GitHub Feed

Explore the latest GitHub repositories gathered from our feed. Entries are grouped by day to help you track developments quickly.

Tue May 20, 2025

Repository Description CVE Metrics Action
CVE-2024-53677 CVE-2024-53677 Apache Struts: Mixing setters for uploaded files and normal fields can allow bypass file upload checks
v4.0 CRITICAL Score: 9.5
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:N/AU:Y/R:A/V:C/RE:L/U:Red
Visit Repo
CVE-2025-4322-Exploit n/a n/a Visit Repo
Exploits-CVEs This repo exists as a personal project for me to learn more ab n/a n/a Visit Repo
CVE-2025-4919-Exploit n/a n/a Visit Repo
CVE-2025-2135 n/a n/a Visit Repo
CVE-2011-0762 Um script automatizado melhorando o exploit do cve-2011-0762 p n/a n/a Visit Repo
hackopolis Hackopolis is a vulnerable web application which contains a wi n/a n/a Visit Repo
SQL-Injection-in-John-XXIII-College-Website-gallary.php- This repo is made for CVE requets and POC n/a n/a Visit Repo
CVE-2024-4577-PHP-RCE PHP RCE PoC for CVE-2024-4577 written in bash, go, python and Argument Injection in PHP-CGI
v3.1 CRITICAL Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Visit Repo
CVE-2021-41773 Proof of Concept for CVE-2021-41773: Apache path traversal exp Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49 n/a Visit Repo
exploit-cve-2025-1974 ingress-nginx admission controller RCE escalation
v3.1 CRITICAL Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Visit Repo
CVE-2025-29813-PE CVE-2025-29813 – Visual Studio Privilege Escalation via Impr n/a n/a Visit Repo
CVE-2025-24054 Vulnerabilidad NTLM (CVE-2025-24054) explotada para robo de ha NTLM Hash Disclosure Spoofing Vulnerability
v3.1 MEDIUM Score: 6.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
Visit Repo
CVE-2021-38003 Write Up & Exploitation For CVE-2021-38003 n/a n/a Visit Repo

Mon May 19, 2025

Repository Description CVE Metrics Action
CVE-Exploits-on-Metasploitable2 n/a n/a Visit Repo

Sun May 18, 2025

Repository Description CVE Metrics Action
VulnrabilityScanner A Python-based tool that automates initial vulnerability scann n/a n/a Visit Repo
POC-CVE-2025-24104-Py n/a n/a Visit Repo
CVE-2024-41713-PoC-exploit Mitel MiCollab Authentication Bypass to Arbitrary File Read n/a n/a Visit Repo
CVE-2025-32756-POC Designed for Demonstration of Deep Exploitation. n/a n/a Visit Repo
CVE-2025-4664 CVE-2025-4664 n/a n/a Visit Repo
wp-ulike-cve-2025-32259-poc In affected versions of the WP ULike plugin, there is no prope WordPress WP ULike plugin <= 4.7.9.1 - Content Spoofing Vulnerability
v3.1 MEDIUM Score: 5.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Visit Repo
CVE-2025-4921 CVE-2025-4921 n/a n/a Visit Repo
POC-CVE-2024-44258-Py n/a n/a Visit Repo
CVE-2025-47539 Eventin <= 4.0.26 - Missing Authorization to Unauthenticated P n/a n/a Visit Repo
CVE-2025-31200-iOS-AudioConverter-RCE Public disclosure of CVE-2025-31200 – Zero-click RCE in iOS n/a n/a Visit Repo

Sat May 17, 2025

Repository Description CVE Metrics Action
cve-scanner CVE漏洞信息查询工具,支持单个CVE查询、批量� n/a n/a Visit Repo
PDF-FUD-Exploit A meticulous scrutiny of the Exploit PDFs innards exposes a ne n/a n/a Visit Repo
Discord-Image-Logger-Stealer Ephemeral discourse is embodied by the likes of Messenger Sess n/a n/a Visit Repo
CVE-2025-4427 CVE-2025-4427 Authentication Bypass
v3.1 MEDIUM Score: 5.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Visit Repo
HTA-Exploit Microsoft Windows HTA (HTML Application) - Pinnacle of Remote n/a n/a Visit Repo
Slient-URL-Exploit URL Contamination Exploit Muted Java Drive-By downloads can tr n/a n/a Visit Repo
Anydesk-Exploit-CVE-2025-12654-RCE-Builder Exploit development targets vulnerabilities using tools like e n/a n/a Visit Repo
Pwnkit-CVE-2021-4034 Automation Exploit n/a n/a Visit Repo
reproduce-cve-2024-2887 n/a n/a Visit Repo

Fri May 16, 2025

Repository Description CVE Metrics Action
CVE-2024-3661 CVE-2024-3661 TunnelVision Testing DHCP routing options can manipulate interface-based VPN traffic
v3.1 HIGH Score: 7.6
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
Visit Repo
CVE-2025-4427 CVE-2025-4427 Authentication Bypass
v3.1 MEDIUM Score: 5.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Visit Repo
LetsDefend-CVE-2022-41082-Exploitation-Attempt Microsoft Exchange Server Remote Code Execution Vulnerability
v3.1 HIGH Score: 8
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
Visit Repo
CVE-2025-32583 WordPress PDF 2 Post Plugin <= 2.4.0 - Remote Code Execution (RCE) vulnerability
v3.1 CRITICAL Score: 9.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Visit Repo
tmux-fuzzing Software Security Lab: Enhanced fuzzing for tmux using OSS-Fuz n/a n/a Visit Repo
CVE-2025-4822 USOM Tarafından resmi yayın beklenmektedir. n/a n/a Visit Repo
PwnKit-Local-Privilege-Escalation-Vulnerability-Discovered-in-polkit-s-pkexec-CVE-2021-4034- Software Vulnerabilities and mitigation university course, to n/a n/a Visit Repo
CVE-2025-47646 WordPress PSW Front-end Login &amp; Registration Plugin <= 1. n/a n/a Visit Repo
CVE-2025-4428 Ivanti EPMM Pre-Auth RCE Chain Remote Code Execution
v3.1 HIGH Score: 7.2
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Visit Repo
CVE-2025-4784 USOM Tarafından resmi yayın beklenmektedir. n/a n/a Visit Repo
qub-network-security-cve-2023-20198 Analysis, detection, and mitigation of CVE-2023-20198 exploita n/a
v3.1 CRITICAL Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Visit Repo
CVE-2025-4686 USOM Tarafından resmi yayın beklenmektedir. n/a n/a Visit Repo
CVE-2024-51793 (CVE-2024-51793) Wordpress Plugin: Computer Repair Shop <= 3.8 WordPress RepairBuddy plugin <= 3.8115 - Arbitrary File Upload vulnerability
v3.1 CRITICAL Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Visit Repo
CVE-2025-3605 n/a n/a Visit Repo
CVE-2025-4190 CSV Mass Importer <= 1.2 - Admin+ Arbitrary File Upload n/a Visit Repo
CVE-2025-4688 USOM Tarafından resmi yayın beklenmektedir. n/a n/a Visit Repo

GitHub Threat Intelligence at a Glance

Stay on top of cybersecurity developments and open-source research through daily GitHub updates.

Jump into a repository to explore code, documentation, or CVE-related insights.