Search for vulnerabilites in software or hardware and grab actionable CVE information.
-
Updated
Aug 6, 2023 - PowerShell
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. The United States' National Cybersecurity FFRDC, operated by The Mitre Corporation, maintains the system, with funding from the US National Cyber Security Division of the US Department of Homeland Security
Search for vulnerabilites in software or hardware and grab actionable CVE information.
Python based script, that shows latest 30 CVEs from Circl.lu
Security research reports
GUI to scrape CVEs from a URL and formats them to be put into Tenable
Text4Shell Vulnerability Scanner for Windows
Proof of Concept about a XSS Stored in SCM Manager 1.2 <= 1.60
Explore CVE-2023-33580 (XSS) & CVE-2023-33584 (SQLI) discovered by me. Dive into vulnerabilities and exploits for insights.
CVE-2020-12641: Command Injection via “_im_convert_path” Parameter in Roundcube Webmail
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
Ensimag 3A - Exploit on CVE 2020-7247
NeonShield is a web application designed to fetch and display New CVE (Common Vulnerabilities and Exposures) data from a public API.
CVE-2020-8250: Privilege Escalation via Command Injection in Pulse Secure VPN Linux Client