Publicly Disclosed
PoC Exploits

🔴 Alway take caution when working with PoC Exploits 🔴

Discovered just now...

PoC for CVE-2026-23398

LinuxLinux
Linux Kernel Vulnerability Affecting ICMP Protocol Handling

A vulnerability in the Linux kernel's ICMP protocol handling could lead to a kernel panic upon receiving specific ICMP Fragmentation Needed errors. The issue arises from the unconditional dereference of an unregistered protocol's handler, which may result in a NULL pointer dereference. This occur...

PoC for CVE-2025-49132

PterodactylPanel🟣 EPSS 13%10CRITICAL
Remote Code Execution Vulnerability in Pterodactyl Game Server Mana...

Pterodactyl, a widely used free and open-source game server management panel, has a significant vulnerability that allows unauthorized remote code execution. This occurs through the /locales/locale.json endpoint when specific query parameters are manipulated. Attackers exploiting this flaw can ex...

PoC for CVE-2026-39363

VitejsVite8.2HIGH
WebSocket Vulnerability in Vite Frontend Framework

A vulnerability in the Vite frontend tooling framework allows unauthorized access to arbitrary files on the server. If an attacker connects to the Vite development server's WebSocket without an Origin header, they can exploit the custom WebSocket event 'vite:invoke' to retrieve file contents as J...

Discovered 2 hours ago

PoC for CVE-2026-34197

ApacheApache ActiveMQ Broker8.8HIGH
Code Injection Vulnerability in Apache ActiveMQ Broker Up to Versio...

Apache ActiveMQ Broker is prone to a code injection vulnerability due to improper input validation in the Jolokia JMX-HTTP bridge. By default, this bridge exposes a web console that allows the execution of operations on all ActiveMQ MBeans. An authenticated attacker can exploit this vulnerability...

Discovered 12 hours ago

PoC for CVE-2026-33017

Langflow-aiLangflow9.3CRITICAL
Authentication Bypass in Langflow Tool for AI-Powered Workflows

Langflow, a tool for constructing and deploying AI-driven agents and workflows, is susceptible to a vulnerability in the POST /api/v1/build_public_tmp/{flow_id}/flow endpoint in versions before 1.9.0. This vulnerability enables an attacker to build public flows without authentication, leveraging ...

Discovered 15 hours ago

PoC for CVE-2026-4338

WordPressActivitypub7.5HIGH
Improper Access Control in ActivityPub Plugin for WordPress

The ActivityPub WordPress plugin prior to version 8.0.2 contains a flaw that allows unauthenticated users to access sensitive content, including drafts, scheduled, and pending posts. This lack of proper filtering enables unauthorized visibility of unpublished materials, potentially leading to inf...

Discovered 18 hours ago

PoC for CVE-2026-22732

VmwareSpring Security9.1CRITICAL
Improper Handling of HTTP Response Headers in Spring Security by Pi...

The vulnerability exists within Spring Security when applications define HTTP response headers. In certain configurations, these headers may not be written properly, which might lead to unexpected behavior and potential exposure of sensitive information. This impacts multiple versions across the ...

Discovered 19 hours ago

PoC for CVE-2026-4406

WordPressGravity Forms4.7MEDIUM
Reflected Cross-Site Scripting Vulnerability in Gravity Forms Plugi...

The Gravity Forms plugin for WordPress has a vulnerability that allows reflected cross-site scripting through the `form_ids` parameter in the `gform_get_config` AJAX action. This issue affects all versions up to and including 2.9.30. It stems from the `GFCommon::send_json()` method outputting JSO...

Discovered 20 hours ago

PoC for CVE-2025-8088

Win.rar GmbhWinrar8.4HIGH
Path Traversal Vulnerability in WinRAR for Windows by ESET

A path traversal vulnerability present in the Windows version of WinRAR could enable attackers to execute arbitrary code by crafting specially designed malicious archive files. This type of exploitation was observed in the wild, bringing attention to the efforts of security researchers, including...

