|
2 | 2 |
|
3 | 3 | > Automatic monitor github cve using Github Actions |
4 | 4 |
|
5 | | - Last generated : 2025-11-08 02:25:01.733892 |
| 5 | + Last generated : 2025-11-09 02:45:16.257368 |
6 | 6 |
|
7 | 7 | | CVE | Name | Description | Language | Date | |
8 | 8 | |---|---|---|---|---| |
|
185 | 185 | | [CVE-2025-6085](https://www.cve.org/CVERecord?id=CVE-2025-6085) | [d0n601/CVE-2025-6085](https://github.com/d0n601/CVE-2025-6085) | Make Connector <= 1.5.10 - Authenticated (Administrator+) Arbitrary File Upload | none | 2025-06-17T22:17:26Z| |
186 | 186 | | [CVE-2025-6083](https://www.cve.org/CVERecord?id=CVE-2025-6083) | [Yuri08loveElaina/CVE_2025_6083](https://github.com/Yuri08loveElaina/CVE_2025_6083) | In ExtremeCloud Universal ZTNA, a syntax error in the 'searchKeyword' condition caused queries to bypass the owner_id filter. This issue may allow users to search data across the entire table instead of being restricted to their specific owner_id. | Python | 2025-06-15T09:42:47Z| |
187 | 187 | | [CVE-2025-6082](https://www.cve.org/CVERecord?id=CVE-2025-6082) | [byteReaper77/CVE-2025-6082](https://github.com/byteReaper77/CVE-2025-6082) | ProofāofāConcept exploits the Full Path Disclosure bug in the āBirth Chart Compatibilityā WordPress plugin (<=v2.0) | C | 2025-07-22T15:38:22Z| |
| 188 | +| [CVE-2025-60791](https://www.cve.org/CVERecord?id=CVE-2025-60791) | [Smarttfoxx/CVE-2025-60791](https://github.com/Smarttfoxx/CVE-2025-60791) | Easywork Enterprise 2.1.3.354 is vulnerable to Cleartext Storage of Sensitive Information in Memory. The application leaves valid device-bound license keys in process memory after a failed activation attempt. | none | 2025-10-22T20:31:23Z| |
188 | 189 | | [CVE-2025-60787](https://www.cve.org/CVERecord?id=CVE-2025-60787) | [prabhatverma47/CVE-2025-60787](https://github.com/prabhatverma47/CVE-2025-60787) | CVE-2025-60787 Poc - RCE - MotionEye <= 0.43.1b4 | none | 2025-10-03T15:20:43Z| |
189 | 190 | | [CVE-2025-60752](https://www.cve.org/CVERecord?id=CVE-2025-60752) | [zer0matt/CVE-2025-60752](https://github.com/zer0matt/CVE-2025-60752) | PoC of CVE-2025-60752 | Shell | 2025-10-16T23:53:55Z| |
190 | 191 | | [CVE-2025-60751](https://www.cve.org/CVERecord?id=CVE-2025-60751) | [zer0matt/CVE-2025-60751](https://github.com/zer0matt/CVE-2025-60751) | PoC of CVE-2025-60751 | Python | 2025-10-16T23:39:06Z| |
|
342 | 343 | | [CVE-2025-55315](https://www.cve.org/CVERecord?id=CVE-2025-55315) | [RootAid/CVE-2025-55315](https://github.com/RootAid/CVE-2025-55315) | no description | none | 2025-10-17T13:50:15Z| |
343 | 344 | | [CVE-2025-55315](https://www.cve.org/CVERecord?id=CVE-2025-55315) | [7huukdlnkjkjba/CVE-2025-55315-](https://github.com/7huukdlnkjkjba/CVE-2025-55315-) | äøäøēŗ§HTTP请ę±čµ°ē§ę¼ę“å©ēØäøčŖåØåęøéęµčÆå·„å
· | Python | 2025-10-19T02:02:46Z| |
344 | 345 | | [CVE-2025-55315](https://www.cve.org/CVERecord?id=CVE-2025-55315) | [sirredbeard/CVE-2025-55315-repro](https://github.com/sirredbeard/CVE-2025-55315-repro) | Tool that reproduces CVE-2025-55315 in ASP.NET Core. | C# | 2025-10-16T17:14:56Z| |
