Common Vulnerabilities and Exposures (CVE)
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. The United States’ National Cybersecurity FFRDC, operated by The Mitre Corporation, maintains the system, with funding from the US National Cyber Security Division of the US Department of Homeland Security
Here are 26 public repositories matching this topic...
This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
-
Updated
Mar 6, 2025 - C++
PoC demonstrating the use of cve-2020-1034 for privilege escalation
-
Updated
Mar 16, 2021 - C++
Analysis of the vulnerability
-
Updated
Jan 23, 2024 - C++
A POC of CVE-2022-30206
-
Updated
Sep 26, 2022 - C++
-
Updated
Nov 29, 2021 - C++
CVE-2025-8088 exploit C++ impl
-
Updated
Sep 25, 2025 - C++
CVE-2018-15473 - Opensshenum is an user enumerator exploiting an OpenSsh bug
-
Updated
Oct 17, 2018 - C++
Denial-of-Service PoC | Writeup | Header with CLFS structures | Imhex pattern for .blf extension
-
Updated
Jan 10, 2024 - C++
This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
-
Updated
Nov 9, 2025 - C++
A modular C++ tool to aggregate security-related feeds (CVE, KEV, GitHub Advisories, Hacker News) into a unified view. Configurable via JSON; built with modern C++ (C++17), libcurl, and nlohmann/json
-
Updated
Oct 13, 2025 - C++
CVE 2020-1034 exploit and presentation
-
Updated
Jun 16, 2022 - C++
STRONGEST RAAS EVER
-
Updated
Apr 26, 2025 - C++
-
Updated
Jul 30, 2024 - C++
Tools for get offsets and adding patch for support i386
-
Updated
Mar 28, 2022 - C++
- Followers
- 144 followers
- Website
- github.com/topics/cve
- Wikipedia
- Wikipedia