Skip to content
#

Common Vulnerabilities and Exposures (CVE)

The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. The United States' National Cybersecurity FFRDC, operated by The Mitre Corporation, maintains the system, with funding from the US National Cyber Security Division of the US Department of Homeland Security

Here are 651 public repositories matching this topic...

渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms

  • Updated Jul 8, 2022
  • PowerShell
dagobertdebug
dagobertdebug commented Apr 6, 2022

Is your feature request related to a problem?
Sometimes its hard to know the vendor for a product in the "my products" list, eg. if the product's name is "4221" (-> Cisco).

Do you have a solution in mind, or a suggestion to improve OpenCVE?
In /account/subscriptions it would be great to have the vendor name and the product name in one line.
CPE 2.3 string would be additionally a gre

enhancement good first issue

Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber

  • Updated Jul 19, 2021
  • C
Wikipedia
Wikipedia