GitHub Feed
Explore the latest GitHub repositories gathered from our feed. Entries are grouped by day to help you track developments quickly.
Thu Jul 17, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
Blackash-CVE-2025-30065 | CVE-2025-30065 | Apache Parquet Java: Arbitrary code execution in the parquet-avro module when reading an Avro schema from a Parquet file metadata |
v4.0
CRITICAL
Score: 10
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
|
Visit Repo |
CVE-2025-27591_PoC | n/a | n/a | Visit Repo | |
CVE-2025-6558-exp | n/a | n/a | Visit Repo | |
CVE-2025-47812 | n/a |
v3.1
CRITICAL
Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo | |
CVE-2025-32463 | This is the exploit for the CVE-2025-32463 | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
realestate-php-cve-report | Disclosure for CVE-2025-50716 to CVE-2025-50721 | n/a | n/a | Visit Repo |
cve-2016-6210 | PoC of cve-2016-6210 | n/a | n/a | Visit Repo |
CVE-2025-6558 | n/a | n/a | Visit Repo | |
CVE-2025-48384-RCE | Git allows arbitrary code execution through broken config quoting |
v3.1
HIGH
Score: 8.1
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
|
Visit Repo | |
ExploitVeer | An advanced, powerful, and easy-to-use tool designed to detect | n/a | n/a | Visit Repo |
Wed Jul 16, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-53964 | n/a | n/a | Visit Repo | |
cyber-combat | An in-depth analysis of CVE 2023 38408, a critical OpenSSH vul | n/a | n/a | Visit Repo |
Blackash-CVE-2025-22870 | CVE-2025-22870 | HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net | n/a | Visit Repo |
CVE-2025-27521_PoC | n/a |
v3.1
MEDIUM
Score: 6.8
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
|
Visit Repo | |
CVE-2025-32463 | Privilege escalation to root via sudo without gcc. Exploit wor | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-32463 | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo | |
BleedingLife | a web-browser Buffer Overflow Exploit Pack (powered by PHP+MyS | n/a | n/a | Visit Repo |
CVE-2025-32463-Chwoot-POC | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo | |
exploit-poc | Place to archive all the PoC for exploits, CVEs etc. | n/a | n/a | Visit Repo |
Blackash-CVE-2025-5777 | CVE-2025-5777 | NetScaler ADC and NetScaler Gateway - Insufficient input validation leading to memory overread |
v4.0
CRITICAL
Score: 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L
|
Visit Repo |
CVE-2025-52688 | n/a | n/a | Visit Repo | |
Blackash-CVE-2025-32432 | CVE-2025-32432 | Craft CMS Allows Remote Code Execution |
v3.1
CRITICAL
Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L
|
Visit Repo |
CVE-2025-47812 | Improper Neutralization of Null Byte or NUL Character in WingF | n/a |
v3.1
CRITICAL
Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-27210_NodeJS_Path_Traversal_Exploit | (PoC) CVE-2025-27210, a precise Path Traversal vulnerability a | n/a |
v3.0
HIGH
Score: 7.5
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
Visit Repo |
cve-poc | n/a | n/a | Visit Repo | |
CVE-2025-52689-PoC | Weak Session ID Check in the OmniAccess Stellar Web Management Interface |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo | |
CVE-2024-4577 | Exploit for php-cgi | Argument Injection in PHP-CGI |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
HML-CVE-2025-49113-Round-Cube | n/a |
v3.1
CRITICAL
Score: 9.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo | |
cve-2025-48384-poc | Git allows arbitrary code execution through broken config quoting |
v3.1
HIGH
Score: 8.1
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
|
Visit Repo |
Tue Jul 15, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-23167 | Working exploit for CVE-2025-23167 – HTTP request smuggling | n/a |
v3.0
MEDIUM
Score: 6.5
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
|
Visit Repo |
CVE-2025-32463 | Privilege escalation to root using sudo chroot, NO NEED for gc | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
phpMyAdmin-RCE-Exploit-Lab | Dimostrazione di una vulnerabilità RCE (Remote Code Execution | n/a | n/a | Visit Repo |
CVE-2025-48384-submodule | Git allows arbitrary code execution through broken config quoting |
v3.1
HIGH
Score: 8.1
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
|
Visit Repo | |
CVE-2025-27591 | CVE-2025-27591 | n/a | n/a | Visit Repo |
Blackash-CVE-2025-53833 | CVE-2025-53833 | LaRecipe is vulnerable to Server-Side Template Injection attacks |
v3.1
CRITICAL
Score: 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2016-0792 | CVE-2016-0792 Exploit By XBOW AI | n/a | n/a | Visit Repo |
AutoVAPT-AI-Based-Vulnerability-Scanner-Pentest-Tool | AutoVAPT is an open-source GUI tool for automated Vulnerabilit | n/a | n/a | Visit Repo |
CVE-2025-5349-Scanner | NetScaler ADC and NetScaler Gateway - Improper access control on the NetScaler Management Interface |
v4.0
HIGH
Score: 8.7
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L
|
Visit Repo | |
CVE-2025-32463 | CVE-2025-32463 漏洞概念验证 | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-47981 | SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
Visit Repo | |
CVE-2025-25257 | PoC for CVE-2025-25257, a critical unauthenticated SQL injecti | n/a | n/a | Visit Repo |
CVE-2025-27591-Proof-Of-Concept | CVE-2025-27591 | n/a | n/a | Visit Repo |
CVE-2025-XXXX-Sirv-Stored-XSS | Stored XSS in Sirv WordPress Plugin v7.5.5 – CVE-2025-XXXX | n/a | n/a | Visit Repo |
Linux-Privilege-Escalation-CVE-2025-27591 | CVE-2025-27591 is a known privilege escalation vulnerability i | n/a | n/a | Visit Repo |
CVE-2025-7340 | HT Contact Form Widget For Elementor Page Builder & Gutenberg | HT Contact Form Widget For Elementor Page Builder & Gutenberg Blocks & Form Builder. <= 2.2.1 - Unauthenticated Arbitrary File Upload |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-5777 | CVE-2025-5777 (CitrixBleed 2) - [Citrix NetScaler ADC] [Citrix | NetScaler ADC and NetScaler Gateway - Insufficient input validation leading to memory overread |
v4.0
CRITICAL
Score: 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L
|
Visit Repo |
cve-2025-32463-lab | Educational Docker lab to simulate privilege escalation via CV | n/a |
v3.1
CRITICAL
Score: 9.3
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
Visit Repo |
Mon Jul 14, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
cve-2025-5755 | n/a | n/a | Visit Repo | |
Thank-u-Next | CVE-2025-29927 PoC | Auth Bypass Exploit | Python Tool using h | n/a | n/a | Visit Repo |
fortiweb_rce_toolkit | A powerful and modular PoC tool for CVE‑2025‑25257 in Fort | n/a | n/a | Visit Repo |
GitHub Threat Intelligence at a Glance
Stay on top of cybersecurity developments and open-source research through daily GitHub updates.
Jump into a repository to explore code, documentation, or CVE-related insights.