About 75,500 results
Open links in new tab
  1. Exploit Database - Exploits for Penetration Testers, Researchers, …

    The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.

  2. PHP CGI Module 8.3.4 - Remote Code Execution (RCE) - Exploit …

    Jun 15, 2025 · PHP CGI Module 8.3.4 - Remote Code Execution (RCE). CVE-2024-4577 . webapps exploit for PHP platform

  3. Windows File Explorer Windows 11 (23H2) - Exploit Database

    May 29, 2025 · Windows File Explorer Windows 11 (23H2) - NTLM Hash Disclosure. CVE-2025-24071 . remote exploit for Windows platform

  4. Sitecore 10.4 - Remote Code Execution (RCE) - Exploit Database

    Jun 26, 2025 · Sitecore 10.4 - Remote Code Execution (RCE). CVE-2025-27218 . webapps exploit for Multiple platform

  5. Remote Keyboard Desktop 1.0.1 - Exploit Database

    May 21, 2025 · Remote Keyboard Desktop 1.0.1 - Remote Code Execution (RCE).. remote exploit for Windows platform

  6. About the Exploit Database

    The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

  7. Online Book Store 1.0 - Unauthenticated Remote Code Execution

    Jan 8, 2020 · Online Book Store 1.0 - Unauthenticated Remote Code Execution.. webapps exploit for PHP platform

  8. Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04 ...

    Jun 16, 2015 · Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - 'overlayfs' Local Privilege Escalation. CVE-2015-1328 . local exploit for Linux platform

  9. Rejetto HTTP File Server (HFS) 2.3.x - Exploit Database

    Jan 4, 2016 · Rejetto HTTP File Server (HFS) 2.3.x - Remote Command Execution (2). CVE-2014-6287CVE-111386 . remote exploit for Windows platform

  10. Google Hacking Database (GHDB) - Google Dorks, OSINT, Recon

    The GHDB is an index of search queries (we call them dorks) used to find publicly available information, intended for pentesters and security researchers.