Skip to content

Vulnerabilities and Exploit

CVE - Common Vulnerabilities and Exposures

Each vulnerability is assigned a CVE ID with a standardized format like CVE-2024-29988

The MITRE corporation maintains the CVE system.

CVE Program Mission
National Vulnerability Database

Exploit database

Exploit Database is a public archive of exploit code, proof-of-concepts, shellcode, advisories and related vulnerability materials. It’s a community-driven and curated repository (maintained by Offensive Security) that collects examples of real-world exploits and links them to CVEs and references so security researchers and practitioners can study, reproduce, and learn from them.