PoC for CVE-2026-23524

LaravelReverb9.8CRITICAL
Remote Code Execution Vulnerability in Laravel Reverb by Laravel

The Laravel Reverb component, used for real-time WebSocket communication in Laravel applications, is vulnerable due to its handling of data from the Redis channel. In versions 1.6.3 and below, Reverb improperly utilizes PHP’s unserialize() function without adequately restricting the classes that ...

Discovered 1 day ago

PoC for CVE-2024-56426

SamsungExynos Mobile and Wear...7.5HIGH
Out-of-Bounds Write Vulnerability in Samsung Exynos Mobile and Wear...

A vulnerability exists in Samsung's Exynos mobile and wearable processors due to improper validation on incoming USB packets. This lack of length checks can potentially lead to out-of-bounds writes, allowing attackers to modify memory contents and execute arbitrary code. The affected processors i...

PoC for CVE-2026-5741

SuvarchalDocker-mcp-server6.9MEDIUM
OS Command Injection in suvarchal Docker MCP Server by Suvarchal

A vulnerability has been discovered in the Suvarchal Docker MCP Server, specifically in the HTTP Interface's functions such as stop_container, remove_container, and pull_image in the src/index.ts file. This flaw allows for OS command injection, which can potentially be exploited remotely. The iss...

PoC for CVE-2025-9074

DockerDocker Desktop9.3CRITICAL
Docker Desktop Vulnerability Allows Unauthorized Access to Docker E...

A security issue in Docker Desktop has been discovered, enabling local running Linux containers to communicate with the Docker Engine API through the default Docker subnet. This issue can arise irrespective of whether Enhanced Container Isolation (ECI) is active or if the 'Expose daemon on tcp://...

PoC for CVE-2026-23696

Windmill LabsWindmill Ce (community...9.4CRITICAL
SQL Injection Vulnerability in Windmill CE and EE by Windmill Labs

Versions 1.276.0 through 1.603.2 of Windmill CE and EE have a security flaw in the folder ownership management feature that enables authenticated attackers to exploit SQL through the owner parameter. This vulnerability can lead to the unauthorized reading of sensitive data, including JWT signing ...

PoC for CVE-2026-23696

Windmill LabsWindmill Ce (community...9.4CRITICAL
SQL Injection Vulnerability in Windmill CE and EE by Windmill Labs

Versions 1.276.0 through 1.603.2 of Windmill CE and EE have a security flaw in the folder ownership management feature that enables authenticated attackers to exploit SQL through the owner parameter. This vulnerability can lead to the unauthorized reading of sensitive data, including JWT signing ...

PoC for CVE-2026-32662

GardynCloud Api6.9MEDIUM
API Vulnerability in Gardyn's IoT Gardening System

The Gardyn IoT Gardening System has a significant security issue where development and test API endpoints are accessible, mirroring the functionality of production systems. This exposure can be exploited, leading to potential security breaches. It is crucial for users to be aware of this vulnerab...

PoC for CVE-2026-32646

GardynCloud Api8.7HIGH
Unauthorized Access Vulnerability in Gardyn's Device Management Int...

An unauthorized access vulnerability exists in Gardyn's Smart Garden System, allowing attackers to access a specific administrative endpoint without proper authentication. This exposure could enable malicious actors to manipulate device management functions, posing a security risk to users' syste...

PoC for CVE-2026-28767

GardynCloud Api6.9MEDIUM
Unauthorized Access Vulnerability in Gardyn's Smart Garden Product

An administrative endpoint in Gardyn's Smart Garden is exposed to unauthorized access due to insufficient authentication controls. This vulnerability allows attackers to interact with administrative features without proper credentials, potentially leading to unauthorized modifications or sensitiv...

PoC for CVE-2026-28766

GardynCloud Api9.2CRITICAL
Authentication Bypass Vulnerability in Gardyn Products

A security flaw in Gardyn products allows unauthenticated access to sensitive endpoint information, exposing all user account data for registered users. This vulnerability presents a significant risk, as it enables potential attackers to retrieve personal information without the need for authenti...

PoC for CVE-2026-25197

GardynCloud Api9.3CRITICAL
User Profile Pivoting Vulnerability in Gardyn's API

A security flaw exists within the Gardyn API that permits authenticated users to access and modify data related to other user profiles. By manipulating the identifier in API calls, an attacker can gain unintended access to sensitive information, potentially leading to unauthorized data exposure a...

