Publicly Disclosed
PoC Exploits

đź”´ Alway take caution when working with PoC Exploits đź”´

Discovered 1 hour ago

PoC for CVE-2026-6279

WordPressAvada (fusion) Builder9.8CRITICAL
Unauthenticated Remote Code Execution Vulnerability in Avada Builde...

The Avada Builder (fusion-builder) plugin for WordPress is susceptible to a Remote Code Execution vulnerability that allows unauthenticated attackers to exploit the system via PHP Function Injection. This issue arises from a flaw in the handling of attacker-controlled input within the `Fusion_Bui...

Discovered 3 hours ago

PoC for CVE-2026-48172

Litespeed Technol...Cpanel Plugin10CRITICAL
Privilege Escalation Vulnerability in LiteSpeed User-End cPanel Plugin

The LiteSpeed User-End cPanel Plugin prior to version 2.4.5 is susceptible to a privilege escalation flaw that may allow attackers to gain unauthorized access, potentially escalating privileges to the root level. This vulnerability has been actively exploited since May 2026. Detection can be perf...

Discovered 4 hours ago

PoC for CVE-2024-12537

Open-webuiOpen-webui/open-webui7.5HIGH
Authentication Flaw in Open-WebUI Affects Performance

In version 0.3.32 of Open-WebUI, a critical security flaw exists due to the lack of authentication mechanisms. This vulnerability allows any unauthenticated attacker to send requests to the `api/v1/utils/code/format` endpoint. By submitting a POST request containing an excessively high volume of ...

Discovered 5 hours ago

PoC for CVE-2026-9306

QuantumnousNew-api6.3MEDIUM
Authorization Bypass in QuantumNous new-api Affecting Image Relay F...

A security vulnerability exists in the QuantumNous new-api, particularly in the Midjourney Image Relay Endpoint, found in the function RelayMidjourneyImage/GetByOnlyMJId. This vulnerability allows attackers to bypass authorization mechanisms, leading to unauthorized access to sensitive functional...

PoC for CVE-2026-9305

QuantumnousNew-api5.3MEDIUM
SQL Injection Vulnerability in QuantumNous new-api Affecting Self E...

A SQL injection vulnerability exists in the QuantumNous new-api affecting version 0.12.1. The issue lies within the SearchUserTopUps/SearchAllTopUps function located in the model/topup.go file of the self Endpoint. This vulnerability allows attackers to manipulate SQL queries, potentially leading...

Discovered 6 hours ago

PoC for CVE-2026-9304

CalcomCal.diy2.3LOW
Server-Side Request Forgery Vulnerability in Calcom Logo API

A security flaw has been identified in Calcom's cal.diy product, specifically in the Logo API's function validateUrlForSSRF within the file apps/web/app/api/logo/route.ts. This vulnerability enables remote attackers to conduct server-side request forgery, potentially leading to unauthorized acces...

PoC for CVE-2026-9303

CalcomCal.diy5.3MEDIUM
Cross-Site Request Forgery in calcom cal.diy Affects Multiple Versions

A vulnerability exists in calcom cal.diy versions up to 4.9.4, where an unknown function can be exploited via cross-site request forgery. This allows attackers to initiate unauthorized actions on behalf of users without their consent, exposing sensitive data and potentially compromising user acco...

Discovered 7 hours ago

PoC for CVE-2026-9302

546669204Vps-inventory-monitoring5.3MEDIUM
Code Injection Vulnerability in vps-inventory-monitoring by 546669204

A code injection vulnerability exists within the vps-inventory-monitoring product, specifically in the eval function of the VpsTest.php file located in app/index/command. By manipulating the argument 'vf', an attacker may execute arbitrary code remotely. This issue has been publicly disclosed and...

PoC for CVE-2026-9301

Omec-projectAmf5.3MEDIUM
Memory Corruption Vulnerability in OMEC Project AMF by OMEC

A critical vulnerability exists in the OMEC Project AMF affecting versions up to 2.1.1. It arises from the NGReset Message Handler component, where improper handling can lead to memory corruption. This vulnerability can be exploited remotely, posing significant security risks. Users are advised t...

