Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Last updated: 2025-11-28 11:52
- List available at: http://www.jamessawyer.co.uk/pub/cve_links.txt
- Bitcoin: 3QjWqhQbHdHgWeYHTpmorP8Pe1wgDjJy54
- ETH address: 0x01d23570c34A78380452A4BE9C95bAe439719bAf
- https://github.com/0xMandor/CVE-2025-50433
- https://github.com/0xNullComet/CVE-2016-10204_Webshell
- https://github.com/0xla1n/Nagios-CVE-2019-15949-RCE-Poc
- https://github.com/4daysday/cve-2025-8088
- https://github.com/B1ack4sh/Blackash-CVE-2025-29306
- https://github.com/B1ack4sh/Blackash-CVE-2025-58360
- https://github.com/B1ack4sh/Blackash-CVE-2025-59528
- https://github.com/B1ack4sh/Blackash-CVE-2025-62593
- https://github.com/Bamolitho/adminer_CVE-2021-43008
- https://github.com/BlueShield-CyberDefense/Phishing-Analysis
- https://github.com/Delfaster/CVE-2025-32421---Race-Condition-Vulnerability---Next.js
- https://github.com/ExtremeUday/CVE-2025-2945-pgAdmin4-Authenticated-RCE-PoC-
- https://github.com/Gayang2902/CVE-2025-57833
- https://github.com/Kairo-one/CVE-2020-14343
- https://github.com/Nxploited/CVE-2025-39401
- https://github.com/SFRDevelopment/windows-smb-vulnerability-framework-cve-2025-33073
- https://github.com/Smarttfoxx/CVE-2025-65320
- https://github.com/ThePhykon/CVE-2025-53367-POC
- https://github.com/YardenFadida/CVE-2024-3661_Demo
- https://github.com/alecasg555/safe-expr-eval
- https://github.com/aleister1102/kibana-prototype-pollusion
- https://github.com/andknownmaly/CVE-2019-16278
- https://github.com/arielrbrdev/redteamlab1
- https://github.com/calysteon/CVE-2025-43504
- https://github.com/cxdxnt/CVE-2023-42793
- https://github.com/d0n601/CVE-2025-13595
- https://github.com/d0n601/CVE-2025-13597
- https://github.com/earthbendergara/unrealircd3.2.8.1-local-exploit
- https://github.com/f3d0rq/CVE-2017-7921
- https://github.com/f3d0rq/CVE-2021-43798
- https://github.com/faizdotid/CVE-2021-41773
- https://github.com/gui2000guix-ui/cve-2021-21980-mock-server
- https://github.com/gui2000guix-ui/cve-2021-21980-nuclei-poc
- https://github.com/hossainshadat/CVE-2025-57310
- https://github.com/hossainshadat/CVE-2025-63419
- https://github.com/hossainshadat/CVE-2025-63420
- https://github.com/joelindra/CVE-2017-9841
- https://github.com/julichaan/CVE-2024-32019-ndsudo-local-privilege-escalation-NetData
- https://github.com/justjoeyking/CVE-2025-32463
- https://github.com/le0s1mba/CVE-2023-1189
- https://github.com/marcostolosa/CVE-2025-10230
- https://github.com/mcorybillington/CVE-2025-34322_CVE-2025-34323_Nagios_Log_Server
- https://github.com/nehkark/CVE-2025-62168
- https://github.com/pkxk5pr6m2-web/cve-2021-21980-nuclei-poc
- https://github.com/quyenheu/CVE-2025-58360
- https://github.com/richardzhangcmplx/Dubbo-deserialization
- https://github.com/rimbadirgantara/opac-fast-automation
- https://github.com/soltanali0/CVE-2025-32433-Eploit
- https://github.com/stankobra853/CVE-2025-62207
- https://github.com/truediogo/CVE-2025-64720-PoC
- https://github.com/voidvarov/CVE-2024-24590-ClearML-RCE-Exploit
- https://github.com/yunus-a1i/veeam-cve-2023-27532-mock
Advertisement
Add Comment
Please, Sign In to add comment