Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
May 27, 2024, 8:25 a.m.
CVE-2024-4367 mitigation for Odoo 14.0
odoo14
Python JavaScript CSS HTML
Updated: 4 months ago0 stars 0 fork 0 watcherBorn at : May 23, 2024, 7:34 a.m. This repo has been linked 1 different CVEs too. -
July 3, 2024, 2:20 p.m.
Nexus Repository Manager 3 Unauthenticated Path Traversal
Updated: 2 months, 3 weeks ago1 stars 2 fork 2 watcherBorn at : May 23, 2024, 6:47 a.m. This repo has been linked 1 different CVEs too. -
May 23, 2024, 6:54 a.m.
PoC Exploit for CVE-2024-32002
Shell
Updated: 4 months ago0 stars 0 fork 0 watcherBorn at : May 23, 2024, 6:38 a.m. This repo has been linked 1 different CVEs too. -
May 23, 2024, 6:55 a.m.
PoC Exploit for CVE-2024-32002
Updated: 4 months ago0 stars 0 fork 0 watcherBorn at : May 23, 2024, 6:38 a.m. This repo has been linked 1 different CVEs too. -
May 26, 2024, 10:46 p.m.
None
Updated: 4 months ago0 stars 0 fork 0 watcherBorn at : May 23, 2024, 4:28 a.m. This repo has been linked 1 different CVEs too. -
May 23, 2024, 5:05 a.m.
None
Updated: 4 months ago2 stars 0 fork 0 watcherBorn at : May 23, 2024, 4:25 a.m. This repo has been linked 1 different CVEs too. -
Aug. 5, 2024, 5:08 a.m.
CVE-2024-3495 Country State City Dropdown CF7 <= 2.7.2 - Unauthenticated SQL Injection
Python
Updated: 1 month, 3 weeks ago8 stars 0 fork 0 watcherBorn at : May 23, 2024, 2:41 a.m. This repo has been linked 1 different CVEs too. -
June 27, 2024, 3:54 p.m.
This vulnerability allows an unauthenticated attacker to remotely execute arbitrary code on a vulnerable Confluence server. The vulnerability exists due to an improper validation of user-supplied input in the Confluence REST API. This allows an attacker to inject malicious code into the Confluence server, which can then be executed by the server
Updated: 3 months ago1 stars 9 fork 9 watcherBorn at : May 23, 2024, 2:10 a.m. This repo has been linked 1 different CVEs too. -
May 23, 2024, 2:02 a.m.
Ethical Hacking
Updated: 4 months ago0 stars 0 fork 0 watcherBorn at : May 23, 2024, 1:46 a.m. This repo has been linked 4 different CVEs too. -
May 23, 2024, 5:10 p.m.
None
Nix
Updated: 4 months ago0 stars 0 fork 0 watcherBorn at : May 23, 2024, 12:14 a.m. This repo has been linked 1 different CVEs too.