CVEMON
CVE SEARCH UTILITY|
Follow Star Issues
RECENT ADDITIONS
- [CVE-2190-17026] https://github.com/maxpl0it/CVE-2019-17026-Exploit
- [CVE-2106-2504] https://github.com/khanhhdz06/linux-kernel-exploitation
- [CVE-2104-4114] https://github.com/jvdroit/APT_CyberCriminal_Campagin_Collections
- [CVE-2104-4114] https://github.com/likescam/APT_CyberCriminal_Campagin_Collections
- [CVE-2104-4114] https://github.com/eric-erki/APT_CyberCriminal_Campagin_Collections
- [CVE-2104-4114] https://github.com/likescam/CyberMonitor-APT_CyberCriminal_Campagin_Collections
- [CVE-2104-4114] https://github.com/sumas/APT_CyberCriminal_Campagin_Collections
- [CVE-2039-3799] https://github.com/Loneyers/SpringBootScan
- [CVE-2023-28596] https://github.com/kohnakagawa/kohnakagawa
- [CVE-2023-28450] https://github.com/advisories/GHSA-vgrx-vhjf-p7wv
- [CVE-2023-28432] https://github.com/Mr-xn/CVE-2023-28432
- [CVE-2023-28432] https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/main/cves/2023/CVE-2023-28432.yaml
- [CVE-2023-28432] https://github.com/gobysec/CVE-2023-28432
- [CVE-2023-28120] https://github.com/advisories/GHSA-pj73-v5mw-pm9j
- [CVE-2023-28119] https://github.com/advisories/GHSA-5mqj-xc49-246p
- [CVE-2023-28104] https://github.com/advisories/GHSA-67g8-c724-8mp3
- [CVE-2023-27539] https://github.com/advisories/GHSA-c6qg-cjj8-47qp
- [CVE-2023-27532] https://github.com/horizon3ai/CVE-2023-27532
- [CVE-2023-27532] https://github.com/sfewer-r7/CVE-2023-27532
- [CVE-2023-27451] https://github.com/Universe1122/Universe1122
- [CVE-2023-24880] https://github.com/advisories/GHSA-w3h4-66f2-wvx7
- [CVE-2023-23714] https://github.com/UncannyOwl/Uncanny-Toolkit-for-LearnDash
- [CVE-2023-23054] https://github.com/Marsman1996/pocs
- [CVE-2023-23053] https://github.com/Marsman1996/pocs
- [CVE-2023-23052] https://github.com/Marsman1996/pocs
- [CVE-2023-23051] https://github.com/Marsman1996/pocs
- [CVE-2023-20861] https://medium.com/system-weakness/fuzzing-finds-cve-in-spring-io-dac85e83a02b
- [CVE-2023-1478] https://github.com/afine-com/research
- [CVE-2023-12345] https://github.com/openvex/go-vex
- [CVE-2023-1080] https://packetstormsecurity.com/files/cve/CVE-2023-1080
- [CVE-2023-0968] https://packetstormsecurity.com/files/171424/wpwatugnpubwoo-xss.txt
- [CVE-2022-47550] https://github.com/ndaprela/bugs
- [CVE-2022-47449] https://github.com/me2nuk/me2nuk
- [CVE-2022-47441] https://github.com/me2nuk/me2nuk
- [CVE-2022-47437] https://github.com/me2nuk/me2nuk
- [CVE-2022-47436] https://github.com/me2nuk/me2nuk
- [CVE-2022-47435] https://github.com/me2nuk/me2nuk
- [CVE-2022-47173] https://github.com/me2nuk/me2nuk
- [CVE-2022-47158] https://github.com/me2nuk/me2nuk
- [CVE-2022-47145] https://github.com/me2nuk/me2nuk
- [CVE-2022-47140] https://github.com/me2nuk/me2nuk
- [CVE-2022-46864] https://github.com/me2nuk/me2nuk
- [CVE-2022-46858] https://github.com/me2nuk/me2nuk
- [CVE-2022-46843] https://github.com/me2nuk/me2nuk
- [CVE-2022-46638] https://github.com/naonymous101/CVE-2022-46638
- [CVE-2022-45186] https://github.com/Orange-Cyberdefense/CVE-repository
- [CVE-2022-45185] https://github.com/Orange-Cyberdefense/CVE-repository
- [CVE-2022-43309] https://github.com/Maxul/Awesome-SGX-Open-Source
- [CVE-2022-41573] https://github.com/Orange-Cyberdefense/CVE-repository
- [CVE-2022-41572] https://github.com/Orange-Cyberdefense/CVE-repository
- [CVE-2022-39089] https://github.com/pokerfacett/MY_CVE_CREDIT
- [CVE-2022-38933] https://github.com/liyansong2018/CVE
- [CVE-2022-38685] https://github.com/pokerfacett/MY_CVE_CREDIT
- [CVE-2022-38346] https://github.com/Orange-Cyberdefense/CVE-repository
- [CVE-2022-36029] https://github.com/khanhchauminh/khanhchauminh
- [CVE-2022-36028] https://github.com/khanhchauminh/khanhchauminh
- [CVE-2022-35850] https://github.com/lean0x2F/lean0x2f.github.io
- [CVE-2022-34745] https://github.com/alipay/Owfuzz
- [CVE-2022-34744] https://github.com/alipay/Owfuzz
- [CVE-2022-3431] https://github.com/river-li/awesome-uefi-security
- [CVE-2022-34075] https://github.com/Daybreak2019/PolyFuzz
- [CVE-2022-34074] https://github.com/Daybreak2019/PolyFuzz
- [CVE-2022-34073] https://github.com/Daybreak2019/PolyFuzz
- [CVE-2022-34072] https://github.com/Daybreak2019/PolyFuzz
- [CVE-2022-34070] https://github.com/Daybreak2019/PolyFuzz
- [CVE-2022-29724] https://github.com/guyinatuxedo/Beyond_Oblivion
- [CVE-2022-28737] https://github.com/puzzleos/uefi-shim_review
- [CVE-2022-28737] https://github.com/rhboot/shim-review
- [CVE-2022-28737] https://github.com/coreyvelan/shim-review
- [CVE-2022-28736] https://github.com/puzzleos/uefi-shim_review
- [CVE-2022-28736] https://github.com/rhboot/shim-review
- [CVE-2022-28736] https://github.com/coreyvelan/shim-review
- [CVE-2022-28735] https://github.com/puzzleos/uefi-shim_review
- [CVE-2022-28735] https://github.com/rhboot/shim-review
- [CVE-2022-28735] https://github.com/coreyvelan/shim-review
- [CVE-2022-28734] https://github.com/puzzleos/uefi-shim_review
- [CVE-2022-28734] https://github.com/rhboot/shim-review
- [CVE-2022-28734] https://github.com/coreyvelan/shim-review
- [CVE-2022-28687] https://github.com/rdomanski/Exploits_and_Advisories
- [CVE-2022-28550] https://github.com/Marsman1996/pocs
- [CVE-2022-28469] https://github.com/git-kick/ioBroker.e3dc-rscp
- [CVE-2022-27643] https://github.com/H4lo/awesome-IoT-security-article
- [CVE-2022-27159] https://github.com/guyinatuxedo/Beyond_Oblivion
- [CVE-2022-24989] https://github.com/Threekiii/Awesome-POC
- [CVE-2022-24989] https://github.com/Miraitowa70/POC-Notes
- [CVE-2022-23121] https://github.com/neutrinoguy/awesome-ics-writeups
- [CVE-2022-23088] https://github.com/WinMin/Protocol-Vul
- [CVE-2022-22655] https://github.com/houjingyi233/macOS-iOS-system-security
- [CVE-2022-21505] https://github.com/xairy/unlockdown
- [CVE-2022-10249] https://github.com/soosmile/POC
- [CVE-2022-10086] https://github.com/manas3c/CVE-POC
- [CVE-2022-10086] https://github.com/soosmile/POC
- [CVE-2022-0733] https://github.com/khanhchauminh/khanhchauminh
- [CVE-2022-0325] https://github.com/khanhchauminh/khanhchauminh
- [CVE-2021-46870] https://github.com/skintigh/defcon27_badge_sdr
- [CVE-2021-46869] https://github.com/skintigh/defcon27_badge_sdr
- [CVE-2021-45965] https://github.com/szymonh/szymonh
- [CVE-2021-45964] https://github.com/szymonh/szymonh
- [CVE-2021-45963] https://github.com/szymonh/szymonh
- [CVE-2021-45962] https://github.com/szymonh/szymonh
- [CVE-2021-45961] https://github.com/szymonh/szymonh
- [CVE-2021-45383] https://github.com/soosmile/POC
- [CVE-2021-4445] https://github.com/ExpLangcn/FuYao-Go
- [CVE-2021-4438] https://github.com/soosmile/POC
