mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-16 00:18:04 +02:00
346 lines
12 KiB
HTML
346 lines
12 KiB
HTML
<!DOCTYPE html>
|
|
<html lang="en">
|
|
<head>
|
|
<meta charset="UTF-8" />
|
|
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
|
<title>CVE PoC Hub</title>
|
|
<link rel="stylesheet" href="/style.css" />
|
|
<script defer src="/assets/site.js"></script>
|
|
</head>
|
|
<body class="color-no-search">
|
|
<header class="site-header">
|
|
<div class="wrap">
|
|
<div class="brand"><a href="/">CVE PoC Hub</a></div>
|
|
<nav>
|
|
<a href="/search/">PoC Search</a>
|
|
<a href="/kev/">KEV</a>
|
|
<a href="/epss/">EPSS</a>
|
|
</nav>
|
|
</div>
|
|
</header>
|
|
<main class="wrap">
|
|
<section class="hero hero-signal" data-search-root>
|
|
<div class="hero-meta">
|
|
<p class="eyebrow">Signal-first</p>
|
|
<h1>Search PoCs, KEV, and EPSS without the clutter</h1>
|
|
<p class="lede">Built for fast triage. One page, no badges, no filler.</p>
|
|
</div>
|
|
<form class="searchForm" action="#">
|
|
<input type="text" class="search" placeholder="Search CVE, vendor, product, or keyword" autocomplete="off">
|
|
</form>
|
|
<div class="stat-row">
|
|
<div class="stat"><strong>1478</strong><span>KEV entries tracked</span></div>
|
|
<div class="stat"><strong>10</strong><span>High-EPSS not in KEV</span></div>
|
|
<div class="stat"><strong>18</strong><span>New KEV in last 30 days</span></div>
|
|
</div>
|
|
<div class="search-results" data-results style="display:none">
|
|
<div class="header">
|
|
<h2>Results</h2>
|
|
<span class="muted">Filter with negative terms (e.g., -windows)</span>
|
|
</div>
|
|
<div class="noResults">No results yet.</div>
|
|
<div class="results-table hide">
|
|
<table class="results">
|
|
<thead>
|
|
<tr>
|
|
<td width="18%">CVE</td>
|
|
<td>Description / PoC links</td>
|
|
</tr>
|
|
</thead>
|
|
<tbody class="results"></tbody>
|
|
</table>
|
|
</div>
|
|
</div>
|
|
</section>
|
|
|
|
<section class="section">
|
|
<div class="section-header">
|
|
<h1>Trending PoCs</h1>
|
|
<span class="muted">Recent GitHub movement (last 4 days, sorted by stars)</span>
|
|
</div>
|
|
<div class="table-wrap" data-trending>
|
|
<table>
|
|
<thead>
|
|
<tr><th>Stars</th><th>Updated</th><th>Name</th><th>Description</th></tr>
|
|
</thead>
|
|
<tbody id="trending-body">
|
|
<tr><td colspan="4" class="muted">Loading trending PoCs…</td></tr>
|
|
</tbody>
|
|
</table>
|
|
</div>
|
|
</section>
|
|
|
|
|
|
<section class="section">
|
|
<div class="section-header">
|
|
<h1>Latest KEV additions</h1>
|
|
<span class="muted">Last 30 days</span>
|
|
</div>
|
|
<div class="table-wrap">
|
|
<table data-require-poc data-require-desc>
|
|
<thead>
|
|
<tr><th>CVE</th><th>Vendor</th><th>Product</th><th>EPSS</th><th>Percentile</th><th>Date Added</th><th>Due</th></tr>
|
|
</thead>
|
|
<tbody>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2025-59718">CVE-2025-59718</a></td>
|
|
<td>Fortinet</td>
|
|
<td>Multiple Products</td>
|
|
<td>0.000</td>
|
|
<td> 0th</td>
|
|
<td>2025-12-16</td>
|
|
<td>2025-12-23</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2025-14611">CVE-2025-14611</a></td>
|
|
<td>Gladinet</td>
|
|
<td>CentreStack and Triofox</td>
|
|
<td>0.000</td>
|
|
<td> 0th</td>
|
|
<td>2025-12-15</td>
|
|
<td>2026-01-05</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2025-43529">CVE-2025-43529</a></td>
|
|
<td>Apple</td>
|
|
<td>Multiple Products</td>
|
|
<td>0.000</td>
|
|
