PoC Week 2026-05-18

Posted on May 18, 2026

The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count.

For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them. I don’t vouch for any links in this list: follow them with caution.

CVE-2026-31431

CVE-2026-0300

CVE-2026-7482

  • Severity: 9.1 CRITICAL
  • Impacted Products: Ollama 0.17.1
  • Description: Ollama versions prior to 0.17.1 are affected by a heap out-of-bounds read vulnerability in the GGUF model loader that allows unauthenticated remote attackers to access sensitive server memory. This issue occurs when the application processes a maliciously crafted GGUF file via the /api/create endpoint.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-7482
  • PoC:

CVE-2026-7411

CVE-2026-44109 NEW

CVE-2026-42796

CVE-2026-42778

CVE-2026-42208 NEW

CVE-2026-41940

CVE-2026-36356

  • Severity: 9.1 CRITICAL
  • Impacted Products: MeiG Smart FORGE_SLT711 (firmware MDM9607.LE.1.0-00110-STD.PROD-1)
  • Description: The GoAhead web server on MeiG Smart FORGE_SLT711 devices (firmware MDM9607.LE.1.0-00110-STD.PROD-1) allows unauthenticated OS command injection via the /action/SetRemoteAccessCfg endpoint.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-36356
  • PoC:

CVE-2026-25588 NEW

CVE-2026-24118

CVE-2026-23631 NEW

  • Severity: 8.1 HIGH
  • Impacted Products: redis-server, 8.6.3
  • Description: Redis is an in-memory data structure store. In all versions of redis-server with Lua scripting, an authenticated attacker can exploit the master-replica synchronization mechanism to trigger a use-after-free on replicas where replica-read-only is disabled or can be disabled, which may lead to remote code execution. A workaround is to prevent users from executing Lua scripts or avoid using replicas where replica-read-only is disabled. This is patched in version 8.6.3.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-23631
  • PoC:

CVE-2026-0073 NEW

CVE-2022-0847 NEW

CVE-2016-5195

  • Severity: 7.8 HIGH
  • Impacted Products: Linux kernel versions 2.x through 4.x before 4.8.3
  • Description: A race condition in mm/gup.c allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, known as “Dirty COW.”
  • Remediation: Update to a version after 4.8.3, applying patches or following specific vendor advisories.
  • More Info: NVD - CVE-2016-5195
  • PoC: https://github.com/dirtycow/dirtycow.github.io/blob/master/pokemon.c

CVE-2026-20127

References

This list was scraped from the quite amazing and highly recommended newsletters below:

Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.