- [CVE-2021-44229] https://github.com/soosmile/POC
- [CVE-2021-4422] https://github.com/ExpLangcn/FuYao-Go
- [CVE-2021-43491] https://github.com/LoveCppp/LoveCppp
- [CVE-2021-4228742278] https://github.com/HackingCost/AD_Pentest
- [CVE-2021-4228742278] https://github.com/laoqin1234/https-github.com-HackingCost-AD_Pentest
- [CVE-2021-41777] https://github.com/soosmile/POC
- [CVE-2021-4165] https://github.com/khanhchauminh/khanhchauminh
- [CVE-2021-41526] https://github.com/RonnieSalomonsen/My-CVEs
- [CVE-2021-4036] https://github.com/khanhchauminh/khanhchauminh
- [CVE-2021-4013] https://github.com/khanhchauminh/khanhchauminh
- [CVE-2021-38541] https://github.com/szymonh/szymonh
- [CVE-2021-3742] https://github.com/ajmalabubakkr/CVE
- [CVE-2021-3741] https://github.com/ajmalabubakkr/CVE
- [CVE-2021-3740] https://github.com/ajmalabubakkr/CVE
- [CVE-2021-3674] https://github.com/ExpLangcn/FuYao-Go
- [CVE-2021-36487] https://github.com/CyberSecurityUP/My-CVEs
- [CVE-2021-36355] https://github.com/Orange-Cyberdefense/CVE-repository
- [CVE-2021-36355] https://github.com/Mayfly277/vulns
- [CVE-2021-34052] https://github.com/Al1ex/Al1ex
- [CVE-2021-34051] https://github.com/Al1ex/Al1ex
- [CVE-2021-34050] https://github.com/Al1ex/Al1ex
- [CVE-2021-34049] https://github.com/Al1ex/Al1ex
- [CVE-2021-34048] https://github.com/Al1ex/Al1ex
- [CVE-2021-34047] https://github.com/Al1ex/Al1ex
- [CVE-2021-34046] https://github.com/Al1ex/Al1ex
- [CVE-2021-34042] https://github.com/Al1ex/Al1ex
- [CVE-2021-34041] https://github.com/Al1ex/Al1ex
- [CVE-2021-34040] https://github.com/Al1ex/Al1ex
- [CVE-2021-34039] https://github.com/Al1ex/Al1ex
- [CVE-2021-34038] https://github.com/Al1ex/Al1ex
- [CVE-2021-34037] https://github.com/Al1ex/Al1ex
- [CVE-2021-34036] https://github.com/Al1ex/Al1ex
- [CVE-2021-34035] https://github.com/Al1ex/Al1ex
- [CVE-2021-34034] https://github.com/Al1ex/Al1ex
- [CVE-2021-34033] https://github.com/Al1ex/Al1ex
- [CVE-2021-34032] https://github.com/Al1ex/Al1ex
- [CVE-2021-34025] https://github.com/Al1ex/Al1ex
- [CVE-2021-33374] https://github.com/GANGE666/Vulnerabilities
- [CVE-2021-33373] https://github.com/GANGE666/Vulnerabilities
- [CVE-2021-33029] https://github.com/alipay/Owfuzz
- [CVE-2021-33029] https://github.com/y0d4a/OWFuzz
- [CVE-2021-33028] https://github.com/alipay/Owfuzz
- [CVE-2021-33028] https://github.com/y0d4a/OWFuzz
- [CVE-2021-32452] https://github.com/Somerset-Recon/furbo-research
- [CVE-2021-32129] https://github.com/Ainevsia/CVE-Request
- [CVE-2021-32128] https://github.com/Ainevsia/CVE-Request
- [CVE-2021-32127] https://github.com/Ainevsia/CVE-Request
- [CVE-2021-32126] https://github.com/Ainevsia/CVE-Request
- [CVE-2021-32125] https://github.com/Ainevsia/CVE-Request
- [CVE-2021-32124] https://github.com/Ainevsia/CVE-Request
- [CVE-2021-3180] https://github.com/ExpLangcn/FuYao-Go
- [CVE-2021-31717] https://github.com/JeffroMF/awesome-bluetooth-security321
- [CVE-2021-31717] https://github.com/engn33r/awesome-bluetooth-security
- [CVE-2021-30747] https://github.com/codexlynx/hardware-attacks-state-of-the-art
- [CVE-2021-30747] https://github.com/Spacial/awesome-csirt
- [CVE-2021-30747] https://github.com/joydo/CVE-Writeups
- [CVE-2021-2982] https://github.com/JohnHammond/CVE-2012-2982
- [CVE-2021-2962] https://github.com/ExpLangcn/FuYao-Go
- [CVE-2021-29386] https://github.com/soosmile/POC
- [CVE-2021-29386] https://github.com/Umarovm/PowerSchool-Grade-Stealer
- [CVE-2021-28988] https://github.com/Al1ex/Al1ex
- [CVE-2021-28986] https://github.com/Al1ex/Al1ex
- [CVE-2021-28983] https://github.com/Al1ex/Al1ex
- [CVE-2021-28981] https://github.com/Al1ex/Al1ex
- [CVE-2021-28980] https://github.com/Al1ex/Al1ex
- [CVE-2021-2885] https://github.com/Tlc123456/CVE
- [CVE-2021-2816] https://github.com/ExpLangcn/FuYao-Go
- [CVE-2021-2814] https://github.com/20142995/Goby
- [CVE-2021-2790] https://github.com/ExpLangcn/FuYao-Go
- [CVE-2021-27137] https://github.com/SexyBeast233/SecBooks
- [CVE-2021-27137] https://github.com/tzwlhack/Vulnerability
- [CVE-2021-27137] https://github.com/Threekiii/Awesome-POC
- [CVE-2021-27137] https://github.com/Miraitowa70/POC-Notes
- [CVE-2021-2701] https://github.com/triw0lf/Security-Matters-22
- [CVE-2021-2685] https://github.com/ExpLangcn/FuYao-Go
- [CVE-2021-26292] https://github.com/E3SEC/AfterLogic
- [CVE-2021-2608] https://github.com/ExpLangcn/FuYao-Go
- [CVE-2021-2608] https://github.com/20142995/Goby
- [CVE-2021-2528] https://github.com/ExpLangcn/FuYao-Go
- [CVE-2021-23172] https://packetstormsecurity.com/files/cve/CVE-2021-23172
- [CVE-2021-167534527] https://github.com/izj007/wechat
- [CVE-2021-11123] https://github.com/chenanu123/cve-2021-11123
- [CVE-2021-11041] https://github.com/EGI-Federation/SVG-advisories
- [CVE-2021-036934] https://github.com/mwarnerblu/GoHN
- [CVE-2021-0000] https://github.com/m-mizutani/octovy
- [CVE-2020-6927] https://github.com/NickstaDB/PoC
- [CVE-2020-6927] https://github.com/alphaSeclab/sec-daily-2020
- [CVE-2020-6926] https://github.com/NickstaDB/PoC
- [CVE-2020-6926] https://github.com/alphaSeclab/sec-daily-2020
- [CVE-2020-6925] https://github.com/NickstaDB/PoC
- [CVE-2020-6925] https://github.com/alphaSeclab/sec-daily-2020
- [CVE-2020-5029] https://github.com/GovindPalakkal/EvilRip
- [CVE-2020-43736] https://github.com/xss10086/code
- [CVE-2020-36355] https://github.com/Orange-Cyberdefense/CVE-repository
- [CVE-2020-36145] https://github.com/CyberSecurityUP/My-CVEs
- [CVE-2020-35703] https://github.com/CyberSecurityUP/My-CVEs
- [CVE-2020-34343] https://github.com/goichot/CVE-2020-3433
- [CVE-2020-3431] https://github.com/alphaSeclab/sec-daily-2020
- [CVE-2020-3019] https://github.com/tzwlhack/Vulnerability
- [CVE-2020-3019] https://github.com/dudek-marcin/Poc-Exp
- [CVE-2020-28913] https://github.com/koronkowy/koronkowy
- [CVE-2020-28913] https://github.com/tzwlhack/Vulnerability
- [CVE-2020-28637] https://github.com/The-Cracker-Technology/jwt_tool
- [CVE-2020-28637] https://github.com/puckiestyle/jwt_tool
- [CVE-2020-28637] https://github.com/mishmashclone/ticarpi-jwt_tool
- [CVE-2020-28637] https://github.com/ticarpi/jwt_tool
- [CVE-2020-28176] https://github.com/Marsman1996/pocs
- [CVE-2020-27839] https://packetstormsecurity.com/files/cve/CVE-2020-27839
- [CVE-2020-27686] https://github.com/codedninja/Teradek-Livestream-Broadcaster-RCE
- [CVE-2020-27685] https://github.com/codedninja/Teradek-Livestream-Broadcaster-RCE
- [CVE-2020-27578] https://github.com/Orange-Cyberdefense/CVE-repository
- [CVE-2020-27577] https://github.com/Orange-Cyberdefense/CVE-repository
- [CVE-2020-27505] https://github.com/M507/Miner
