GitHub Feed
Explore the latest GitHub repositories gathered from our feed. Entries are grouped by day to help you track developments quickly.
Mon Aug 18, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
PDF-FUD-Exploit | A meticulous scrutiny of the Exploit PDFs innards exposes a ne | n/a | n/a | Visit Repo |
CVE-2025-4334 | Proof-of-concept exploit for CVE-2025-4334, a privilege escala | Simple User Registration <= 6.3 - Unauthenticated Privilege Escalation |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2014-4725 | exploiter | n/a | n/a | Visit Repo |
CVE-2025-25256 | CVE-2025-25256: Fortinet FortiSIEM OS Command Injection PoC | n/a | n/a | Visit Repo |
CVE-2024-47533 | Cobbler allows anyone to connect to cobbler XML-RPC server with a known password and make changes |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo | |
CVE-2025-55668 | Apache Tomcat - Session fixation via rewrite valve | n/a | n/a | Visit Repo |
CVE-2025-49113-Roundcube_1.6.10 | n/a |
v3.1
CRITICAL
Score: 9.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
Sat Aug 09, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-24893 | POC exploit for CVE-2025-24893 | Remote code execution as guest via SolrSearchMacros request in xwiki |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2021-30809-UAF | CVE-2021-30809 UAF use-after-free PoC | n/a | n/a | Visit Repo |
CVE-2024-0000-PoC | PoC and Exploit monitoring and save every day. Subscribe: @au | n/a | n/a | Visit Repo |
Blackash-CVE-2025-21298 | CVE-2025-21298 | Windows OLE Remote Code Execution Vulnerability |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
Visit Repo |
Shellshock-CVE-2014-6271-Exploitation-and-Analysis | n/a | n/a | Visit Repo | |
CVE-2025-32463 | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo | |
CVE-2025-4404-POC | POC for CVE-2025-4404 | Freeipa: idm: privilege escalation from host to domain admin in freeipa |
v3.1
CRITICAL
Score: 9.1
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2022-0000-PoC | PoC and Exploit monitoring and save every day. Subscribe: @au | n/a | n/a | Visit Repo |
CVE-2025-8730 | Exploit demonstrating an authentication bypass vulnerability | Belkin F9K1009/F9K1010 Web Interface hard-coded credentials |
v4.0
CRITICAL
Score: 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
|
Visit Repo |
Fri Aug 08, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-31722 | Used to demo CVE-2025-31722. | n/a | n/a | Visit Repo |
CVE-2025-6384 | CVE-2025-6384: Groovy Sandbox Bypass 2 in CrafterCMS | n/a | n/a | Visit Repo |
CVE-2025-24893 | XWiki 15.10.11, 16.4.1 and 16.5.0RC1 Unauthenticated Remote co | Remote code execution as guest via SolrSearchMacros request in xwiki |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-24354-PoC | SSRF in ImgProxy (only for educational purpose) | imgproxy is vulnerable to SSRF against 0.0.0.0 |
v3.1
MEDIUM
Score: 5.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
Visit Repo |
CVE-2018-7600-Remote-Code-Execution | This repository contains a completely original and self-develo | n/a | n/a | Visit Repo |
CVE-2025-32463 | This CVE addresses a vulnerability in sudo versions 1.9.14 to | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-24893 | POC | Remote code execution as guest via SolrSearchMacros request in xwiki |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-53786 | Microsoft Exchange Server Hybrid Deployment Elevation of Privilege Vulnerability |
v3.1
HIGH
Score: 8
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
Visit Repo | |
CVE-2025-24893-XWiki-RCE | This vulnerability could allow a malicious user to execute rem | Remote code execution as guest via SolrSearchMacros request in xwiki |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
cve-2022-0847-poc-dockerimage | n/a | n/a | Visit Repo | |
CVE-2025-5777-Exploit | NetScaler ADC and NetScaler Gateway - Insufficient input validation leading to memory overread |
v4.0
CRITICAL
Score: 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L
|
Visit Repo | |
BrokenDoor-CVE-2011-2523- | A classic Exploit updated for vsftpd backdoor 2.3.4 | n/a | n/a | Visit Repo |
CVE-2025-24893 | Bash POC script for RCE vulnerability in XWiki Platform | Remote code execution as guest via SolrSearchMacros request in xwiki |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-24893-POC | Remote code execution as guest via SolrSearchMacros request in xwiki |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
Thu Aug 07, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-34152 | Shenzhen Aitemi M300 Wi-Fi Repeater Unauthenticated RCE (CVE-2 | n/a | n/a | Visit Repo |
CVE-2025-53770 | Microsoft SharePoint Server Remote Code Execution Vulnerability |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:W/RC:C
|
Visit Repo | |
CVE-2025-XXXX | FastCGI PHP-FPM local privilege escalation exploit targeting | n/a | n/a | Visit Repo |
CVE-2025-54948 | n/a | n/a | Visit Repo | |
CVE-2025-24893-XWiki-unauthenticated-RCE-via-SolrSearch | CVE-2025-24893 is a critical unauthenticated remote code execu | Remote code execution as guest via SolrSearchMacros request in xwiki |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-24893-XWiki-Platform-Remote-Code-Execution | This vulnerability could allow a malicious user to execute rem | Remote code execution as guest via SolrSearchMacros request in xwiki |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-7769 | PoC to inject a command via the DEVICE_PING endpoint | n/a | n/a | Visit Repo |
cve-simple-webapp-poc | n/a | n/a | Visit Repo | |
CVE-2025-54253-e | n/a | n/a | Visit Repo | |
test-mcp | A repo for CVE-2025-54135 reproduction | n/a | n/a | Visit Repo |
cve-2022-0847-poc | n/a | n/a | Visit Repo | |
cve-2025-48384 | Git allows arbitrary code execution through broken config quoting |
v3.1
HIGH
Score: 8.1
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
|
Visit Repo | |
CVE-2024-32167 | n/a | n/a | Visit Repo | |
CVE-2025-4126 | smart contract reentrancy attack vulnerability POC | n/a | n/a | Visit Repo |
CVE-2024-32019-poc | Netdata ndsudo PoC | ndsudo: local privilege escalation via untrusted search path |
v3.1
HIGH
Score: 8.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-30406 | Explore the CVE-2025-30406 ViewState exploit PoC for ASP.NET a | n/a |
v3.1
CRITICAL
Score: 9
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
Wed Aug 06, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
security-research | My security research lab — CVEs, PoCs, and hardware/software | n/a | n/a | Visit Repo |
CVE-2021-3544_RemoteMouse-3.008-RCE | POC for CVE-2021-3544 based on https://www.exploit-db.com/expl | n/a | n/a | Visit Repo |
CVE-2025-54253-Exploit-Demo | Simulated PoC for CVE-2025-54253: Adobe AEM OGNL Injection Vul | n/a | n/a | Visit Repo |
xwiki-cve-2025-24893-poc | PoC for CVE-2025-24893 | Remote code execution as guest via SolrSearchMacros request in xwiki |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
GitHub Threat Intelligence at a Glance
Stay on top of cybersecurity developments and open-source research through daily GitHub updates.
Jump into a repository to explore code, documentation, or CVE-related insights.