GitHub Feed
Explore the latest GitHub repositories gathered from our feed. Entries are grouped by day to help you track developments quickly.
Mon Jul 21, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-53770-Hunting | Hunting for Critical SharePoint Vulnerability CVE-2025-53770 | Microsoft SharePoint Server Remote Code Execution Vulnerability |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:W/RC:C
|
Visit Repo |
CVE-2023-7028 | This FORK of repository presents a proof-of-concept of CVE-202 | Weak Password Recovery Mechanism for Forgotten Password in GitLab |
v3.1
CRITICAL
Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
|
Visit Repo |
grafana-CVE-2024-9264 | Grafana image with DuckDB binary present vulnerable to exploit | Grafana SQL Expressions allow for remote code execution |
v4.0
CRITICAL
Score: 9.4
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
|
Visit Repo |
CVE-2025-53770-Exploit | SharePoint WebPart Injection Exploit Tool | Microsoft SharePoint Server Remote Code Execution Vulnerability |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:W/RC:C
|
Visit Repo |
CVE-2025-53770 | Scanner for the SharePoint CVE-2025-53770 RCE zero day vulnera | Microsoft SharePoint Server Remote Code Execution Vulnerability |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:W/RC:C
|
Visit Repo |
Sudo-Privilege-Escalation-Linux-CVE-2025-32463-and-CVE-2025-32462 | A deep dive into two critical Sudo vulnerabilities (CVE‑2025 | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
SharePointSecurityMonitor | A comprehensive security monitoring solution for SharePoint Se | n/a | n/a | Visit Repo |
CVE-2025-53770-Scanner | Microsoft SharePoint Server Remote Code Execution Vulnerability |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:W/RC:C
|
Visit Repo | |
CVE-2025-53770 | POC | Microsoft SharePoint Server Remote Code Execution Vulnerability |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:W/RC:C
|
Visit Repo |
Bootstrap-with-XSS | A poc for Bootstrap XSS(CVE-2024-6485、CVE-2016-10735、CVE-2 | n/a | n/a | Visit Repo |
POC-CVE-2024-8118 | Berikut untuk POC grafana CVE-2024-8118 | Grafana alerting wrong permission on datasource rule write endpoint |
v4.0
MEDIUM
Score: 5.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
|
Visit Repo |
bluefire-sharepoint-cve-2025-53770 | Microsoft SharePoint Server Remote Code Execution Vulnerability |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:W/RC:C
|
Visit Repo | |
ZeroPoint | This PowerShell script detects indicators of compromise for CV | n/a | n/a | Visit Repo |
CVE-2025-53770 | A critical zero-day vulnerability CVE‑2025‑53770 has been | Microsoft SharePoint Server Remote Code Execution Vulnerability |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:W/RC:C
|
Visit Repo |
CVEScannerX | Scans IPs, domains, or local systems for known CVEs using NVD, | n/a | n/a | Visit Repo |
CVE-exploit | It scans for the particular ip address and gives the result in | n/a | n/a | Visit Repo |
Sun Jul 20, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-4380 | n/a | n/a | Visit Repo | |
Blackash-CVE-2025-53770 | CVE-2025-53770 | Microsoft SharePoint Server Remote Code Execution Vulnerability |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:W/RC:C
|
Visit Repo |
ai-detects-if-cve-was-zero-day | Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3 | n/a | n/a | Visit Repo |
cve_2022_0492 | PoC for CVE-2022-0492 | n/a | n/a | Visit Repo |
CVE-2025-49706-SharePoint-Spoofing-Vulnerability-Under-Active-Exploitation | A deep dive into CVE-2025-49706 — the SharePoint spoofing fl | Microsoft SharePoint Server Spoofing Vulnerability |
