
Exploit Database - Exploits for Penetration Testers, Researchers, …
The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.
About the Exploit Database
The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.
Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)
Mar 8, 2022 · * * This exploit requires Linux 5.8 or later; the code path was made * reachable by commit f6dd975583bd ("pipe: merge * anon_pipe_buf*_ops"). The commit did not introduce …
Microsoft Excel - OLE Arbitrary Code Execution - Windows dos …
Sep 30, 2017 · Microsoft Excel - OLE Arbitrary Code Execution. CVE-2017-0199 . dos exploit for Windows platform
Exploit Database Statistics
The following graphs and statistics provide you with a glimpse of the entries that have been added to the Exploit Database over the years. They will be re-generated, at minimum, on a monthly …
Exploit Database Papers
Archived security papers and articles in various languages.
Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free Privilege Escalation
Feb 26, 2017 · Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free Privilege Escalation. CVE-2017-6074 . local exploit for Linux platform
NodeJS 24.x - Path Traversal - NodeJS remote Exploit
Jul 16, 2025 · NodeJS 24.x - Path Traversal. CVE-2025-27210 . remote exploit for NodeJS platform
Moodle - Remote Command Execution (Metasploit) - Linux …
Oct 31, 2013 · Moodle - Remote Command Execution (Metasploit). CVE-2013-3630CVE-99140 . remote exploit for Linux platform
Exploit Database SearchSploit Manual
The Exploit Database repository is the main core of Exploit-DB, making SearchSploit efficient and easy to use. However, some of the exploit metadata (such as screenshots, setup files, tags, …