We aggregate public proof-of-concept (PoC) code from GitHub and the security community, and use a Shenlong Agent (LLM-based) pipeline to generate technical PoC walk-throughs for high-severity CVEs. Public PoCs are free; AI-generated PoCs are a Pro / Pro+ feature. Each entry links back to its source CVE detail page for full context, references, and patches.
| POC ID | Related Vulnerability | Added At |
|---|---|---|
| 121744949 | Pterodactyl Panel 代码注入漏洞 (CVE-2025-49132) | 2026-02-22 16:52:31 |
| 121744948 | Pterodactyl Panel 代码注入漏洞 (CVE-2025-49132) | 2026-02-22 16:52:31 |
| 121744947 | Pterodactyl Panel 代码注入漏洞 (CVE-2025-49132) | 2026-02-22 16:52:31 |
| 121744946 | Pterodactyl Panel 代码注入漏洞 (CVE-2025-49132) | 2026-02-22 16:52:31 |
| 121744945 | Pterodactyl Panel 代码注入漏洞 (CVE-2025-49132) | 2026-02-22 16:52:31 |
| 121744944 | datart 安全漏洞 (CVE-2025-70829) | 2026-02-22 16:52:31 |
| 121744943 | beatXP VEGA Smartwatch 安全漏洞 (CVE-2025-69821) | 2026-02-22 16:52:31 |
| 121744942 | podinfo 安全漏洞 (CVE-2025-70849) | 2026-02-22 16:52:31 |
| 121744941 | Flexense SyncBreeze Enterprise 缓冲区错误漏洞 (CVE-2018-6537) | 2026-02-22 16:52:31 |
| 121744940 | FasterXML jackson-databind 代码问题漏洞 (CVE-2018-14720) | 2026-02-22 16:52:31 |
| 121744939 | FasterXML jackson-databind 代码问题漏洞 (CVE-2018-14718) | 2026-02-22 16:52:31 |
| 121744938 | plexus-archiver 路径遍历漏洞 (CVE-2018-1002200) | 2026-02-22 16:52:31 |
| 121744937 | Apache Qpid Broker-J 安全漏洞 (CVE-2018-8030) | 2026-02-22 16:52:31 |
| 121744936 | FasterXML jackson-databind 代码问题漏洞 (CVE-2018-7489) | 2026-02-22 16:52:31 |
| 121744935 | Eclipse Vert.x 安全漏洞 (CVE-2018-12537) | 2026-02-22 16:52:31 |
| 121744934 | FasterXML jackson-databind 代码问题漏洞 (CVE-2018-19362) | 2026-02-22 16:52:31 |
| 121744933 | FasterXML jackson-databind 代码问题漏洞 (CVE-2018-14719) | 2026-02-22 16:52:31 |
| 121744932 | Google Go 安全漏洞 (CVE-2018-6574) | 2026-02-22 16:52:31 |
| 121744931 | Drupal 安全漏洞 (CVE-2018-7600) | 2026-02-22 16:52:31 |
| 121744930 | weixin-java-tools 安全漏洞 (CVE-2018-20318) | 2026-02-22 16:52:31 |
A CVE PoC (Proof of Concept) is code that demonstrates how a specific vulnerability can be exploited. Security researchers use PoCs to verify vulnerabilities and assess their impact.
Shenlong Agent analyzes CVE descriptions and patch diffs via an LLM pipeline, generating structured technical walk-throughs — covering high-severity CVEs within hours of disclosure.
Public PoCs from GitHub are free. AI-generated PoC analyses by Shenlong Agent are a Pro / Pro+ feature.