PoC for CVE-2025-10681

GardynMobile Application8.8HIGH
Hardcoded Credentials in Mobile App and Firmware of Gardyn's Smart ...

The Smart Plant System by Gardyn contains a significant vulnerability involving hardcoded storage credentials within its mobile application and device firmware. These credentials not only lack sufficient restrictions on end-user permissions but also do not have an expiration mechanism in place. T...

PoC for CVE-2025-1242

GardynHome Kit9.3CRITICAL
IoT Hub Vulnerability in Gardyn Products Exposes Administrative Cre...

The Gardyn IoT Hub exhibits a vulnerability where administrative credentials can be extracted via its application API responses, reverse engineering of the mobile application, and the device's firmware. This flaw may grant an attacker full administrative access to the IoT Hub, consequently puttin...

PoC for CVE-2026-22679

Weaver Network Co...E-cology9.3CRITICAL
Unauthenticated Remote Code Execution in Weaver E-cology 10.0

Weaver E-cology 10.0 prior to version 20260312 is exposed to an unauthenticated remote code execution vulnerability. This occurs in the /papi/esearch/data/devops/dubboApi/debug/method endpoint, which allows malicious actors to execute arbitrary commands. By crafting specific POST requests with at...

PoC for CVE-2021-4473

Beijing Topsec Ne...Tianxin Internet Behav...9.3CRITICAL
Command Injection Vulnerability in Tianxin Internet Behavior Manage...

The Tianxin Internet Behavior Management System has a command injection vulnerability within its Reporter component. This issue allows unauthenticated attackers to execute arbitrary commands by manipulating the objClass parameter with crafted shell metacharacters and output redirection. If exploi...

PoC for CVE-2026-22666

DolibarrDolibarr Erp/crm8.6HIGH
Authenticated Remote Code Execution in Dolibarr ERP/CRM by Dolibarr

Dolibarr ERP/CRM versions prior to 23.0.2 suffer from an authenticated remote code execution vulnerability in the dol_eval_standard() function. This flaw arises from inadequate string checks in whitelist mode and a failure to recognize PHP dynamic callable syntax. An attacker with administrator p...

PoC for CVE-2026-39324

RackRack-session9.3CRITICAL
Session Management Vulnerability in Rack's Cookie Implementation

An issue has been identified in Rack::Session's cookie implementation, where decryption failures in session management are not adequately handled. When configured with secrets, if cookie decryption fails, an incorrect fallback to a default decoder occurs instead of rejecting the cookie. This flaw...

Discovered 2 days ago

PoC for CVE-2026-1900

WordPressLink Whisper Free6.5MEDIUM
Unauthenticated Settings Update Vulnerability in Link Whisper Free ...

The Link Whisper Free plugin for WordPress prior to version 0.9.1 has a serious issue where its REST API endpoint is publicly accessible. This flaw allows attackers to make unauthorized changes to plugin settings without the need for authentication, potentially leading to data exposure and modifi...

PoC for CVE-2026-4079

WordPressSql Chart Builder6.5MEDIUM
SQL Injection Vulnerability in SQL Chart Builder Plugin by WordPress

The SQL Chart Builder plugin for WordPress, prior to version 2.3.8, is susceptible to SQL injection due to insufficient input sanitization. Malicious actors could exploit this vulnerability by injecting arbitrary SQL queries through user inputs that are directly concatenated into SQL statements, ...

PoC for CVE-2025-15611

WordPressPopup Box5.4MEDIUM
Cross-Site Request Forgery Vulnerability in Popup Box Plugin for Wo...

The Popup Box WordPress plugin versions prior to 5.5.0 have a critical vulnerability where nonces are not properly validated in the add_or_edit_popupbox() function. This flaw permits unauthenticated attackers to execute Cross-Site Request Forgery attacks. If an admin inadvertently visits a compro...

PoC for CVE-2023-6246

Red HatGlibc🟣 EPSS 27%8.4HIGH
Heap-Based Buffer Overflow Vulnerability in glibc Library

A heap-based buffer overflow vulnerability exists in the __vsyslog_internal function of the glibc library, which is crucial for logging system events through the syslog and vsyslog functionalities. The issue arises if the openlog function is not invoked or if it is invoked with a NULL ident argum...

