GitHub Feed
Explore the latest GitHub repositories gathered from our feed. Entries are grouped by day to help you track developments quickly.
Wed Aug 20, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-55188-7z-exploit | ️ Demonstrate CVE-2025-55188, a 7-Zip vulnerability allowing | n/a | n/a | Visit Repo |
CVE-2025-48384-POC | Git allows arbitrary code execution through broken config quoting |
v3.1
HIGH
Score: 8.1
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
|
Visit Repo | |
CVE-2025-54782 | @nestjs/devtools-integration's CSRF to Sandbox Escape Allows for RCE against JS Developers |
v4.0
CRITICAL
Score: 9.4
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
|
Visit Repo | |
CVE-2025-8889 | n/a | n/a | Visit Repo | |
Soosyze-CMS-2.0---CVE-2025-52392 | Este script em Bash demonstra como seria um ataque automatizad | n/a | n/a | Visit Repo |
vsftpd-exploit | A step-by-step walkthrough of exploiting the vsFTPd 2.3.4 back | n/a | n/a | Visit Repo |
CVE-2014-4725 | exploiter | n/a | n/a | Visit Repo |
CVE-2025-8088-Winrar-Tool-Gui | n/a | n/a | Visit Repo | |
CVE-2025-5777 | Exploit for CVE-2025-5777: Citrix NetScaler Memory Disclosure | NetScaler ADC and NetScaler Gateway - Insufficient input validation leading to memory overread |
v4.0
CRITICAL
Score: 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L
|
Visit Repo |
cve-2025-34036 | Shenzhen TVT CCTV-DVR Command Injection |
v4.0
CRITICAL
Score: 10
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
|
Visit Repo | |
CVE-2025-31324-Exploits | Missing Authorization check in SAP NetWeaver (Visual Composer development server) |
v3.1
CRITICAL
Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo | |
CVE-2024-4577 | Argument Injection in PHP-CGI |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
Tue Aug 19, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2024-36042 | CVE-2024-36042 Silverpeas authentication bypass vulnerability | n/a | n/a | Visit Repo |
CVE-2024-53900 | n/a | n/a | Visit Repo | |
Nextjs-middleware-vulnerable-appdemo-CVE-2025-29927 | Authorization Bypass in Next.js Middleware |
v3.1
CRITICAL
Score: 9.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
|
Visit Repo | |
CVE-2025-8723 | Cloudflare Image Resizing <= 1.5.6 | Unauthenticated Remote Co | Cloudflare Image Resizing <= 1.5.6 - Missing Authentication to Unauthenticated Remote Code Execution via rest_pre_dispatch Hook |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-50383 | n/a | n/a | Visit Repo | |
CVE-2019-5688 | POC Code for the NVFLASH driver | n/a | n/a | Visit Repo |
WinRAR-Exploit-Builder | The WinRAR Exploit Builder is a C# project designed to create | n/a | n/a | Visit Repo |
CVE-2025-8671-MadeYouReset-HTTP-2-DDoS | CVE-2025-25063 MadeYouReset HTTP/2 DDoS | n/a | n/a | Visit Repo |
CVE-2020-36708 | Proof of concept for CVE-2020-36708 | n/a |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-49113-Roundcube-RCE-PHP | This is a rewritten exploit to work with php | n/a |
v3.1
CRITICAL
Score: 9.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
Mon Aug 18, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-25063-MadeYouReset-HTTP-2-DDoS | CVE-2025-25063 MadeYouReset HTTP/2 DDoS | n/a |
v3.1
MEDIUM
Score: 4.4
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N
|
Visit Repo |
cve-2024-32019-PoC | ndsudo: local privilege escalation via untrusted search path |
v3.1
HIGH
Score: 8.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo | |
