Common Vulnerabilities and Exposures (CVE)
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. The United States’ National Cybersecurity FFRDC, operated by The Mitre Corporation, maintains the system, with funding from the US National Cyber Security Division of the US Department of Homeland Security
Here are 72 public repositories matching this topic...
Text4Shell Vulnerability Scanner for Windows
-
Updated
Jun 19, 2025 - C
PoC Code for CVE-2018-18714 (exploit by stack overflow)
-
Updated
Nov 9, 2018 - C
Vulnerable samba versions and exploits, wrapped in docker containers
-
Updated
Mar 15, 2021 - C
Kernel exploits consisting mostly of privilege escalation attacks against core components of Linux distribtions
-
Updated
Jun 22, 2024 - C
Exploit for CVE-2022-2588 by [Markakd](https://github.com/Markakd)
-
Updated
Sep 24, 2022 - C
A repository containing all of the exploits I discovered and/or wrote (or sometimes neither).
-
Updated
Aug 19, 2025 - C
is a PoC exploit for the macOS vulnerability CVE-2023-40404. This PoC leverages IOKit APIs to interact with the IOUserEthernetResource network service, manipulating the system's network interfaces
-
Updated
Sep 30, 2024 - C
peiwithhao's learning journey in network/system security
-
Updated
Nov 4, 2025 - C
Track and explore function-level CVE patch changes across multiple programming languages.
-
Updated
Aug 24, 2025 - C
Meltdown & Spectre - catastrophic vulnerabilities - exploited 🛡️
-
Updated
Jul 30, 2020 - C
This repository contains a C program to test for CVE-2024-2961, a buffer overflow vulnerability in the iconv() function of glibc.
-
Updated
Jun 4, 2024 - C
This repository contains PoC exploits we developed for internal research or red team exercises.
-
Updated
Nov 28, 2024 - C
- Followers
- 145 followers
- Website
- github.com/topics/cve
- Wikipedia
- Wikipedia