GitHub Feed
Explore the latest GitHub repositories gathered from our feed. Entries are grouped by day to help you track developments quickly.
Fri Jul 18, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2021-32099 | PoC for CVE-2021-32099 | n/a | n/a | Visit Repo |
cve-analysis-2 | Real-world vulnerability analysis of five CVEs (2025) focusing | n/a | n/a | Visit Repo |
CVE-2025-7753 | PoC Exploit for CVE-2025-7753 — Time-Based SQL Injection in | n/a | n/a | Visit Repo |
Blackash-CVE-2025-27210 | CVE-2025-27210 | n/a | n/a | Visit Repo |
CVE-2025-7783-poc | POC of CVE-2025-7783 | n/a | n/a | Visit Repo |
CVE-2025-47176 | Microsoft Outlook Remote Code Execution Vulnerability | Microsoft Outlook Remote Code Execution Vulnerability |
v3.1
HIGH
Score: 7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
Visit Repo |
DjVuLibre-poc-CVE-2025-53367 | DjVuLibre OOB-Write Vulnerability in MMRDecoder |
v4.0
HIGH
Score: 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
|
Visit Repo | |
Sudo-CVE-2021-3156 | Exploit para explotar la vulnerabilidad CVE-2021-3156. | n/a | n/a | Visit Repo |
CVE-2025-32463 | Local Privilege Escalation to Root via Sudo chroot in Linux | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2022-44136-poc | Zenar CMS 9.3 suffers from an unrestricted file upload v | n/a | n/a | Visit Repo |
CVE-2025-49113 | n/a |
v3.1
CRITICAL
Score: 9.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo | |
CVE-2025-25257 | Exploiting the CVE-2025-25257 vulnerability in FortiWeb. This | n/a | n/a | Visit Repo |
cve-monitor | Created July 18, 2025 - A Python-based dashboard for monitorin | n/a | n/a | Visit Repo |
CVE-2025-27591-PoC | A Proof of Concept for CVE-2025-27591, a local privilege escal | n/a | n/a | Visit Repo |
Thu Jul 17, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-48384-submodule_test | Git allows arbitrary code execution through broken config quoting |
v3.1
HIGH
Score: 8.1
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
|
Visit Repo | |
CvEsposa2025 | n/a | n/a | Visit Repo | |
splashin-cve-2025 | Public advisory, PoCs, and full technical report for Splashin� | n/a | n/a | Visit Repo |
Blackash-CVE-2025-47812 | CVE-2025-47812 | n/a |
v3.1
CRITICAL
Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
cve-analysis | Detailed analysis of selected 2024–2025 CVEs (XSS, CSRF, SQL | n/a | n/a | Visit Repo |
Blackash-CVE-2025-30065 | CVE-2025-30065 | Apache Parquet Java: Arbitrary code execution in the parquet-avro module when reading an Avro schema from a Parquet file metadata |
v4.0
CRITICAL
Score: 10
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
|
Visit Repo |
CVE-2025-27591_PoC | n/a | n/a | Visit Repo | |
CVE-2025-6558-exp | n/a | n/a | Visit Repo | |
CVE-2025-47812 | n/a |
v3.1
CRITICAL
Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo | |
CVE-2025-32463 | This is the exploit for the CVE-2025-32463 | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
realestate-php-cve-report | Disclosure for CVE-2025-50716 to CVE-2025-50721 | n/a | n/a | Visit Repo |
cve-2016-6210 | PoC of cve-2016-6210 | n/a | n/a | Visit Repo |
CVE-2025-6558 | n/a | n/a | Visit Repo | |
CVE-2025-48384-RCE | Git allows arbitrary code execution through broken config quoting |
v3.1
HIGH
Score: 8.1
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
|
Visit Repo | |
ExploitVeer | An advanced, powerful, and easy-to-use tool designed to detect | n/a | n/a | Visit Repo |
Wed Jul 16, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-53964 | n/a | n/a | Visit Repo | |
cyber-combat | An in-depth analysis of CVE 2023 38408, a critical OpenSSH vul | n/a | n/a | Visit Repo |
Blackash-CVE-2025-22870 | CVE-2025-22870 | HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net | n/a | Visit Repo |
CVE-2025-27521_PoC | n/a |
v3.1
MEDIUM
Score: 6.8
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
|
Visit Repo | |
CVE-2025-32463 | Privilege escalation to root via sudo without gcc. Exploit wor | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-32463 | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo | |
BleedingLife | a web-browser Buffer Overflow Exploit Pack (powered by PHP+MyS | n/a | n/a | Visit Repo |
CVE-2025-32463-Chwoot-POC | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo | |
exploit-poc | Place to archive all the PoC for exploits, CVEs etc. | n/a | n/a | Visit Repo |
Blackash-CVE-2025-5777 | CVE-2025-5777 | NetScaler ADC and NetScaler Gateway - Insufficient input validation leading to memory overread |
v4.0
CRITICAL
Score: 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L
|
Visit Repo |
CVE-2025-52688 | n/a | n/a | Visit Repo | |
Blackash-CVE-2025-32432 | CVE-2025-32432 | Craft CMS Allows Remote Code Execution |
v3.1
CRITICAL
Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L
|
Visit Repo |
CVE-2025-47812 | Improper Neutralization of Null Byte or NUL Character in WingF | n/a |
v3.1
CRITICAL
Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-27210_NodeJS_Path_Traversal_Exploit | (PoC) CVE-2025-27210, a precise Path Traversal vulnerability a | n/a | n/a | Visit Repo |
cve-poc | n/a | n/a | Visit Repo | |
CVE-2025-52689-PoC | Weak Session ID Check in the OmniAccess Stellar Web Management Interface |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo | |
CVE-2024-4577 | Exploit for php-cgi | Argument Injection in PHP-CGI |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
HML-CVE-2025-49113-Round-Cube | n/a |
v3.1
CRITICAL
Score: 9.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo | |
cve-2025-48384-poc | Git allows arbitrary code execution through broken config quoting |
v3.1
HIGH
Score: 8.1
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
|
Visit Repo |
Tue Jul 15, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-23167 | Working exploit for CVE-2025-23167 – HTTP request smuggling | n/a |
v3.0
MEDIUM
Score: 6.5
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
|
Visit Repo |
CVE-2025-32463 | Privilege escalation to root using sudo chroot, NO NEED for gc | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
GitHub Threat Intelligence at a Glance
Stay on top of cybersecurity developments and open-source research through daily GitHub updates.
Jump into a repository to explore code, documentation, or CVE-related insights.