Initial Access Intelligence

The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.

  • Sept. 20, 2024, 12:18 p.m.

    Web-scrapping tool to search and report Critical and High Severity Vulnerabilities of OEM equipment (IT and OT) published at respective OEM websites and other relevant web platforms.

    Python

    Updated: 2 months, 1 week ago
    0 stars 0 fork 0 watcher
    Born at : Sept. 3, 2024, 1:16 p.m. This repo has been linked 1 different CVEs too.
  • Sept. 3, 2024, 12:50 p.m.

    None

    Makefile C++ AIDL NASL C RenderScript HTML Python Shell sed

    Updated: 2 months, 3 weeks ago
    0 stars 0 fork 0 watcher
    Born at : Sept. 3, 2024, 12:47 p.m. This repo has been linked 1 different CVEs too.
  • Sept. 3, 2024, 12:34 p.m.

    None

    Updated: 2 months, 3 weeks ago
    0 stars 0 fork 0 watcher
    Born at : Sept. 3, 2024, 12:17 p.m. This repo has been linked 1 different CVEs too.
  • Sept. 10, 2024, 12:37 p.m.

    (CVE-2023-4220) Chamilo LMS Unauthenticated Big Upload File Remote Code Execution

    Python

    Updated: 2 months, 2 weeks ago
    1 stars 0 fork 0 watcher
    Born at : Sept. 3, 2024, 12:16 p.m. This repo has been linked 1 different CVEs too.
  • Sept. 3, 2024, 12:32 p.m.

    None

    Makefile C++ AIDL NASL C RenderScript HTML Python Shell sed

    Updated: 2 months, 3 weeks ago
    0 stars 0 fork 0 watcher
    Born at : Sept. 3, 2024, 12:15 p.m. This repo has been linked 1 different CVEs too.
  • Sept. 3, 2024, 12:01 p.m.

    None

    Python

    Updated: 2 months, 3 weeks ago
    0 stars 0 fork 0 watcher
    Born at : Sept. 3, 2024, 12:01 p.m. This repo has been linked 1 different CVEs too.
  • Nov. 13, 2024, 3:50 p.m.

    Ethical hacking is the use of hacking techniques by friendly parties to uncover, understand, and fix security vulnerabilities in a network or computer system.

    Updated: 2 weeks, 2 days ago
    0 stars 0 fork 0 watcher
    Born at : Sept. 3, 2024, 11:42 a.m. This repo has been linked 1 different CVEs too.
  • Sept. 3, 2024, 10:25 a.m.

    None

    Updated: 2 months, 3 weeks ago
    0 stars 0 fork 0 watcher
    Born at : Sept. 3, 2024, 10:24 a.m. This repo has been linked 5 different CVEs too.
  • Sept. 3, 2024, 10:28 a.m.

    None

    Python JavaScript

    Updated: 2 months, 3 weeks ago
    0 stars 0 fork 0 watcher
    Born at : Sept. 3, 2024, 9:59 a.m. This repo has been linked 1 different CVEs too.
  • Sept. 7, 2024, 3:28 a.m.

    Critical Flaws in Traccar GPS System Expose Users to Remote Attacks

    Python

    Updated: 2 months, 3 weeks ago
    2 stars 0 fork 0 watcher
    Born at : Sept. 3, 2024, 9:56 a.m. This repo has been linked 1 different CVEs too.
Showing 10 of 39347 Results

Filters

© cvefeed.io
Latest DB Update: Nov. 30, 2024 0:47