- [CVE-2020-27504] https://github.com/M507/Miner
- [CVE-2020-27503] https://github.com/M507/Miner
- [CVE-2020-27352] https://github.com/reni2study/Cloud-Native-Security2
- [CVE-2020-27352] https://github.com/Metarget/awesome-cloud-native-security
- [CVE-2020-27162] https://github.com/doyensec/awesome-electronjs-hacking
- [CVE-2020-27161] https://github.com/doyensec/awesome-electronjs-hacking
- [CVE-2020-25377] https://github.com/zer0detail/Echidna
- [CVE-2020-25376] https://github.com/zer0detail/Echidna
- [CVE-2020-2528] https://github.com/Orange-Cyberdefense/CVE-repository
- [CVE-2020-24934] https://github.com/securibee/Twitter-Seclists
- [CVE-2020-2457] https://github.com/ExpLangcn/FuYao-Go
- [CVE-2020-24350] https://github.com/immunityinc/Advisories
- [CVE-2020-24259] https://github.com/V0lk3n/OSMR-CheatSheet
- [CVE-2020-22979] https://github.com/ax1sX/SpringSecurity
- [CVE-2020-20569] https://github.com/Al1ex/Al1ex
- [CVE-2020-20567] https://github.com/Al1ex/Al1ex
- [CVE-2020-20566] https://github.com/Al1ex/Al1ex
- [CVE-2020-20565] https://github.com/Al1ex/Al1ex
- [CVE-2020-20564] https://github.com/Al1ex/Al1ex
- [CVE-2020-20563] https://github.com/Al1ex/Al1ex
- [CVE-2020-20562] https://github.com/Al1ex/Al1ex
- [CVE-2020-20561] https://github.com/Al1ex/Al1ex
- [CVE-2020-20560] https://github.com/Al1ex/Al1ex
- [CVE-2020-20559] https://github.com/Al1ex/Al1ex
- [CVE-2020-20558] https://github.com/Al1ex/Al1ex
- [CVE-2020-20556] https://github.com/Al1ex/Al1ex
- [CVE-2020-20555] https://github.com/Al1ex/Al1ex
- [CVE-2020-20554] https://github.com/Al1ex/Al1ex
- [CVE-2020-20553] https://github.com/Al1ex/Al1ex
- [CVE-2020-20552] https://github.com/Al1ex/Al1ex
- [CVE-2020-20551] https://github.com/Al1ex/Al1ex
- [CVE-2020-20550] https://github.com/Al1ex/Al1ex
- [CVE-2020-20549] https://github.com/Al1ex/Al1ex
- [CVE-2020-20548] https://github.com/Al1ex/Al1ex
- [CVE-2020-20547] https://github.com/Al1ex/Al1ex
- [CVE-2020-20546] https://github.com/Al1ex/Al1ex
- [CVE-2020-20533] https://github.com/Al1ex/Al1ex
- [CVE-2020-20532] https://github.com/Al1ex/Al1ex
- [CVE-2020-20531] https://github.com/Al1ex/Al1ex
- [CVE-2020-20530] https://github.com/Al1ex/Al1ex
- [CVE-2020-20528] https://github.com/Al1ex/Al1ex
- [CVE-2020-20527] https://github.com/Al1ex/Al1ex
- [CVE-2020-20526] https://github.com/Al1ex/Al1ex
- [CVE-2020-20525] https://github.com/Al1ex/Al1ex
- [CVE-2020-20524] https://github.com/Al1ex/Al1ex
- [CVE-2020-19663] https://github.com/peanuts62/IOT_CVE
- [CVE-2020-19662] https://github.com/peanuts62/IOT_CVE
- [CVE-2020-18555] https://github.com/l0kihardt/l0kihardt
- [CVE-2020-18545] https://github.com/l0kihardt/l0kihardt
- [CVE-2020-18528] https://github.com/Al1ex/Al1ex
- [CVE-2020-18527] https://github.com/Al1ex/Al1ex
- [CVE-2020-16882] https://github.com/WingsSec/Meppo
- [CVE-2020-15524] https://github.com/immunityinc/Advisories
- [CVE-2020-15436] https://packetstormsecurity.com/files/cve/CVE-2020-15436
- [CVE-2020-15048] https://github.com/alphaSeclab/sec-daily-2020
- [CVE-2020-148823] https://github.com/Zero094/Vulnerability-verification
- [CVE-2020-13629] https://github.com/CyberSecurityUP/Awesome-Hardware-and-IoT-Hacking
- [CVE-2020-13629] https://github.com/mishmashclone/V33RU-IoTSecurity101
- [CVE-2020-13629] https://github.com/V33RU/IoTSecurity101
- [CVE-2020-13629] https://github.com/alphaSeclab/sec-daily-2020
- [CVE-2020-13629] https://github.com/youneselmoukhtari/iot-Security-
- [CVE-2020-13363] https://github.com/CyberSecurityUP/My-CVEs
- [CVE-2020-13172] https://github.com/immunityinc/Advisories
- [CVE-2020-13165] https://github.com/hannob/pgpbugs
- [CVE-2020-12694] https://github.com/ndaprela/bugs
- [CVE-2020-123477] https://github.com/ferdinandmudjialim/metasploit-cve-search
- [CVE-2020-12340] https://github.com/ferdinandmudjialim/metasploit-cve-search
- [CVE-2020-10873] https://github.com/0xbigshaq/php7-internals
- [CVE-2020-10872] https://github.com/0xbigshaq/php7-internals
- [CVE-2020-10370] https://github.com/JeffroMF/awesome-bluetooth-security321
- [CVE-2020-10370] https://github.com/engn33r/awesome-bluetooth-security
- [CVE-2020-10369] https://github.com/JeffroMF/awesome-bluetooth-security321
- [CVE-2020-10369] https://github.com/engn33r/awesome-bluetooth-security
- [CVE-2020-10368] https://github.com/JeffroMF/awesome-bluetooth-security321
- [CVE-2020-10368] https://github.com/engn33r/awesome-bluetooth-security
- [CVE-2020-10367] https://github.com/JeffroMF/awesome-bluetooth-security321
- [CVE-2020-10367] https://github.com/engn33r/awesome-bluetooth-security
- [CVE-2020-10367] https://github.com/joydo/CVE-Writeups
- [CVE-2020-0436] https://github.com/projectceladon/trusty-release-binaries
- [CVE-2020-03081] https://github.com/full-disclosure/repo
- [CVE-2019-9999] https://github.com/HackOvert/awesome-bugs
- [CVE-2019-9999] https://github.com/alphaSeclab/sec-daily-2019
- [CVE-2019-6998] https://github.com/0xUhaw/CVE-Bins
- [CVE-2019-54321] https://github.com/limkokholefork/ubuntu-cve-oval
- [CVE-2019-5112] https://github.com/adityatrivedi2/Threat-Modeling-for-LMS
- [CVE-2019-4233] https://github.com/UrbanCode/jenkins-publisher-ucd-plugin
- [CVE-2019-20084] https://github.com/pr0v3rbs/FirmAE
- [CVE-2019-189888] https://github.com/corneacristian/Notes
- [CVE-2019-18779] https://github.com/sjmini/icse2020-Solidity
- [CVE-2019-18778] https://github.com/sjmini/icse2020-Solidity
- [CVE-2019-18777] https://github.com/sjmini/icse2020-Solidity
- [CVE-2019-18776] https://github.com/sjmini/icse2020-Solidity
- [CVE-2019-18775] https://github.com/sjmini/icse2020-Solidity
- [CVE-2019-17411] https://github.com/CyberSecurityUP/My-CVEs
- [CVE-2019-17004] https://github.com/R3dg0/writeups
- [CVE-2019-17004] https://github.com/abuzafarhaqq/bugBounty
- [CVE-2019-17004] https://github.com/Saidul-M-Khan/Awesome-Bugbounty-Writeups
- [CVE-2019-17004] https://github.com/xbl3/Awesome-Bugbounty-Writeups_devanshbatham
- [CVE-2019-17004] https://github.com/ajino2k/Awesome-Bugbounty-Writeups
- [CVE-2019-17004] https://github.com/bugrider/devanshbatham-repo
- [CVE-2019-17004] https://github.com/Fa1c0n35/Awesome-Bugbounty-Writeups
- [CVE-2019-17004] https://github.com/plancoo/Bugbounty_Writeups
- [CVE-2019-17004] https://github.com/blitz-cmd/Bugbounty-writeups
- [CVE-2019-17004] https://github.com/devanshbatham/Awesome-Bugbounty-Writeups
- [CVE-2019-17004] https://github.com/bot8080/awesomeBugbounty
- [CVE-2019-17004] https://github.com/dipesh259/Writeups
- [CVE-2019-17004] https://github.com/Prodrious/writeups
- [CVE-2019-17004] https://github.com/choudharyrajritu1/Bug_Bounty-POC
- [CVE-2019-16911] https://github.com/rochesecurity/Roche-CVEs
