GitHub Feed
Explore the latest GitHub repositories gathered from our feed. Entries are grouped by day to help you track developments quickly.
Sat Jun 28, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-49144_PoC | Discover CVE-2025-49144, a local privilege escalation flaw in | Notepad++ Privilege Escalation in Installer via Uncontrolled Executable Search Path |
v3.1
HIGH
Score: 7.3
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
|
Visit Repo |
65-75-65-83-72.github.io | Discover the CVE-2025-49144 vulnerability in Notepad++ install | n/a | n/a | Visit Repo |
Fri Jun 27, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-20281-2-Citrix-ISE-RCE | Unauthenticated Python PoC for CVE-2025-20281 RCE against Cisc | Cisco ISE API Unauthenticated Remote Code Execution Vulnerability |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
PAM-UDisks-PrivEsc-Metasploit | Metasploit modules for the PAM Environment and Udisks PE explo | n/a | n/a | Visit Repo |
CVE-2024-3094-analysis | Security analysis project: Real-world CVE breakdown | Xz: malicious code in distributed source |
v3.1
CRITICAL
Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2024-27388_afterpatch | SUNRPC: fix some memleaks in gssx_dec_option_array | n/a | Visit Repo | |
CVE-2025-30208 | CVE‑2025‑30208 is a medium-severity arbitrary file read vu | Vite bypasses server.fs.deny when using `?raw??` |
v3.1
MEDIUM
Score: 5.3
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
|
Visit Repo |
HeimShell | CVE-2023-5180 LinuxServer.io Heimdall before 2.5.7 does not pr | n/a | n/a | Visit Repo |
CVE-2025-6218_WinRAR | n/a | n/a | Visit Repo | |
vulnerability-assessment-lab | Vulnerability Assessment – Internal Linux Network (CE823 Pr | n/a | n/a | Visit Repo |
CVE-2025-1562 | Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit <= 3.5.3 - Missing Authorization to Unauthenticated Arbitrary Plugin Installation |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
Thu Jun 26, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-49144-Test | A test attack for CVE-2025-49144 | Notepad++ Privilege Escalation in Installer via Uncontrolled Executable Search Path |
v3.1
HIGH
Score: 7.3
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
|
Visit Repo |
cyber-vulnerability-diary | Daily vulnerability & exploit logs as I grow my cybersecurity | n/a | n/a | Visit Repo |
notepad-v8.8.1-LPE-CVE- | CVE-2025-49144 * Notepad++ v8.8.1 * SYSTEM-level POC | n/a | n/a | Visit Repo |
Citrix-cve-2025-6543 | Script para determinar si Citrix es vulnerable al CVE-2025-654 | Memory overflow vulnerability leading to unintended control flow and Denial of Service |
v4.0
CRITICAL
Score: 9.2
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L
|
Visit Repo |
CVE-2025-4334 | Simple User Registration <= 6.3 - Unauthenticated Privilege Es | Simple User Registration <= 6.3 - Unauthenticated Privilege Escalation |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-48703 | Remote Code execution in CentOS web panel | n/a | n/a | Visit Repo |
Blackash-CVE-2025-1974 | CVE-2025-1974 | ingress-nginx admission controller RCE escalation |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
Wed Jun 25, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-49132 | Scanner - CVE-2025-49132 | n/a | n/a | Visit Repo |
icu-74-debian | Debian build files for icu 74.2 with a patch to fix CVE-2025-5 | n/a | n/a | Visit Repo |
Escalamiento-de-Privilegios-usando-el-Kernel-Exploit-Dirty-Cow | Exploit para escalada de privilegios en Linux basado en la vul | n/a | n/a | Visit Repo |
CVE-2025-44608 | CVE-2025-44608 | n/a | n/a | Visit Repo |
Blackash-CVE-2025-30208 | CVE-2025-30208 | Vite bypasses server.fs.deny when using `?raw??` |
v3.1
MEDIUM
Score: 5.3
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
|
Visit Repo |
vBulletin-CVE-2025-48828-Multi-target | Batch RCE scanner for vulnerable vBulletin instances using rep | n/a |