PoC for CVE-2026-33186

GrpcGrpc-go9.1CRITICAL
Authorization Bypass Vulnerability in gRPC-Go by Google

The gRPC-Go server has a vulnerability that allows an attacker to bypass authorization checks due to improper input validation on the HTTP/2 ':path' pseudo-header. Specifically, versions before 1.79.3 accepted requests with omitted leading slashes in the ':path', allowing unauthorized access to s...

PoC for CVE-2026-32945

PjsipPjproject8.4HIGH
Heap-based Buffer Overflow in PJSIP Open Source Multimedia Communic...

The PJSIP multimedia communication library has a vulnerability related to a heap-based buffer overflow in the DNS parser's name length handler. This issue impacts applications using PJSIP's integrated DNS resolver, which is configured through pjsua_config.nameserver or UaConfig.nameserver setting...

PoC for CVE-2026-27654

F5Nginx Open Source8.8HIGH
Buffer Overflow Vulnerability in NGINX Open Source and NGINX Plus

A vulnerability exists within the ngx_http_dav_module of NGINX Open Source and NGINX Plus that can be exploited to trigger a buffer overflow in the NGINX worker process. This scenario is possible when configuration files utilize the DAV module's MOVE or COPY methods combined with specific prefix ...

PoC for CVE-2025-55182

MetaReact-server-dom-webpack🟣 EPSS 66%10CRITICAL
Remote Code Execution Vulnerability in React Server Components by Meta

A remote code execution vulnerability found in React Server Components allows attackers to exploit improperly handled payloads. This issue affects versions 19.0.0 through 19.2.0, compromising server function endpoints through unsafe deserialization of HTTP request payloads. As a result, this flaw...

PoC for CVE-2026-5719

ItsourcecodeConstruction Managemen...5.3MEDIUM
SQL Injection Vulnerability in itsourcecode Construction Management...

A vulnerability exists in the itsourcecode Construction Management System 1.0, specifically within the argument handling in the borrowedtool.php file. By manipulating the input parameters, an attacker can execute SQL injection attacks remotely, jeopardizing the security of the system and potentia...

PoC for CVE-2023-32749

PydioCells🟣 EPSS 47%8.8HIGH
Privilege Escalation in Pydio Cells by External User Role Manipulation

Pydio Cells allows users to create external users for file sharing. However, by altering the HTTP request during this process, it is possible to assign arbitrary roles to new external users. This vulnerability enables an attacker to grant themselves or any other unauthorized user access to all ce...

PoC for CVE-2025-30065

ApacheApache Parquet Java10CRITICAL
Code Execution Vulnerability in Apache Parquet Product by Apache

The parquet-avro module of Apache Parquet versions 1.15.0 and earlier contains a schema parsing vulnerability that enables attackers to execute arbitrary code. It is crucial for users to upgrade to version 1.15.1 or later to mitigate this risk and secure their systems against potential exploitation.

PoC for CVE-2026-5705

Code-projectsOnline Hotel Booking5.3MEDIUM
Cross-Site Scripting in Online Hotel Booking by Code-Projects

A cross-site scripting vulnerability exists in the Online Hotel Booking 1.0 software, specifically affecting the /booknow.php component. This flaw allows attackers to manipulate the roomname parameter, enabling them to execute arbitrary scripts in the context of another user's browser. The exploi...

PoC for CVE-2026-5692

TotolinkA7100ru6.9MEDIUM
OS Command Injection Vulnerability in Totolink A7100RU Router

A security flaw has been identified in the Totolink A7100RU router, specifically in the function setGameSpeedCfg located in /cgi-bin/cstecgi.cgi. This vulnerability allows for OS command injection through manipulation of the 'enable' argument, potentially enabling an attacker to execute arbitrary...

PoC for CVE-2026-5691

TotolinkA7100ru6.9MEDIUM
OS Command Injection in Totolink Router A7100RU

A security flaw has been identified in the Totolink A7100RU router, specifically within the setFirewallType function of the cstecgi.cgi file. This vulnerability allows attackers to manipulate the firewallType parameter, potentially leading to OS command injection. This threat can be exploited rem...

