GitHub Feed
Explore the latest GitHub repositories gathered from our feed. Entries are grouped by day to help you track developments quickly.
Thu Jun 05, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-5701-Exploit | n/a | n/a | Visit Repo | |
CVE-2025-3054-Exploit | WP User Frontend Pro <= 4.1.3 - Authenticated (Subscriber+) Arbitrary File Upload |
v3.1
HIGH
Score: 8.8
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo | |
CVE-2025-32756-POC | Proof of Concept for CVE-2025-32756 - A critical stack-based b | n/a | n/a | Visit Repo |
cve-2024-53703-poc | POC for exploiting CVE-2024-53703, a stack-based buffer overfl | n/a | n/a | Visit Repo |
CVE-2025-49113 | n/a |
v3.1
CRITICAL
Score: 9.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo | |
CVE-2011-0762 | Script que corrigi o exploit da CVE que foi publicado no explo | n/a | n/a | Visit Repo |
Discord-Image-Logger-Stealer | Discord Image Logger captures images shared in Discord channel | n/a | n/a | Visit Repo |
Wed Jun 04, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
Automate_Exploit_CVE-2022-44268 | An exploit automation script that builds upon the work of Void | n/a | n/a | Visit Repo |
CVE-2025-46816 | POC for exploit of goshs | n/a | n/a | Visit Repo |
CVE-2025-4123-Exploit-Tool-Grafana- | CVE-2025-4123 - Grafana Tool | n/a |
v3.1
HIGH
Score: 7.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L
|
Visit Repo |
CVE-2025-4632-POC | n/a |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo | |
CVE-2025-2539 | Unauthenticated Arbitrary File Read exploit for WordPress File | File Away <= 3.9.9.0.1 - Missing Authorization to Unauthenticated Arbitrary File Read |
v3.1
HIGH
Score: 7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
Visit Repo |
CVE-2025-49223-BillboardJS-PoC | CVE-2025-49223 - Prototype Pollution in Billboard.js | n/a | n/a | Visit Repo |
CVE-2025-22056-exploit | netfilter: nft_tunnel: fix geneve_opt type confusion addition | n/a | Visit Repo | |
CVE | CVE-2025-32206 | n/a | n/a | Visit Repo |
CVE-2025-49113-nuclei-template | CVE-2025-49113 - Roundcube <= 1.6.10 Post-Auth RCE via PHP Obj | n/a |
v3.1
CRITICAL
Score: 9.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
chainhunt | ChainHunt: AI-enhanced vulnerability & exploit correlator. Cha | n/a | n/a | Visit Repo |
CVE-2019-12840-NodeJs-Exploit | Authenticated Remote Command Execution - Webmin <= 1.910 | n/a | n/a | Visit Repo |
Tue Jun 03, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-2945_PoC | pgAdmin Proof of Concept | pgAdmin 4: Remote Code Execution in Query Tool and Cloud Deployment |
v3.1
CRITICAL
Score: 9.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-49113 | Detection for CVE-2025-49113 | n/a |
v3.1
CRITICAL
Score: 9.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
Exploit_CVE-2023-27163 | Proof of Concept exploit for Server Side Request Forgery vulne | n/a | n/a | Visit Repo |
CVE-2025-5419 | n/a | n/a | Visit Repo | |
CVE-2025-22224 | Privilege Escalation via TOCTOU Race Condition in VMware VMX ( | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-20188 | n/a | n/a | Visit Repo | |
CVE-2024-53677 | Apache Struts: Mixing setters for uploaded files and normal fields can allow bypass file upload checks |
v4.0
CRITICAL
Score: 9.5
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:N/AU:Y/R:A/V:C/RE:L/U:Red
|
Visit Repo | |
cve20254664 | n/a | n/a | Visit Repo | |
CVE-2025-3102 | SureTriggers <= 1.0.78 - Authorization Bypass Exploit | SureTriggers <= 1.0.78 - Authorization Bypass due to Missing Empty Value Check to Unauthenticated Administrative User Creation |
v3.1
HIGH
Score: 8.1
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-4123-template | n/a |
v3.1
HIGH
Score: 7.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L
|
Visit Repo | |
Bug-Bounty-Reports | Document ethical hacking findings, CVEs, writeups, and proof-o | n/a | n/a | Visit Repo |
django-vulnerability-CVE-2025-32873 | Django Security Issue (CVE-2025-32873) | n/a | n/a | Visit Repo |
cve-2024-3094 | A XZ backdoor vulnerability explained in details | Xz: malicious code in distributed source |
v3.1
CRITICAL
Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-46206 | n/a | n/a | Visit Repo | |
Banco_vetorial_CVE | Automatize a extração e inserção de dados de vulnerabilida | n/a | n/a | Visit Repo |
CVE-2014-4688-NodeJs-Exploit | Authenticated Remote Command Execution – pfSense <= 2.1.3 | n/a | n/a | Visit Repo |
CVE-2024-28784 | Technical disclosure for CVE-2024-28784 — a stored XSS vulne | IBM QRadar cross-site scripting |
v3.1
MEDIUM
Score: 5.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
Visit Repo |
Mon Jun 02, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
PoC-CVE-2024-39924 | PoC for CVE-2024-39924 | n/a | n/a | Visit Repo |
CVE-2025-44148 | A reflected cross-site scripting (XSS) vulnerability exists in | n/a | n/a | Visit Repo |
Exploit_MS08-067 | MS08-067 | CVE-2008-4250 | n/a | n/a | Visit Repo |
CVE-2025-5280-V8-OOB | Remote Code Execution via Out-of-Bounds Write in V8 (CVE-2025- | n/a | n/a | Visit Repo |
CVE-2025-22224-PoC | Privilege Escalation via TOCTOU in VMware VMX (CVE-2025-22224) | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
DVR_Credential_Scanner | A tool for scanning DVR systems vulnerable to CVE-2018-9995 cr | n/a | n/a | Visit Repo |
Sun Jun 01, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2011-0762 | Prova de Conceito corrigida do exploit-db | n/a | n/a | Visit Repo |
CVE-2023-25690-POC | CVE 2023 25690 Proof of concept - mod_proxy vulnerable configu | Apache HTTP Server: HTTP request splitting with mod_rewrite and mod_proxy | n/a | Visit Repo |
os-toolkit | A modular pentesting toolkit for scanning, exploitation simula | n/a | n/a | Visit Repo |
msfcve | Metasploit Exploit CVE Coverage | n/a | n/a | Visit Repo |
Discord-Image-Logger-Stealer | Ephemeral discourse is embodied by the likes of Messenger Sess | n/a | n/a | Visit Repo |
RCE-CVE-2025-3248 | This Python script exploits CVE-2025-3248 to execute arbitrary | Langflow Unauth RCE |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
HTA-Exploit | Microsoft Windows HTA (HTML Application) - Pinnacle of Remote | n/a | n/a | Visit Repo |
Anydesk-Exploit-CVE-2025-12654-RCE-Builder | Exploit development targets vulnerabilities using tools like e | n/a | n/a | Visit Repo |
PDF-FUD-Exploit | A meticulous scrutiny of the Exploit PDFs innards exposes a ne | n/a | n/a | Visit Repo |
GitHub Threat Intelligence at a Glance
Stay on top of cybersecurity developments and open-source research through daily GitHub updates.
Jump into a repository to explore code, documentation, or CVE-related insights.