| 346 | +| [CVE-2025-55315](https://www.cve.org/CVERecord?id=CVE-2025-55315) | [jlinebau/CVE-2025-55315-Scanner-Monitor](https://github.com/jlinebau/CVE-2025-55315-Scanner-Monitor) | Quick and Simple Scripts to Scan for Vulnerable Servers and Packet Level Monitors | Go | 2025-10-24T14:19:43Z| |
345 | 347 | | [CVE-2025-55287](https://www.cve.org/CVERecord?id=CVE-2025-55287) | [Eternalvalhalla/CVE-2025-55287-POC](https://github.com/Eternalvalhalla/CVE-2025-55287-POC) | Authenticated stored XSS priv esc PoC. Affects Genealogy versions prior to 4.4.0 | JavaScript | 2025-08-21T18:06:09Z| |
346 | 348 | | [CVE-2025-55287](https://www.cve.org/CVERecord?id=CVE-2025-55287) | [SEORY0/CVE-Analyzer](https://github.com/SEORY0/CVE-Analyzer) | 2025-1 ASC Project : AI źø°ė° CVE ģė ė¶ģ ė° ģ¤ķ ķź²½ źµ¬ģ¶ ķė ģģķ¬ | Python | 2025-08-19T09:34:39Z| |
347 | 349 | | [CVE-2025-55241](https://www.cve.org/CVERecord?id=CVE-2025-55241) | [Spanky-McSpank/CVE-2025-55241-Internal-Audit](https://github.com/Spanky-McSpank/CVE-2025-55241-Internal-Audit) | Audit Tool for CVE-2025-55241 - No Warranty Provided or Assumed. Analyze and Use at Own Risk | Python | 2025-09-19T14:13:44Z| |
|
488 | 490 | | [CVE-2025-52289](https://www.cve.org/CVERecord?id=CVE-2025-52289) | [Whit3-d3viL-hacker/CVE-2025-52289](https://github.com/Whit3-d3viL-hacker/CVE-2025-52289) | f | none | 2025-07-31T15:49:10Z| |
489 | 491 | | [CVE-2025-52136](https://www.cve.org/CVERecord?id=CVE-2025-52136) | [f1r3K0/CVE-2025-52136](https://github.com/f1r3K0/CVE-2025-52136) | EMQXę§å¶å°äøåŗē½å©ēØ | Go | 2025-10-17T06:08:53Z| |
490 | 492 | | [CVE-2025-52100](https://www.cve.org/CVERecord?id=CVE-2025-52100) | [changyaoyou/CVE-2025-52100](https://github.com/changyaoyou/CVE-2025-52100) | CVE-2025-52100 | none | 2025-08-29T04:32:32Z| |
| 493 | +| [CVE-2025-52099](https://www.cve.org/CVERecord?id=CVE-2025-52099) | [SCREAMBBY/CVE-2025-52099](https://github.com/SCREAMBBY/CVE-2025-52099) | an integer overflow in SQLite 3.50.0 | C | 2025-10-24T09:55:36Z| |
491 | 494 | | [CVE-2025-52097](https://www.cve.org/CVERecord?id=CVE-2025-52097) | [rwilsonecs/CVE-2025-52097](https://github.com/rwilsonecs/CVE-2025-52097) | Public Disclosure of CVE-2025-52097 | none | 2025-07-11T19:18:29Z| |
492 | 495 | | [CVE-2025-52078](https://www.cve.org/CVERecord?id=CVE-2025-52078) | [Yucaerin/CVE-2025-52078](https://github.com/Yucaerin/CVE-2025-52078) | CVE-2025-52078 - Unauthenticated Arbitrary File Upload - Writebot SaaS React Template | Python | 2025-05-29T03:06:56Z| |
493 | 496 | | [CVE-2025-52021](https://www.cve.org/CVERecord?id=CVE-2025-52021) | [hafizgemilang/CVE-2025-52021](https://github.com/hafizgemilang/CVE-2025-52021) | no description | none | 2025-10-07T14:23:32Z| |
|
695 | 698 | | [CVE-2025-48129](https://www.cve.org/CVERecord?id=CVE-2025-48129) | [ahmedseaad1420/cvear2025](https://github.com/ahmedseaad1420/cvear2025) | no description | HTML | 2025-06-09T00:31:57Z| |
696 | 699 | | [CVE-2025-48129](https://www.cve.org/CVERecord?id=CVE-2025-48129) | [Sh1r0ko11/redmagic-9spro-exploits](https://github.com/Sh1r0ko11/redmagic-9spro-exploits) | discovered zero day/CVEs exploits on the nubia redmagic 9spro models, 9.06.2025 | none | 2025-06-08T17:53:42Z| |
