About 129,000 results
Open links in new tab
  1. Exploit Database - Exploits for Penetration Testers, Researchers, …

    The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.

  2. SOPlanning 1.52.01 (Simple Online Planning Tool) - Exploit Database

    Nov 15, 2024 · # Exploit Title: SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated) # Date: 6th October, 2024 # Exploit Author: Ardayfio Samuel …

  3. About the Exploit Database

    The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

  4. OpenSSH server (sshd) 9.8p1 - Race Condition - Linux remote Exploit

    Apr 22, 2025 · * Exploit Title : OpenSSH server (sshd) 9.8p1 - Race Condition * Author : Milad Karimi (Ex3ptionaL) * Date : 2025-04-16 * * Description: * Targets a signal handler race …

  5. Rejetto HTTP File Server (HFS) 2.3.x - Exploit Database

    Jan 4, 2016 · Rejetto HTTP File Server (HFS) 2.3.x - Remote Command Execution (2). CVE-2014-6287CVE-111386 . remote exploit for Windows platform

  6. LimeSurvey Community 5.3.32 - Stored XSS - PHP webapps Exploit

    Mar 25, 2024 · # Exploit Title: Stored Cross-Site Scripting (XSS) in LimeSurvey Community Edition Version 5.3.32+220817 # Exploit Author: Subhankar Singh # Date: 2024-02-03 # …

  7. Apache Tomcat 11.0.3 - Remote Code Execution - Exploit Database

    Apr 7, 2025 · Apache Tomcat 11.0.3 - Remote Code Execution. CVE-2025-24813 . webapps exploit for Multiple platform

  8. Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04 ...

    Jun 16, 2015 · Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - 'overlayfs' Local Privilege Escalation. CVE-2015-1328 . local exploit for Linux platform

  9. Exploit Database Papers

    Archived security papers and articles in various languages.

  10. Exploit Database Statistics

    The following graphs and statistics provide you with a glimpse of the entries that have been added to the Exploit Database over the years. They will be re-generated, at minimum, on a monthly …