About 108,000 results
Open links in new tab
  1. Exploit Database - Exploits for Penetration Testers, Researchers, and ...

    The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.

  2. Exploit Database Statistics

    The following graphs and statistics provide you with a glimpse of the entries that have been added to the Exploit Database over the years. They will be re-generated, at minimum, on a monthly basis and will …

  3. Exploit Database History

    Jul 8, 2009 · The domain exploit-db.com, was set up on the 17th of November 2009, where it still continues today. Milw0rm did not accept any updates after September 2009 and closed its doors for …

  4. Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)

    Mar 8, 2022 · * * This exploit requires Linux 5.8 or later; the code path was made * reachable by commit f6dd975583bd ("pipe: merge * anon_pipe_buf*_ops"). The commit did not introduce the bug, it was * …

  5. About the Exploit Database

    The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

  6. Google Hacking Database (GHDB) - Google Dorks, OSINT, Recon

    The GHDB is an index of search queries (we call them dorks) used to find publicly available information, intended for pentesters and security researchers.

  7. SOPlanning 1.52.01 (Simple Online Planning Tool) - Exploit Database

    Nov 15, 2024 · # Exploit Title: SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated) # Date: 6th October, 2024 # Exploit Author: Ardayfio Samuel Nii …

  8. AVTECH IP Camera / NVR / DVR Devices - Exploit Database

    Oct 11, 2016 · AVTECH IP Camera / NVR / DVR Devices - Multiple Vulnerabilities.. webapps exploit for CGI platform

  9. Exploit Database SearchSploit Manual

    The Exploit Database repository is the main core of Exploit-DB, making SearchSploit efficient and easy to use. However, some of the exploit metadata (such as screenshots, setup files, tags, and …

  10. Exploit Database Papers

    Archived security papers and articles in various languages.