697 | 700 | | [CVE-2025-47987](https://www.cve.org/CVERecord?id=CVE-2025-47987) | [Kryptoenix/CVE-2025-47987_PoC](https://github.com/Kryptoenix/CVE-2025-47987_PoC) | no description | C | 2025-08-22T09:42:02Z| |
| 701 | +| [CVE-2025-4796](https://www.cve.org/CVERecord?id=CVE-2025-4796) | [Nxploited/CVE-2025-4796](https://github.com/Nxploited/CVE-2025-4796) | Eventin <= 4.0.34 - Authenticated (Contributor+) Privilege Escalation via User Email Change/Account Takeover | Python | 2025-10-25T03:35:29Z| |
698 | 702 | | [CVE-2025-47917](https://www.cve.org/CVERecord?id=CVE-2025-47917) | [byteReaper77/CVE-2025-47917](https://github.com/byteReaper77/CVE-2025-47917) | PoC exploit for CVE-2025-47917: Use-After-Free in mbedTLS leading to remote code execution. | C | 2025-07-22T00:34:25Z| |
699 | 703 | | [CVE-2025-4784](https://www.cve.org/CVERecord?id=CVE-2025-4784) | [sahici/CVE-2025-4784](https://github.com/sahici/CVE-2025-4784) | USOM Tarafından resmi yayın beklenmektedir. | none | 2025-05-15T16:47:09Z| |
700 | 704 | | [CVE-2025-47827](https://www.cve.org/CVERecord?id=CVE-2025-47827) | [Zedeldi/CVE-2025-47827](https://github.com/Zedeldi/CVE-2025-47827) | PoC and vulnerability report for CVE-2025-47827. | Shell | 2025-05-20T10:42:11Z| |
|
981 | 985 | | [CVE-2025-3248](https://www.cve.org/CVERecord?id=CVE-2025-3248) | [min8282/CVE-2025-3248](https://github.com/min8282/CVE-2025-3248) | CVE-2025-3248 | Python | 2025-09-03T00:13:48Z| |
982 | 986 | | [CVE-2025-3248](https://www.cve.org/CVERecord?id=CVE-2025-3248) | [wand3rlust/CVE-2025-3248](https://github.com/wand3rlust/CVE-2025-3248) | PoC for achieving RCE in Langflow versions <1.3.0 | Python | 2025-09-17T10:30:09Z| |
983 | 987 | | [CVE-2025-3248](https://www.cve.org/CVERecord?id=CVE-2025-3248) | [Kiraly07/Demo_CVE-2025-3248](https://github.com/Kiraly07/Demo_CVE-2025-3248) | no description | Python | 2025-10-01T04:53:30Z| |
| 988 | +| [CVE-2025-3248](https://www.cve.org/CVERecord?id=CVE-2025-3248) | [bambooqj/cve-2025-3248](https://github.com/bambooqj/cve-2025-3248) | Langflow åØåƹēØę·ęäŗ¤ēāéŖčÆä»£ē āå AST č§£ęåē¼čÆę¶ļ¼åØęŖåé“ęäøę²ē®±éå¶ēę
åµäøč°ēØäŗ Python ē compile()/exec()ļ¼ä»„ååØē¼čÆé¶ę®µä¼čÆä¼°å½ę°é»č®¤åę°äøč£
é„°åØļ¼ļ¼ę»å»č
åÆęę¶ęč½½č·ę¾åØåę°é»č®¤å¼ęč£
é„°åØéļ¼åę¤åØęå”åØäøäøęäøę§č”ä»»ęčÆå„ļ¼åå¼¹ shellćäøč½½åØć横åē§»åØēļ¼ | Python | 2025-10-24T13:08:17Z| |
984 | 989 | | [CVE-2025-32463](https://www.cve.org/CVERecord?id=CVE-2025-32463) | [4f-kira/CVE-2025-32463](https://github.com/4f-kira/CVE-2025-32463) | no description | C | 2025-07-01T13:29:02Z| |
985 | 990 | | [CVE-2025-32463](https://www.cve.org/CVERecord?id=CVE-2025-32463) | [neko205-mx/CVE-2025-32463_Exploit](https://github.com/neko205-mx/CVE-2025-32463_Exploit) | no description | Shell | 2025-07-02T08:53:44Z| |
986 | 991 | | [CVE-2025-32463](https://www.cve.org/CVERecord?id=CVE-2025-32463) | [kh4sh3i/CVE-2025-32463](https://github.com/kh4sh3i/CVE-2025-32463) | Local Privilege Escalation to Root via Sudo chroot in Linux | Shell | 2025-07-02T07:20:20Z| |
|