v3.1
MEDIUM
Score: 6.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:F/RL:O/RC:C
|
Visit Repo |
CVE-2025-32463 | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo | |
CVE-2025-7840 | Proof‑of‑concept exploit for CVE‑2025‑7840 that inject | Campcodes Online Movie Theater Seat Reservation System Reserve Your Seat Page index.php cross site scripting |
v4.0
MEDIUM
Score: 5.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
|
Visit Repo |
CVE-2025-48384 | CVE-2025-48384 PoC | Git allows arbitrary code execution through broken config quoting |
v3.1
HIGH
Score: 8.1
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-34085 | WordPress Simple File List Unauthenticated RCE Exploit | WordPress Simple File List Plugin < 4.2.3 Unauthenticated Remote Code Execution |
v4.0
CRITICAL
Score: 10
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
|
Visit Repo |
CVE-2025-51396 | LiveHelperChat <=4.61 - Stored Cross Site Scripting (XSS) via | n/a | n/a | Visit Repo |
CVE-2025-51970 | SQL Injection in Online Shopping System Advanced (CVE-2025-519 | n/a | n/a | Visit Repo |
CVE-2025-49721_part1 | Research error with cache manager error in fastfat | Windows Fast FAT File System Driver Elevation of Privilege Vulnerability |
v3.1
HIGH
Score: 7.8
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
Visit Repo |
CVE-2025-51398 | LiveHelperChat <=4.61 - Stored Cross Site Scripting (XSS) via | n/a | n/a | Visit Repo |
POC-CVE-2025-32023 | This is a reference to https://github.com/leesh3288/CVE-2025-3 | n/a | n/a | Visit Repo |
CVE-2025-51403 | LiveHelperChat <=4.61 - Stored Cross Site Scripting (XSS) via | n/a | n/a | Visit Repo |
CVE-2025-51400 | LiveHelperChat <=4.61 - Stored Cross Site Scripting (XSS) via | n/a | n/a | Visit Repo |
CVE-2025-51397 | LiveHelperChat <=4.61 - Stored Cross Site Scripting (XSS) via | n/a | n/a | Visit Repo |
CVE-2025-51401 | LiveHelperChat <=4.61 - Stored Cross Site Scripting (XSS) via | n/a | n/a | Visit Repo |
CVE-2025-27591-Below | n/a | n/a | Visit Repo |
Sat Jul 19, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-27591-PoC | Local Privilege Escalation Exploit for CVE-2025-27591 | Abuse | n/a | n/a | Visit Repo |
CVE-2025-49113 | Python Exploit for CVE-2025-49113 | Roundcube Webmail RCE via | n/a |
v3.1
CRITICAL
Score: 9.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2024-47575 | PoC for CVE-2024-47575 | n/a |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H/RL:U/RC:C
|
Visit Repo |
CVE-2025-31161 | n/a |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo | |
CVE-2025-51863 | n/a | n/a | Visit Repo | |
CVE-2025-51867 | n/a | n/a | Visit Repo | |
CVE-2025-51869 | n/a | n/a | Visit Repo | |
CVE-2025-41646 | RevPi Webstatus application is vulnerable to an authentication bypass |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo | |
CVE-2025-25257 | Public PoC for CVE-2025-25257: FortiWeb pre-auth SQLi to RCE | n/a | n/a | Visit Repo |
PutScanner | A tool that identifies writable web directories in Apache Tomc | n/a | n/a | Visit Repo |
CVE-2025-7795 | Proof-of-Concept exploit for CVE-2025-7795 – A buffer overfl | n/a | n/a | Visit Repo |
CVE-2025-51864 | n/a | n/a | Visit Repo | |
CVE-2025-53640 | Broken Object Level Authorization (BOLA) in CERN's Indico lead | n/a | n/a | Visit Repo |
CVE-2025-51865 | n/a | n/a | Visit Repo | |
CVE-2025-51868 | n/a | n/a | Visit Repo |
GitHub Threat Intelligence at a Glance
Stay on top of cybersecurity developments and open-source research through daily GitHub updates.
Jump into a repository to explore code, documentation, or CVE-related insights.