<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
  <channel>
    <title>PoC-in-GitHub RSS</title>
    <link>https://poc-in-github.motikan2010.net/</link>
    <description>PoC auto collect from GitHub. Be careful Malware.</description>
    <lastBuildDate>Wed, 08 Apr 2026 03:34:14 +0900</lastBuildDate>

    <item>
        <title>CVE-2026-0740 (2026-04-07) whattheslime/CVE-2026-0740</title>
        <link>https://github.com/whattheslime/CVE-2026-0740</link>
        <description>The Ninja Forms - File Uploads plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'NF_FU_AJAX_Controllers_Uploads::handle_upload' function in all versions up to, and including, 3.3.26. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Note: The vulnerability was partially patched in version 3.3.25 and fully patched in version 3.3.27.<br/>[GitHub]Ninja Forms File Uploads &lt;= 3.3.26 - Unauthenticated Arbitrary File Upload to RCE (CVE-2026-0740)</description>
        <pubDate>Wed, 08 Apr 2026 03:34:14 +0900</pubDate>
        <category>CVE-2026-0740</category>
    </item>
    <item>
        <title>CVE-2025-55182 (2025-12-03) kaxm23/CVE-2025-55182-Auto-Scanner</title>
        <link>https://github.com/kaxm23/CVE-2025-55182-Auto-Scanner</link>
        <description>A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.<br/>[GitHub]CVE-2025-55182 Auto Scanner - Improved Version For authorized CTF/testing purposes only</description>
        <pubDate>Fri, 10 Apr 2026 20:07:12 +0900</pubDate>
        <category>CVE-2025-55182</category>
    </item>
    <item>
        <title>CVE-2025-5548 (2025-06-04) CryptoMachio/CVE-2025-5548</title>
        <link>https://github.com/CryptoMachio/CVE-2025-5548</link>
        <description>A vulnerability, which was classified as critical, was found in FreeFloat FTP Server 1.0. Affected is an unknown function of the component NOOP Command Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.<br/>[GitHub]Estudio técnico de la vulnerabilidad CVE-2025-5548</description>
        <pubDate>Fri, 10 Apr 2026 20:19:44 +0900</pubDate>
        <category>CVE-2025-5548</category>
    </item>
    <item>
        <title>CVE-2025-55182 (2025-12-03) kaxm23/rust-cve-2025-55182-scanner</title>
        <link>https://github.com/kaxm23/rust-cve-2025-55182-scanner</link>
        <description>A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.<br/>[GitHub]powerfull rust cve-2025-55182-scanner used for ctf &amp; ethical purpose only </description>
        <pubDate>Fri, 10 Apr 2026 20:49:46 +0900</pubDate>
        <category>CVE-2025-55182</category>
    </item>
    <item>
        <title>CVE-2021-22911 (2021-05-27) roshanrajbanshi/rocketcat-cve-2021-22911-exploit</title>
        <link>https://github.com/roshanrajbanshi/rocketcat-cve-2021-22911-exploit</link>
        <description>A improper input sanitization vulnerability exists in Rocket.Chat server 3.11, 3.12 &amp; 3.13 that could lead to unauthenticated NoSQL injection, resulting potentially in RCE.<br/>[GitHub]CVE-2021-22911 Rocket.Chat NoSQL Injection RCE Exploit - Educational Purpose</description>
        <pubDate>Fri, 10 Apr 2026 18:16:26 +0900</pubDate>
        <category>CVE-2021-22911</category>
    </item>
    <item>
        <title>CVE-2026-34197 (2026-04-07) hg0434hongzh0/CVE-2026-34197</title>
        <link>https://github.com/hg0434hongzh0/CVE-2026-34197</link>
        <description>Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ.

Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The default Jolokia access policy permits exec operations on all ActiveMQ MBeans (org.apache.activemq:*), including
BrokerService.addNetworkConnector(String) and BrokerService.addConnector(String).

An authenticated attacker can invoke these operations with a crafted discovery URI that triggers the VM transport's brokerConfig parameter to load a remote Spring XML application context using ResourceXmlApplicationContext.
Because Spring's ResourceXmlApplicationContext instantiates all singleton beans before the BrokerService validates the configuration, arbitrary code execution occurs on the broker's JVM through bean factory methods such as Runtime.exec().



This issue affects Apache ActiveMQ Broker: before 5.19.4, from 6.0.0 before 6.2.3; Apache ActiveMQ All: before 5.19.4,<br/>[GitHub]POC</description>
        <pubDate>Fri, 10 Apr 2026 10:29:12 +0900</pubDate>
        <category>CVE-2026-34197</category>
    </item>
    <item>
        <title>CVE-2026-33033 (2026-04-07) ch4n3-yoon/CVE-2026-33033-PoC</title>
        <link>https://github.com/ch4n3-yoon/CVE-2026-33033-PoC</link>
        <description>An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and 4.2 before 4.2.30.
`MultiPartParser` allows remote attackers to degrade performance by submitting multipart uploads with `Content-Transfer-Encoding: base64` including excessive whitespace.
Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Seokchan Yoon for reporting this issue.<br/>[GitHub]A PoC script for demonstrating CVE-2026-33033</description>
        <pubDate>Fri, 10 Apr 2026 11:04:12 +0900</pubDate>
        <category>CVE-2026-33033</category>
    </item>
    <item>
        <title>CVE-2025-55182 (2025-12-03) masterwok/CVE-2025-55182-React2Shell-PoC</title>
        <link>https://github.com/masterwok/CVE-2025-55182-React2Shell-PoC</link>
        <description>A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.<br/>[GitHub]Proof-of-concept exploit for CVE-2025-55182 (React2Shell)</description>
        <pubDate>Fri, 10 Apr 2026 12:34:25 +0900</pubDate>
        <category>CVE-2025-55182</category>
    </item>
    <item>
        <title>CVE-2026-5530 (2026-04-05) davidrxchester/CVE-2026-5530</title>
        <link>https://github.com/davidrxchester/CVE-2026-5530</link>
        <description>A flaw has been found in Ollama up to 18.1. This issue affects some unknown processing of the file server/download.go of the component Model Pull API. Executing a manipulation can lead to server-side request forgery. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.<br/>[GitHub]POC for CVE-2026-5530 - SSRF via Ollama Pull/Push API</description>
        <pubDate>Fri, 10 Apr 2026 12:52:57 +0900</pubDate>
        <category>CVE-2026-5530</category>
    </item>
    <item>
        <title>CVE-2026-35584 (2026-04-07) LeonardoNovais7/CVE-2026-35584</title>
        <link>https://github.com/LeonardoNovais7/CVE-2026-35584</link>
        <description>FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Prior to 1.8.212, the endpoint GET /thread/read/{conversation_id}/{thread_id} does not require authentication and does not validate whether the given thread_id belongs to the given conversation_id. This allows any unauthenticated attacker to mark any thread as read by passing arbitrary IDs, enumerate valid thread IDs via HTTP response codes (200 vs 404), and manipulate opened_at timestamps across conversations (IDOR). This vulnerability is fixed in 1.8.212.<br/>[GitHub]POC - CVE-2026-35584</description>
        <pubDate>Fri, 10 Apr 2026 13:49:07 +0900</pubDate>
        <category>CVE-2026-35584</category>
    </item>
  </channel>
</rss>