Search for vulnerabilites in software or hardware and grab actionable CVE information.
-
Updated
Aug 6, 2023 - PowerShell
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. The United States' National Cybersecurity FFRDC, operated by The Mitre Corporation, maintains the system, with funding from the US National Cyber Security Division of the US Department of Homeland Security
Search for vulnerabilites in software or hardware and grab actionable CVE information.
Ensimag 3A - Exploit on CVE 2020-7247
NeonShield is a web application designed to fetch and display New CVE (Common Vulnerabilities and Exposures) data from a public API.
CVE-2020-8250: Privilege Escalation via Command Injection in Pulse Secure VPN Linux Client
CVE-2022-20818: Local Privilege Escalation via Partial File Read in Cisco SD-WAN
A network service vulnerability scanner (NSVS) for my AQA Computer Science A-level NEA using the USA's national vulnerability database (NVD).
Unquoted Service Path exploit in FortiClient (CVE-2019-17658)
BI T3434 Project on data mining CVEs and Exploits
Sample phase one audit of a flattened smart contract file for a Token Exchange. The report is generated with the combination of manually testing the contract in a local environment, as well as using automated tools, which in this case includes MythX and Slither.
An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.
CVE-2021-46364: YAML Deserialization in Magnolia CMS