- [CVE-2019-16634] https://github.com/RoqueNight/Linux-Privilege-Escalation-Basics
- [CVE-2019-16259] https://github.com/0x23353435/EmpEISDecrypt
- [CVE-2019-15063] https://github.com/JeffroMF/awesome-bluetooth-security321
- [CVE-2019-15063] https://github.com/engn33r/awesome-bluetooth-security
- [CVE-2019-14775] https://github.com/lukaspustina/cve-scorer
- [CVE-2019-14325] https://github.com/seqred-s-a/cve-2019-14326
- [CVE-2019-13621] https://github.com/sungjungk/fp-scanner-hacking
- [CVE-2019-13600] https://github.com/0xT11/CVE-POC
- [CVE-2019-13600] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2019-13600] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2019-11291130] https://github.com/ycdxsb/WindowsPrivilegeEscalation
- [CVE-2019-00000] https://github.com/shaliniKushwah-crest/readme
- [CVE-2018-9467] https://github.com/virtualpatch/virtualpatch_evaluation
- [CVE-2018-9442] https://github.com/codexlynx/hardware-attacks-state-of-the-art
- [CVE-2018-9341] https://github.com/HacTF/poc--exp
- [CVE-2018-9341] https://github.com/wateroot/poc-exp
- [CVE-2018-9341] https://github.com/lnick2023/nicenice
- [CVE-2018-9341] https://github.com/qazbnm456/awesome-cve-poc
- [CVE-2018-9341] https://github.com/xbl3/awesome-cve-poc_qazbnm456
- [CVE-2018-9061] https://github.com/dtkhiem86/WordPress-Pentesting-Report
- [CVE-2018-9061] https://github.com/deltastrikeop/CS7
- [CVE-2018-8816] https://github.com/junxzm1990/afl-pt
- [CVE-2018-5318] https://github.com/xbl3/awesome-cve-poc_qazbnm456
- [CVE-2018-5318] https://github.com/qazbnm456/awesome-cve-poc
- [CVE-2018-5318] https://github.com/lnick2023/nicenice
- [CVE-2018-2983] https://github.com/superfish9/pt
- [CVE-2018-20319] https://github.com/alphaSeclab/sec-daily-2019
- [CVE-2018-20119] https://github.com/RUB-SysSec/redqueen
- [CVE-2018-20118] https://github.com/RUB-SysSec/redqueen
- [CVE-2018-20117] https://github.com/RUB-SysSec/redqueen
- [CVE-2018-20116] https://github.com/RUB-SysSec/redqueen
- [CVE-2018-19419] https://github.com/WSP-LAB/FUSE
- [CVE-2018-19172] https://github.com/WSP-LAB/FUSE
- [CVE-2018-19062] https://github.com/WSP-LAB/FUSE
- [CVE-2018-18637] https://github.com/WSP-LAB/FUSE
- [CVE-2018-18574] https://github.com/WSP-LAB/FUSE
- [CVE-2018-18549] https://github.com/PAGalaxyLab/VulInfo
- [CVE-2018-18523] https://github.com/PAGalaxyLab/VulInfo
- [CVE-2018-18522] https://github.com/PAGalaxyLab/VulInfo
- [CVE-2018-18421] https://github.com/PAGalaxyLab/VulInfo
- [CVE-2018-18067] https://github.com/PAGalaxyLab/VulInfo
- [CVE-2018-17853] https://github.com/PAGalaxyLab/VulInfo
- [CVE-2018-1776] https://github.com/rmadamson/rmadamson
- [CVE-2018-17453] https://github.com/PAGalaxyLab/VulInfo
- [CVE-2018-17424] https://github.com/PAGalaxyLab/VulInfo
- [CVE-2018-1703] https://github.com/rmadamson/rmadamson
- [CVE-2018-1689] https://github.com/Yuki0x80/BlackHat2019
- [CVE-2018-16830] https://github.com/PAGalaxyLab/VulInfo
- [CVE-2018-16829] https://github.com/PAGalaxyLab/VulInfo
- [CVE-2018-16828] https://github.com/PAGalaxyLab/VulInfo
- [CVE-2018-16827] https://github.com/PAGalaxyLab/VulInfo
- [CVE-2018-16826] https://github.com/PAGalaxyLab/VulInfo
- [CVE-2018-16825] https://github.com/PAGalaxyLab/VulInfo
- [CVE-2018-16824] https://github.com/PAGalaxyLab/VulInfo
- [CVE-2018-16823] https://github.com/PAGalaxyLab/VulInfo
- [CVE-2018-16748] https://github.com/RUB-SysSec/redqueen
- [CVE-2018-16747] https://github.com/RUB-SysSec/redqueen
- [CVE-2018-14566] https://github.com/RUB-SysSec/redqueen
- [CVE-2018-14466] https://packetstormsecurity.com/files/cve/CVE-2018-14466
- [CVE-2018-13452] https://github.com/xbl3/awesome-cve-poc_qazbnm456
- [CVE-2018-13452] https://github.com/qazbnm456/awesome-cve-poc
- [CVE-2018-13452] https://github.com/lnick2023/nicenice
- [CVE-2018-12935] https://github.com/RUB-SysSec/redqueen
- [CVE-2018-11812] https://github.com/sec-bit/awesome-buggy-erc20-tokens
- [CVE-2018-11811] https://github.com/sec-bit/awesome-buggy-erc20-tokens
- [CVE-2018-11810] https://github.com/sec-bit/awesome-buggy-erc20-tokens
- [CVE-2018-11809] https://github.com/sec-bit/awesome-buggy-erc20-tokens
- [CVE-2018-11672] https://github.com/pranav0408/WinAFL
- [CVE-2018-11672] https://github.com/googleprojectzero/winafl
- [CVE-2018-11672] https://github.com/chaojianhu/winafl-intelpt
- [CVE-2018-11672] https://github.com/s0i37/winafl_inmemory
- [CVE-2018-11672] https://github.com/hardik05/winafl-powermopt
- [CVE-2018-11398] https://github.com/sec-bit/awesome-buggy-erc20-tokens
- [CVE-2018-100086] https://github.com/ExpLangcn/FuYao-Go
- [CVE-2018-100060] https://github.com/ExpLangcn/FuYao-Go
- [CVE-2018-100053] https://github.com/ExpLangcn/FuYao-Go
- [CVE-2018-0000] https://github.com/iotcube/API
- [CVE-2017-9672] https://github.com/h-takimoto/samlsp-python
- [CVE-2017-9672] https://github.com/SAML-Toolkits/python3-saml
- [CVE-2017-9672] https://github.com/gloliva/python3-saml-fork
- [CVE-2017-9672] https://github.com/pexip/os-python3-saml
- [CVE-2017-9672] https://github.com/ansible/python3-saml
- [CVE-2017-7311] https://github.com/vah13/SAP_vulnerabilities
- [CVE-2017-21223] https://github.com/CyberSecurityUP/My-CVEs
- [CVE-2017-18153] https://github.com/jiayy/android_vuln_poc-exp
- [CVE-2017-18150] https://github.com/jiayy/android_vuln_poc-exp
- [CVE-2017-18148] https://github.com/jiayy/android_vuln_poc-exp
- [CVE-2017-1687] https://github.com/ExpLangcn/FuYao-Go
- [CVE-2017-16695] https://github.com/R0B1NL1N/linux-kernel-exploitation
- [CVE-2017-16695] https://github.com/gameFace22/vulnmachine-walkthrough
- [CVE-2017-16695] https://github.com/khanhhdz06/linux-kernel-exploitation
- [CVE-2017-16695] https://github.com/jondonas/linux-exploit-suggester-2
- [CVE-2017-15832] https://github.com/jiayy/android_vuln_poc-exp
- [CVE-2017-15688] https://github.com/SexyBeast233/SecBooks
- [CVE-2017-13309] https://github.com/Anonymous-Phunter/PHunter
- [CVE-2017-1263] https://github.com/ExpLangcn/FuYao-Go
- [CVE-2017-11859] https://github.com/xbl3/awesome-cve-poc_qazbnm456
- [CVE-2017-11859] https://github.com/qazbnm456/awesome-cve-poc
- [CVE-2017-11859] https://github.com/lnick2023/nicenice
- [CVE-2017-10001683] https://github.com/xxg1413/rust-security
- [CVE-2017-100002] https://github.com/ExpLangcn/FuYao-Go
- [CVE-2016-9890] https://github.com/mynameisv/MMSBGA
- [CVE-2016-7654321] https://github.com/lauravoicu/Common-Vulnerabilities-Exposures
- [CVE-2016-45657] https://github.com/viai957/webkit-vulnerability
- [CVE-2016-4012] https://github.com/HackThisCode/CVE-Bot
- [CVE-2016-33083309] https://github.com/ycdxsb/WindowsPrivilegeEscalation
- [CVE-2016-100031] https://github.com/trhacknon/myhktools
