
Exploit Database - Exploits for Penetration Testers, Researchers, and ...
The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.
About the Exploit Database
The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.
Exploit Database Papers
May 11, 2022 · Archived security papers and articles in various languages.
Google Hacking Database (GHDB) - Google Dorks, OSINT, Recon
The GHDB is an index of search queries (we call them dorks) used to find publicly available information, intended for pentesters and security researchers.
WordPress Core 6.2 - Directory Traversal - PHP webapps Exploit
Apr 22, 2025 · WordPress Core 6.2 - Directory Traversal. CVE-2023-2745 . webapps exploit for PHP platform
OpenSSH server (sshd) 9.8p1 - Race Condition - Linux remote Exploit
Apr 22, 2025 · * Exploit Title : OpenSSH server (sshd) 9.8p1 - Race Condition * Author : Milad Karimi (Ex3ptionaL) * Date : 2025-04-16 * * Description: * Targets a signal handler race condition in …
Apache 2.4.x - Buffer Overflow - Multiple webapps Exploit
Apr 1, 2023 · # Exploit Title: Apache 2.4.x - Buffer Overflow # Date: Jan 2 2023 # Exploit Author: Sunil Iyengar # Vendor Homepage: https://httpd.apache.org/ # Software Link: …
Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)
Mar 8, 2022 · * * This exploit requires Linux 5.8 or later; the code path was made * reachable by commit f6dd975583bd ("pipe: merge * anon_pipe_buf*_ops"). The commit did not introduce the bug, it was * …
Aurba 501 - Authenticated RCE - Linux webapps Exploit
Aug 24, 2024 · # Exploit Title: Remote Command Execution | Aurba 501 # Date: 17-07-2024 # Exploit Author: Hosein Vita # Vendor Homepage: https://www.hpe.com # Version: Aurba 501 CN12G5W0XX …
Exploit Database Statistics
The following graphs and statistics provide you with a glimpse of the entries that have been added to the Exploit Database over the years. They will be re-generated, at minimum, on a monthly basis and will …