Hello, thank you very much for your work. I noticed that CVE searchploit retrieved via git the entire exploit db repo. On the other hand, unless I am mistaken, all the exploits are therefore loaded on the machine, which would allow an authenticated attacker to execute all the exploits from the machine… I think that the data should be deleted each time and only the CVE <-> EBID match
Hello, thank you very much for your work. I noticed that CVE searchploit retrieved via git the entire exploit db repo. On the other hand, unless I am mistaken, all the exploits are therefore loaded on the machine, which would allow an authenticated attacker to execute all the exploits from the machine… I think that the data should be deleted each time and only the CVE <-> EBID match