About 163,000 results
Open links in new tab
  1. Exploit Database - Exploits for Penetration Testers, Researchers, …

    The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.

  2. Unauthenticated Remote Code Execution - Exploit Database

    Jan 8, 2020 · Online Book Store 1.0 - Unauthenticated Remote Code Execution.. webapps exploit for PHP platform

  3. Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)

    Mar 8, 2022 · * * This exploit requires Linux 5.8 or later; the code path was made * reachable by commit f6dd975583bd ("pipe: merge * anon_pipe_buf*_ops"). The commit did not introduce …

  4. Google Hacking Database (GHDB) - Google Dorks, OSINT, Recon

    The GHDB is an index of search queries (we call them dorks) used to find publicly available information, intended for pentesters and security researchers.

  5. Rejetto HTTP File Server (HFS) 2.3.x - Exploit Database

    Jan 4, 2016 · Rejetto HTTP File Server (HFS) 2.3.x - Remote Command Execution (2). CVE-2014-6287CVE-111386 . remote exploit for Windows platform

  6. Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04 ...

    Jun 16, 2015 · Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - 'overlayfs' Local Privilege Escalation. CVE-2015-1328 . local exploit for Linux platform

  7. Samba 3.0.20 < 3.0.25rc3 - 'Username' map script ... - Exploit …

    Aug 18, 2010 · versions 3.0.20 through 3.0.25rc3 when using the non-default "username map script" configuration option. By specifying a username containing shell meta characters, …

  8. WordPress Core 6.2 - Directory Traversal - PHP webapps Exploit

    Apr 22, 2025 · WordPress Core 6.2 - Directory Traversal. CVE-2023-2745 . webapps exploit for PHP platform

  9. Apache 2.4.x - Buffer Overflow - Multiple webapps Exploit

    Apr 1, 2023 · Apache 2.4.x - Buffer Overflow. CVE-2021-44790 . webapps exploit for Multiple platform

  10. About the Exploit Database

    The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.