Vulnerabilities and Exploit
CVE - Common Vulnerabilities and Exposures
Each vulnerability is assigned a CVE ID with a standardized format like CVE-2024-29988
The MITRE corporation maintains the CVE system.
CVE Program Mission
National Vulnerability Database
Exploit database
Exploit Database is a public archive of exploit code, proof-of-concepts, shellcode, advisories and related vulnerability materials. It’s a community-driven and curated repository (maintained by Offensive Security) that collects examples of real-world exploits and links them to CVEs and references so security researchers and practitioners can study, reproduce, and learn from them.