
Exploit Database - Exploits for Penetration Testers, Researchers, and ...
The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.
SOPlanning 1.52.01 (Simple Online Planning Tool) - Exploit Database
Nov 15, 2024 · # Exploit Title: SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated) # Date: 6th October, 2024 # Exploit Author: Ardayfio Samuel Nii …
About the Exploit Database
The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.
Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)
Mar 8, 2022 · * * This exploit requires Linux 5.8 or later; the code path was made * reachable by commit f6dd975583bd ("pipe: merge * anon_pipe_buf*_ops"). The commit did not introduce the bug, it was * …
OpenSSH server (sshd) 9.8p1 - Race Condition - Linux remote Exploit
Apr 22, 2025 · * Exploit Title : OpenSSH server (sshd) 9.8p1 - Race Condition * Author : Milad Karimi (Ex3ptionaL) * Date : 2025-04-16 * * Description: * Targets a signal handler race condition in …
Exploit Database Statistics
The following graphs and statistics provide you with a glimpse of the entries that have been added to the Exploit Database over the years. They will be re-generated, at minimum, on a monthly basis and will …
Exploit Database Papers
May 11, 2022 · Archived security papers and articles in various languages.
WordPress Core 6.2 - Directory Traversal - PHP webapps Exploit
Apr 22, 2025 · WordPress Core 6.2 - Directory Traversal. CVE-2023-2745 . webapps exploit for PHP platform
Microsoft Windows 11 Version 24H2 Cross Device Service - Exploit …
Jun 9, 2025 · # # This exploit requires low privileges and user interaction but has low attack complexity # and results in high impact due to full privilege escalation. # import os
Exploit Database SearchSploit Manual
The Exploit Database repository is the main core of Exploit-DB, making SearchSploit efficient and easy to use. However, some of the exploit metadata (such as screenshots, setup files, tags, and …