About 110,000 results
Open links in new tab
  1. Exploit Database - Exploits for Penetration Testers, Researchers, …

    The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.

  2. About the Exploit Database

    The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

  3. Aurba 501 - Authenticated RCE - Linux webapps Exploit

    Aug 24, 2024 · # Exploit Title: Remote Command Execution | Aurba 501 # Date: 17-07-2024 # Exploit Author: Hosein Vita # Vendor Homepage: https://www.hpe.com # Version: Aurba 501 …

  4. Exploit Database Papers

    Archived security papers and articles in various languages.

  5. Exploit Database Statistics

    The following graphs and statistics provide you with a glimpse of the entries that have been added to the Exploit Database over the years. They will be re-generated, at minimum, on a monthly …

  6. Roundcube 1.6.10 - Remote Code Execution (RCE) - Exploit Database

    Jun 13, 2025 · Roundcube 1.6.10 - Remote Code Execution (RCE). CVE-2025-49113 . webapps exploit for Multiple platform

  7. NTLM Hash Leak Malicious Windows Theme - Exploit Database

    Mar 22, 2025 · Microsoft Windows - NTLM Hash Leak Malicious Windows Theme. CVE-2024-21320 . remote exploit for Windows platform

  8. Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)

    Mar 8, 2022 · * * This exploit requires Linux 5.8 or later; the code path was made * reachable by commit f6dd975583bd ("pipe: merge * anon_pipe_buf*_ops"). The commit did not introduce …

  9. Exploit Database SearchSploit Manual

    The Exploit Database repository is the main core of Exploit-DB, making SearchSploit efficient and easy to use. However, some of the exploit metadata (such as screenshots, setup files, tags, …

  10. Apache James Server 2.3.2 - Remote Command Execution (RCE ...

    Sep 28, 2021 · This Python 3 implementation is based on the original (Python 2) exploit code developed by Jakub Palaczynski, Marcin Woloszyn, Maciej Grabiec. The following …