Discovered 8 hours ago

PoC for CVE-2025-46822

OsamataherJava-springboot-codebase7.7HIGH
Path Traversal Vulnerability in Java Spring Boot Codebase by OsamaT...

A vulnerability in the Java Spring Boot codebase by OsamaTaher prior to a specific commit allows for absolute path traversal. This flaw enables unauthorized users to access sensitive internal files, posing a significant security threat. A patch was introduced in commit c835c6f7799eacada4c0fc77e08...

PoC for CVE-2026-9300

Omec-projectAmf5.3MEDIUM
Memory Corruption Vulnerability in omec-project AMF Affecting NGSet...

A vulnerability exists within the omec-project AMF, specifically in the NGSetupRequest handler, which can be exploited to cause memory corruption. This flaw allows remote attackers to manipulate the component, potentially leading to unauthorized actions or system instability. The exploit has been...

Discovered 9 hours ago

PoC for CVE-2026-9299

Omec-projectAmf5.3MEDIUM
Memory Corruption Vulnerability in omec-project AMF Functionality

A memory corruption vulnerability has been identified in the omec-project AMF, specifically within the PDUSessionResourceModifyIndication function located in the /go/src/amf/ngap/handler.go file. This flaw enables potential remote exploitation, allowing an attacker to manipulate the system's memo...

PoC for CVE-2026-9298

Omec-projectAmf5.3MEDIUM
Memory Corruption Vulnerability in OMEC Project AMF by Linux Founda...

A vulnerability has been identified in the OMEC Project AMF software, specifically within the PathSwitchRequest Handler component. This issue can lead to memory corruption, potentially allowing attackers to manipulate the application remotely. The exploit is publicly available, making it crucial ...

Discovered 10 hours ago

PoC for CVE-2026-41901

ThymeleafThymeleaf9CRITICAL
Server-Side Template Injection in Thymeleaf by Thymeleaf

Thymeleaf is a widely used Java template engine that is vulnerable to a security bypass issue in its expression execution mechanisms prior to version 3.1.5.RELEASE. This vulnerability occurs when unsanitized variables containing potentially harmful expressions are passed into the template engine....

PoC for CVE-2026-9297

EdimaxBr-6428ns5.3MEDIUM
Command Injection Vulnerability in Edimax BR-6428NS Router

A security vulnerability has been identified in the Edimax BR-6428NS router running version 1.10. This flaw resides in the function formWlbasic within the POST Request Handler component. By manipulating the 'repeaterSSID' argument, attackers can execute arbitrary commands remotely. The publicly d...

PoC for CVE-2026-9296

EdimaxBr-6428ns5.3MEDIUM
Command Injection Vulnerability in Edimax BR-6428NS Router

A command injection vulnerability has been detected in the Edimax BR-6428NS router, specifically within the file handling of the POST request to /goform/formWlanM. This weakness allows attackers to manipulate various arguments, such as ateFunc, ateGain, and ateTxCount, potentially leading to unau...

Discovered 11 hours ago

PoC for CVE-2026-31802

IsaacsNode-tar8.2HIGH
Symlink Vulnerability in node-tar for Node.js by Isaacs

node-tar, a comprehensive Tar utility for Node.js, is susceptible to a symlink vulnerability that allows an attacker to craft a drive-relative symlink target. This exploitation can lead to the creation of symlinks that point to paths outside the targeted extraction directory. As a result, during ...

PoC for CVE-2026-41091

MicrosoftMicrosoft Malware Prot...7.8HIGH
Elevation of Privilege Vulnerability in Microsoft Defender

An issue has been identified in Microsoft Defender that could allow an authorized attacker to gain elevated privileges through improper link resolution before file access, also known as link following. This vulnerability could enable attackers to manipulate file paths, potentially leading to unau...

Discovered 12 hours ago

PoC for CVE-2026-42208

BerriaiLitellm🟣 EPSS 54%9.3CRITICAL
Database Query Vulnerability in LiteLLM Proxy Server by BerriAI

The LiteLLM proxy server from BerriAI has a vulnerability in its implementation that exposes sensitive database information to unauthorized parties. Versions 1.81.16 to prior to 1.83.7 mishandle API key checks by incorporating user-supplied key values directly into database queries instead of tre...

