PoC Week 2025-02-17
The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count. Older CVEs, trivially exploitable vulnerabilities (such as using hard-coded credentials) and those affecting open source projects with very small userbases aren’t listed.
For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them.
CVE-2024-21413 Severity: 9.8 CRITICAL Impacted Products: Microsoft Outlook Description: Microsoft Outlook Remote Code Execution Vulnerability.…
Read more ⟶
PoC Week 2025-02-10
The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count. Older CVEs, trivially exploitable vulnerabilities (such as using hard-coded credentials) and those affecting open source projects with very small userbases aren’t listed.
For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them.
CVE-2024-55591 Severity: 9.8 CRITICAL Impacted Products: FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.…
Read more ⟶
PoC Week 2025-02-03
The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count. Older CVEs, trivially exploitable vulnerabilities (such as using hard-coded credentials) and those affecting open source projects with very small userbases aren’t listed.
For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them.
CVE-2024-57595 Severity: Awaiting analysis Impacted Products: DLINK DIR-825 REVB 2.03 devices Description: OS command injection vulnerability in the CGl interface apc_client_pin.…
Read more ⟶
PoC Week 2025-01-27
The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count. Older CVEs, trivially exploitable vulnerabilities (such as using hard-coded credentials) and those affecting open source projects with very small userbases aren’t listed.
For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them.
CVE-2025-21298 Severity: 9.8 CRITICAL Impacted Products: Windows - various, see advisory Description: Windows OLE Remote Code Execution Vulnerability Remediation: Follow developer guidance.…
Read more ⟶
PoC Week 2025-01-20
The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count. Older CVEs, trivially exploitable vulnerabilities (such as using hard-coded credentials) and those affecting open source projects with very small userbases aren’t listed.
For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them.
CVE-2024-55591 Severity: 9.8 CRITICAL Impacted Products: FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.…
Read more ⟶
PoC Week 2025-01-13
The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count. Older CVEs and those affecting open source projects with very small userbases aren’t listed.
For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them.
CVE-2024-6387 Severity: 8.2 HIGH Impacted Products: sshd Description: A security regression (CVE-2006-5051) was discovered in OpenSSH’s server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner.…
Read more ⟶
PoC Week 2025-01-09
The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count. Older CVEs and those affecting open source projects with very small userbases aren’t listed.
After a few weeks off, this edition lists all PoCs since the 12th December.
For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them.
CVE-2024-50623 Severity: 9.9 CRITICAL Impacted Products: Cleo Harmony before 5.…
Read more ⟶
PoC Week 2024-12-09
The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count. Older CVEs and those affecting open source projects with very small userbases aren’t listed.
For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them.
CVE-2024-42327 Severity: 9.9 CRITICAL Impacted Products: FreeBSD 13.3, 14.1, 14.0 Description: A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability.…
Read more ⟶
PoC Week 2024-12-02
The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count. Older CVEs and those affecting open source projects with very small userbases aren’t listed.
For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them.
CVE-2024-9474 Severity: 6.9 MEDIUM Impacted Products: Palo Alto PAN-OS - various versions, see NIST link Description: A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges.…
Read more ⟶
PoC Week 2024-11-25
The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count. Older CVEs and those affecting open source projects with very small userbases aren’t listed.
For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them.
CVE-2024-9474 Severity: 6.9 MEDIUM Impacted Products: Palo Alto PAN-OS - various versions, see NIST link Description: A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges.…
Read more ⟶