About 169,000 results
Open links in new tab
  1. Exploit Database - Exploits for Penetration Testers, Researchers, and ...

    The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.

  2. SOPlanning 1.52.01 (Simple Online Planning Tool) - Exploit Database

    Nov 15, 2024 · # Exploit Title: SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated) # Date: 6th October, 2024 # Exploit Author: Ardayfio Samuel Nii …

  3. Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)

    Mar 8, 2022 · * * This exploit requires Linux 5.8 or later; the code path was made * reachable by commit f6dd975583bd ("pipe: merge * anon_pipe_buf*_ops"). The commit did not introduce the bug, it was * …

  4. Exploit Database Statistics

    The following graphs and statistics provide you with a glimpse of the entries that have been added to the Exploit Database over the years. They will be re-generated, at minimum, on a monthly basis and will …

  5. Microsoft Excel - OLE Arbitrary Code Execution - Windows dos Exploit

    Sep 30, 2017 · Microsoft Excel - OLE Arbitrary Code Execution. CVE-2017-0199 . dos exploit for Windows platform

  6. Exploit Database Papers

    May 11, 2022 · Archived security papers and articles in various languages.

  7. Microsoft Excel 2024 Use after free - Exploit Database

    Jun 26, 2025 · Microsoft Excel 2024 Use after free - Remote Code Execution (RCE). CVE-2025-47165 . remote exploit for Windows platform

  8. WordPress Core 6.2 - Directory Traversal - PHP webapps Exploit

    Apr 22, 2025 · WordPress Core 6.2 - Directory Traversal. CVE-2023-2745 . webapps exploit for PHP platform

  9. Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free Privilege Escalation

    Feb 26, 2017 · Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free Privilege Escalation. CVE-2017-6074 . local exploit for Linux platform

  10. Exploit Database SearchSploit Manual

    The Exploit Database repository is the main core of Exploit-DB, making SearchSploit efficient and easy to use. However, some of the exploit metadata (such as screenshots, setup files, tags, and …