CVE Exploits Repository

This repository contains curated proof-of-concept exploits and exploitation artifacts derived from real-world vulnerabilities.

All materials are published strictly for security research, technical analysis, and reproducibility purposes.

The focus is on memory corruption, kernel exploitation, and system-level vulnerability research.

CVE Description Type Vulnerability release date Author
CVE-2025-39913 UAF in kernel ≤ 6.12.38 linux (psock-cork)OS2025-10-01Byte Reaper
CVE-2025-39866use-after-free and race condition in linux kernel 6.12.16OS2025-09-26Byte Reaper
CVE-2025-7795Buffer overflow vulnerability in Tenda routersNetwork2025-07-18Byte Reaper
CVE-2025-47917Use-After-Free in mbedTLS leading to remote code execution (RCE)Network2025-07-20Byte Reaper
CVE-2022-0847Dirty Pipe in Linux kernel ≤5.16.11 (privilege escalation.)OS2022-03-29Byte Reaper

External Research Submissions

Bytrep selectively reviews external research artifacts that align with the scope and technical depth of our work.

Submissions may include proof-of-concept exploits, technical analyses, or vulnerability research derived from real-world security issues.

All submissions are evaluated by our internal research team. Publication is at the sole discretion of Bytrep.

Contact

Research submissions can be sent to:

Contact@bytrep.com