GitHub Feed
Explore the latest GitHub repositories gathered from our feed. Entries are grouped by day to help you track developments quickly.
Fri Jun 13, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2024-55890 | D-Tale allows Remote Code Execution through the Custom Filter Input |
v4.0
MEDIUM
Score: 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
|
Visit Repo | |
CVExploiter | Is there a CVE? If so, exploit it! Automatically! Via multiple | n/a | n/a | Visit Repo |
CVE-2025-5815-Nuclei-Template | CVE-2025-5815: An unauthenticated vulnerability in the WordPre | Traffic Monitor <= 3.2.2 - Missing Authorization to Unauthenticated Settings Update |
v3.1
MEDIUM
Score: 5.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
|
Visit Repo |
CVE-2025-29471 | n/a | n/a | Visit Repo | |
cve-2025-2082 | Tesla Model 3 VCSEC Integer Overflow Remote Code Execution Vulnerability |
v3.0
HIGH
Score: 7.5
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
Thu Jun 12, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-21420_POC | Windows Disk Cleanup Tool Elevation of Privilege Vulnerability | Windows Disk Cleanup Tool Elevation of Privilege Vulnerability |
v3.1
HIGH
Score: 7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
Visit Repo |
CVE-Guvenlik-Acigi-Analiz-Paneli | https://cve.mitre.org/ web sitesinden çektiğim verileri anal | n/a | n/a | Visit Repo |
CVE-2025-5288 | Wordpress REST API | Custom API Generator For Cross Platform A | REST API | Custom API Generator For Cross Platform And Import Export In WP 1.0.0 - 2.0.3 - Missing Authorization to Unauthenticated Privilege Escalation via process_handler Function |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
cvePOC | This script will check if POC is available for a CVE on CVE.or | n/a | n/a | Visit Repo |
CVE-2024-54772 | n/a | n/a | Visit Repo | |
CVE-2021-29447 | PoC for CVE-2021-29447 | WordPress Authenticated XXE attack when installation is running PHP 8 |
v3.1
HIGH
Score: 7.1
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
|
Visit Repo |
SOC335-Event-ID-313-CVE-2024-49138-Exploitation-Detected--Lest-Defend-Writeup | In this lab I walked through an end-to-end intrusion that bega | Windows Common Log File System Driver Elevation of Privilege Vulnerability |
v3.1
HIGH
Score: 7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
Visit Repo |
CVE-2025-32711-Exploit | M365 Copilot Information Disclosure Vulnerability |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C
|
Visit Repo | |
CVE-2024-8232 | SpiderControl SCADA Web Server File Upload Vulnerability | iniNet Solutions SpiderControl SCADA Web Server Unrestricted Upload of File with Dangerous Type |
v4.0
HIGH
Score: 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
|
Visit Repo |
CVE-2025-5701 | HyperComments <= 1.2.2 - Unauthenticated (Subscriber+) Arbitra | n/a | n/a | Visit Repo |
CVE-2025-5287 | Likes and Dislikes Plugin <= 1.0.0 - Unauthenticated SQL Injec | n/a | n/a | Visit Repo |
CVE-2025-33053-Proof-Of-Concept | Internet Shortcut Files Remote Code Execution Vulnerability |
v3.1
HIGH
Score: 8.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
|
Visit Repo | |
Next.JS-CVE-2025-29927 | Authorization Bypass in Next.js Middleware |
v3.1
CRITICAL
Score: 9.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
|
Visit Repo | |
cve-2025-24035-rds-websocket-dos-test | ️ Safe simulation for CVE-2025-24035 to test RD Gateway WebS | Windows Remote Desktop Services Remote Code Execution Vulnerability |
v3.1
HIGH
Score: 8.1
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
Visit Repo |
CVE-2025-27817 | CVE-2025-27817 | n/a | n/a | Visit Repo |
-CVE-2025-1793-poc | SQL Injection in run-llama/llama_index |
v3.0
CRITICAL
Score: 9.8
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
Wed Jun 11, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
cve-2025-24514 | ingress-nginx controller - configuration injection via unsanitized auth-url annotation |
