CyberGlossary

Vulnerabilities

Proof-of-Concept Exploit

Also known as: PoC exploit

Definition

A minimal, often non-weaponized piece of code that demonstrates a vulnerability is real and exploitable, typically published for research or coordinated disclosure.

A proof-of-concept (PoC) exploit is the smallest credible demonstration that a flaw can be triggered to produce its expected impact — for example, crashing a service, leaking memory bytes, or popping a calculator from a renderer process. PoCs are widely used by researchers, bug-bounty hunters, and vendors to validate fixes, but defenders treat them with care: even rough PoCs are often refined into weaponized exploits within hours or days. Many CVE write-ups link to GitHub PoCs. Defenders use PoCs to validate detections, test patches, and prioritize emergency response, especially when a PoC is paired with an active EPSS or KEV signal.

Examples

  • A small Python script that triggers a heap overflow but only prints a debug message.
  • A crafted HTTP request that demonstrates blind SSRF without exfiltrating data.

Related terms