Cisco-ISE-3.0---Remote-Code-Execution-RCE- | Esse script explora a vulnerabilidade CVE-2025-20124 — uma f | n/a | n/a | Visit Repo |
CVE-2025-54424 | CVE-2025-54424: 1Panel TLS client cert bypass enables RCE via | n/a | n/a | Visit Repo |
ExploitFinder | Advanced Exploit Finder v2.0.0 - Professional vulnerability d | n/a | n/a | Visit Repo |
CVE-2025-32433-PoC | CVE-2025-32433 PoC: Unauthenticated Remote Code Execution (RCE | Erlang/OTP SSH Vulnerable to Pre-Authentication RCE |
v3.1
CRITICAL
Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
sap-netweaver-0day-CVE-2025-31324 | sap netweaver 0day poc by shinyhunters (scattered lapsus$ hunt | Missing Authorization check in SAP NetWeaver (Visual Composer development server) |
v3.1
CRITICAL
Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
apache__sling-org-apache-sling-servlets-resolver_CVE-2024-23673_2-10-0 | Apache Sling Servlets Resolver: Malicious code execution via path traversal |
v3.1
HIGH
Score: 8.5
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo | |
EventON-Lite-CVE-Report | Disclosure for CVE-2025-8091 | n/a | n/a | Visit Repo |
0day-buffer-overflow-in-exiv2 | ZeroDay on exiv2!CVE-2025-XXXX: Heap-based buffer overflow in | n/a | n/a | Visit Repo |
imagemagick-2025-poc | PoCs for 2025 ImageMagick vulnerabilities – integer overflow | n/a | n/a | Visit Repo |
cve-2025-50428 | Proof of concept for the vulnerability CVE-2025-50428: Authent | n/a | n/a | Visit Repo |
CVE-2019-12185 | CVE-2019-12185 - eLabFTW 1.8.5 Python3 Exploit POC | n/a | n/a | Visit Repo |
PoC-CVE-2015-10141-Xdebug | Proof-of-Concept exploit script for Xdebug 2.5.5 and earlier v | Xdebug Remote Debugger Unauthenticated OS Command Execution |
v4.0
CRITICAL
Score: 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
|
Visit Repo |
CVE-2024-28397-RCE | n/a | n/a | Visit Repo | |
CVE-2025-50154 | n/a | n/a | Visit Repo | |
Project-Exploitation-of-Webmin-Authentication-Vulnerability | Research Objective: To conduct a comprehensive analysis and su | n/a | n/a | Visit Repo |
HTA-Exploit | Microsoft Windows HTA (HTML Application) - Pinnacle of Remote | n/a | n/a | Visit Repo |
CVE-2025-55188-PoC | 7-Zip Exploit for Linux Platform | n/a | n/a | Visit Repo |
cve2025-20265 | Safe Python script to detect Cisco FMC instances potentially v | n/a | n/a | Visit Repo |
CVE-2025-50165 | n/a | n/a | Visit Repo | |
CVE-2024-47533 | PoC of CVE-2025-47533 Clobber RCE | Cobbler allows anyone to connect to cobbler XML-RPC server with a known password and make changes |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
WinRAR-CVE-2025-8088-PoC-RAR | WinRAR 0day CVE-2025-8088 PoC RAR Archive | n/a | n/a | Visit Repo |
CVE-2025-32778 | PoC exploit for CVE-2025-32778: command injection in Web-Check | Web-Check allows command Injection via Unvalidated URL in Screenshot API |
v4.0
CRITICAL
Score: 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
|
Visit Repo |
CVE-2017-5871 | 01 Oktober 2024, saya menyumbangkan Template CVE-2017-5871 unt | n/a | n/a | Visit Repo |
CVE-2025-48384 | Git allows arbitrary code execution through broken config quoting |
v3.1
HIGH
Score: 8.1
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
|
Visit Repo | |
Blackash-CVE-2025-53773 | CVE-2025-53773 | n/a | n/a | Visit Repo |
CVE-2025-9043 | n/a | n/a | Visit Repo |
GitHub Threat Intelligence at a Glance
Stay on top of cybersecurity developments and open-source research through daily GitHub updates.
Jump into a repository to explore code, documentation, or CVE-related insights.