- [CVE-2016-100031] https://github.com/iqrok/myhktools
- [CVE-2016-100031] https://github.com/CrackerCat/myhktools
- [CVE-2016-100031] https://github.com/hktalent/myhktools
- [CVE-2016-100031] https://github.com/touchmycrazyredhat/myhktools
- [CVE-2016-100031] https://github.com/do0dl3/myhktools
- [CVE-2016-1000253] https://github.com/SAML-Toolkits/php-saml
- [CVE-2016-1000253] https://github.com/Bimsuru/PHP-SAML-NEW
- [CVE-2016-1000253] https://github.com/andreariano/php-saml
- [CVE-2016-1000253] https://github.com/kxc3244/php-app
- [CVE-2016-1000253] https://github.com/Bimsuru/UPDATE-SAML
- [CVE-2016-1000253] https://github.com/onewelcome/php-saml
- [CVE-2016-1000253] https://github.com/robertowebdeveloper/test-saml
- [CVE-2016-1000252] https://github.com/SAML-Toolkits/python-saml
- [CVE-2016-1000252] https://github.com/JonathanRowe/python-saml-master
- [CVE-2016-1000252] https://github.com/poupyi/python-saml
- [CVE-2016-1000252] https://github.com/angmarkosy/SAMLp2.7
- [CVE-2016-1000251] https://github.com/h-takimoto/samlsp-python
- [CVE-2016-1000251] https://github.com/SAML-Toolkits/python3-saml
- [CVE-2016-1000251] https://github.com/gloliva/python3-saml-fork
- [CVE-2016-1000251] https://github.com/pexip/os-python3-saml
- [CVE-2016-1000251] https://github.com/ansible/python3-saml
- [CVE-2016-1000244] https://github.com/justinsteven/advisories
- [CVE-2016-1000243] https://github.com/justinsteven/advisories
- [CVE-2015-8545] https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
- [CVE-2015-8545] https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
- [CVE-2015-8545] https://github.com/klausware/Java-Deserialization-Cheat-Sheet
- [CVE-2015-8238] https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
- [CVE-2015-8238] https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
- [CVE-2015-8238] https://github.com/klausware/Java-Deserialization-Cheat-Sheet
- [CVE-2015-8237] https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
- [CVE-2015-8237] https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
- [CVE-2015-8237] https://github.com/klausware/Java-Deserialization-Cheat-Sheet
- [CVE-2015-6964] https://github.com/Marclass/BritExploit
- [CVE-2015-6841] https://github.com/rednaga/disclosures
- [CVE-2015-5527] https://github.com/rednaga/disclosures
- [CVE-2015-5526] https://github.com/rednaga/disclosures
- [CVE-2015-5525] https://github.com/rednaga/disclosures
- [CVE-2015-4110] https://github.com/silverline/mitmproxy_script
- [CVE-2015-2705] https://github.com/gold1029/mongoaudit
- [CVE-2015-2705] https://github.com/Ch4p34uN0iR/mongoaudit
- [CVE-2015-2705] https://github.com/stampery/mongoaudit
- [CVE-2015-2309] https://github.com/cs278/composer-audit
- [CVE-2015-2232] https://github.com/rednaga/disclosures
- [CVE-2014-8787] https://github.com/inso-/TORQUE-Resource-Manager-2.5.x-2.5.13-stack-based-buffer-overflow-exploit-CVE-2014-8729-CVE-2014-878
- [CVE-2014-8274] https://github.com/river-li/awesome-uefi-security
- [CVE-2014-8274] https://github.com/abazhaniuk/Publications
- [CVE-2014-8273] https://github.com/hardenedvault/bootkit-samples
- [CVE-2014-7654321] https://github.com/richardhendricksen/ecr-scan-image
- [CVE-2014-7654321] https://github.com/alexjurkiewicz/ecr-scan-image
- [CVE-2014-7306] https://github.com/Section9Labs/advisories
- [CVE-2014-7305] https://github.com/Section9Labs/advisories
- [CVE-2014-6217] https://github.com/XorgX304/shellShocker
- [CVE-2014-6061] https://github.com/cs278/composer-audit
- [CVE-2014-5329] https://github.com/warmilk/http-Dos-Attack-Detection
- [CVE-2014-5244] https://github.com/cs278/composer-audit
- [CVE-2014-4878] https://github.com/HacTF/poc--exp
- [CVE-2014-4878] https://github.com/wateroot/poc-exp
- [CVE-2014-4878] https://github.com/avboy1337/Vulnerabilities
- [CVE-2014-4324] https://github.com/tangsilian/android-vuln
- [CVE-2014-3568000] https://github.com/trend-anz/Deep-Security-Open-Patch
- [CVE-2014-2917] https://github.com/gold1029/mongoaudit
- [CVE-2014-2917] https://github.com/Ch4p34uN0iR/mongoaudit
- [CVE-2014-2917] https://github.com/stampery/mongoaudit
- [CVE-2014-12345] https://github.com/lauravoicu/Common-Vulnerabilities-Exposures
- [CVE-2014-111111111111111111111111] https://github.com/yesmar/cve
- [CVE-2014-11111111111111111111111] https://github.com/yesmar/cve
- [CVE-2014-1111111111111111111111] https://github.com/yesmar/cve
- [CVE-2014-0976] https://github.com/tangsilian/android-vuln
- [CVE-2014-0975] https://github.com/tangsilian/android-vuln
- [CVE-2013-7035] https://github.com/JCDMeira/release-notes-react
- [CVE-2013-1691] https://github.com/nqwang/radamsa
- [CVE-2013-1691] https://github.com/sambacha/mirror-radamsa
- [CVE-2013-1691] https://github.com/Hwangtaewon/radamsa
- [CVE-2013-1691] https://github.com/StephenHaruna/RADAMSA
- [CVE-2013-1691] https://github.com/sunzu94/radamsa-Fuzzer
- [CVE-2013-05230] https://github.com/NetSPI/Dekrypto
- [CVE-2012-3584] https://github.com/uvhw/conchimgiangnang
- [CVE-2012-2594] https://github.com/sailay1996/offsec_WE
- [CVE-2012-2594] https://github.com/mishmashclone/sailay1996-offsec_WE
- [CVE-2004-4002] https://github.com/Xiol/CVEChecker
- [CVE-2001-3389] https://github.com/becrevex/Gaston
- [CVE-2000-7654321] https://github.com/cs278/composer-audit
- [CVE-2000-1234567] https://github.com/cs278/composer-audit
- [CVE-1999-99999] https://github.com/MrSeccubus/jekyll-secinfo
- [CVE-1999-5656] https://github.com/becrevex/Kampai
- [CVE-1999-04534] https://github.com/trend-anz/TippingPoint-Open-Patch
- [CVE-1990-0000] https://github.com/tecnobabble/vulnfeed_2_tenb
- [CVE-1234-5678] https://github.com/openvex/vexctl
- [CVE-0000-0000] https://github.com/Konstantinos-Papanagnou/CMSpit
- [CVE-0000-0000] https://github.com/KINGSABRI/CVE-in-Ruby
- [CVE-0000-0000] https://github.com/Simonpe1/xray-custom-integration-demo
- [CVE-2023-28343] https://github.com/superzerosec/CVE-2023-28343
- [CVE-2023-28164] https://packetstormsecurity.com/files/cve/CVE-2023-28164
- [CVE-2023-28155] https://github.com/advisories/GHSA-p8p7-x288-28g6
- [CVE-2023-27326] https://github.com/Mr-xn/Penetration_Testing_POC
- [CVE-2023-27326] https://github.com/WinMin/awesome-vm-exploit
- [CVE-2023-25735] https://github.com/googleprojectzero/fuzzilli
- [CVE-2023-25690] https://packetstormsecurity.com/files/171426/USN-5942-2.txt
- [CVE-2023-24625] https://medium.com/@klockw3rk/extracting-hash-from-password-protected-microsoft-office-files-b206438944d2
- [CVE-2023-24625] https://medium.com/@frycos/yet-another-net-deserialization-35f6ce048df7
- [CVE-2023-24055] https://github.com/manas3c/CVE-POC