v3.1
CRITICAL
Score: 9
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2024-43917 | TI WooCommerce Wishlist (WordPress plugin) <= 2.8.2 CVE-2024-4 | WordPress TI WooCommerce Wishlist plugin <= 2.8.2 - SQL Injection vulnerability |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L
|
Visit Repo |
wordpress-cve-2024-10924-pentest | Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 - 9.1.1.1 - Authentication Bypass |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo | |
PoC-CVE | Proof of concept (PoC) repository for specific CVEs. | n/a | n/a | Visit Repo |
CVE-2025-48703 | Remote code exec cent os web panel by trhacknon | n/a | n/a | Visit Repo |
CVE-2025-51046 | PoC and technical advisory for CVE-2025-51046 – An unauthent | n/a | n/a | Visit Repo |
CVE-2025-49144_PoC | CVE-2025-49144 PoC for security researchers to test and try. | Notepad++ Privilege Escalation in Installer via Uncontrolled Executable Search Path |
v3.1
HIGH
Score: 7.3
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-47577 | TI WooCommerce Wishlist (WordPress plugin) <= 2.9.2 CVE-2025-4 | n/a | n/a | Visit Repo |
CVE-2025-30712-_PoC | This is for testing. | n/a |
v3.1
HIGH
Score: 8.1
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L
|
Visit Repo |
cve_2019-5736-PoC | C-based PoC for CVE-2019-5736 | n/a | n/a | Visit Repo |
HFS_EXPLOIT_PROJECT | Metasploit RCE on HFS 2.3 - CVE-2014-62 | n/a | n/a | Visit Repo |
CVE-PoC-Query-Tool | n/a | n/a | Visit Repo | |
CVE-2024-38819-POC2 | n/a |
v3.1
HIGH
Score: 7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
Visit Repo | |
CVE-2025-27558_Patching | Patching CVE-2025-27558 vulnerability that had affected my lin | n/a | n/a | Visit Repo |
CVE-2022-2588 | Exploit code for CVE-2022-2588 | n/a |
v3.1
MEDIUM
Score: 5.3
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
|
Visit Repo |
CVE-2022-1257 | A script is a PoC for **CVE-2022-1257**, a vulnerability in th | Improper Verification of Cryptographic Signature by McAfee Agent |
v3.1
MEDIUM
Score: 6.1
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
|
Visit Repo |
Langflow-CVE-2025-3248-Multi-target | Langflow versions prior to 1.3.0 are susceptible to code injec | Langflow Unauth RCE |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
Tue Jun 24, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-49132 | PoCs for CVE-2025-49132 | n/a | n/a | Visit Repo |
printDemon2system | PrintDemon (CVE-2020-1048) Privilege Escalation | n/a | n/a | Visit Repo |
CVE-2025-5309-Scanner | CVE-2025-5309 Multi-Method SSTI Scanner | BeyondTrust Detecti | n/a | n/a | Visit Repo |
CVE-2025-49144 | PoC CVE-2025-49144 | Notepad++ Privilege Escalation in Installer via Uncontrolled Executable Search Path |
v3.1
HIGH
Score: 7.3
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-45467 | n/a | n/a | Visit Repo | |
CVE-2025-1718-Scanner | CVE-2025-1718 - Hitachi Energy FTP Reboot Vulnerability Scanne | n/a |
v4.0
HIGH
Score: 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
|
Visit Repo |
CVE-2025-0133 | Reflected XSS vulnerability found in Palo Alto GlobalProtect G | PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability in GlobalProtect Gateway and Portal |
v4.0
MEDIUM
Score: 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/S:N/AU:N/R:U/V:D/RE:M/U:Amber
|
Visit Repo |
CVE-2025-45466 | It is the details of CVE-2025-45466 | n/a | n/a | Visit Repo |
CVE-2025-48461 | Weak Session Cookie Entropy | n/a | Visit Repo |
Mon Jun 23, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
Blackash-CVE-2025-4322 | CVE-2025-4322 – Unauthenticated Privilege Escalation via Pas | n/a | n/a | Visit Repo |
GitHub Threat Intelligence at a Glance
Stay on top of cybersecurity developments and open-source research through daily GitHub updates.
Jump into a repository to explore code, documentation, or CVE-related insights.