GitHub Feed
Explore the latest GitHub repositories gathered from our feed. Entries are grouped by day to help you track developments quickly.
Sun Jul 06, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2024-9264 | Grafana RCE | Grafana SQL Expressions allow for remote code execution |
v4.0
CRITICAL
Score: 9.4
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
|
Visit Repo |
CVE-2025-3248 | Langflow Unauth RCE |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo | |
CVE-2024-55963 | CVE-2024-55963, allows unauthenticated remote code execution o | n/a | n/a | Visit Repo |
poctracker | Collect various available vulnerability exploit tools | n/a | n/a | Visit Repo |
Sat Jul 05, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-32463 | Linux distributions: Affects Ubuntu, Debian, Fedora, CentOS, S | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2024-42364 | homepage DNS rebinding vulnerability (GHSL-2024-096) |
v3.1
MEDIUM
Score: 6.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
|
Visit Repo | |
CVE-2024-35198 | TorchServe bypass allowed_urls configuration |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo | |
CVE-2024-28084 | n/a | n/a | Visit Repo | |
cve-ledger | Collaboratively developed a tool that aggregates CVE data from | n/a | n/a | Visit Repo |
CVE-2025-6554-2 | n/a | n/a | Visit Repo | |
CVE-2025-5777 | CitrixBleed2 poc | NetScaler ADC and NetScaler Gateway - Insufficient input validation leading to memory overread |
v4.0
CRITICAL
Score: 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L
|
Visit Repo |
Blackash-CVE-2025-0411 | CVE-2025-0411 | 7-Zip Mark-of-the-Web Bypass Vulnerability |
v3.0
HIGH
Score: 7
CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
|
Visit Repo |
ansible-sudo-cve2025-patch | This repository ships an Ansible playbook that detects vulnera | n/a | n/a | Visit Repo |
CVE-2024-9264 | Grafana SQL Expressions allow for remote code execution |
v4.0
CRITICAL
Score: 9.4
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
|
Visit Repo | |
Blackash-CVE-2025-49493 | CVE-2025-49493 | n/a |
v3.1
MEDIUM
Score: 5.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
|
Visit Repo |
cve-2025-32462 | cve-2025-32462' demo | n/a |
v3.1
LOW
Score: 2.8
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
|
Visit Repo |
CVE-2025-22963 | n/a |
v3.1
HIGH
Score: 7.5
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
|
Visit Repo | |
CVE-2025-24071 | Microsoft Windows File Explorer Spoofing Vulnerability |
v3.1
MEDIUM
Score: 6.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
Visit Repo | |
CVE-2025-32463 | Local privilege escalation vulnerability CVE-2025-32463 in Sud | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
Blackash-CVE-2025-32463 | CVE-2025-32463 | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
Fri Jul 04, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
WingFTP-CVE-2025-47812-illdeed | Remote Command Execution exploit for Wing FTP Server (CVE-2025 | n/a |
v3.1
CRITICAL
Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
Offensive-Security-Research-Hub | This platform is a deep offensive security lab by Captain Nemo | n/a | n/a | Visit Repo |
CVE-2025-6554 | n/a | n/a | Visit Repo | |
CVE-2025-32463-POC | ️ Proof of Concept (PoC) for CVE-2025-32463 — Local privil | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-5777-CitrixBleed | CitrixBleed-2 (CVE-2025-5777) – proof-of-concept exploit for | NetScaler ADC and NetScaler Gateway - Insufficient input validation leading to memory overread |
v4.0
CRITICAL
Score: 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L
|
Visit Repo |
CVE-2025-32463_chwoot | Demonstrate CVE-2025-32463 with this PoC for sudo's chroot fea | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
gardyn | CVE-2025-29628, CVE-2025-29629, CVE-2025-29630, CVE-2025-29631 | n/a | n/a | Visit Repo |
CVE-2025-32462-POC | Local privilege escalation PoC for CVE-2025-32462 (sudo -h by | n/a |
v3.1
LOW
Score: 2.8
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
|
Visit Repo |
CVE-2025-6554 | n/a | n/a | Visit Repo | |
cve-2025-6907 | a standalone C-based SQL Injection exploit targeting the CVE� | n/a | n/a | Visit Repo |
CVE-2025-5961 | Migration, Backup, Staging – WPvivid Backup & Migration <= 0 | n/a | n/a | Visit Repo |
Cisco-CVE-2025-20281-illdeed | Unauthenticated Remote Code Execution exploit for CVE-2025-202 | Cisco ISE API Unauthenticated Remote Code Execution Vulnerability |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CrushFTP-CVE-2024-4040-illdeed | Exploit for CVE-2024-4040 – Authentication bypass in CrushFT | Unauthenticated arbitrary file read and remote code execution in CrushFTP |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-32463_illdeed | Privilege escalation exploit for CVE-2025-32463 using a malici | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
les-moders | Modern version of Linux Exploit Suggester. Detects kernel/OS-b | n/a | n/a | Visit Repo |
CVE-2025-32463 | # CVE-2025-32463 – Sudo EoP Exploit (PoC) with precompiled . | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2021-29447-Authenticated-XXE-WordPress-5.6-5.7 | POC to exploit WordPress 5.6-5.7 (PHP 8+) Authenticated XXE In | WordPress Authenticated XXE attack when installation is running PHP 8 |
v3.1
HIGH
Score: 7.1
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
|
Visit Repo |
dependency-chain-vulnerability-mapper | Visualizes and analyzes how vulnerabilities propagate through | n/a | n/a | Visit Repo |
CVE-2025-49132 | Check a list of Pterodactyl panels for vulnerabilities from a | n/a | n/a | Visit Repo |
CVE-2025-41646---Critical-Authentication-Bypass- | CVE-2025-41646 - Critical Authentication bypass | RevPi Webstatus application is vulnerable to an authentication bypass |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-27817 | Apache Kafka客户端未对用户输入进行严格验证和� | n/a | n/a | Visit Repo |
CVE-2025-32462 | CVE-2025-32462 exploit code | n/a |
v3.1
LOW
Score: 2.8
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
|
Visit Repo |
les-moders | Discover LES-Modern v3.0, an advanced tool for dynamic Linux e | n/a | n/a | Visit Repo |
Thu Jul 03, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
vre-vulnexploitmatcher | Given a vulnerability report (e.g., CVE ID), searches ExploitD | n/a | n/a | Visit Repo |
CVE-2025-6554 | n/a | n/a | Visit Repo | |
CVE-2025-6543_CitrixNetScaler_PoC | Multi-host, multi-port scanner and auditor for CVE-2025-6543-a | Memory overflow vulnerability leading to unintended control flow and Denial of Service |
v4.0
CRITICAL
Score: 9.2
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L
|
Visit Repo |
CVE-2025-23968 | Arbitrary File Upload in AI Bud – AI Content Generator, AI C | n/a | n/a | Visit Repo |
sudo_patch_CVE-2025-32463 | Mr.CIA's manual patching guide for CVE-2025-32463 (Sudo local | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-32462-Exploit | CVE-2025-32462 Exploit | n/a |
v3.1
LOW
Score: 2.8
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
|
Visit Repo |
CVE-2024-48061 | CVE-2024-48061 - poc | n/a | n/a | Visit Repo |
GitHub Threat Intelligence at a Glance
Stay on top of cybersecurity developments and open-source research through daily GitHub updates.
Jump into a repository to explore code, documentation, or CVE-related insights.