- [CVE-2023-23415] https://medium.com/@cve_program/cve-program-report-for-q4-calendar-year-2020-4f564146f3b2
- [CVE-2023-23415] https://medium.com/@s1kr10s/velotismart-0day-ca5056bcdcac
- [CVE-2023-23415] https://medium.com/@tranpdanh/some-way-to-execute-os-command-in-liferay-portal-84498bde18d3
- [CVE-2023-23415] https://medium.com/@darinder.shokar/a-scripted-approach-for-creating-and-using-service-accounts-in-forgerock-identity-cloud-fd2dc9db1819
- [CVE-2023-23415] https://medium.com/@knownsec404team/analysis-of-weblogic-deserialization-vulnerability-cve-2018-2628-164bbed7a71d
- [CVE-2023-23415] https://medium.com/codex/koa-js-invulnerability-analysis-a-k-a-why-the-security-industry-does-not-understand-software-1c4670f225a9
- [CVE-2023-23415] https://medium.com/s2wblog/scarcruft-bolsters-arsenal-for-targeting-individual-android-devices-97d2bcef4ab
- [CVE-2023-23415] https://medium.com/tenable-techblog/grandstream-pbx-hacking-29f61c0d9179
- [CVE-2023-23415] https://medium.com/sfdcmastery/how-i-passed-my-salesforce-admin-201-certification-exam-in-27-days-3b37c49b8c12
- [CVE-2023-23415] https://medium.com/bugbountywriteup/analyzing-cve-2022-22980-to-discover-a-real-exploitable-path-in-the-source-code-review-process-with-145d97717656
- [CVE-2023-23415] https://medium.com/@riemannbernhardj/exploiting-cve-2019-11768-561b0097c003
- [CVE-2023-23415] https://medium.com/wortell/what-is-and-how-to-monitor-for-citrixmash-cve-2019-19781-95e20d7926a7
- [CVE-2023-23415] https://github.com/amitdubey1921/CVE-2023-23416
- [CVE-2023-23397] https://www.youtube.com/watch?v=8OtfW4uo75k
- [CVE-2023-23397] https://github.com/advisories/GHSA-4778-q233-jmh5
- [CVE-2023-23397] https://github.com/stevesec/CVE-2023-23397
- [CVE-2023-23397] https://www.youtube.com/watch?v=HkOeRncBTe0
- [CVE-2023-23397] https://www.youtube.com/watch?v=-zQ0c_al254
- [CVE-2023-0795] https://packetstormsecurity.com/files/related/171120/Debian-Security-Advisory-5361-1.html
- [CVE-2023-0292] https://github.com/MrTuxracer/advisories
- [CVE-2023-0291] https://github.com/MrTuxracer/advisories
- [CVE-2023-0179] https://github.com/manas3c/CVE-POC
- [CVE-2023-0045] https://github.com/manas3c/CVE-POC
- [CVE-2022-8475] https://github.com/manas3c/CVE-POC
- [CVE-2022-5561] https://github.com/manas3c/CVE-POC
- [CVE-2022-46485] https://github.com/manas3c/CVE-POC
- [CVE-2022-46484] https://github.com/manas3c/CVE-POC
- [CVE-2022-46104] https://github.com/manas3c/CVE-POC
- [CVE-2022-45451] https://github.com/manas3c/CVE-POC
- [CVE-2022-45265] https://github.com/manas3c/CVE-POC
- [CVE-2022-44268] https://github.com/betillogalvanfbc/POC-CVE-2022-44268
- [CVE-2022-44215] https://github.com/manas3c/CVE-POC
- [CVE-2022-42813] https://packetstormsecurity.com/files/cve/CVE-2022-42813
- [CVE-2022-42475] https://github.com/izj007/wechat
- [CVE-2022-42475] https://github.com/CKevens/CVE-2022-42475-RCE-POC
- [CVE-2022-42045] https://github.com/gmh5225/awesome-game-security
- [CVE-2022-42045] https://github.com/manas3c/CVE-POC
- [CVE-2022-42045] https://github.com/hfiref0x/KDU
- [CVE-2022-4178] https://packetstormsecurity.com/files/cve/CVE-2022-4178
- [CVE-2022-41082] https://github.com/notareaperbutDR34P3r/vuln-CVE-2022-41082
- [CVE-2022-40916] https://github.com/manas3c/CVE-POC
- [CVE-2022-40490] https://github.com/manas3c/CVE-POC
- [CVE-2022-39841] https://github.com/manas3c/CVE-POC
- [CVE-2022-38217] https://github.com/manas3c/CVE-POC
- [CVE-2022-37705] https://github.com/manas3c/CVE-POC
- [CVE-2022-37704] https://github.com/manas3c/CVE-POC
- [CVE-2022-37703] https://packetstormsecurity.com/files/171427/USN-5966-1.txt
- [CVE-2022-37206] https://github.com/manas3c/CVE-POC
- [CVE-2022-3699] https://github.com/gmh5225/awesome-game-security
- [CVE-2022-3699] https://github.com/manas3c/CVE-POC
- [CVE-2022-36163] https://github.com/manas3c/CVE-POC
- [CVE-2022-36162] https://github.com/manas3c/CVE-POC
- [CVE-2022-3328] https://github.com/manas3c/CVE-POC
- [CVE-2022-31855] https://github.com/Y0ung-DST/Y0ung-DST
- [CVE-2022-31749] https://github.com/manas3c/CVE-POC
- [CVE-2022-31705] https://github.com/WinMin/awesome-vm-exploit
- [CVE-2022-31297] https://github.com/manas3c/CVE-POC
- [CVE-2022-30507] https://github.com/manas3c/CVE-POC
- [CVE-2022-30190] https://github.com/Gra3s/CVE-2022-30190_EXP_PowerPoint
- [CVE-2022-30006] https://github.com/manas3c/CVE-POC
- [CVE-2022-29554] https://github.com/manas3c/CVE-POC
- [CVE-2022-29553] https://github.com/manas3c/CVE-POC
- [CVE-2022-29552] https://github.com/manas3c/CVE-POC
- [CVE-2022-29551] https://github.com/manas3c/CVE-POC
- [CVE-2022-28943] https://github.com/manas3c/CVE-POC
- [CVE-2022-28733] https://github.com/rhboot/shim-review
- [CVE-2022-28733] https://github.com/puzzleos/uefi-shim_review
- [CVE-2022-28733] https://github.com/coreyvelan/shim-review
- [CVE-2022-28132] https://github.com/manas3c/CVE-POC
- [CVE-2022-27414] https://github.com/manas3c/CVE-POC
- [CVE-2022-27251] https://github.com/manas3c/CVE-POC
- [CVE-2022-27251] https://github.com/soosmile/POC
- [CVE-2022-2602] https://github.com/Mr-xn/Penetration_Testing_POC
- [CVE-2022-2602] https://github.com/manas3c/CVE-POC
- [CVE-2022-2602] https://github.com/khanhhdz06/linux-kernel-exploitation
- [CVE-2022-2601] https://packetstormsecurity.com/files/cve/CVE-2022-2601
- [CVE-2022-2588] https://github.com/xuetusummer/Penetration_Testing_POC
- [CVE-2022-2588] https://github.com/Mr-xn/Penetration_Testing_POC
- [CVE-2022-2588] https://github.com/weeka10/-hktalent-TOP
- [CVE-2022-2588] https://github.com/bsauce/kernel-security-learning
- [CVE-2022-2588] https://github.com/manas3c/CVE-POC
- [CVE-2022-2588] https://github.com/ARGOeu-Metrics/secmon-probes
- [CVE-2022-2588] https://github.com/bsauce/kernel-exploit-factory
- [CVE-2022-2588] https://github.com/cyberanand1337x/bug-bounty-2022
- [CVE-2022-2588] https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- [CVE-2022-2586] https://github.com/manas3c/CVE-POC
- [CVE-2022-2586] https://github.com/khanhhdz06/linux-kernel-exploitation
- [CVE-2022-2586] https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- [CVE-2022-25257] https://github.com/soosmile/POC
- [CVE-2022-25257] https://github.com/manas3c/CVE-POC
- [CVE-2022-25063] https://github.com/manas3c/CVE-POC
- [CVE-2022-25063] https://github.com/soosmile/POC
- [CVE-2022-24087] https://github.com/manas3c/CVE-POC
- [CVE-2022-24087] https://github.com/soosmile/POC
- [CVE-2022-23361] https://github.com/manas3c/CVE-POC
- [CVE-2022-23361] https://github.com/soosmile/POC
- [CVE-2022-23093] https://github.com/halon/changelog
- [CVE-2022-23093] https://github.com/H4lo/awesome-IoT-security-article
- [CVE-2022-22675] https://packetstormsecurity.com/files/cve/CVE-2022-26701
