GitHub Feed
Explore the latest GitHub repositories gathered from our feed. Entries are grouped by day to help you track developments quickly.
Tue May 20, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2024-53677 | CVE-2024-53677 | Apache Struts: Mixing setters for uploaded files and normal fields can allow bypass file upload checks |
v4.0
CRITICAL
Score: 9.5
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:N/AU:Y/R:A/V:C/RE:L/U:Red
|
Visit Repo |
CVE-2025-4322-Exploit | n/a | n/a | Visit Repo | |
Exploits-CVEs | This repo exists as a personal project for me to learn more ab | n/a | n/a | Visit Repo |
CVE-2025-4919-Exploit | n/a | n/a | Visit Repo | |
CVE-2025-2135 | n/a | n/a | Visit Repo | |
CVE-2011-0762 | Um script automatizado melhorando o exploit do cve-2011-0762 p | n/a | n/a | Visit Repo |
hackopolis | Hackopolis is a vulnerable web application which contains a wi | n/a | n/a | Visit Repo |
SQL-Injection-in-John-XXIII-College-Website-gallary.php- | This repo is made for CVE requets and POC | n/a | n/a | Visit Repo |
CVE-2024-4577-PHP-RCE | PHP RCE PoC for CVE-2024-4577 written in bash, go, python and | Argument Injection in PHP-CGI |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2021-41773 | Proof of Concept for CVE-2021-41773: Apache path traversal exp | Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49 | n/a | Visit Repo |
exploit-cve-2025-1974 | ingress-nginx admission controller RCE escalation |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo | |
CVE-2025-29813-PE | CVE-2025-29813 – Visual Studio Privilege Escalation via Impr | n/a | n/a | Visit Repo |
CVE-2025-24054 | Vulnerabilidad NTLM (CVE-2025-24054) explotada para robo de ha | NTLM Hash Disclosure Spoofing Vulnerability |
v3.1
MEDIUM
Score: 6.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
Visit Repo |
CVE-2021-38003 | Write Up & Exploitation For CVE-2021-38003 | n/a | n/a | Visit Repo |
Mon May 19, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-Exploits-on-Metasploitable2 | n/a | n/a | Visit Repo |
Sun May 18, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
VulnrabilityScanner | A Python-based tool that automates initial vulnerability scann | n/a | n/a | Visit Repo |
POC-CVE-2025-24104-Py | n/a | n/a | Visit Repo | |
CVE-2024-41713-PoC-exploit | Mitel MiCollab Authentication Bypass to Arbitrary File Read | n/a | n/a | Visit Repo |
CVE-2025-32756-POC | Designed for Demonstration of Deep Exploitation. | n/a | n/a | Visit Repo |
CVE-2025-4664 | CVE-2025-4664 | n/a | n/a | Visit Repo |
wp-ulike-cve-2025-32259-poc | In affected versions of the WP ULike plugin, there is no prope | WordPress WP ULike plugin <= 4.7.9.1 - Content Spoofing Vulnerability |
v3.1
MEDIUM
Score: 5.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
|
Visit Repo |
CVE-2025-4921 | CVE-2025-4921 | n/a | n/a | Visit Repo |
POC-CVE-2024-44258-Py | n/a | n/a | Visit Repo | |
CVE-2025-47539 | Eventin <= 4.0.26 - Missing Authorization to Unauthenticated P | n/a | n/a | Visit Repo |
CVE-2025-31200-iOS-AudioConverter-RCE | Public disclosure of CVE-2025-31200 – Zero-click RCE in iOS | n/a | n/a | Visit Repo |
Sat May 17, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
cve-scanner | CVE漏洞信息查询工具,支持单个CVE查询、批量� | n/a | n/a | Visit Repo |
PDF-FUD-Exploit | A meticulous scrutiny of the Exploit PDFs innards exposes a ne | n/a | n/a | Visit Repo |
Discord-Image-Logger-Stealer | Ephemeral discourse is embodied by the likes of Messenger Sess | n/a | n/a | Visit Repo |
CVE-2025-4427 | CVE-2025-4427 | Authentication Bypass |
v3.1
MEDIUM
Score: 5.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
Visit Repo |
HTA-Exploit | Microsoft Windows HTA (HTML Application) - Pinnacle of Remote | n/a | n/a | Visit Repo |
Slient-URL-Exploit | URL Contamination Exploit Muted Java Drive-By downloads can tr | n/a | n/a | Visit Repo |
Anydesk-Exploit-CVE-2025-12654-RCE-Builder | Exploit development targets vulnerabilities using tools like e | n/a | n/a | Visit Repo |
Pwnkit-CVE-2021-4034 | Automation Exploit | n/a | n/a | Visit Repo |
reproduce-cve-2024-2887 | n/a | n/a | Visit Repo |
Fri May 16, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2024-3661 | CVE-2024-3661 TunnelVision Testing | DHCP routing options can manipulate interface-based VPN traffic |
v3.1
HIGH
Score: 7.6
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
|
Visit Repo |
CVE-2025-4427 | CVE-2025-4427 | Authentication Bypass |
v3.1
MEDIUM
Score: 5.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
Visit Repo |
LetsDefend-CVE-2022-41082-Exploitation-Attempt | Microsoft Exchange Server Remote Code Execution Vulnerability |
v3.1
HIGH
Score: 8
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
Visit Repo | |
CVE-2025-32583 | WordPress PDF 2 Post Plugin <= 2.4.0 - Remote Code Execution (RCE) vulnerability |
v3.1
CRITICAL
Score: 9.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo | |
tmux-fuzzing | Software Security Lab: Enhanced fuzzing for tmux using OSS-Fuz | n/a | n/a | Visit Repo |
CVE-2025-4822 | USOM Tarafından resmi yayın beklenmektedir. | n/a | n/a | Visit Repo |
PwnKit-Local-Privilege-Escalation-Vulnerability-Discovered-in-polkit-s-pkexec-CVE-2021-4034- | Software Vulnerabilities and mitigation university course, to | n/a | n/a | Visit Repo |
CVE-2025-47646 | WordPress PSW Front-end Login & Registration Plugin <= 1. | n/a | n/a | Visit Repo |
CVE-2025-4428 | Ivanti EPMM Pre-Auth RCE Chain | Remote Code Execution |
v3.1
HIGH
Score: 7.2
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-4784 | USOM Tarafından resmi yayın beklenmektedir. | n/a | n/a | Visit Repo |
qub-network-security-cve-2023-20198 | Analysis, detection, and mitigation of CVE-2023-20198 exploita | n/a |
v3.1
CRITICAL
Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-4686 | USOM Tarafından resmi yayın beklenmektedir. | n/a | n/a | Visit Repo |
CVE-2024-51793 | (CVE-2024-51793) Wordpress Plugin: Computer Repair Shop <= 3.8 | WordPress RepairBuddy plugin <= 3.8115 - Arbitrary File Upload vulnerability |
v3.1
CRITICAL
Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-3605 | n/a | n/a | Visit Repo | |
CVE-2025-4190 | CSV Mass Importer <= 1.2 - Admin+ Arbitrary File Upload | n/a | Visit Repo | |
CVE-2025-4688 | USOM Tarafından resmi yayın beklenmektedir. | n/a | n/a | Visit Repo |
GitHub Threat Intelligence at a Glance
Stay on top of cybersecurity developments and open-source research through daily GitHub updates.
Jump into a repository to explore code, documentation, or CVE-related insights.