About 50 results
Open links in new tab
  1. Exploit Database - Exploits for Penetration Testers, Researchers, and ...

    The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.

  2. About the Exploit Database

    The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

  3. OpenSSH server (sshd) 9.8p1 - Race Condition - Linux remote Exploit

    Apr 22, 2025 · * Exploit Title : OpenSSH server (sshd) 9.8p1 - Race Condition * Author : Milad Karimi (Ex3ptionaL) * Date : 2025-04-16 * * Description: * Targets a signal handler race condition in …

  4. Exploit Database Statistics

    The following graphs and statistics provide you with a glimpse of the entries that have been added to the Exploit Database over the years. They will be re-generated, at minimum, on a monthly basis and will …

  5. Samba 3.0.20 < 3.0.25rc3 - 'Username' map script ... - Exploit Database

    Aug 18, 2010 · versions 3.0.20 through 3.0.25rc3 when using the non-default "username map script" configuration option. By specifying a username containing shell meta characters, attackers can …

  6. Exploit Database Papers

    Archived security papers and articles in various languages.

  7. Sar2HTML 3.2.1 - Remote Command Execution - PHP webapps Exploit

    Aug 2, 2019 · # Exploit Title: sar2html Remote Code Execution # Date: 01/08/2019 # Exploit Author: Furkan KAYAPINAR # Vendor Homepage:https://github.com/cemtan/sar2html # Software Link: …

  8. Apache 2.4.x - Buffer Overflow - Multiple webapps Exploit

    Apr 1, 2023 · # Exploit Title: Apache 2.4.x - Buffer Overflow # Date: Jan 2 2023 # Exploit Author: Sunil Iyengar # Vendor Homepage: https://httpd.apache.org/ # Software Link: …

  9. Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)

    Mar 8, 2022 · * * This exploit requires Linux 5.8 or later; the code path was made * reachable by commit f6dd975583bd ("pipe: merge * anon_pipe_buf*_ops"). The commit did not introduce the bug, it was * …

  10. GNU Screen 4.5.0 - Local Privilege Escalation - Exploit Database

    Jan 25, 2017 · GNU Screen 4.5.0 - Local Privilege Escalation.. local exploit for Linux platform