We aggregate public proof-of-concept (PoC) code from GitHub and the security community, and use a Shenlong Agent (LLM-based) pipeline to generate technical PoC walk-throughs for high-severity CVEs. Public PoCs are free; AI-generated PoCs are a Pro / Pro+ feature. Each entry links back to its source CVE detail page for full context, references, and patches.
| POC ID | Related Vulnerability | Added At |
|---|---|---|
| 121745313 | Resteasy 安全漏洞 (CVE-2020-1695) | 2026-02-22 16:52:33 |
| 121745312 | FasterXML jackson-databind 代码问题漏洞 (CVE-2020-36187) | 2026-02-22 16:52:33 |
| 121745311 | ppp 缓冲区错误漏洞 (CVE-2020-8597) | 2026-02-22 16:52:33 |
| 121745310 | FasterXML jackson-databind 代码问题漏洞 (CVE-2020-36185) | 2026-02-22 16:52:33 |
| 121745309 | Fasterxml Jackson 代码问题漏洞 (CVE-2020-25649) | 2026-02-22 16:52:33 |
| 121745308 | JBPM KIE Workbench 跨站脚本漏洞 (CVE-2013-6465) | 2026-02-22 16:52:33 |
| 121745307 | OWASP ESAPI 加密问题漏洞 (CVE-2013-5960) | 2026-02-22 16:52:33 |
| 121745305 | Apache Santuario 加密问题漏洞 (CVE-2013-2172) | 2026-02-22 16:52:33 |
| 121745304 | Apache Commons FileUpload 输入验证错误漏洞 (CVE-2013-2186) | 2026-02-22 16:52:33 |
| 121745303 | Apache Santuario 资源管理错误漏洞 (CVE-2013-4517) | 2026-02-22 16:52:33 |
| 121745302 | Microsoft XML Core Services XSLT解析漏洞 (CVE-2013-0007) | 2026-02-22 16:52:33 |
| 121745301 | Microsoft Windows 输入验证错误漏洞 (CVE-2013-3900) | 2026-02-22 16:52:33 |
| 121745300 | OWASP ESAPI CBC Mode HMAC 身份验证绕过漏洞 (CVE-2013-5679) | 2026-02-22 16:52:33 |
| 121745299 | Red Hat JBoss KeyCloak 安全漏洞 (CVE-2014-3651) | 2026-02-22 16:52:33 |
| 121745298 | OpenSSL 缓冲区错误漏洞 (CVE-2014-0160) | 2026-02-22 16:52:33 |
| 121745297 | OpenSSL 缓冲区错误漏洞 (CVE-2014-0160) | 2026-02-22 16:52:33 |
| 121745296 | Red Hat JBoss Undertow 目录遍历漏洞 (CVE-2014-7816) | 2026-02-22 16:52:33 |
| 121745295 | Electric Sheep Fencing pfSense 安全漏洞 (CVE-2014-4688) | 2026-02-22 16:52:33 |
| 121745294 | Rejetto HTTP File Server‘ParserLib.pas’代码注入漏洞 (CVE-2014-6287) | 2026-02-22 16:52:33 |
| 121745293 | Allegro RomPager 代码注入漏洞 (CVE-2014-9222) | 2026-02-22 16:52:33 |
A CVE PoC (Proof of Concept) is code that demonstrates how a specific vulnerability can be exploited. Security researchers use PoCs to verify vulnerabilities and assess their impact.
Shenlong Agent analyzes CVE descriptions and patch diffs via an LLM pipeline, generating structured technical walk-throughs — covering high-severity CVEs within hours of disclosure.
Public PoCs from GitHub are free. AI-generated PoC analyses by Shenlong Agent are a Pro / Pro+ feature.