- [CVE-2022-22673] https://packetstormsecurity.com/files/cve/CVE-2022-26731
- [CVE-2022-2109] https://github.com/manas3c/CVE-POC
- [CVE-2022-20128] https://github.com/manas3c/CVE-POC
- [CVE-2022-1609] https://github.com/manas3c/CVE-POC
- [CVE-2022-14733] https://github.com/manas3c/CVE-POC
- [CVE-2022-10270] https://github.com/manas3c/CVE-POC
- [CVE-2021-6901] https://github.com/manas3c/CVE-POC
- [CVE-2021-6857] https://github.com/manas3c/CVE-POC
- [CVE-2021-6857] https://github.com/soosmile/POC
- [CVE-2021-4428] https://github.com/kward/log4sh
- [CVE-2021-4428] https://github.com/soosmile/POC
- [CVE-2021-4428] https://github.com/manas3c/CVE-POC
- [CVE-2021-44270] https://github.com/soosmile/POC
- [CVE-2021-44228] https://www.youtube.com/watch?v=O7zeYx_Sz5c
- [CVE-2021-41730] https://github.com/soosmile/POC
- [CVE-2021-3899] https://github.com/manas3c/CVE-POC
- [CVE-2021-35975] https://github.com/soosmile/POC
- [CVE-2021-34527] https://github.com/alvesnet-oficial/microsoft-vulnerabilidades
- [CVE-2021-34506] https://github.com/brawnysec/365x5
- [CVE-2021-34045] https://github.com/Al1ex/Al1ex
- [CVE-2021-34045] https://github.com/soosmile/POC
- [CVE-2021-34045] https://github.com/Al1ex/CVE-2021-34045
- [CVE-2021-3360] https://github.com/manas3c/CVE-POC
- [CVE-2021-3360] https://github.com/soosmile/POC
- [CVE-2021-32761] https://packetstormsecurity.com/files/cve/CVE-2021-32761
- [CVE-2021-3157] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2021-3157] https://github.com/soosmile/POC
- [CVE-2021-3157] https://github.com/manas3c/CVE-POC
- [CVE-2021-28854] https://github.com/ydycjz6j/VICIdial
- [CVE-2021-28854] https://github.com/20142995/Goby
- [CVE-2021-28750] https://github.com/manas3c/CVE-POC
- [CVE-2021-28750] https://github.com/soosmile/POC
- [CVE-2021-28216] https://www.youtube.com/watch?v=V2s_LiOF20E
- [CVE-2021-28073] https://github.com/errorecho/CVEs-Collection
- [CVE-2021-28073] https://github.com/Threekiii/Vulhub-Reproduce
- [CVE-2021-28073] https://github.com/SexyBeast233/SecBooks
- [CVE-2021-28073] https://github.com/zmylml/yangzifun
- [CVE-2021-28073] https://github.com/Threekiii/Awesome-Exploit
- [CVE-2021-26856] https://github.com/manas3c/CVE-POC
- [CVE-2021-26856] https://github.com/soosmile/POC
- [CVE-2021-26121] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2021-26121] https://github.com/manas3c/CVE-POC
- [CVE-2021-26121] https://github.com/soosmile/POC
- [CVE-2021-26102] https://github.com/manas3c/CVE-POC
- [CVE-2021-26102] https://github.com/soosmile/POC
- [CVE-2021-1675] https://github.com/alvesnet-oficial/microsoft-vulnerabilidades
- [CVE-2021-10086] https://github.com/manas3c/CVE-POC
- [CVE-2020-8888] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2020-8888] https://github.com/soosmile/POC
- [CVE-2020-8888] https://github.com/0xT11/CVE-POC
- [CVE-2020-8888] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2020-7897] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2020-7897] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2020-7897] https://github.com/soosmile/POC
- [CVE-2020-72381] https://github.com/0xT11/CVE-POC
- [CVE-2020-72381] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2020-7209] https://packetstormsecurity.com/files/158025/LinuxKI-Toolset-6.01-Remote-Command-Execution.html
- [CVE-2020-3161] https://packetstormsecurity.com/files/157265/Cisco-IP-Phone-11.7-Denial-Of-Service.html
- [CVE-2020-29007] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2020-29007] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2020-2883] https://medium.com/morphusblog/b%C3%BAssola-edi%C3%A7%C3%A3o-4-9d9392a0c510
- [CVE-2020-27845] https://packetstormsecurity.com/files/cve/CVE-2020-27845
- [CVE-2020-27190] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2020-27190] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2020-25769] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2020-25769] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2020-25769] https://github.com/immunityinc/Advisories
- [CVE-2020-25518] https://github.com/0xT11/CVE-POC
- [CVE-2020-25518] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2020-25518] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2020-25488] https://github.com/0xT11/CVE-POC
- [CVE-2020-25488] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2020-25488] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2020-24597] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2020-24597] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2020-24597] https://github.com/0xT11/CVE-POC
- [CVE-2020-24597] https://github.com/HoangKien1020/CVE-2021-23132
- [CVE-2020-2333] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2020-2333] https://github.com/soosmile/POC
- [CVE-2020-2333] https://github.com/0xT11/CVE-POC
- [CVE-2020-2333] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2020-17008] https://github.com/readloud/Awesome-Stars
- [CVE-2020-17008] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2020-17008] https://github.com/soosmile/POC
- [CVE-2020-17008] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2020-17008] https://github.com/NetW0rK1le3r/awesome-hacking-lists
- [CVE-2020-15808] https://github.com/soosmile/POC
- [CVE-2020-15399] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2020-15399] https://github.com/soosmile/POC
- [CVE-2020-15399] https://github.com/0xT11/CVE-POC
- [CVE-2020-15399] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2020-15256] https://packetstormsecurity.com/files/171425/USN-5967-1.txt
- [CVE-2020-1472] https://www.youtube.com/watch?v=7lSwRQWyoHA
- [CVE-2020-1472] https://github.com/S3N4T0R-0X0/AM0N-Eye
- [CVE-2020-13457] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2020-13457] https://github.com/soosmile/POC
- [CVE-2020-13457] https://github.com/0xT11/CVE-POC
- [CVE-2020-13457] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2020-12688] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2020-12688] https://github.com/soosmile/POC
- [CVE-2020-12688] https://github.com/0xT11/CVE-POC
- [CVE-2020-12688] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2020-12388] https://packetstormsecurity.com/files/157860/Firefox-Default-Content-Process-DACL-Sandbox-Escape.html
- [CVE-2020-11794] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2020-11794] https://github.com/soosmile/POC
- [CVE-2020-11794] https://github.com/0xT11/CVE-POC
- [CVE-2020-11794] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2020-10205] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2020-10205] https://github.com/soosmile/POC
- [CVE-2020-0431] https://packetstormsecurity.com/files/cve/CVE-2020-0431
