GitHub Feed
Explore the latest GitHub repositories gathered from our feed. Entries are grouped by day to help you track developments quickly.
Tue Jun 10, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2024-57378 | Detection for CVE-2024-57378 | n/a | n/a | Visit Repo |
CVE-2025-20286 | n/a | n/a | Visit Repo | |
CVE-2025-4601 | RH - Real Estate WordPress Theme <= 4.4.0 - Authenticated (Sub | RH - Real Estate WordPress Theme <= 4.4.0 - Authenticated (Subscriber+) Privilege Escalation |
v3.1
HIGH
Score: 8.8
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2017-9841-EXPLOIT | n/a | n/a | Visit Repo | |
Roundcube-CVE-2025-49113 | Proof-of-concept to CVE-2025-49113 | n/a |
v3.1
CRITICAL
Score: 9.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-46142 | n/a | n/a | Visit Repo | |
CVE-2025-24016 | Detection for CVE-2025-24016 - Deserialization of Untrusted Da | Remote code execution in Wazuh server |
v3.1
CRITICAL
Score: 9.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H
|
Visit Repo |
Blackash-CVE-2025-24016 | CVE-2025-24016 | Remote code execution in Wazuh server |
v3.1
CRITICAL
Score: 9.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H
|
Visit Repo |
CVE-2025-5419 | Out-of-Bounds Read/Write in Chrome V8 — Heap Corruption → | n/a | n/a | Visit Repo |
Hydroph0bia | Binaries, drivers, PoCs and other stuff on Hydroph0bia vulnera | n/a | n/a | Visit Repo |
POC_for_-CVE-2024-22371 | Apache Camel issue on ExchangeCreatedEvent |
v3.1
LOW
Score: 2.9
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
|
Visit Repo | |
CVE-2025-26892 | WordPress Celestial Aura Theme <= 2.2 is vulnerable to Arbitr | n/a | n/a | Visit Repo |
Mon Jun 09, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-32756 | CVE-2025-32756: NSE Scanning for RCE in vulnerable FortiVoice, | n/a | n/a | Visit Repo |
cve-lfi-lab | A hands on lab investigating CVE-2025-39507 from a Tier 1 SOC | n/a | n/a | Visit Repo |
CVE-2025-20286 | n/a | n/a | Visit Repo | |
CVE-2025-2539 | CVE-2025-2539 - WordPress File Away <= 3.9.9.0.1 - Arbitrary F | File Away <= 3.9.9.0.1 - Missing Authorization to Unauthenticated Arbitrary File Read |
v3.1
HIGH
Score: 7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
Visit Repo |
Why-so-Serious-SAM | PoC malware that uses exploit CVE-2021-36934 (improper ACLs on | n/a | n/a | Visit Repo |
CVE-2025-32756-POC | n/a | n/a | Visit Repo | |
Blackash-CVE-2025-32433 | CVE-2025-32433 Erlang SSH Library Exploit | Erlang/OTP SSH Vulnerable to Pre-Authentication RCE |
v3.1
CRITICAL
Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2024-10914 | CVE-2024-10914 is a critical command injection vulnerability a | D-Link DNS-320/DNS-320LW/DNS-325/DNS-340L account_mgr.cgi cgi_user_add os command injection |
v4.0
CRITICAL
Score: 9.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
|
Visit Repo |
CVE-2025-29972 | CVE-2025-29927 - Critical Security Vulnerability in Next.js | n/a | n/a | Visit Repo |
Blackash-CVE-2025-24071 | CVE-2025-24071 | Microsoft Windows File Explorer Spoofing Vulnerability |
v3.1
MEDIUM
Score: 6.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
Visit Repo |
SMB-LINUX-CVE-2025-37899 | n/a | n/a | Visit Repo | |
CVE-2025-24071 | Security Vulnerability Report: CVE-2025-24071 - Windows File E | Microsoft Windows File Explorer Spoofing Vulnerability |
v3.1
MEDIUM
Score: 6.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
