About 183,000 results
Open links in new tab
  1. Exploit Database - Exploits for Penetration Testers, Researchers, …

    The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.

  2. Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)

    Mar 8, 2022 · * * author: Max Kellermann <[email protected]> * * Proof-of-concept exploit for the Dirty Pipe * vulnerability (CVE-2022-0847) caused by an uninitialized * …

  3. Google Hacking Database (GHDB) - Google Dorks, OSINT, Recon

    The GHDB is an index of search queries (we call them dorks) used to find publicly available information, intended for pentesters and security researchers.

  4. Rejetto HTTP File Server (HFS) 2.3.x - Exploit Database

    Jan 4, 2016 · Rejetto HTTP File Server (HFS) 2.3.x - Remote Command Execution (2). CVE-2014-6287CVE-111386 . remote exploit for Windows platform

  5. Online Book Store 1.0 - Unauthenticated Remote Code Execution

    Jan 8, 2020 · Online Book Store 1.0 - Unauthenticated Remote Code Execution.. webapps exploit for PHP platform

  6. About the Exploit Database

    The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

  7. Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04 ...

    Jun 16, 2015 · Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - 'overlayfs' Local Privilege Escalation. CVE-2015-1328 . local exploit for Linux platform

  8. Apache HTTP Server 2.4.49 - Exploit Database

    Oct 6, 2021 · Apache HTTP Server 2.4.49 - Path Traversal & Remote Code Execution (RCE). CVE-2021-41773 . webapps exploit for Multiple platform

  9. 5.3.12 / < 5.4.2 - cgi-bin Remote Code Execution - Exploit Database

    Oct 29, 2013 · The vulnerability makes it possible to execute the binary because this binary has a security check enabled when installed with Apache http server and this security check is …

  10. Cisco IOS - Remote Code Execution - Hardware remote Exploit

    Jan 5, 2018 · The exploit requires shellcode as HEX input. This repo contains an example shellcode for bypassing authentication in telnet service and in enable prompt. Shellcode to …