We aggregate public proof-of-concept (PoC) code from GitHub and the security community, and use a Shenlong Agent (LLM-based) pipeline to generate technical PoC walk-throughs for high-severity CVEs. Public PoCs are free; AI-generated PoCs are a Pro / Pro+ feature. Each entry links back to its source CVE detail page for full context, references, and patches.
| POC ID | Related Vulnerability | Added At |
|---|---|---|
| 121745164 | 疑似 0day (CVE-2025-69460) | 2026-02-22 16:52:33 |
| 121745163 | Newgen OmniDocs 安全漏洞 (CVE-2025-65742) | 2026-02-22 16:52:33 |
| 121745162 | WordPress plugin Kubio AI Page Builder 路径遍历漏洞 (CVE-2025-2294) | 2026-02-22 16:52:33 |
| 121745161 | RayVentory Scan Engine 安全漏洞 (CVE-2025-69599) | 2026-02-22 16:52:33 |
| 121745160 | astral-tokio-tar 安全漏洞 (CVE-2025-62518) | 2026-02-22 16:52:33 |
| 121745159 | Chamilo LMS 安全漏洞 (CVE-2025-26153) | 2026-02-22 16:52:33 |
| 121745158 | Apache Tomcat 安全漏洞 (CVE-2025-55752) | 2026-02-22 16:52:33 |
| 121745157 | WordPress plugin Truelysell Core 安全漏洞 (CVE-2025-8572) | 2026-02-22 16:52:33 |
| 121745156 | n8n 安全漏洞 (CVE-2025-68613) | 2026-02-22 16:52:33 |
| 121745155 | n8n 安全漏洞 (CVE-2025-68613) | 2026-02-22 16:52:33 |
| 121745154 | n8n 安全漏洞 (CVE-2025-68613) | 2026-02-22 16:52:33 |
| 121745153 | TMS Management Console 安全漏洞 (CVE-2025-69612) | 2026-02-22 16:52:33 |
| 121745152 | PPC 2K05X 安全漏洞 (CVE-2025-70545) | 2026-02-22 16:52:33 |
| 121745151 | CrushFTP 安全漏洞 (CVE-2025-54309) | 2026-02-22 16:52:33 |
| 121745150 | 疑似 0day (CVE-2025-13834) | 2026-02-22 16:52:33 |
| 121745149 | WordPress plugin HyperComments 安全漏洞 (CVE-2025-5701) | 2026-02-22 16:52:33 |
| 121745148 | SAMSUNG SMR 安全漏洞 (CVE-2025-21042) | 2026-02-22 16:52:33 |
| 121745147 | Microsoft SharePoint Server 安全漏洞 (CVE-2025-53770) | 2026-02-22 16:52:33 |
| 121745146 | Microsoft SharePoint Server 安全漏洞 (CVE-2025-53770) | 2026-02-22 16:52:33 |
| 121745145 | Gryphon Guardian WiFi access point 安全漏洞 (CVE-2025-65753) | 2026-02-22 16:52:33 |
A CVE PoC (Proof of Concept) is code that demonstrates how a specific vulnerability can be exploited. Security researchers use PoCs to verify vulnerabilities and assess their impact.
Shenlong Agent analyzes CVE descriptions and patch diffs via an LLM pipeline, generating structured technical walk-throughs — covering high-severity CVEs within hours of disclosure.
Public PoCs from GitHub are free. AI-generated PoC analyses by Shenlong Agent are a Pro / Pro+ feature.