Visit Repo |
CVE-2025-5068 | Remote Code Execution via Use-After-Free in Chromium Blink | n/a | n/a | Visit Repo |
Review.CVE-2021-3156 | CVE-2021-3156-Exploit-Demo | n/a | n/a | Visit Repo |
CVE-2011-0762 | Script que corrigi o exploit da CVE que foi publicado no explo | n/a | n/a | Visit Repo |
CVE-2022-26134 | Atlassian's Confluence Server and Data Center editions (Vulner | n/a | n/a | Visit Repo |
CVE-2025-48129 | WordPress Spreadsheet Price Changer for WooCommerce and WP E- | n/a | n/a | Visit Repo |
CVE-2024-42049-PoC | PoC for CVE-2024-42049 | n/a | n/a | Visit Repo |
Why-so-Serious-SAM | PoC malware that uses exploit CVE-2021-36934 (improper ACLs on | n/a | n/a | Visit Repo |
cvear2025 | n/a | n/a | Visit Repo | |
cventas_2025 | FastAPI-based cventas app with uv and SQLite | n/a | n/a | Visit Repo |
Sun Jun 08, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
redmagic-9spro-exploits | unfixed ex-zero day/CVEs exploits on the nubia redmagic 9spro | n/a | n/a | Visit Repo |
cve-poc | CVE PoC repository monitoring tool - Automated discovery and t | n/a | n/a | Visit Repo |
Blackash-CVE-2025-32756 | CVE-2025-32756-POC | n/a | n/a | Visit Repo |
CVE-2023-27163-Request-Baskets-Local-Ports-Bruteforcer | PoC and internal port brute-forcer for CVE-2023-27163 | n/a | n/a | Visit Repo |
CVE-2025-5840 | CVE-2025-5840 Exploit Written In Python By haxerr9 | SourceCodester Client Database Management System user_update_customer_order.php unrestricted upload |
v4.0
MEDIUM
Score: 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X
|
Visit Repo |
CVE-2025-46041 | n/a | n/a | Visit Repo | |
Event-ID-263-Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919- | Information disclosure |
v3.1
HIGH
Score: 8.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
|
Visit Repo | |
SOC274---Palo-Alto-Networks-PAN-OS-Command-Injection-Vulnerability-Exploitation-CVE-2024-3400- | PAN-OS: Arbitrary File Creation Leads to OS Command Injection Vulnerability in GlobalProtect |
v3.1
CRITICAL
Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo | |
CVE-2025-5419 | Out-of-Bounds Read/Write in Chrome V8 — Heap Corruption → | n/a | n/a | Visit Repo |
CVE-2024-40453 | CVE-2024-40453 poc | n/a | n/a | Visit Repo |
CVE-2023-27163-Request-Baskets | PoC for CVE-2023-27163 | n/a | n/a | Visit Repo |
CVE-2025-22870 | PoC CVE-2025-22870 (SSRF) | HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net | n/a | Visit Repo |
CVE-2024-51482 | CVE-2024-51482 poc | Boolean-based SQL Injection in ZoneMinder v1.37.* <= 1.37.64 |
v3.1
CRITICAL
Score: 10
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
Sat Jun 07, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2017-5638 | CVE-2017-5638 Exploit Rewrite In Python By haxerr9 | n/a | n/a | Visit Repo |
Blackash-CVE-2025-0282 | CVE-2025-0282 | n/a |
v3.1
CRITICAL
Score: 9
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
Blackash-CVE-2025-29927 | CVE-2025-29927 | Authorization Bypass in Next.js Middleware |
v3.1
CRITICAL
Score: 9.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
|
Visit Repo |
KTM_POCS | Reports and POCs for CVE 2024-43570 and CVE-2024-43535 | n/a | n/a | Visit Repo |
GitHub Threat Intelligence at a Glance
Stay on top of cybersecurity developments and open-source research through daily GitHub updates.
Jump into a repository to explore code, documentation, or CVE-related insights.