PoC for CVE-2026-5690

TotolinkA7100ru6.9MEDIUM
OS Command Injection Vulnerability in Totolink A7100RU Router

A vulnerability exists in the Totolink A7100RU router due to improper validation in the setRemoteCfg function of the cstecgi.cgi file. By manipulating the enable argument, an attacker can execute OS commands remotely, potentially compromising the device's security. This exploit has been publicly ...

PoC for CVE-2026-5689

TotolinkA7100ru6.9MEDIUM
OS Command Injection in Totolink A7100RU Product

A vulnerability has been identified in the Totolink A7100RU firmware version 7.4cu.2313_b20191024, specifically within the setNtpCfg function of the cgi-bin/cstecgi.cgi file. This issue arises from improper handling of the 'tz' argument, allowing attackers to perform OS command injection. Such ma...

PoC for CVE-2026-5688

TotolinkA7100ru6.9MEDIUM
OS Command Injection Vulnerability in Totolink A7100RU

A security flaw exists in the Totolink A7100RU router, specifically within the setDdnsCfg function of the /cgi-bin/cstecgi.cgi file. This vulnerability allows an attacker to manipulate the 'provider' argument, potentially leading to OS command injection. Such attacks can be executed remotely, mak...

PoC for CVE-2026-5687

TendaCx12l8.7HIGH
Buffer Overflow Vulnerability in Tenda CX12L Router

A vulnerability exists in the Tenda CX12L router, specifically within the fromNatStaticSetting function located in the /goform/NatStaticSetting file. This weakness allows an attacker to execute a stack-based buffer overflow by manipulating input arguments. The vulnerability can be exploited remot...

PoC for CVE-2026-5686

TendaCx12l8.7HIGH
Stack-Based Buffer Overflow in Tenda CX12L Router

A security vulnerability has been identified in the Tenda CX12L router's handling of the RouteStatic function, specifically affecting the /goform/RouteStatic file. An attacker can exploit this flaw by manipulating the 'page' argument, leading to a stack-based buffer overflow. The nature of this v...

PoC for CVE-2026-5685

TendaCx12l8.7HIGH
Stack-Based Buffer Overflow in Tenda CX12L Router

A stack-based buffer overflow vulnerability has been discovered in the Tenda CX12L router version 16.03.53.12, specifically within the fromAddressNat function located in the /goform/addressNat file. This flaw allows an attacker to remotely manipulate the argument page, potentially leading to expl...

PoC for CVE-2026-5684

TendaCx12l8.6HIGH
Stack-Based Buffer Overflow in Tenda CX12L Router by Tenda

A stack-based buffer overflow vulnerability exists in the Tenda CX12L router's webExcptypemanFilter function. By manipulating the 'page' argument within the '/goform/webExcptypemanFilter' endpoint, an attacker with local network access may exploit this issue, potentially leading to remote code ex...

PoC for CVE-2026-5683

TendaCx12l5.1MEDIUM
Stack-based Buffer Overflow in Tenda CX12L Device

A stack-based buffer overflow vulnerability exists in the Tenda CX12L device, specifically in the fromP2pListFilter function located in the /goform/P2pListFilter file. This vulnerability is triggered by manipulating the 'page' argument and can allow an attacker to execute arbitrary code. The expl...

PoC for CVE-2026-5281

GoogleChrome8.8HIGH
Remote Code Execution Vulnerability in Dawn for Google Chrome

A use after free vulnerability in the Dawn component of Google Chrome prior to version 146.0.7680.178 allows remote attackers, through a specially crafted HTML page, to execute arbitrary code in the context of the browser's renderer process. This issue represents a significant security risk, as i...

PoC for CVE-2026-5682

MeeshoOnline Shopping App6.3MEDIUM
Cryptographic Vulnerability in Meesho Online Shopping App for Android

The Meesho Online Shopping App for Android, specifically the component com.meesho.supply, has a vulnerability involving an unknown function within the /api/endpoint. This issue allows for the manipulation of cryptographic algorithms, potentially leading to insecure data handling. Although the com...