<td> 0th</td>
|
|
<td>2025-12-15</td>
|
|
<td>2026-01-05</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2018-4063">CVE-2018-4063</a></td>
|
|
<td>Sierra Wireless</td>
|
|
<td>AirLink ALEOS</td>
|
|
<td>0.000</td>
|
|
<td> 0th</td>
|
|
<td>2025-12-12</td>
|
|
<td>2026-01-02</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2025-14174">CVE-2025-14174</a></td>
|
|
<td>Google</td>
|
|
<td>Chromium</td>
|
|
<td>0.000</td>
|
|
<td> 0th</td>
|
|
<td>2025-12-12</td>
|
|
<td>2026-01-02</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2025-58360">CVE-2025-58360</a></td>
|
|
<td>OSGeo</td>
|
|
<td>GeoServer</td>
|
|
<td>0.000</td>
|
|
<td> 0th</td>
|
|
<td>2025-12-11</td>
|
|
<td>2026-01-01</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2025-6218">CVE-2025-6218</a></td>
|
|
<td>RARLAB</td>
|
|
<td>WinRAR</td>
|
|
<td>0.000</td>
|
|
<td> 0th</td>
|
|
<td>2025-12-09</td>
|
|
<td>2025-12-30</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2025-62221">CVE-2025-62221</a></td>
|
|
<td>Microsoft</td>
|
|
<td>Windows</td>
|
|
<td>0.000</td>
|
|
<td> 0th</td>
|
|
<td>2025-12-09</td>
|
|
<td>2025-12-30</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2022-37055">CVE-2022-37055</a></td>
|
|
<td>D-Link</td>
|
|
<td>Routers</td>
|
|
<td>0.000</td>
|
|
<td> 0th</td>
|
|
<td>2025-12-08</td>
|
|
<td>2025-12-29</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2025-66644">CVE-2025-66644</a></td>
|
|
<td>Array Networks</td>
|
|
<td>ArrayOS AG</td>
|
|
<td>0.000</td>
|
|
<td> 0th</td>
|
|
<td>2025-12-08</td>
|
|
<td>2025-12-29</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2025-55182">CVE-2025-55182</a></td>
|
|
<td>Meta</td>
|
|
<td>React Server Components</td>
|
|
<td>0.000</td>
|
|
<td> 0th</td>
|
|
<td>2025-12-05</td>
|
|
<td>2025-12-12</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2021-26828">CVE-2021-26828</a></td>
|
|
<td>OpenPLC</td>
|
|
<td>ScadaBR</td>
|
|
<td>0.000</td>
|
|
<td> 0th</td>
|
|
<td>2025-12-03</td>
|
|
<td>2025-12-24</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2025-48572">CVE-2025-48572</a></td>
|
|
<td>Android</td>
|
|
<td>Framework</td>
|
|
<td>0.000</td>
|
|
<td> 0th</td>
|
|
<td>2025-12-02</td>
|
|
<td>2025-12-23</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2025-48633">CVE-2025-48633</a></td>
|
|
<td>Android</td>
|
|
<td>Framework</td>
|
|
<td>0.000</td>
|
|
<td> 0th</td>
|
|
<td>2025-12-02</td>
|
|
<td>2025-12-23</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2021-26829">CVE-2021-26829</a></td>
|
|
<td>OpenPLC</td>
|
|
<td>ScadaBR</td>
|
|
<td>0.000</td>
|
|
<td> 0th</td>
|
|
<td>2025-11-28</td>
|
|
<td>2025-12-19</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2025-61757">CVE-2025-61757</a></td>
|
|
<td>Oracle</td>
|
|
<td>Fusion Middleware</td>
|
|
<td>0.000</td>
|
|
<td> 0th</td>
|
|
<td>2025-11-21</td>
|
|
<td>2025-12-12</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2025-13223">CVE-2025-13223</a></td>
|
|
<td>Google</td>
|
|
<td>Chromium V8</td>
|
|
<td>0.000</td>
|
|
<td> 0th</td>
|
|
<td>2025-11-19</td>
|
|
<td>2025-12-10</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2025-58034">CVE-2025-58034</a></td>
|
|
<td>Fortinet</td>
|
|
<td>FortiWeb</td>
|
|
<td>0.000</td>
|
|
<td> 0th</td>
|
|
<td>2025-11-18</td>
|
|
<td>2025-11-25</td>
|
|
</tr>
|
|
</tbody>
|
|
</table>
|
|
</div>
|
|
</section>
|
|
|
|
<section class="section">
|
|
<div class="section-header">
|
|
<h1>High EPSS not in KEV</h1>
|
|
