Common Vulnerabilities and Exposures (CVE)
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. The United States’ National Cybersecurity FFRDC, operated by The Mitre Corporation, maintains the system, with funding from the US National Cyber Security Division of the US Department of Homeland Security
Here are 26 public repositories matching this topic...
PoC demonstrating the use of cve-2020-1034 for privilege escalation
-
Updated
Mar 16, 2021 - C++
This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
-
Updated
Mar 6, 2025 - C++
Analysis of the vulnerability
-
Updated
Jan 23, 2024 - C++
-
Updated
Nov 29, 2021 - C++
This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
-
Updated
Nov 12, 2025 - C++
Denial-of-Service PoC | Writeup | Header with CLFS structures | Imhex pattern for .blf extension
-
Updated
Jan 10, 2024 - C++
STRONGEST RAAS EVER
-
Updated
Apr 26, 2025 - C++
A POC of CVE-2022-30206
-
Updated
Sep 26, 2022 - C++
CVE-2025-8088 exploit C++ impl
-
Updated
Sep 25, 2025 - C++
Tools for get offsets and adding patch for support i386
-
Updated
Mar 28, 2022 - C++
A modular C++ tool to aggregate security-related feeds (CVE, KEV, GitHub Advisories, Hacker News) into a unified view. Configurable via JSON; built with modern C++ (C++17), libcurl, and nlohmann/json
-
Updated
Oct 13, 2025 - C++
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
-
Updated
Nov 12, 2025 - C++
CVE-2018-15473 - Opensshenum is an user enumerator exploiting an OpenSsh bug
-
Updated
Oct 17, 2018 - C++
- Followers
- 145 followers
- Website
- github.com/topics/cve
- Wikipedia
- Wikipedia