PoC for CVE-2026-9295

EdimaxBr-6428ns8.7HIGH
Buffer Overflow Vulnerability in Edimax BR-6428NS Router

A security flaw has been detected in the Edimax BR-6428NS router, specifically within the POST Request Handler's function known as formWirelessTbl. An issue arises due to manipulation of the vapurl argument, leading to a buffer overflow that could be exploited remotely. This vulnerability poses a...

PoC for CVE-2026-9294

EdimaxBr-6428ns8.7HIGH
Buffer Overflow Vulnerability in Edimax BR-6428NS Router

A vulnerability exists within the Edimax BR-6428NS router, specifically in the function handling POST requests for TCP/IP setup. The manipulation of the pppUserName parameter can trigger a buffer overflow, which enables a remote attacker to exploit this flaw. The potential consequences include un...

Discovered 14 hours ago

PoC for CVE-2025-34291

LangflowLangflow🟣 EPSS 31%9.4CRITICAL
Chained Vulnerability in Langflow AI Platform Exposes Accounts and ...

Langflow, specifically versions up to and including 1.6.9, is affected by a critical security issue stemming from a chained vulnerability. This flaw enables attackers to hijack user accounts and execute arbitrary code remotely. It arises from an overly permissive Cross-Origin Resource Sharing (CO...

PoC for CVE-2026-1731

BeyondtrustRemote Support(rs) & P...🟣 EPSS 80%9.9CRITICAL
Remote Code Execution Vulnerability in BeyondTrust Remote Support a...

BeyondTrust Remote Support and certain older versions of Privileged Remote Access contain a pre-authentication vulnerability that can be exploited by unauthenticated attackers. By sending specially crafted requests, an attacker may execute arbitrary operating system commands in the context of the...

PoC for CVE-2026-3854

GithubEnterprise Server8.7HIGH
Remote Code Execution Vulnerability in GitHub Enterprise Server

An improper neutralization of special elements vulnerability has been identified in GitHub Enterprise Server, which allows an attacker with push access to a repository to execute arbitrary code. During a 'git push' operation, user-supplied push option values were not adequately sanitized before b...

PoC for CVE-2026-0073

GoogleAndroid8.8HIGH
Logic Error in Wireless ADB Authentication in Android Products

A significant logic error in the adbd_tls_verify_cert function of auth.cpp in various Android versions permits a bypass of the wireless ADB mutual authentication process. This flaw can lead to unauthorized remote code execution by exploiting the vulnerability as the shell user without requiring a...

Discovered 15 hours ago

PoC for CVE-2026-9082

DrupalDrupal Core9.8CRITICAL
SQL Injection Vulnerability in Drupal Core by Drupal

An SQL Injection vulnerability exists in Drupal Core that arises from improper neutralization of special elements utilized in SQL commands. This flaw allows attackers to manipulate SQL queries, potentially leading to unauthorized access to sensitive data. Affected versions include those from 8.9....

PoC for CVE-2026-40369

MicrosoftWindows 11 Version 24h27.8HIGH
Windows Kernel Elevation of Privilege Vulnerability in Microsoft Pr...

A vulnerability in the Windows Kernel allows an authorized attacker to exploit an untrusted pointer dereference, potentially enabling them to gain higher privileges on the affected system. This could lead to unauthorized access to sensitive data and administrative functionalities. It's critical f...

Discovered 18 hours ago

PoC for CVE-2026-8181

WordPressBurst Statistics – Pri...9.8CRITICAL
Authentication Bypass Vulnerability in Burst Statistics Plugin for ...

The Burst Statistics plugin for WordPress contains a security flaw that allows unauthenticated attackers to exploit incorrect handling of return values in the authentication process. This leads to a vulnerability in the `is_mainwp_authenticated()` function, enabling attackers who know an administ...

PoC for CVE-2026-5817

DockerDocker Desktop8.8HIGH
Arbitrary Code Execution in Docker Model Runner on macOS

The vllm-metal inference backend in Docker Model Runner on macOS is vulnerable due to its unconditional setting of trust_remote_code=True when loading model tokenizers. This design flaw allows for the execution of arbitrary Python files from any model obtained via OCI registry. As a consequence, ...

