GitHub Feed

Explore the latest GitHub repositories gathered from our feed. Entries are grouped by day to help you track developments quickly.

Fri Jul 18, 2025

Repository Description CVE Metrics Action
CVE-2021-32099 PoC for CVE-2021-32099 n/a n/a Visit Repo
cve-analysis-2 Real-world vulnerability analysis of five CVEs (2025) focusing n/a n/a Visit Repo
CVE-2025-7753 PoC Exploit for CVE-2025-7753 — Time-Based SQL Injection in n/a n/a Visit Repo
Blackash-CVE-2025-27210 CVE-2025-27210 n/a n/a Visit Repo
CVE-2025-7783-poc POC of CVE-2025-7783 n/a n/a Visit Repo
CVE-2025-47176 Microsoft Outlook Remote Code Execution Vulnerability Microsoft Outlook Remote Code Execution Vulnerability
v3.1 HIGH Score: 7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Visit Repo
DjVuLibre-poc-CVE-2025-53367 DjVuLibre OOB-Write Vulnerability in MMRDecoder
v4.0 HIGH Score: 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Visit Repo
Sudo-CVE-2021-3156 Exploit para explotar la vulnerabilidad CVE-2021-3156. n/a n/a Visit Repo
CVE-2025-32463 Local Privilege Escalation to Root via Sudo chroot in Linux n/a
v3.1 CRITICAL Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Visit Repo
CVE-2022-44136-poc Zenar CMS 9.3 suffers from an ​​unrestricted file upload v n/a n/a Visit Repo
CVE-2025-49113 n/a
v3.1 CRITICAL Score: 9.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Visit Repo
CVE-2025-25257 Exploiting the CVE-2025-25257 vulnerability in FortiWeb. This n/a n/a Visit Repo
cve-monitor Created July 18, 2025 - A Python-based dashboard for monitorin n/a n/a Visit Repo
CVE-2025-27591-PoC A Proof of Concept for CVE-2025-27591, a local privilege escal n/a n/a Visit Repo

Thu Jul 17, 2025

Repository Description CVE Metrics Action
CVE-2025-48384-submodule_test Git allows arbitrary code execution through broken config quoting
v3.1 HIGH Score: 8.1
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
Visit Repo
CvEsposa2025 n/a n/a Visit Repo
splashin-cve-2025 Public advisory, PoCs, and full technical report for Splashin� n/a n/a Visit Repo
Blackash-CVE-2025-47812 CVE-2025-47812 n/a
v3.1 CRITICAL Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Visit Repo
cve-analysis Detailed analysis of selected 2024–2025 CVEs (XSS, CSRF, SQL n/a n/a Visit Repo
Blackash-CVE-2025-30065 CVE-2025-30065 Apache Parquet Java: Arbitrary code execution in the parquet-avro module when reading an Avro schema from a Parquet file metadata
v4.0 CRITICAL Score: 10
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Visit Repo
CVE-2025-27591_PoC n/a n/a Visit Repo
CVE-2025-6558-exp n/a n/a Visit Repo
CVE-2025-47812 n/a
v3.1 CRITICAL Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Visit Repo
CVE-2025-32463 This is the exploit for the CVE-2025-32463 n/a
v3.1 CRITICAL Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Visit Repo
realestate-php-cve-report Disclosure for CVE-2025-50716 to CVE-2025-50721 n/a n/a Visit Repo
cve-2016-6210 PoC of cve-2016-6210 n/a n/a Visit Repo
CVE-2025-6558 n/a n/a Visit Repo
CVE-2025-48384-RCE Git allows arbitrary code execution through broken config quoting
v3.1 HIGH Score: 8.1
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
Visit Repo
ExploitVeer An advanced, powerful, and easy-to-use tool designed to detect n/a n/a Visit Repo

Wed Jul 16, 2025

Repository Description CVE Metrics Action
CVE-2025-53964 n/a n/a Visit Repo
cyber-combat An in-depth analysis of CVE 2023 38408, a critical OpenSSH vul n/a n/a Visit Repo
Blackash-CVE-2025-22870 CVE-2025-22870 HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net n/a Visit Repo
CVE-2025-27521_PoC n/a
v3.1 MEDIUM Score: 6.8
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Visit Repo
CVE-2025-32463 Privilege escalation to root via sudo without gcc. Exploit wor n/a
v3.1 CRITICAL Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Visit Repo
CVE-2025-32463 n/a
v3.1 CRITICAL Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Visit Repo
BleedingLife a web-browser Buffer Overflow Exploit Pack (powered by PHP+MyS n/a n/a Visit Repo
CVE-2025-32463-Chwoot-POC n/a
v3.1 CRITICAL Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Visit Repo
exploit-poc Place to archive all the PoC for exploits, CVEs etc. n/a n/a Visit Repo
Blackash-CVE-2025-5777 CVE-2025-5777 NetScaler ADC and NetScaler Gateway - Insufficient input validation leading to memory overread
v4.0 CRITICAL Score: 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L
Visit Repo
CVE-2025-52688 n/a n/a Visit Repo
Blackash-CVE-2025-32432 CVE-2025-32432 Craft CMS Allows Remote Code Execution
v3.1 CRITICAL Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L
Visit Repo
CVE-2025-47812 Improper Neutralization of Null Byte or NUL Character in WingF n/a
v3.1 CRITICAL Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Visit Repo
CVE-2025-27210_NodeJS_Path_Traversal_Exploit (PoC) CVE-2025-27210, a precise Path Traversal vulnerability a n/a n/a Visit Repo
cve-poc n/a n/a Visit Repo
CVE-2025-52689-PoC Weak Session ID Check in the OmniAccess Stellar Web Management Interface
v3.1 CRITICAL Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Visit Repo
CVE-2024-4577 Exploit for php-cgi Argument Injection in PHP-CGI
v3.1 CRITICAL Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Visit Repo
HML-CVE-2025-49113-Round-Cube n/a
v3.1 CRITICAL Score: 9.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Visit Repo
cve-2025-48384-poc Git allows arbitrary code execution through broken config quoting
v3.1 HIGH Score: 8.1
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
Visit Repo

Tue Jul 15, 2025

Repository Description CVE Metrics Action
CVE-2025-23167 Working exploit for CVE-2025-23167 – HTTP request smuggling n/a
v3.0 MEDIUM Score: 6.5
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Visit Repo
CVE-2025-32463 Privilege escalation to root using sudo chroot, NO NEED for gc n/a
v3.1 CRITICAL Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Visit Repo

GitHub Threat Intelligence at a Glance

Stay on top of cybersecurity developments and open-source research through daily GitHub updates.

Jump into a repository to explore code, documentation, or CVE-related insights.