
Exploit Database - Exploits for Penetration Testers, Researchers, and ...
The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.
WiFi Mouse 1.7.8.5 - Remote Code Execution - Windows remote Exploit
Mar 1, 2021 · WiFi Mouse 1.7.8.5 - Remote Code Execution.. remote exploit for Windows platform
Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)
Mar 8, 2022 · * * This exploit requires Linux 5.8 or later; the code path was made * reachable by commit f6dd975583bd ("pipe: merge * anon_pipe_buf*_ops"). The commit did not introduce the bug, it was * …
About the Exploit Database
The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.
Exploit Database Statistics
The following graphs and statistics provide you with a glimpse of the entries that have been added to the Exploit Database over the years. They will be re-generated, at minimum, on a monthly basis and will …
Exploit Database Papers
Archived security papers and articles in various languages.
AVTECH IP Camera / NVR / DVR Devices - Exploit Database
Oct 11, 2016 · AVTECH IP Camera / NVR / DVR Devices - Multiple Vulnerabilities.. webapps exploit for CGI platform
Exploit Database SearchSploit Manual
The Exploit Database repository is the main core of Exploit-DB, making SearchSploit efficient and easy to use. However, some of the exploit metadata (such as screenshots, setup files, tags, and …
Apache 2.4.x - Buffer Overflow - Multiple webapps Exploit
Apr 1, 2023 · Apache 2.4.x - Buffer Overflow. CVE-2021-44790 . webapps exploit for Multiple platform
Exploit Database Submission Guidelines
Want to submit your exploit to us? Here’s what you need to know. We deal with dozens of submissions a day, verifying, testing and cataloging the exploits we receive. When possible, we go as far as testing …