Discovered 1 day ago

PoC for CVE-2026-34926

Trend MicroTrendai Apex One6.7MEDIUM
Directory Traversal Flaw in Apex One by Trend Micro

Apex One, a security solution from Trend Micro, exhibits a directory traversal vulnerability that could potentially allow a pre-authenticated local attacker to manipulate a critical server-side database table. By leveraging access to the Apex One Server and possessing administrative credentials, ...

PoC for CVE-2026-5118

WordPressDivi Form Builder9.8CRITICAL
Privilege Escalation in Divi Form Builder Plugin for WordPress

The Divi Form Builder plugin for WordPress is susceptible to privilege escalation due to its improper handling of user role parameters during the registration process. Specifically, it permits unauthenticated attackers to submit user registration requests manipulating the 'role' parameter without...

PoC for CVE-2026-20223

CiscoCisco Secure Workload10CRITICAL
Access Validation Flaw in Cisco Secure Workload

A vulnerability exists in Cisco Secure Workload's internal REST APIs that could permit an unauthenticated attacker to access sensitive site resources with Site Admin rights. This flaw arises from inadequate validation and authentication for REST API requests. By sending a specially crafted API re...

PoC for CVE-2026-3102

ExifToolExiftool5.3MEDIUM
Command Injection Vulnerability in ExifTool PNG Parser on macOS

A command injection vulnerability exists in the ExifTool PNG File Parser, specifically in the SetMacOSTags function located in the lib/Image/ExifTool/MacOS.pm file. This vulnerability allows an attacker to manipulate the DateTimeOriginal argument, facilitating remote exploitation. Users are stron...

Discovered 2 days ago

PoC for CVE-2026-5118

WordPressDivi Form Builder9.8CRITICAL
Privilege Escalation in Divi Form Builder Plugin for WordPress

The Divi Form Builder plugin for WordPress is susceptible to privilege escalation due to its improper handling of user role parameters during the registration process. Specifically, it permits unauthenticated attackers to submit user registration requests manipulating the 'role' parameter without...

PoC for CVE-2026-31431

LinuxLinux7.8HIGH
Vulnerability in Linux Kernel Affecting Crypto Operations

A vulnerability has been identified in the Linux kernel's crypto subsystem, specifically within the algif_aead component. This issue arises from an unnecessary complexity in operating in-place, which has been reverted for improved security and performance. The change eliminates the need for in-pl...

PoC for CVE-2026-0300

Palo Alto NetworksCloud Ngfw8.7HIGH
Buffer Overflow Vulnerability in Palo Alto Networks User-ID™ Authen...

A buffer overflow vulnerability exists within the User-ID™ Authentication Portal of Palo Alto Networks PAN-OS software. This flaw allows unauthenticated attackers to execute arbitrary code with root privileges on PA-Series and VM-Series firewalls by manipulating specially crafted packets. To miti...

PoC for CVE-2026-45585

MicrosoftWindows 11 Version 24h26.8MEDIUM
Security Feature Bypass in Windows by Microsoft

A security feature bypass vulnerability exists in Microsoft Windows, referred to as 'YellowKey.' This flaw could allow unauthorized access to restricted features, compromising system integrity. A proof of concept has been publicly released, contrary to established security practices. Users are ad...

PoC for CVE-2026-41091

MicrosoftMicrosoft Malware Prot...7.8HIGH
Elevation of Privilege Vulnerability in Microsoft Defender

An issue has been identified in Microsoft Defender that could allow an authorized attacker to gain elevated privileges through improper link resolution before file access, also known as link following. This vulnerability could enable attackers to manipulate file paths, potentially leading to unau...

PoC for CVE-2026-47102

BerriaiLitellm8.7HIGH
Privilege Escalation Vulnerability in LiteLLM by BerriAI

LiteLLM versions before 1.83.10 have a vulnerability that allows users to change their own user_role through the /user/update endpoint. Although this endpoint restricts access to updating only the user's account, it fails to limit which fields can be modified. This oversight enables a user with a...

PoC for CVE-2026-47102

BerriaiLitellm8.7HIGH
Privilege Escalation Vulnerability in LiteLLM by BerriAI

LiteLLM versions before 1.83.10 have a vulnerability that allows users to change their own user_role through the /user/update endpoint. Although this endpoint restricts access to updating only the user's account, it fails to limit which fields can be modified. This oversight enables a user with a...

