We aggregate public proof-of-concept (PoC) code from GitHub and the security community, and use a Shenlong Agent (LLM-based) pipeline to generate technical PoC walk-throughs for high-severity CVEs. Public PoCs are free; AI-generated PoCs are a Pro / Pro+ feature. Each entry links back to its source CVE detail page for full context, references, and patches.
| POC ID | Related Vulnerability | Added At |
|---|---|---|
| 121744896 | Samba MS-RPC Shell命令注入漏洞 (CVE-2007-2447) | 2026-02-22 16:52:31 |
| 121744895 | Fortinet FortiManager 访问控制错误漏洞 (CVE-2021-24006) | 2026-02-22 16:52:31 |
| 121744894 | Fortinet FortiManager 访问控制错误漏洞 (CVE-2021-24006) | 2026-02-22 16:52:31 |
| 121744893 | WordPress 代码问题漏洞 (CVE-2021-24499) | 2026-02-22 16:52:31 |
| 121744892 | Apache Log4j 代码问题漏洞 (CVE-2021-44228) | 2026-02-22 16:52:31 |
| 121744891 | Apache Log4j 代码问题漏洞 (CVE-2021-44228) | 2026-02-22 16:52:31 |
| 121744890 | Apache Log4j 代码问题漏洞 (CVE-2021-44228) | 2026-02-22 16:52:31 |
| 121744888 | Hikvision Web Server 操作系统命令注入漏洞 (CVE-2021-36260) | 2026-02-22 16:52:31 |
| 121744887 | Cron Utils 代码注入漏洞 (CVE-2021-41269) | 2026-02-22 16:52:31 |
| 121744886 | Apache HTTP Server 安全漏洞 (CVE-2021-42013) | 2026-02-22 16:52:31 |
| 121744885 | polkit 缓冲区错误漏洞 (CVE-2021-4034) | 2026-02-22 16:52:31 |
| 121744884 | Apache Commons Compress 安全漏洞 (CVE-2021-35517) | 2026-02-22 16:52:31 |
| 121744883 | Github json-smart-v1 缓冲区错误漏洞 (CVE-2021-31684) | 2026-02-22 16:52:31 |
| 121744882 | Alibaba nacos 访问控制错误漏洞 (CVE-2021-29442) | 2026-02-22 16:52:31 |
| 121744881 | Fortinet FortiClientEms 代码问题漏洞 (CVE-2021-24019) | 2026-02-22 16:52:31 |
| 121744880 | Dahua IPC 授权问题漏洞 (CVE-2021-33044) | 2026-02-22 16:52:31 |
| 121744879 | Gerapy 操作系统命令注入漏洞 (CVE-2021-43857) | 2026-02-22 16:52:31 |
| 121744878 | Apache Commons Compress 安全漏洞 (CVE-2021-36090) | 2026-02-22 16:52:31 |
| 121744877 | Grav 安全漏洞 (CVE-2021-21425) | 2026-02-22 16:52:31 |
| 121744876 | HugoMario swagger-codegen 信息泄露漏洞 (CVE-2021-21364) | 2026-02-22 16:52:31 |
A CVE PoC (Proof of Concept) is code that demonstrates how a specific vulnerability can be exploited. Security researchers use PoCs to verify vulnerabilities and assess their impact.
Shenlong Agent analyzes CVE descriptions and patch diffs via an LLM pipeline, generating structured technical walk-throughs — covering high-severity CVEs within hours of disclosure.
Public PoCs from GitHub are free. AI-generated PoC analyses by Shenlong Agent are a Pro / Pro+ feature.