GitHub Feed
Explore the latest GitHub repositories gathered from our feed. Entries are grouped by day to help you track developments quickly.
Sun Jun 22, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-30401 | n/a | n/a | Visit Repo | |
CVE-2025-3248-Scanner | Powerful unauthenticated RCE scanner for CVE-2025-3248 affecti | Langflow Unauth RCE |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
Sat Jun 21, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
TryHack | CVE-2024-3094 | n/a | n/a | Visit Repo |
AutoPwn-Titanic.htb | This is an automated exploitation script for the Hack The Box | n/a | n/a | Visit Repo |
CVE-2011-0762 | Script que corrigi o exploit da CVE que foi publicado no explo | n/a | n/a | Visit Repo |
CVE-2017-12615-PoC | PoC environment and exploit for the Apache Tomcat on Windows R | n/a | n/a | Visit Repo |
CVE-2025-24813 | tomcat CVE-2025-24813 反序列化RCE环境 | Apache Tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT | n/a | Visit Repo |
Grafana-cve-2025-4123 | n/a |
v3.1
MEDIUM
Score: 6.8
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L
|
Visit Repo | |
CVE-2021-30047 | Exploit CVE-2021-30047. | n/a | n/a | Visit Repo |
CVE-2025-2539 | File Away <= 3.9.9.0.1 - Missing Authorization to Unauthenticated Arbitrary File Read |
v3.1
HIGH
Score: 7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
Visit Repo | |
PX4-Military-UAV-Autopilot-1.12.3-Stack-Buffer-Overflow-Exploit-CVE-2025-5640- | n/a | n/a | Visit Repo | |
CVE-2023-24249-PoC | n/a | n/a | Visit Repo |
Fri Jun 20, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-49132-PoC | n/a | n/a | Visit Repo | |
CVE-2024-9796 | CVE-2024-9796 poc | WP-Advanced-Search < 3.3.9.2 - Unauthenticated SQL Injection | n/a | Visit Repo |
fortinet-cve-2024-50562 | CVE-2024-50562 is a session management vulnerability in Fortin | n/a | n/a | Visit Repo |
CVE-2025-6019-exploit | exploit | Libblockdev: lpe from allow_active to root in libblockdev via udisks |
v3.1
HIGH
Score: 7
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
POC-CVE-2025-48988-CVE-2025-48976 | n/a | n/a | Visit Repo | |
CVE-2015-1578-PoC-Metasploit | This is a proof-of-concept Metasploit module exploit for CVE-2 | n/a | n/a | Visit Repo |
Thu Jun 19, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
SMB-PenTest-Exploiting-CVE-2007-2447-on-Metasploitable-2 | n/a | n/a | Visit Repo | |
cheese | CVE-2025-21479 proof-of-concept, I think | n/a | n/a | Visit Repo |
CVE-Exploitation | n/a | n/a | Visit Repo | |
CVE-2025-36041 | Exploit (C) of the CVE-2025-36041 vulnerability in IBM MQ | IBM MQ improper certificate validation |
v3.1
MEDIUM
Score: 4.7
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:N
|
Visit Repo |
ManagedProvisioning-A10_r33_CVE-2025-26443 | n/a | n/a | Visit Repo | |
threat-intel-cve-2024-3094 | Threat intelligence report analyzing the xz-utils backdoor vul | Xz: malicious code in distributed source |
v3.1
CRITICAL
Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-6335 | cve报告 | DedeCMS Template dedetag.class.php command injection |
v4.0
MEDIUM
Score: 5.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
|
Visit Repo |
CVE-2025-23121-RCE | n/a |
v3.0
CRITICAL
Score: 9.9
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo | |
Blackash-CVE-2025-0108 | CVE-2025-0108 | PAN-OS: Authentication Bypass in the Management Web Interface |
v4.0
MEDIUM
Score: 5.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/AU:N/R:U/V:C/RE:M/U:Green
|
Visit Repo |
vsftpd234-exploit | Exploit for CVE-2011-2523. | n/a | n/a | Visit Repo |
CVE-2019-11043- | exploit for CVE-2019-11043 | Underflow in PHP-FPM can lead to RCE |
v3.1
HIGH
Score: 8.7
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
|
Visit Repo |
