Initial Access Intelligence

The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.

  • May 27, 2024, 8:25 a.m.

    CVE-2024-4367 mitigation for Odoo 14.0

    odoo14

    Python JavaScript CSS HTML

    Updated: 4 months ago
    0 stars 0 fork 0 watcher
    Born at : May 23, 2024, 7:34 a.m. This repo has been linked 1 different CVEs too.
  • July 3, 2024, 2:20 p.m.

    Nexus Repository Manager 3 Unauthenticated Path Traversal

    Updated: 2 months, 3 weeks ago
    1 stars 2 fork 2 watcher
    Born at : May 23, 2024, 6:47 a.m. This repo has been linked 1 different CVEs too.
  • May 23, 2024, 6:54 a.m.

    PoC Exploit for CVE-2024-32002

    Shell

    Updated: 4 months ago
    0 stars 0 fork 0 watcher
    Born at : May 23, 2024, 6:38 a.m. This repo has been linked 1 different CVEs too.
  • May 23, 2024, 6:55 a.m.

    PoC Exploit for CVE-2024-32002

    Updated: 4 months ago
    0 stars 0 fork 0 watcher
    Born at : May 23, 2024, 6:38 a.m. This repo has been linked 1 different CVEs too.
  • May 26, 2024, 10:46 p.m.

    None

    Updated: 4 months ago
    0 stars 0 fork 0 watcher
    Born at : May 23, 2024, 4:28 a.m. This repo has been linked 1 different CVEs too.
  • May 23, 2024, 5:05 a.m.

    None

    Updated: 4 months ago
    2 stars 0 fork 0 watcher
    Born at : May 23, 2024, 4:25 a.m. This repo has been linked 1 different CVEs too.
  • Aug. 5, 2024, 5:08 a.m.

    CVE-2024-3495 Country State City Dropdown CF7 <= 2.7.2 - Unauthenticated SQL Injection

    Python

    Updated: 1 month, 3 weeks ago
    8 stars 0 fork 0 watcher
    Born at : May 23, 2024, 2:41 a.m. This repo has been linked 1 different CVEs too.
  • June 27, 2024, 3:54 p.m.

    This vulnerability allows an unauthenticated attacker to remotely execute arbitrary code on a vulnerable Confluence server. The vulnerability exists due to an improper validation of user-supplied input in the Confluence REST API. This allows an attacker to inject malicious code into the Confluence server, which can then be executed by the server

    Updated: 3 months ago
    1 stars 9 fork 9 watcher
    Born at : May 23, 2024, 2:10 a.m. This repo has been linked 1 different CVEs too.
  • May 23, 2024, 2:02 a.m.

    Ethical Hacking

    Updated: 4 months ago
    0 stars 0 fork 0 watcher
    Born at : May 23, 2024, 1:46 a.m. This repo has been linked 4 different CVEs too.
  • May 23, 2024, 5:10 p.m.

    None

    Nix

    Updated: 4 months ago
    0 stars 0 fork 0 watcher
    Born at : May 23, 2024, 12:14 a.m. This repo has been linked 1 different CVEs too.
Showing 10 of 37392 Results

Filters