PoC for CVE-2020-36910

Cayin TechnologySmp-8000qd8.7HIGH
Authenticated Remote Command Injection in Cayin Signage Media Playe...

Cayin Signage Media Player 3.0 is susceptible to an authenticated remote command injection vulnerability impacting the system.cgi and wizard_system.cgi pages. This flaw allows attackers to exploit the 'NTP_Server_IP' parameter while using default credentials, enabling them to execute arbitrary sh...

PoC for CVE-2020-36910

Cayin TechnologySmp-8000qd8.7HIGH
Authenticated Remote Command Injection in Cayin Signage Media Playe...

Cayin Signage Media Player 3.0 is susceptible to an authenticated remote command injection vulnerability impacting the system.cgi and wizard_system.cgi pages. This flaw allows attackers to exploit the 'NTP_Server_IP' parameter while using default credentials, enabling them to execute arbitrary sh...

PoC for CVE-2020-36909

Secure ComputingSnapgear Management Co...8.7HIGH
File Manipulation Vulnerability in SnapGear Management Console by S...

The SnapGear Management Console SG560 version 3.1.5 is affected by a file manipulation vulnerability that permits authenticated users to perform unauthorized actions such as reading, writing, and deleting files. This vulnerability arises from flaws in the edit_config_files CGI script, which can b...

PoC for CVE-2020-36907

Extreme NetworksAerohive Hiveos8.7HIGH
Denial of Service Vulnerability in Aerohive HiveOS by Extreme Networks

Aerohive HiveOS contains a vulnerability in its NetConfig UI that could allow unauthenticated attackers to disrupt service. By sending a specially crafted HTTP request to the action.php5 script with specific parameters, an attacker can render the web interface unusable, causing service disruption...

PoC for CVE-2020-36908

Secure ComputingSnapgear Management Co...5.1MEDIUM
Cross-Site Request Forgery Vulnerability in SnapGear Management Con...

The SnapGear Management Console SG560 version 3.1.5 is vulnerable to a cross-site request forgery (CSRF) flaw that enables attackers to execute unauthorized administrative actions without user consent. By crafting a malicious web page, an attacker can trick a legitimate user into submitting a for...

PoC for CVE-2020-36908

Secure ComputingSnapgear Management Co...5.1MEDIUM
Cross-Site Request Forgery Vulnerability in SnapGear Management Con...

The SnapGear Management Console SG560 version 3.1.5 is vulnerable to a cross-site request forgery (CSRF) flaw that enables attackers to execute unauthorized administrative actions without user consent. By crafting a malicious web page, an attacker can trick a legitimate user into submitting a for...

PoC for CVE-2020-36907

Extreme NetworksAerohive Hiveos8.7HIGH
Denial of Service Vulnerability in Aerohive HiveOS by Extreme Networks

Aerohive HiveOS contains a vulnerability in its NetConfig UI that could allow unauthenticated attackers to disrupt service. By sending a specially crafted HTTP request to the action.php5 script with specific parameters, an attacker can render the web interface unusable, causing service disruption...

PoC for CVE-2020-36905

Fibar Group S.a.Home Center 35.1MEDIUM
Remote File Inclusion in FIBARO System Home Center by FIBARO

The FIBARO System Home Center 5.021 is impacted by a remote file inclusion vulnerability due to an undocumented proxy API. This issue enables attackers to exploit the 'url' GET parameter, allowing them to inject arbitrary client-side scripts. By leveraging this vulnerability, attackers can includ...

PoC for CVE-2020-36906

P5Fnip-8x16a5.3MEDIUM
Cross-Site Request Forgery Vulnerability in P5 FNIP-8x16A FNIP-4xSH

The P5 FNIP-8x16A FNIP-4xSH version 1.0.20 is vulnerable to cross-site request forgery (CSRF), which allows attackers to execute unauthorized administrative actions. By deceiving a logged-in user into accessing a malicious webpage, an attacker can manipulate the victim's session to create new adm...

PoC for CVE-2020-36906

P5Fnip-8x16a5.3MEDIUM
Cross-Site Request Forgery Vulnerability in P5 FNIP-8x16A FNIP-4xSH

The P5 FNIP-8x16A FNIP-4xSH version 1.0.20 is vulnerable to cross-site request forgery (CSRF), which allows attackers to execute unauthorized administrative actions. By deceiving a logged-in user into accessing a malicious webpage, an attacker can manipulate the victim's session to create new adm...

PoC for CVE-2020-36905

Fibar Group S.a.Home Center 35.1MEDIUM
Remote File Inclusion in FIBARO System Home Center by FIBARO

The FIBARO System Home Center 5.021 is impacted by a remote file inclusion vulnerability due to an undocumented proxy API. This issue enables attackers to exploit the 'url' GET parameter, allowing them to inject arbitrary client-side scripts. By leveraging this vulnerability, attackers can includ...

PoC for CVE-2020-36905

Fibar Group S.a.Home Center 35.1MEDIUM
Remote File Inclusion in FIBARO System Home Center by FIBARO

The FIBARO System Home Center 5.021 is impacted by a remote file inclusion vulnerability due to an undocumented proxy API. This issue enables attackers to exploit the 'url' GET parameter, allowing them to inject arbitrary client-side scripts. By leveraging this vulnerability, attackers can includ...

PoC for CVE-2025-43529

AppleiOS And iPad OS8.8HIGH
Use-After-Free Vulnerability in Apple iOS and macOS Products

A significant use-after-free vulnerability has been identified in Apple’s iOS and macOS products, impacting versions prior to the latest updates. This flaw arises due to improper memory management, allowing maliciously crafted web content to trigger arbitrary code execution. Apple has acknowledge...

Discovered 2 days ago

PoC for CVE-2025-68926

RustfsRustfs9.8CRITICAL
Authentication Vulnerability in RustFS Object Storage System

The RustFS object storage system, prior to version 1.0.0-alpha.77, suffers from a significant authentication vulnerability due to the use of a hardcoded static token, 'rustfs rpc'. This token is exposed in the source code and is non-configurable, meaning it cannot be altered or rotated. As a resu...

Latest Cyber Security Exploit PoCs