CVE-2019-15107 | exploit for CVE-2019-15107 | n/a | n/a | Visit Repo |
CVE-2025-3248 | CVE-2025-3248 — Langflow RCE Exploit | Langflow Unauth RCE |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-26199 | Public Disclosure | n/a | n/a | Visit Repo |
CVE-2015-1578-PoC | This is a proof-of-concept exploit for CVE-2015-1578, a buffer | n/a | n/a | Visit Repo |
CVE-2025-6019 | Libblockdev: lpe from allow_active to root in libblockdev via udisks |
v3.1
HIGH
Score: 7
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
Wed Jun 18, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2023-6401 | CVE-2023-6401 is a DLL hijacking vulnerability that allows att | NotePad++ dbghelp.exe uncontrolled search path |
v3.1
MEDIUM
Score: 5.3
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
|
Visit Repo |
CVE-2025-44203 | CVE-2025-44203 - HotelDruid 3.0.0/3.0.7 - Sensitive Informatio | n/a | n/a | Visit Repo |
CVE-2025-33053-WebDAV-RCE-PoC-and-C2-Concept | Proof-of-Concept for CVE-2025-33053 Exploiting WebDAV with .u | Internet Shortcut Files Remote Code Execution Vulnerability |
v3.1
HIGH
Score: 8.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
|
Visit Repo |
CVE-2025-3248 | Exploit for Langflow AI Remote Code Execution (Unauthenticated | Langflow Unauth RCE |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-26198 | Public Disclosure | n/a | n/a | Visit Repo |
roundcube-cve-2025-49113 | n/a |
v3.1
CRITICAL
Score: 9.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo | |
CVE-2025-1094 | PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation |
v3.1
HIGH
Score: 8.1
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo | |
CVE-2025-33053-Checker-PoC | CVE-2025-33053 Checker and PoC | Internet Shortcut Files Remote Code Execution Vulnerability |
v3.1
HIGH
Score: 8.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
|
Visit Repo |
CVE-2025-0133 | Palo Alto - Global Protect - Reflected XSS | PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability in GlobalProtect Gateway and Portal |
v4.0
MEDIUM
Score: 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/S:N/AU:N/R:U/V:D/RE:M/U:Amber
|
Visit Repo |
RCE-CVE-2025-32710 | Windows Remote Desktop Services Vulnerability Allows Remote Co | Windows Remote Desktop Services Remote Code Execution Vulnerability |
v3.1
HIGH
Score: 8.1
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
Visit Repo |
CVE-2025-3248 | Langflow Unauth RCE |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
Tue Jun 17, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
Pool-Overflow-CVE-2021-31956 | Kernel Pool Overflow Exploit targeting CVE-2021-31956 | Windows NTFS Elevation of Privilege Vulnerability |
v3.1
HIGH
Score: 7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
|
Visit Repo |
Roundcube_CVE-2025-49113 | Explicação + Lab no THM | n/a |
v3.1
CRITICAL
Score: 9.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
-CVE-2025-0133-GlobalProtect-XSS | CVE-2025-0133 GlobalProtect XSS | PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability in GlobalProtect Gateway and Portal |
v4.0
MEDIUM
Score: 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/S:N/AU:N/R:U/V:D/RE:M/U:Amber
|
Visit Repo |
CVE-2025-6220 | Ultimate Addons for Contact Form 7 <= 3.5.12 - Authenticated ( | Ultimate Addons for Contact Form 7 <= 3.5.12 - Authenticated (Administrator+) Arbitrary File Upload via 'save_options' |
v3.1
HIGH
Score: 7.2
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-43200 | n/a | n/a | Visit Repo |
GitHub Threat Intelligence at a Glance
Stay on top of cybersecurity developments and open-source research through daily GitHub updates.
Jump into a repository to explore code, documentation, or CVE-related insights.