GitHub Feed
Explore the latest GitHub repositories gathered from our feed. Entries are grouped by day to help you track developments quickly.
Sat Jul 05, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2024-9264 | Grafana SQL Expressions allow for remote code execution |
v4.0
CRITICAL
Score: 9.4
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
|
Visit Repo | |
Blackash-CVE-2025-49493 | CVE-2025-49493 | n/a |
v3.1
MEDIUM
Score: 5.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
|
Visit Repo |
cve-2025-32462 | cve-2025-32462' demo | n/a |
v3.1
LOW
Score: 2.8
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
|
Visit Repo |
CVE-2025-22963 | n/a |
v3.1
HIGH
Score: 7.5
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
|
Visit Repo | |
CVE-2025-24071 | Microsoft Windows File Explorer Spoofing Vulnerability |
v3.1
MEDIUM
Score: 6.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
Visit Repo | |
CVE-2025-32463 | Local privilege escalation vulnerability CVE-2025-32463 in Sud | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
Blackash-CVE-2025-32463 | CVE-2025-32463 | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
Fri Jul 04, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
WingFTP-CVE-2025-47812-illdeed | Remote Command Execution exploit for Wing FTP Server (CVE-2025 | n/a | n/a | Visit Repo |
Offensive-Security-Research-Hub | This platform is a deep offensive security lab by Captain Nemo | n/a | n/a | Visit Repo |
CVE-2025-6554 | n/a | n/a | Visit Repo | |
CVE-2025-32463-POC | ️ Proof of Concept (PoC) for CVE-2025-32463 — Local privil | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-5777-CitrixBleed | CitrixBleed-2 (CVE-2025-5777) – proof-of-concept exploit for | NetScaler ADC and NetScaler Gateway - Insufficient input validation leading to memory overread |
v4.0
CRITICAL
Score: 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L
|
Visit Repo |
CVE-2025-32463_chwoot | Demonstrate CVE-2025-32463 with this PoC for sudo's chroot fea | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
gardyn | CVE-2025-29628, CVE-2025-29629, CVE-2025-29630, CVE-2025-29631 | n/a | n/a | Visit Repo |
CVE-2025-32462-POC | Local privilege escalation PoC for CVE-2025-32462 (sudo -h by | n/a |
v3.1
LOW
Score: 2.8
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
|
Visit Repo |
CVE-2025-6554 | n/a | n/a | Visit Repo | |
cve-2025-6907 | a standalone C-based SQL Injection exploit targeting the CVE� | n/a | n/a | Visit Repo |
CVE-2025-5961 | Migration, Backup, Staging – WPvivid Backup & Migration <= 0 | n/a | n/a | Visit Repo |
Cisco-CVE-2025-20281-illdeed | Unauthenticated Remote Code Execution exploit for CVE-2025-202 | Cisco ISE API Unauthenticated Remote Code Execution Vulnerability |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CrushFTP-CVE-2024-4040-illdeed | Exploit for CVE-2024-4040 – Authentication bypass in CrushFT | Unauthenticated arbitrary file read and remote code execution in CrushFTP |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-32463_illdeed | Privilege escalation exploit for CVE-2025-32463 using a malici | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
les-moders | Modern version of Linux Exploit Suggester. Detects kernel/OS-b | n/a | n/a | Visit Repo |
CVE-2025-32463 | # CVE-2025-32463 – Sudo EoP Exploit (PoC) with precompiled . | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2021-29447-Authenticated-XXE-WordPress-5.6-5.7 | POC to exploit WordPress 5.6-5.7 (PHP 8+) Authenticated XXE In | WordPress Authenticated XXE attack when installation is running PHP 8 |
v3.1
HIGH
Score: 7.1
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
|
Visit Repo |
dependency-chain-vulnerability-mapper | Visualizes and analyzes how vulnerabilities propagate through | n/a | n/a | Visit Repo |
CVE-2025-49132 | Check a list of Pterodactyl panels for vulnerabilities from a | n/a | n/a | Visit Repo |
CVE-2025-41646---Critical-Authentication-Bypass- | CVE-2025-41646 - Critical Authentication bypass | RevPi Webstatus application is vulnerable to an authentication bypass |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-27817 | Apache Kafka客户端未对用户输入进行严格验证和� | n/a | n/a | Visit Repo |
CVE-2025-32462 | CVE-2025-32462 exploit code | n/a |
v3.1
LOW
Score: 2.8
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
|
Visit Repo |
les-moders | Discover LES-Modern v3.0, an advanced tool for dynamic Linux e | n/a | n/a | Visit Repo |
Thu Jul 03, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
vre-vulnexploitmatcher | Given a vulnerability report (e.g., CVE ID), searches ExploitD | n/a | n/a | Visit Repo |
CVE-2025-6554 | n/a | n/a | Visit Repo | |
CVE-2025-6543_CitrixNetScaler_PoC | Multi-host, multi-port scanner and auditor for CVE-2025-6543-a | Memory overflow vulnerability leading to unintended control flow and Denial of Service |
v4.0
CRITICAL
Score: 9.2
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L
|
Visit Repo |
CVE-2025-23968 | Arbitrary File Upload in AI Bud – AI Content Generator, AI C | n/a | n/a | Visit Repo |
sudo_patch_CVE-2025-32463 | Mr.CIA's manual patching guide for CVE-2025-32463 (Sudo local | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-32462-Exploit | CVE-2025-32462 Exploit | n/a |
v3.1
LOW
Score: 2.8
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
|
Visit Repo |
CVE-2024-48061 | CVE-2024-48061 - poc | n/a | n/a | Visit Repo |
CVE-2025-32463-sudo-chwoot | PoC for CVE-2025-32463 - Sudo chroot Elevation of Privilege Vu | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
MCP-Inspector-CVE-2025-49596 | MCP-Inspector-vulncheck is a Python script that checks if an M | MCP Inspector proxy server lacks authentication between the Inspector client and proxy |
v4.0
CRITICAL
Score: 9.4
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
|
Visit Repo |
tryhackme-hack-the-bank-lab | Offensive Security Lab on TryHackMe - Hack the Bank | Recon, E | n/a | n/a | Visit Repo |
CVE-2025-6018-19-exploit | n/a | n/a | Visit Repo | |
CVE-2025-6019_Poc | Exploit for CVE-2025-6019 | Libblockdev: lpe from allow_active to root in libblockdev via udisks |
v3.1
HIGH
Score: 7
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-32462 | Exploit for CVE-2025-32462 | n/a |
v3.1
LOW
Score: 2.8
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
|
Visit Repo |
Bad_Hoist-WriteUp | A Writeup for Sleirsgoevy's version of the Exploit Implementat | n/a | n/a | Visit Repo |
CVE-2025-32463 | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo | |
Web-App-Vulnerability-Scanner | Basic function is to scan for basic vulns such as xss , sql in | n/a | n/a | Visit Repo |
CVE-2025-32463 | Sudo chroot privileged escalation PoC | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-32463 | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo | |
CVE-2025-45407 | CVE-2025-45407: Multiple XSS Vulnerabilities in DiscoveryNG v6 | n/a | n/a | Visit Repo |
BlackLace | BlackLace is a red team toolkit that combines Bluetooth and Zi | n/a | n/a | Visit Repo |
GitHub Threat Intelligence at a Glance
Stay on top of cybersecurity developments and open-source research through daily GitHub updates.
Jump into a repository to explore code, documentation, or CVE-related insights.