1865 | 1870 | | [CVE-2025-1639](https://www.cve.org/CVERecord?id=CVE-2025-1639) | [Nxploited/CVE-2025-1639](https://github.com/Nxploited/CVE-2025-1639) | Animation Addons for Elementor Pro <= 1.6 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Installation/Activation | Python | 2025-03-13T10:48:05Z| |
1866 | 1871 | | [CVE-2025-1562](https://www.cve.org/CVERecord?id=CVE-2025-1562) | [gmh5225/CVE-2025-1562](https://github.com/gmh5225/CVE-2025-1562) | no description | none | 2025-06-22T15:33:38Z| |
1867 | 1872 | | [CVE-2025-1562](https://www.cve.org/CVERecord?id=CVE-2025-1562) | [zhuowei/cheese](https://github.com/zhuowei/cheese) | CVE-2025-21479 proof-of-concept, I think | C | 2025-06-19T19:47:52Z| |
| 1873 | +| [CVE-2025-1550](https://www.cve.org/CVERecord?id=CVE-2025-1550) | [ChCh0i/cve-2025-1550](https://github.com/ChCh0i/cve-2025-1550) | no description | Python | 2025-10-24T19:02:33Z| |
1868 | 1874 | | [CVE-2025-1461](https://www.cve.org/CVERecord?id=CVE-2025-1461) | [neverendingsupport/nes-vuetify-cve-2025-1461](https://github.com/neverendingsupport/nes-vuetify-cve-2025-1461) | no description | Vue | 2025-05-29T13:27:43Z| |
1869 | 1875 | | [CVE-2025-1338](https://www.cve.org/CVERecord?id=CVE-2025-1338) | [jxcaxtc/CVE-2025-1338](https://github.com/jxcaxtc/CVE-2025-1338) | This repository contains a proof-of-concept exploit script for CVE-2025-1338 | Python | 2025-10-04T23:51:36Z| |
1870 | 1876 | | [CVE-2025-1337](https://www.cve.org/CVERecord?id=CVE-2025-1337) | [ada-z3r0/CVE-2025-1337-PoC](https://github.com/ada-z3r0/CVE-2025-1337-PoC) | no description | Python | 2025-08-22T02:34:37Z| |
|
5268 | 5274 | | [CVE-2023-46604](https://www.cve.org/CVERecord?id=CVE-2023-46604) | [cuanh2333/CVE-2023-46604](https://github.com/cuanh2333/CVE-2023-46604) | no description | Python | 2024-10-16T03:31:13Z| |
5269 | 5275 | | [CVE-2023-46604](https://www.cve.org/CVERecord?id=CVE-2023-46604) | [tomasmussi/activemq-cve-2023-46604](https://github.com/tomasmussi/activemq-cve-2023-46604) | Repository to exploit CVE-2023-46604 reported for ActiveMQ | Python | 2023-12-30T20:02:19Z| |
5270 | 5276 | | [CVE-2023-46604](https://www.cve.org/CVERecord?id=CVE-2023-46604) | [skrkcb2/CVE-2023-46604](https://github.com/skrkcb2/CVE-2023-46604) | no description | none | 2025-02-27T02:49:18Z| |
| 5277 | +| [CVE-2023-46604](https://www.cve.org/CVERecord?id=CVE-2023-46604) | [CCIEVoice2009/CVE-2023-46604](https://github.com/CCIEVoice2009/CVE-2023-46604) | no description | Python | 2025-05-04T14:42:01Z| |
5271 | 5278 | | [CVE-2023-46527](https://www.cve.org/CVERecord?id=CVE-2023-46527) | [Jianchun-Ding/CVE-poc-update](https://github.com/Jianchun-Ding/CVE-poc-update) | CVE-2023-46371 and CVE-2023-46527 update | Python | 2024-09-10T13:18:02Z| |
5272 | 5279 | | [CVE-2023-46474](https://www.cve.org/CVERecord?id=CVE-2023-46474) | [Xn2/CVE-2023-46474](https://github.com/Xn2/CVE-2023-46474) | Technical details for CVE-2023-46474 | none | 2024-01-11T08:35:18Z| |
5273 | 5280 | | [CVE-2023-46442](https://www.cve.org/CVERecord?id=CVE-2023-46442) | [JAckLosingHeart/CVE-2023-46442_POC](https://github.com/JAckLosingHeart/CVE-2023-46442_POC) | POC for CVE-2023-46442 Denial of Service vulnerability found within Soot | Java | 2024-05-24T10:03:38Z| |