PoC for CVE-2026-9082

DrupalDrupal Core9.8CRITICAL
SQL Injection Vulnerability in Drupal Core by Drupal

An SQL Injection vulnerability exists in Drupal Core that arises from improper neutralization of special elements utilized in SQL commands. This flaw allows attackers to manipulate SQL queries, potentially leading to unauthorized access to sensitive data. Affected versions include those from 8.9....

PoC for CVE-2026-47114

IinaIina8.6HIGH
User-Assisted Command Execution in IINA Media Player by IINA

IINA Media Player versions prior to 1.4.3 expose a vulnerability that could allow remote attackers to exploit command execution. By crafting malicious URLs that utilize the iina://open custom URL scheme, attackers can inject unvalidated command parameters into the mpv runtime. This can result in ...

PoC for CVE-2026-5118

WordPressDivi Form Builder9.8CRITICAL
Privilege Escalation in Divi Form Builder Plugin for WordPress

The Divi Form Builder plugin for WordPress is susceptible to privilege escalation due to its improper handling of user role parameters during the registration process. Specifically, it permits unauthenticated attackers to submit user registration requests manipulating the 'role' parameter without...

PoC for CVE-2026-42048

Langflow-aiLangflow9.6CRITICAL
Path Traversal Vulnerability in Langflow AI Tool by Langflow

Langflow, a tool designed for creating AI-driven agents and workflows, is affected by a path traversal vulnerability in its Knowledge Bases API (DELETE /api/v1/knowledge_bases). This flaw arises from the failure to properly sanitize and validate user-supplied knowledge base names, which are direc...

PoC for CVE-2024-6678

GitlabGitlab8.8HIGH
Security Vulnerability Impacts All Versions of GitLab

A security issue in GitLab CE and EE has been identified that allows an attacker to trigger a pipeline as an arbitrary user under specific conditions. This vulnerability affects multiple versions, including all releases from version 8.14 up to 17.1.7, as well as from version 17.2 up to 17.2.5 and...

PoC for CVE-2026-45250

FreeBSDFreeBSD7.8HIGH
Buffer Overflow Vulnerability in FreeBSD's Kernel Privilege Management

A vulnerability exists in FreeBSD's setcred(2) system call, where an unprivileged local user can exploit a stack buffer overflow due to improper length validation of a user-supplied supplementary groups list. This oversight allows for an arbitrary code execution in the kernel context, potentially...

PoC for CVE-2026-9082

DrupalDrupal Core9.8CRITICAL
SQL Injection Vulnerability in Drupal Core by Drupal

An SQL Injection vulnerability exists in Drupal Core that arises from improper neutralization of special elements utilized in SQL commands. This flaw allows attackers to manipulate SQL queries, potentially leading to unauthorized access to sensitive data. Affected versions include those from 8.9....

PoC for CVE-2026-9082

DrupalDrupal Core9.8CRITICAL
SQL Injection Vulnerability in Drupal Core by Drupal

An SQL Injection vulnerability exists in Drupal Core that arises from improper neutralization of special elements utilized in SQL commands. This flaw allows attackers to manipulate SQL queries, potentially leading to unauthorized access to sensitive data. Affected versions include those from 8.9....

Discovered 3 days ago

PoC for CVE-2026-2587

Eclipse FoundationEclipse Glassfish9.6CRITICAL
Remote Code Execution Vulnerability in Glassfish Gadget Handler fro...

A serious Remote Code Execution vulnerability exists in the server-side template rendering mechanism of the Glassfish gadget handler. This flaw arises from the improper handling of user-supplied values in .xml files, which allows attackers to inject expressions that are evaluated without adequate...

PoC for CVE-2024-37054

MlflowMlflow8.8HIGH
Arbitrary Code Execution Vulnerability in MLflow Platform

A significant security vulnerability exists within the MLflow platform developed by Databricks. This issue arises from the deserialization of untrusted data in versions 0.9.0 and later. Attackers exploit this vulnerability by uploading a malicious PyFunc model that, once interacted with, can exec...