About 112,000 results
Open links in new tab
  1. Exploit Database - Exploits for Penetration Testers, Researchers, …

    The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.

  2. About the Exploit Database

    The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

  3. Exploit Database Statistics

    The following graphs and statistics provide you with a glimpse of the entries that have been added to the Exploit Database over the years. They will be re-generated, at minimum, on a monthly …

  4. Exploit Database Papers

    Archived security papers and articles in various languages.

  5. OpenSSH server (sshd) 9.8p1 - Race Condition - Linux remote Exploit

    Apr 22, 2025 · * Exploit Title : OpenSSH server (sshd) 9.8p1 - Race Condition * Author : Milad Karimi (Ex3ptionaL) * Date : 2025-04-16 * * Description: * Targets a signal handler race …

  6. Roundcube 1.6.10 - Remote Code Execution (RCE) - Exploit Database

    Jun 13, 2025 · Roundcube 1.6.10 - Remote Code Execution (RCE). CVE-2025-49113 . webapps exploit for Multiple platform

  7. Exploit Database SearchSploit Manual

    The Exploit Database repository is the main core of Exploit-DB, making SearchSploit efficient and easy to use. However, some of the exploit metadata (such as screenshots, setup files, tags, …

  8. Apache HTTP Server 2.4.49 - Exploit Database

    Oct 6, 2021 · Apache HTTP Server 2.4.49 - Path Traversal & Remote Code Execution (RCE). CVE-2021-41773 . webapps exploit for Multiple platform

  9. SOPlanning 1.52.01 (Simple Online Planning Tool) - Exploit Database

    Nov 15, 2024 · # Exploit Title: SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated) # Date: 6th October, 2024 # Exploit Author: Ardayfio Samuel …

  10. Exploit Database FAQ

    Why did you not accept my submitted exploit? Do you hold on to exploits before publishing them? Do you have some nefarious scheme whereby you siphon off exploits for your own use? I sent …