We aggregate public proof-of-concept (PoC) code from GitHub and the security community, and use a Shenlong Agent (LLM-based) pipeline to generate technical PoC walk-throughs for high-severity CVEs. Public PoCs are free; AI-generated PoCs are a Pro / Pro+ feature. Each entry links back to its source CVE detail page for full context, references, and patches.
| POC ID | Related Vulnerability | Added At |
|---|---|---|
| 121745292 | Android 信息泄露漏洞 (CVE-2014-8610) | 2026-02-22 16:52:33 |
| 121745291 | Apache Commons FileUpload 权限许可和访问控制问题漏洞 (CVE-2014-0050) | 2026-02-22 16:52:33 |
| 121745290 | GNU Bash 远程代码执行漏洞 (CVE-2014-6271) | 2026-02-22 16:52:33 |
| 121745289 | GNU Bash 远程代码执行漏洞 (CVE-2014-6271) | 2026-02-22 16:52:33 |
| 121745288 | Netty 拒绝服务漏洞 (CVE-2014-3488) | 2026-02-22 16:52:33 |
| 121745287 | PHP ‘php-cgi’ 参数信息泄漏漏洞 (CVE-2012-1823) | 2026-02-22 16:52:33 |
| 121745286 | Apache Santuario 输入验证错误漏洞 (CVE-2019-12400) | 2026-02-22 16:52:33 |
| 121745285 | Apache Solr 注入漏洞 (CVE-2019-17558) | 2026-02-22 16:52:33 |
| 121745284 | Exim 操作系统命令注入漏洞 (CVE-2019-10149) | 2026-02-22 16:52:33 |
| 121745283 | Micro Star MSI Afterburner 安全漏洞 (CVE-2019-16098) | 2026-02-22 16:52:33 |
| 121745282 | Jenkins Script Security Plugin 安全漏洞 (CVE-2019-1003000) | 2026-02-22 16:52:33 |
| 121745281 | Mozilla Firefox 代码问题漏洞 (CVE-2019-11707) | 2026-02-22 16:52:33 |
| 121745280 | Ignite Realtime Openfire 代码问题漏洞 (CVE-2019-18394) | 2026-02-22 16:52:33 |
| 121745279 | FasterXML jackson-databind 代码问题漏洞 (CVE-2019-16335) | 2026-02-22 16:52:33 |
| 121745278 | FasterXML jackson-databind 代码问题漏洞 (CVE-2019-14540) | 2026-02-22 16:52:33 |
| 121745277 | WordPress social-warfare插件跨站脚本漏洞 (CVE-2019-9978) | 2026-02-22 16:52:33 |
| 121745276 | FasterXML jackson-databind 代码问题漏洞 (CVE-2019-14893) | 2026-02-22 16:52:33 |
| 121745275 | Apache Commons Compress 资源管理错误漏洞 (CVE-2019-12402) | 2026-02-22 16:52:33 |
| 121745274 | Ignite Realtime Openfire 路径遍历漏洞 (CVE-2019-18393) | 2026-02-22 16:52:33 |
| 121745273 | TP-Link TL-WR841N 缓冲区错误漏洞 (CVE-2019-17147) | 2026-02-22 16:52:33 |
A CVE PoC (Proof of Concept) is code that demonstrates how a specific vulnerability can be exploited. Security researchers use PoCs to verify vulnerabilities and assess their impact.
Shenlong Agent analyzes CVE descriptions and patch diffs via an LLM pipeline, generating structured technical walk-throughs — covering high-severity CVEs within hours of disclosure.
Public PoCs from GitHub are free. AI-generated PoC analyses by Shenlong Agent are a Pro / Pro+ feature.