- [CVE-2019-8627] https://github.com/0xT11/CVE-POC
- [CVE-2019-8627] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2019-8627] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2019-48814] https://github.com/0xT11/CVE-POC
- [CVE-2019-48814] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2019-48814] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2019-19871] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2019-19871] https://github.com/0xT11/CVE-POC
- [CVE-2019-19871] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2019-19658] https://github.com/0xT11/CVE-POC
- [CVE-2019-19658] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2019-19658] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2019-19654] https://github.com/0xT11/CVE-POC
- [CVE-2019-19654] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2019-19654] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2019-19653] https://github.com/0xT11/CVE-POC
- [CVE-2019-19653] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2019-19653] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2019-19652] https://github.com/0xT11/CVE-POC
- [CVE-2019-19652] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2019-19652] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2019-19651] https://github.com/0xT11/CVE-POC
- [CVE-2019-19651] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2019-19651] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2019-19633] https://github.com/0xT11/CVE-POC
- [CVE-2019-19633] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2019-19633] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2019-19511] https://github.com/0xT11/CVE-POC
- [CVE-2019-19511] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2019-19511] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2019-19369] https://github.com/0xT11/CVE-POC
- [CVE-2019-19369] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2019-19369] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2019-19268] https://github.com/0xT11/CVE-POC
- [CVE-2019-19268] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2019-19268] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2019-14348] https://packetstormsecurity.com/files/153963/WordPress-JoomSport-3.3-SQL-Injection.html
- [CVE-2019-12796] https://github.com/0xT11/CVE-POC
- [CVE-2019-12796] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2019-12796] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2019-11358] https://github.com/ninjabelt52/Freight-Frenzy-code
- [CVE-2019-1010022] https://github.com/marklogic/marklogic-docker
- [CVE-2018-9546] https://github.com/geeksniper/reverse-engineering-toolkit
- [CVE-2018-9546] https://github.com/IOActive/AOSP-DownloadProviderHijacker
- [CVE-2018-9546] https://github.com/IOActive/AOSP-DownloadProviderDbDumper
- [CVE-2018-9546] https://github.com/0xT11/CVE-POC
- [CVE-2018-9546] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2018-9546] https://github.com/alphaSeclab/sec-daily-2019
- [CVE-2018-9468] https://github.com/IOActive/AOSP-DownloadProviderDbDumper
- [CVE-2018-9468] https://github.com/0xT11/CVE-POC
- [CVE-2018-9468] https://github.com/IOActive/AOSP-DownloadProviderHeadersDumper
- [CVE-2018-9468] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2018-9468] https://github.com/alphaSeclab/sec-daily-2019
- [CVE-2018-9411] https://github.com/lnick2023/nicenice
- [CVE-2018-9411] https://github.com/qazbnm456/awesome-cve-poc
- [CVE-2018-9411] https://github.com/0xT11/CVE-POC
- [CVE-2018-9411] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2018-9411] https://github.com/xbl3/awesome-cve-poc_qazbnm456
- [CVE-2018-9375] https://github.com/0xT11/CVE-POC
- [CVE-2018-9375] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2018-3260] https://github.com/vintagesucks/awesome-stars
- [CVE-2018-3260] https://github.com/ambynotcoder/C-libraries
- [CVE-2018-3260] https://github.com/uhub/awesome-c
- [CVE-2018-3260] https://github.com/developer3000S/PoC-in-GitHub
- [CVE-2018-3260] https://github.com/0xT11/CVE-POC
- [CVE-2018-3260] https://github.com/pathakabhi24/Awesome-C
- [CVE-2018-3260] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2018-3260] https://github.com/willyb321/willyb321-stars
- [CVE-2018-16341] https://github.com/merlinepedra/nuclei-templates
- [CVE-2018-16341] https://github.com/merlinepedra25/nuclei-templates
- [CVE-2018-16341] https://github.com/SexyBeast233/SecBooks
- [CVE-2018-16341] https://github.com/0xT11/CVE-POC
- [CVE-2018-16341] https://github.com/Ondrik8/byPass_AV
- [CVE-2018-16341] https://github.com/sobinge/nuclei-templates
- [CVE-2018-14463] https://packetstormsecurity.com/files/cve/CVE-2018-14463
- [CVE-2018-13149] https://github.com/lnick2023/nicenice
- [CVE-2018-13149] https://github.com/qazbnm456/awesome-cve-poc
- [CVE-2018-13149] https://github.com/xbl3/awesome-cve-poc_qazbnm456
- [CVE-2018-12598] https://github.com/0xT11/CVE-POC
- [CVE-2018-12597] https://github.com/0xT11/CVE-POC
- [CVE-2018-11397] https://github.com/sec-bit/awesome-buggy-erc20-tokens
- [CVE-2018-10993] https://github.com/20142995/pocsuite
- [CVE-2018-10993] https://github.com/imaginal/otplogin
- [CVE-2018-10715] https://github.com/0xT11/CVE-POC
- [CVE-2018-10467] https://github.com/0xT11/CVE-POC
- [CVE-2018-10467] https://github.com/hectorgie/PoC-in-GitHub
- [CVE-2017-13869] https://packetstormsecurity.com/files/cve/CVE-2017-13869
- [CVE-2016-8867] https://medium.com/@bmicklea/che-on-openshift-tech-preview-1b710d440e27
- [CVE-2016-6584] https://github.com/hoangcuongflp/MobileSecurity2016-recap
- [CVE-2015-8394] https://github.com/marklogic/marklogic-docker
- [CVE-2015-8393] https://github.com/marklogic/marklogic-docker
- [CVE-2015-8390] https://github.com/marklogic/marklogic-docker
- [CVE-2015-8387] https://github.com/marklogic/marklogic-docker
- [CVE-2015-8380] https://github.com/marklogic/marklogic-docker
- [CVE-2015-8356] https://packetstormsecurity.com/files/135258/Bitrix-mcart.xls-6.5.2-SQL-Injection.html
- [CVE-2015-2231] https://github.com/rednaga/disclosures
- [CVE-2014-4321] https://github.com/JERRY123S/all-poc
- [CVE-2014-4321] https://github.com/I-Prashanth-S/CybersecurityTIFAC
- [CVE-2014-4321] https://github.com/Qamar4P/awesome-android-cpp
- [CVE-2014-4321] https://github.com/weeka10/-hktalent-TOP
- [CVE-2014-4321] https://github.com/cyberanand1337x/bug-bounty-2022
- [CVE-2014-4321] https://github.com/tangsilian/android-vuln
- [CVE-2013-3900] https://github.com/Eduardmihai1997/VulnerabilityManagement
- [CVE-2012-3716] https://github.com/pippianders/wifi-hacking-tools
- [CVE-2005-2541] https://github.com/GoogleCloudPlatform/aactl