We aggregate public proof-of-concept (PoC) code from GitHub and the security community, and use a Shenlong Agent (LLM-based) pipeline to generate technical PoC walk-throughs for high-severity CVEs. Public PoCs are free; AI-generated PoCs are a Pro / Pro+ feature. Each entry links back to its source CVE detail page for full context, references, and patches.
| POC ID | Related Vulnerability | Added At |
|---|---|---|
| 121745246 | Netty 输入验证错误漏洞 (CVE-2015-2156) | 2026-02-22 16:52:33 |
| 121745245 | Apache CXF SAML Web SSO模块安全漏洞 (CVE-2015-5253) | 2026-02-22 16:52:33 |
| 121745244 | Apache Tika 信息泄露漏洞 (CVE-2015-3271) | 2026-02-22 16:52:33 |
| 121745243 | Red Hat PicketLink Service Provider和Identity Provider 安全漏洞 (CVE-2015-6254) | 2026-02-22 16:52:33 |
| 121745242 | Orient OrientDB Server Community Edition Studio组件信息泄露漏洞 (CVE-2015-2913) | 2026-02-22 16:52:33 |
| 121745241 | vsftpd 操作系统命令注入漏洞 (CVE-2011-2523) | 2026-02-22 16:52:33 |
| 121745240 | vsftpd 操作系统命令注入漏洞 (CVE-2011-2523) | 2026-02-22 16:52:33 |
| 121745239 | Apache MyFaces Core ‘ln’ 参数目录遍历漏洞 (CVE-2011-4367) | 2026-02-22 16:52:33 |
| 121745238 | FreeBSD ‘telnetd’ 缓冲区错误漏洞 (CVE-2011-4862) | 2026-02-22 16:52:33 |
| 121745237 | Worklenz 安全漏洞 (CVE-2025-70368) | 2026-02-22 16:52:33 |
| 121745236 | LaRecipe 安全漏洞 (CVE-2025-53833) | 2026-02-22 16:52:33 |
| 121745235 | Axigen Mail Server 安全漏洞 (CVE-2025-68722) | 2026-02-22 16:52:33 |
| 121745234 | SPIP 代码注入漏洞 (CVE-2025-71243) | 2026-02-22 16:52:33 |
| 121745233 | Microsoft Windows Kernel 资源管理错误漏洞 (CVE-2025-62215) | 2026-02-22 16:52:33 |
| 121745232 | WordPress plugin Sneeit Framework 代码注入漏洞 (CVE-2025-6389) | 2026-02-22 16:52:33 |
| 121745231 | Microsoft Windows SMB Server 访问控制错误漏洞 (CVE-2025-33073) | 2026-02-22 16:52:33 |
| 121745230 | Sudo 安全漏洞 (CVE-2025-32463) | 2026-02-22 16:52:33 |
| 121745229 | Sudo 安全漏洞 (CVE-2025-32463) | 2026-02-22 16:52:33 |
| 121745228 | Sudo 安全漏洞 (CVE-2025-32463) | 2026-02-22 16:52:33 |
| 121745227 | Sudo 安全漏洞 (CVE-2025-32463) | 2026-02-22 16:52:33 |
A CVE PoC (Proof of Concept) is code that demonstrates how a specific vulnerability can be exploited. Security researchers use PoCs to verify vulnerabilities and assess their impact.
Shenlong Agent analyzes CVE descriptions and patch diffs via an LLM pipeline, generating structured technical walk-throughs — covering high-severity CVEs within hours of disclosure.
Public PoCs from GitHub are free. AI-generated PoC analyses by Shenlong Agent are a Pro / Pro+ feature.