<span class="muted">Sorted by score</span>
|
|
</div>
|
|
<div class="table-wrap">
|
|
<table data-require-poc data-require-desc>
|
|
<thead><tr><th>CVE</th><th>EPSS</th><th>Percentile</th><th>PoCs</th><th>Summary</th></tr></thead>
|
|
<tbody>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2025-9316">CVE-2025-9316</a></td>
|
|
<td>0.787</td>
|
|
<td>99th</td>
|
|
<td>0</td>
|
|
<td class="mono">No public description yet.</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2025-8943">CVE-2025-8943</a></td>
|
|
<td>0.658</td>
|
|
<td>98th</td>
|
|
<td>1</td>
|
|
<td class="mono">The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks ro...</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2025-8489">CVE-2025-8489</a></td>
|
|
<td>0.433</td>
|
|
<td>97th</td>
|
|
<td>0</td>
|
|
<td class="mono">No public description yet.</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2025-8426">CVE-2025-8426</a></td>
|
|
<td>0.394</td>
|
|
<td>97th</td>
|
|
<td>0</td>
|
|
<td class="mono">No public description yet.</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2025-8518">CVE-2025-8518</a></td>
|
|
<td>0.339</td>
|
|
<td>97th</td>
|
|
<td>1</td>
|
|
<td class="mono">A vulnerability was found in givanz Vvveb 1.0.5. It has been rated as critical. Affected by this issue is the function Save of the file admin/controller/editor/code.php of the component Code Editor. The manipulation l...</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2025-8868">CVE-2025-8868</a></td>
|
|
<td>0.171</td>
|
|
<td>95th</td>
|
|
<td>0</td>
|
|
<td class="mono">No public description yet.</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2025-8730">CVE-2025-8730</a></td>
|
|
<td>0.119</td>
|
|
<td>93th</td>
|
|
<td>2</td>
|
|
<td class="mono">A vulnerability was found in Belkin F9K1009 and F9K1010 2.00.04/2.00.09 and classified as critical. Affected by this issue is some unknown functionality of the component Web Interface. The manipulation leads to hard-c...</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2025-7795">CVE-2025-7795</a></td>
|
|
<td>0.096</td>
|
|
<td>93th</td>
|
|
<td>3</td>
|
|
<td class="mono">A vulnerability, which was classified as critical, has been found in Tenda FH451 1.0.0.9. Affected by this issue is the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument pa...</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2025-9090">CVE-2025-9090</a></td>
|
|
<td>0.083</td>
|
|
<td>92th</td>
|
|
<td>4</td>
|
|
<td class="mono">A vulnerability was identified in Tenda AC20 16.03.08.12. Affected is the function websFormDefine of the file /goform/telnet of the component Telnet Service. The manipulation leads to command injection. It is possible...</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="cve-cell"><a href="/cve/?id=CVE-2025-8085">CVE-2025-8085</a></td>
|
|
<td>0.078</td>
|
|
<td>92th</td>
|
|
<td>1</td>
|
|
<td class="mono">The Ditty WordPress plugin before 3.1.58 lacks authorization and authentication for requests to its displayItems endpoint, allowing unauthenticated visitors to make requests to arbitrary URLs.</td>
|
|
</tr>
|
|
</tbody>
|
|
</table>
|
|
</div>
|
|
</section>
|
|
|
|
</main>
|
|
<footer class="site-footer">
|
|
<div class="wrap">
|
|
<span>Fast CVE triage without the noise.</span>
|
|
<span><a href="https://github.com/0xMarcio/cve">GitHub repo</a></span>
|
|
</div>
|
|
</footer>
|
|
<script src="/logic.js"></script>
|
|
</body>
|
|
</html>
|