Common Vulnerabilities and Exposures (CVE)
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. The United States’ National Cybersecurity FFRDC, operated by The Mitre Corporation, maintains the system, with funding from the US National Cyber Security Division of the US Department of Homeland Security
Here are 27 public repositories matching this topic...
This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
-
Updated
Mar 6, 2025 - C++
PoC demonstrating the use of cve-2020-1034 for privilege escalation
-
Updated
Mar 16, 2021 - C++
Analysis of the vulnerability
-
Updated
Jan 23, 2024 - C++
A POC of CVE-2022-30206
-
Updated
Sep 26, 2022 - C++
CVE-2025-8088 exploit C++ impl
-
Updated
Sep 25, 2025 - C++
-
Updated
Nov 29, 2021 - C++
Denial-of-Service PoC | Writeup | Header with CLFS structures | Imhex pattern for .blf extension
-
Updated
Jan 10, 2024 - C++
CVE-2018-15473 - Opensshenum is an user enumerator exploiting an OpenSsh bug
-
Updated
Oct 17, 2018 - C++
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
-
Updated
Apr 30, 2026 - C++
A modular C++ tool to aggregate security-related feeds (CVE, KEV, GitHub Advisories, Hacker News) into a unified view. Configurable via JSON; built with modern C++ (C++17), libcurl, and nlohmann/json
-
Updated
Oct 13, 2025 - C++
STRONGEST RAAS EVER
-
Updated
Apr 26, 2025 - C++
CVE 2020-1034 exploit and presentation
-
Updated
Jun 16, 2022 - C++
-
Updated
Jul 30, 2024 - C++
PoC for Mirth Connect Remote Code Execution (RCE)
-
Updated
Mar 1, 2026 - C++
- Followers
- 152 followers
- Website
- github.com/topics/cve
- Wikipedia
- Wikipedia