v3.1
HIGH
Score: 8.8
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo | |
Blackash-CVE-2025-21333 | CVE-2025-21333 | Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability |
v3.1
HIGH
Score: 7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
Visit Repo |
CVE-2025-20286 | n/a | n/a | Visit Repo | |
Blackash-CVE-2025-24252 | CVE-2025-24252 | n/a | n/a | Visit Repo |
RCE-CVE-2025 | PoC for Remote Code Execution (RCE) vulnerabilities identified | n/a | n/a | Visit Repo |
postgresql-cve-exploitation | Practical PostgreSQL CVE exploitation labs with documentation | n/a | n/a | Visit Repo |
Why-so-Serious-SAM | PoC malware that uses exploit CVE-2021-36934 (improper ACLs on | n/a | n/a | Visit Repo |
CVEs | Public PoC for researching tasks individually and collectively | n/a | n/a | Visit Repo |
Document-Linux-Privilege-Escalation | Exploiting the vulnerability called "Dirty_Sock" (CVE-2019-730 | n/a | n/a | Visit Repo |
Tue Jun 10, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2024-57378 | Detection for CVE-2024-57378 | n/a | n/a | Visit Repo |
CVE-2025-20286 | n/a | n/a | Visit Repo | |
CVE-2025-4601 | RH - Real Estate WordPress Theme <= 4.4.0 - Authenticated (Sub | RH - Real Estate WordPress Theme <= 4.4.0 - Authenticated (Subscriber+) Privilege Escalation |
v3.1
HIGH
Score: 8.8
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2017-9841-EXPLOIT | n/a | n/a | Visit Repo | |
Roundcube-CVE-2025-49113 | Proof-of-concept to CVE-2025-49113 | n/a |
v3.1
CRITICAL
Score: 9.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-46142 | n/a | n/a | Visit Repo | |
CVE-2025-24016 | Detection for CVE-2025-24016 - Deserialization of Untrusted Da | Remote code execution in Wazuh server |
v3.1
CRITICAL
Score: 9.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H
|
Visit Repo |
Blackash-CVE-2025-24016 | CVE-2025-24016 | Remote code execution in Wazuh server |
v3.1
CRITICAL
Score: 9.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H
|
Visit Repo |
CVE-2025-5419 | Out-of-Bounds Read/Write in Chrome V8 — Heap Corruption → | n/a | n/a | Visit Repo |
Hydroph0bia | Binaries, drivers, PoCs and other stuff on Hydroph0bia vulnera | n/a | n/a | Visit Repo |
POC_for_-CVE-2024-22371 | Apache Camel issue on ExchangeCreatedEvent |
v3.1
LOW
Score: 2.9
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
|
Visit Repo | |
CVE-2025-26892 | WordPress Celestial Aura Theme <= 2.2 is vulnerable to Arbitr | n/a | n/a | Visit Repo |
Mon Jun 09, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-32756 | CVE-2025-32756: NSE Scanning for RCE in vulnerable FortiVoice, | n/a | n/a | Visit Repo |
cve-lfi-lab | A hands on lab investigating CVE-2025-39507 from a Tier 1 SOC | n/a | n/a | Visit Repo |
CVE-2025-20286 | n/a | n/a | Visit Repo | |
CVE-2025-2539 | CVE-2025-2539 - WordPress File Away <= 3.9.9.0.1 - Arbitrary F | File Away <= 3.9.9.0.1 - Missing Authorization to Unauthenticated Arbitrary File Read |
v3.1
HIGH
Score: 7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
Visit Repo |
Why-so-Serious-SAM | PoC malware that uses exploit CVE-2021-36934 (improper ACLs on | n/a | n/a | Visit Repo |
CVE-2025-32756-POC | n/a | n/a | Visit Repo | |
Blackash-CVE-2025-32433 | CVE-2025-32433 Erlang SSH Library Exploit | Erlang/OTP SSH Vulnerable to Pre-Authentication RCE |
v3.1
CRITICAL
Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2024-10914 | CVE-2024-10914 is a critical command injection vulnerability a | D-Link DNS-320/DNS-320LW/DNS-325/DNS-340L account_mgr.cgi cgi_user_add os command injection |
v4.0
CRITICAL
Score: 9.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
|
Visit Repo |
GitHub Threat Intelligence at a Glance
Stay on top of cybersecurity developments and open-source research through daily GitHub updates.
Jump into a repository to explore code, documentation, or CVE-related insights.