|
6377 | 6384 | | [CVE-2022-24181](https://www.cve.org/CVERecord?id=CVE-2022-24181) | [cyberhawk000/CVE-2022-24181](https://github.com/cyberhawk000/CVE-2022-24181) | XSS via Host Header injection and Steal Password Reset Token of another user | none | 2022-03-22T08:06:53Z| |
6378 | 6385 | | [CVE-2022-2414](https://www.cve.org/CVERecord?id=CVE-2022-2414) | [satyasai1460/CVE-2022-2414](https://github.com/satyasai1460/CVE-2022-2414) | CVE-2022-2414 POC | Python | 2023-10-05T07:55:01Z| |
6379 | 6386 | | [CVE-2022-2414](https://www.cve.org/CVERecord?id=CVE-2022-2414) | [geniuszly/CVE-2022-2414](https://github.com/geniuszly/CVE-2022-2414) | is a PoC script for demonstrating an XML External Entity (XXE) vulnerability exploitation | Python | 2024-10-07T15:36:39Z| |
| 6387 | +| [CVE-2022-2414](https://www.cve.org/CVERecord?id=CVE-2022-2414) | [amitlttwo/CVE-2022-2414-Proof-Of-Concept](https://github.com/amitlttwo/CVE-2022-2414-Proof-Of-Concept) | A flaw was found in pki-core. Access to external entities when parsing XML documents can lead to XML external entity (XXE) attacks. This flaw allows a remote attacker to potentially retrieve the content of arbitrary files by sending specially crafted HTTP requests. | Python | 2022-12-06T14:37:08Z| |
6380 | 6388 | | [CVE-2022-24124](https://www.cve.org/CVERecord?id=CVE-2022-24124) | [b1gdog/CVE-2022-24124](https://github.com/b1gdog/CVE-2022-24124) | CVE-2022-24124 exploit | Python | 2022-08-31T16:23:16Z| |
6381 | 6389 | | [CVE-2022-24112](https://www.cve.org/CVERecord?id=CVE-2022-24112) | [btar1gan/exploit_CVE-2022-24112](https://github.com/btar1gan/exploit_CVE-2022-24112) | New exploit for Apache APISIX v2.12.1 - Remote code execution (RCE) | Python | 2024-06-03T17:33:59Z| |
6382 | 6390 | | [CVE-2022-24086](https://www.cve.org/CVERecord?id=CVE-2022-24086) | [BurpRoot/CVE-2022-24086](https://github.com/BurpRoot/CVE-2022-24086) | CVE-2022-24086 POC example | none | 2023-09-03T17:27:58Z| |
|
7394 | 7402 | | [CVE-2019-6340](https://www.cve.org/CVERecord?id=CVE-2019-6340) | [knqyf263/CVE-2019-6340](https://github.com/knqyf263/CVE-2019-6340) | Environment for CVE-2019-6340 (Drupal) | Dockerfile | 2019-02-23T13:28:58Z| |
7395 | 7403 | | [CVE-2019-6329](https://www.cve.org/CVERecord?id=CVE-2019-6329) | [ManhNDd/CVE-2019-6329](https://github.com/ManhNDd/CVE-2019-6329) | Local Privilege Escalation in HP Support Assistant | C++ | 2019-10-13T09:20:16Z| |
7396 | 7404 | | [CVE-2019-6329](https://www.cve.org/CVERecord?id=CVE-2019-6329) | [xtafnull/CMS-made-simple-sqli-python3](https://github.com/xtafnull/CMS-made-simple-sqli-python3) | CMS Made Simple < 2.2.10 - SQL Injection (rewritten for python3), CVE-2019-905 | Python | 2022-05-04T09:26:45Z| |
| 7405 | +| [CVE-2019-6250](https://www.cve.org/CVERecord?id=CVE-2019-6250) | [AkashicYiTai/CVE-2019-6250-libzmq](https://github.com/AkashicYiTai/CVE-2019-6250-libzmq) | no description | C++ | 2024-06-20T10:56:43Z| |
7397 | 7406 | | [CVE-2019-6249](https://www.cve.org/CVERecord?id=CVE-2019-6249) | [AlphabugX/CVE-2019-6249_Hucart-cms](https://github.com/AlphabugX/CVE-2019-6249_Hucart-cms) | CVE-2019-6249 Hucart cms å¤ē°ēÆå¢ | PHP | 2019-02-21T08:03:43Z| |
