About 75,100 results
Open links in new tab
  1. Exploit Database - Exploits for Penetration Testers, Researchers, …

    The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.

  2. About the Exploit Database

    The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

  3. Microsoft Excel - OLE Arbitrary Code Execution - Windows dos …

    Sep 30, 2017 · Microsoft Excel - OLE Arbitrary Code Execution. CVE-2017-0199 . dos exploit for Windows platform

  4. Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)

    Mar 8, 2022 · * * This exploit requires Linux 5.8 or later; the code path was made * reachable by commit f6dd975583bd ("pipe: merge * anon_pipe_buf*_ops"). The commit did not introduce …

  5. Exploit Database Papers

    Archived security papers and articles in various languages.

  6. Exploit Database Statistics

    The following graphs and statistics provide you with a glimpse of the entries that have been added to the Exploit Database over the years. They will be re-generated, at minimum, on a monthly …

  7. Exploit Database History

    Jul 8, 2009 · The domain exploit-db.com, was set up on the 17th of November 2009, where it still continues today. Milw0rm did not accept any updates after September 2009 and closed its …

  8. Exploit Database Submission Guidelines

    Want to submit your exploit to us? Here’s what you need to know. We deal with dozens of submissions a day, verifying, testing and cataloging the exploits we receive. When possible, …

  9. Microsoft Office - OLE Remote Code Execution - Windows remote …

    Nov 20, 2017 · Microsoft Office - OLE Remote Code Execution. CVE-2017-11882 . remote exploit for Windows platform

  10. Exploit Database SearchSploit Manual

    The Exploit Database repository is the main core of Exploit-DB, making SearchSploit efficient and easy to use. However, some of the exploit metadata (such as screenshots, setup files, tags, …