Common Vulnerabilities and Exposures (CVE)
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. The United States' National Cybersecurity FFRDC, operated by The Mitre Corporation, maintains the system, with funding from the US National Cyber Security Division of the US Department of Homeland Security
Here are 1,112 public repositories matching this topic...
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
-
Updated
Jun 12, 2024 - C++
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
-
Updated
Jun 12, 2024 - C++
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
-
Updated
Jun 12, 2024 - C++
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
-
Updated
Jun 12, 2024 - C#
The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
-
Updated
Jun 12, 2024 - C#
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
-
Updated
Jun 12, 2024 - C#
All published CVE and their recent changes, ready to be used by humans and machines
-
Updated
Jun 12, 2024
聚合Github上已有的Poc或者Exp,CVE信息来自CVE官网。Auto Collect Poc Or Exp from Github by CVE ID.
-
Updated
Jun 12, 2024 - Python
Hourly updated database of exploit and exploitation reports
-
Updated
Jun 12, 2024 - Python
Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds
-
Updated
Jun 12, 2024
The Common Vulnerabilities Exposures (CVE) Database
-
Updated
Jun 12, 2024
A web security gateway, serve as a reverse proxy to protect your websites from attacks and exploits.
-
Updated
Jun 12, 2024 - TypeScript
CERT/CC's fork of Metasploit Framework in which we are tagging commits that include vulnerability IDs. The first commit for an ID we recognize gets the tag for that ID. Aside from adding git tags, we do not otherwise modify the code. Updates hourly.
-
Updated
Jun 12, 2024 - Ruby
Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time threat information, gain a competitive advantage, and stay informed about the latest trends.
-
Updated
Jun 12, 2024 - Python
📡 PoC auto collect from GitHub.
-
Updated
Jun 12, 2024
- Followers
- 114 followers
- Wikipedia
- Wikipedia