We aggregate public proof-of-concept (PoC) code from GitHub and the security community, and use a Shenlong Agent (LLM-based) pipeline to generate technical PoC walk-throughs for high-severity CVEs. Public PoCs are free; AI-generated PoCs are a Pro / Pro+ feature. Each entry links back to its source CVE detail page for full context, references, and patches.
| POC ID | Related Vulnerability | Added At |
|---|---|---|
| 121744741 | OpenSSH 代码问题漏洞 (CVE-2023-38408) | 2026-02-22 16:52:30 |
| 121744740 | OpenSSH 代码问题漏洞 (CVE-2023-38408) | 2026-02-22 16:52:30 |
| 121744739 | Metabase 安全漏洞 (CVE-2023-38646) | 2026-02-22 16:52:30 |
| 121744738 | Repetier Server 路径遍历漏洞 (CVE-2023-31059) | 2026-02-22 16:52:30 |
| 121744737 | TYPO3 安全漏洞 (CVE-2023-47125) | 2026-02-22 16:52:30 |
| 121744736 | Chamilo LMS 安全漏洞 (CVE-2023-4220) | 2026-02-22 16:52:30 |
| 121744735 | request-baskets 代码问题漏洞 (CVE-2023-27163) | 2026-02-22 16:52:30 |
| 121744734 | request-baskets 代码问题漏洞 (CVE-2023-27163) | 2026-02-22 16:52:30 |
| 121744733 | Likely 0-day (CVE-2023-34632) | 2026-02-22 16:52:30 |
| 121744732 | Cisco IOS XE Software 安全漏洞 (CVE-2023-20198) | 2026-02-22 16:52:30 |
| 121744731 | Apple iOS和iPadOS 安全漏洞 (CVE-2023-42824) | 2026-02-22 16:52:30 |
| 121744730 | Microsoft Windows Ancillary Function Driver for WinSock 安全漏洞 (CVE-2023-21768) | 2026-02-22 16:52:30 |
| 121744729 | Apache Dubbo 代码问题漏洞 (CVE-2023-23638) | 2026-02-22 16:52:30 |
| 121744728 | Inspect Element Echo.ac 安全漏洞 (CVE-2023-38817) | 2026-02-22 16:52:30 |
| 121744727 | MoveIT SQL注入漏洞 (CVE-2023-34362) | 2026-02-22 16:52:30 |
| 121744726 | Online Shopping Portal SQL注入漏洞 (CVE-2023-38890) | 2026-02-22 16:52:30 |
| 121744725 | SheetJS 安全漏洞 (CVE-2023-30533) | 2026-02-22 16:52:30 |
| 121744724 | Ghost Foundation Ghost 后置链接漏洞 (CVE-2023-40028) | 2026-02-22 16:52:30 |
| 121744723 | WordPress plugin Media Library Assistant 安全漏洞 (CVE-2023-4634) | 2026-02-22 16:52:30 |
| 121744722 | Java WebSocket client nv-websocket-client 安全漏洞 (CVE-2017-1000209) | 2026-02-22 16:52:30 |
A CVE PoC (Proof of Concept) is code that demonstrates how a specific vulnerability can be exploited. Security researchers use PoCs to verify vulnerabilities and assess their impact.
Shenlong Agent analyzes CVE descriptions and patch diffs via an LLM pipeline, generating structured technical walk-throughs — covering high-severity CVEs within hours of disclosure.
Public PoCs from GitHub are free. AI-generated PoC analyses by Shenlong Agent are a Pro / Pro+ feature.