GitHub Feed
Explore the latest GitHub repositories gathered from our feed. Entries are grouped by day to help you track developments quickly.
Sat Aug 23, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
FortiWeb-CVE-2025-52970-Authentication-Bypass | n/a | n/a | Visit Repo | |
glass-cage-ios18-cve-2025-24085-cve-2025-24201 | Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, | n/a | n/a | Visit Repo |
CVE-2025-33053_PoC | POC exploit for CVE-2025-33053 (External control of file execu | Internet Shortcut Files Remote Code Execution Vulnerability |
v3.1
HIGH
Score: 8.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
|
Visit Repo |
PoC-CVE-2020-36847-WordPress-Plugin-4.2.2-RCE | Este repositório contém um script de prova de conceito (PoC) | Simple File List < 4.2.3 - Remote Code Execution |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
Fri Aug 22, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-55575 | n/a | n/a | Visit Repo | |
CVE-2025-53632 | An exploit of CVE-2025-53632 to confirm exploitability | n/a | n/a | Visit Repo |
POC-for-CVE-2025-24893 | Some poorly crafted exploit scripts | Remote code execution as guest via SolrSearchMacros request in xwiki |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-43300-exp | CVE-2025-43300的在野利用代码. | n/a | n/a | Visit Repo |
CVE-2025-55230-Exploit | Windows MBT Transport Driver Elevation of Privilege Vulnerability |
v3.1
HIGH
Score: 7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
Visit Repo | |
CVE-2024-37054-MLflow-RCE | This repository contains a Proof of Concept (PoC) for NiteeshP | n/a |
v3.1
HIGH
Score: 8.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-43300-Exploit | n/a | n/a | Visit Repo | |
EXP-for-CVE-2025-24893 | Some poorly crafted exploit scripts | Remote code execution as guest via SolrSearchMacros request in xwiki |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2024-4367 | n/a | n/a | Visit Repo | |
CVE-2025-27519 | PoC exploit for Below privilege escalation (CVE-2025-27591) al | Cognita Arbitrary File Write |
v4.0
CRITICAL
Score: 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
|
Visit Repo |
nmap-cve-exploit-finder | Run nmap, parse detected services, fetch related CVEs from NVD | n/a | n/a | Visit Repo |
CVE.py | CVE-2025-8418.py | n/a | n/a | Visit Repo |
CVE-2025-1337-PoC | Eastnets PaymentSafe BIC Search cross site scripting |
v4.0
MEDIUM
Score: 5.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
|
Visit Repo |
Thu Aug 21, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-55287-POC | Authenticated stored XSS priv esc PoC. Affects Genealogy versi | n/a | n/a | Visit Repo |
CVE-2015-8351_Otter_Remix | Exploit code for CVE-2015-8351 | n/a | n/a | Visit Repo |
PoC-CVE-2025-8671-MadeYouReset-HTTP-2 | PoC para validar vulnerabilidade MadeYouReset | n/a | n/a | Visit Repo |
CVE-Analyzer | 2025-2 ASC Project : AI 기반 CVE 자동 분석 및 실행 � | n/a | n/a | Visit Repo |
CVE-2025-43300 | n/a | n/a | Visit Repo | |
CVE-2025-53786 | Microsoft Exchange Server Hybrid Deployment Elevation of Privilege Vulnerability |
v3.1
HIGH
Score: 8
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
Visit Repo | |
CVE-2025-9132 | n/a | n/a | Visit Repo | |
cve-2025-22235-demo | Spring Boot EndpointRequest.to() creates wrong matcher if actuator endpoint is not exposed |
v3.1
HIGH
Score: 7.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
|
Visit Repo | |
WinRAR-CVE-2025-8088-PoC-RAR | Demonstrate the WinRAR CVE-2025-8088 exploit with a PoC RAR a | n/a | n/a | Visit Repo |
CVE-2025-8088 | This PoC is for authorized study and testing. CVE-2025-8088 is | n/a | n/a | Visit Repo |
CVE-2025-25256-PoC | CVE-2025-25256: Fortinet FortiSIEM OS Command Injection CVE Po | n/a | n/a | Visit Repo |
CVE-2023-35078 | CVE-2023-35078 - Ivanti MobileIron Core Remote Unauthenticated | n/a |
v3.0
CRITICAL
Score: 10
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2023-41892_poc | Customized this for my own use | Craft CMS Remote Code Execution vulnerability |
v3.1
CRITICAL
Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L
|
Visit Repo |
glibcs | Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the g | n/a | n/a | Visit Repo |
Project-Project-Chimera-Exploiting-a-Modern-WordPress-XXE-to-Pillage-Secrets- | The objective is to conduct a full-scale security assessment o | n/a | n/a | Visit Repo |
CVE-2024-3721---POC | POC on how mirai can target " CVE-2024-3721 " { TBK DVR-4104 a | TBK DVR-4104/DVR-4216 os command injection |
v3.1
MEDIUM
Score: 6.3
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
|
Visit Repo |
Wed Aug 20, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-48384 | Git allows arbitrary code execution through broken config quoting |
v3.1
HIGH
Score: 8.1
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
|
Visit Repo | |
echteeteepee | Go tool and Nuclei template for testing James Kettle's (CVE-20 | n/a | n/a | Visit Repo |
CVE-2018-7600-Remote-Code-Execution | This repository showcases a fully self-developed Proof-of-Conc | n/a | n/a | Visit Repo |
CVE-2025-55188-7z-exploit | ️ Demonstrate CVE-2025-55188, a 7-Zip vulnerability allowing | n/a | n/a | Visit Repo |
CVE-2025-48384-POC | Git allows arbitrary code execution through broken config quoting |
v3.1
HIGH
Score: 8.1
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
|
Visit Repo | |
CVE-2025-54782 | @nestjs/devtools-integration's CSRF to Sandbox Escape Allows for RCE against JS Developers |
v4.0
CRITICAL
Score: 9.4
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
|
Visit Repo | |
CVE-2025-8889 | n/a | n/a | Visit Repo | |
Soosyze-CMS-2.0---CVE-2025-52392 | Este script em Bash demonstra como seria um ataque automatizad | n/a | n/a | Visit Repo |
vsftpd-exploit | A step-by-step walkthrough of exploiting the vsFTPd 2.3.4 back | n/a | n/a | Visit Repo |
CVE-2014-4725 | exploiter | n/a | n/a | Visit Repo |
CVE-2025-8088-Winrar-Tool-Gui | n/a | n/a | Visit Repo | |
CVE-2025-5777 | Exploit for CVE-2025-5777: Citrix NetScaler Memory Disclosure | NetScaler ADC and NetScaler Gateway - Insufficient input validation leading to memory overread |
v4.0
CRITICAL
Score: 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L
|
Visit Repo |
cve-2025-34036 | Shenzhen TVT CCTV-DVR Command Injection |
v4.0
CRITICAL
Score: 10
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
|
Visit Repo | |
CVE-2025-31324-Exploits | Missing Authorization check in SAP NetWeaver (Visual Composer development server) |
v3.1
CRITICAL
Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo | |
CVE-2024-4577 | Argument Injection in PHP-CGI |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
Tue Aug 19, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2024-36042 | CVE-2024-36042 Silverpeas authentication bypass vulnerability | n/a | n/a | Visit Repo |
CVE-2024-53900 | n/a | n/a | Visit Repo |
GitHub Threat Intelligence at a Glance
Stay on top of cybersecurity developments and open-source research through daily GitHub updates.
Jump into a repository to explore code, documentation, or CVE-related insights.