About 162,000 results
Open links in new tab
  1. Exploit Database - Exploits for Penetration Testers, Researchers, …

    The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.

  2. About the Exploit Database

    The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

  3. Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)

    Mar 8, 2022 · * * This exploit requires Linux 5.8 or later; the code path was made * reachable by commit f6dd975583bd ("pipe: merge * anon_pipe_buf*_ops"). The commit did not introduce …

  4. SOPlanning 1.52.01 (Simple Online Planning Tool) - Exploit Database

    Nov 15, 2024 · # Exploit Title: SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated) # Date: 6th October, 2024 # Exploit Author: Ardayfio Samuel …

  5. Exploit Database Statistics

    The following graphs and statistics provide you with a glimpse of the entries that have been added to the Exploit Database over the years. They will be re-generated, at minimum, on a monthly …

  6. Apache 2.4.x - Buffer Overflow - Multiple webapps Exploit

    Apr 1, 2023 · # Exploit Title: Apache 2.4.x - Buffer Overflow # Date: Jan 2 2023 # Exploit Author: Sunil Iyengar # Vendor Homepage: https://httpd.apache.org/ # Software Link: …

  7. Exploit Database Papers

    Archived security papers and articles in various languages.

  8. Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04 ...

    Jun 16, 2015 · Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - 'overlayfs' Local Privilege Escalation. CVE-2015-1328 . local exploit for Linux platform

  9. Ghost CMS 5.59.1 - Arbitrary File Read - Exploit Database

    Aug 11, 2025 · Ghost CMS 5.59.1 - Arbitrary File Read. CVE-2023-40028 . webapps exploit for Multiple platform

  10. Exploit Database SearchSploit Manual

    The Exploit Database repository is the main core of Exploit-DB, making SearchSploit efficient and easy to use. However, some of the exploit metadata (such as screenshots, setup files, tags, …