Common Vulnerabilities and Exposures (CVE)
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. The United States’ National Cybersecurity FFRDC, operated by The Mitre Corporation, maintains the system, with funding from the US National Cyber Security Division of the US Department of Homeland Security
Here are 72 public repositories matching this topic...
By passing an overly large string when invoking nethack, it is possible to corrupt memory. jnethack and falconseye are also prone to this vulnerability.
-
Updated
Dec 16, 2022 - C
rewrited SSH Exploit for CVE-2024-6387 (regreSSHion)
-
Updated
Jul 4, 2024 - C
Exploit for CVE-2022-2588 by [Markakd](https://github.com/Markakd)
-
Updated
Sep 24, 2022 - C
Track and explore function-level CVE patch changes across multiple programming languages.
-
Updated
Aug 24, 2025 - C
Meltdown & Spectre - catastrophic vulnerabilities - exploited 🛡️
-
Updated
Jul 30, 2020 - C
This repository contains a C program to test for CVE-2024-2961, a buffer overflow vulnerability in the iconv() function of glibc.
-
Updated
Jun 4, 2024 - C
This repository contains PoC exploits we developed for internal research or red team exercises.
-
Updated
Nov 28, 2024 - C
Text4Shell Vulnerability Scanner for Windows
-
Updated
Jun 19, 2025 - C
Vulnerable samba versions and exploits, wrapped in docker containers
-
Updated
Mar 15, 2021 - C
Exploit for CVE-2019-17662 (ThinVNC 1.0b1)
-
Updated
Oct 2, 2021 - C
A repository containing all of the exploits I discovered and/or wrote (or sometimes neither).
-
Updated
Aug 19, 2025 - C
- Followers
- 145 followers
- Website
- github.com/topics/cve
- Wikipedia
- Wikipedia