7398 | 7407 | | [CVE-2019-5822](https://www.cve.org/CVERecord?id=CVE-2019-5822) | [Silence-Rain/14-828_Exploitation_of_CVE-2019-5822](https://github.com/Silence-Rain/14-828_Exploitation_of_CVE-2019-5822) | no description | HTML | 2020-05-06T09:05:23Z| |
7399 | 7408 | | [CVE-2019-5736](https://www.cve.org/CVERecord?id=CVE-2019-5736) | [H3xL00m/CVE-2019-5736](https://github.com/H3xL00m/CVE-2019-5736) | no description | Go | 2021-07-08T22:46:30Z| |
|
8406 | 8415 | | [CVE-2014-7911](https://www.cve.org/CVERecord?id=CVE-2014-7911) | [retme7/CVE-2014-7911_poc](https://github.com/retme7/CVE-2014-7911_poc) | Local root exploit for Nexus5 Android 4.4.4(KTU84P) | Java | 2015-01-26T06:33:52Z| |
8407 | 8416 | | [CVE-2014-7911](https://www.cve.org/CVERecord?id=CVE-2014-7911) | [heeeeen/CVE-2014-7911poc](https://github.com/heeeeen/CVE-2014-7911poc) | no description | Java | 2015-11-03T03:42:05Z| |
8408 | 8417 | | [CVE-2014-7911](https://www.cve.org/CVERecord?id=CVE-2014-7911) | [GeneBlue/cve-2014-7911-exp](https://github.com/GeneBlue/cve-2014-7911-exp) | exploit for cve-2014-7911; android; java deserialization ;system privilege;ace; | Java | 2015-12-29T07:28:46Z| |
| 8418 | +| [CVE-2014-7911](https://www.cve.org/CVERecord?id=CVE-2014-7911) | [koozxcv/CVE-2014-7911](https://github.com/koozxcv/CVE-2014-7911) | vulnerabilitiesā Poc and Exploit | Java | 2016-03-22T02:02:11Z| |
8409 | 8419 | | [CVE-2014-7236](https://www.cve.org/CVERecord?id=CVE-2014-7236) | [m0nad/CVE-2014-7236_Exploit](https://github.com/m0nad/CVE-2014-7236_Exploit) | Exploit for CVE-2014-7236 | Perl | 2014-10-12T21:28:24Z| |
8410 | 8420 | | [CVE-2014-7236](https://www.cve.org/CVERecord?id=CVE-2014-7236) | [vortextube/ssl_scanner](https://github.com/vortextube/ssl_scanner) | Heartbleed (CVE-2014-0160) SSLv3 Scanner | Perl | 2014-10-12T05:13:06Z| |
8411 | 8421 | | [CVE-2014-7169](https://www.cve.org/CVERecord?id=CVE-2014-7169) | [gina-alaska/bash-cve-2014-7169-cookbook](https://github.com/gina-alaska/bash-cve-2014-7169-cookbook) | no description | Ruby | 2015-09-30T18:06:13Z| |
|
8593 | 8603 | | CVE NOT FOUND | [shivammittal2403/CVE_Datebase](https://github.com/shivammittal2403/CVE_Datebase) | All Data of cve till 8 sep 2025 |none | 2025-09-08T05:27:36Z| |
8594 | 8604 | | CVE NOT FOUND | [tomitokics/br0ke](https://github.com/tomitokics/br0ke) | My first iOS 'jailbreak' , using CVE 2016-4655 & CVE 2016-4656 |C | 2019-06-16T18:02:09Z| |
8595 | 8605 | | CVE NOT FOUND | [harshul27/CVE-Vulnerability-Dashboard-app](https://github.com/harshul27/CVE-Vulnerability-Dashboard-app) | A Streamlit dashboard providing a cybersecurity analyst's narrative on messaging app vulnerabilities (CVEs) from 2019-2024, featuring historical trends, forecasts, and secure alternatives. Data-driven insights for informed digital security decisions. |Python | 2025-07-02T10:10:25Z| |
| 8606 | +| CVE NOT FOUND | [Smarttfoxx/CVE-2025--](https://github.com/Smarttfoxx/CVE-2025--) | no description |none | 2025-10-25T05:04:42Z| |
0 commit comments