URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
-
Updated
May 16, 2024 - C#
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. The United States' National Cybersecurity FFRDC, operated by The Mitre Corporation, maintains the system, with funding from the US National Cyber Security Division of the US Department of Homeland Security
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
Gather and update all available and newest CVEs with their PoC.
Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds
Github action for monitoring CVE
聚合Github上已有的Poc或者Exp,CVE信息来自CVE官网。Auto Collect Poc Or Exp from Github by CVE ID.
CVE-2024-32640 | Automated SQLi PoC
Use this bot to monitor new CVEs containing defined keywords and send alerts to Slack, Telegram, Discord, PushOver and/or MS Teams.
The Common Vulnerabilities Exposures (CVE) Database
💎 RapidFort hardened secure images
All published CVE and their recent changes, ready to be used by humans and machines
📡 PoC auto collect from GitHub.
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution