About 50 results
Open links in new tab
  1. Exploit Database - Exploits for Penetration Testers, Researchers, and ...

    The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.

  2. Exploit Database Statistics

    The following graphs and statistics provide you with a glimpse of the entries that have been added to the Exploit Database over the years. They will be re-generated, at minimum, on a monthly basis and will …

  3. Roundcube 1.6.10 - Remote Code Execution (RCE) - Exploit Database

    Jun 13, 2025 · Roundcube 1.6.10 - Remote Code Execution (RCE). CVE-2025-49113 . webapps exploit for Multiple platform

  4. Google Hacking Database (GHDB) - Google Dorks, OSINT, Recon

    The GHDB is an index of search queries (we call them dorks) used to find publicly available information, intended for pentesters and security researchers.

  5. Exploit Database Papers

    May 11, 2022 · Archived security papers and articles in various languages.

  6. Microsoft Excel - OLE Arbitrary Code Execution - Windows dos Exploit

    Sep 30, 2017 · Microsoft Excel - OLE Arbitrary Code Execution. CVE-2017-0199 . dos exploit for Windows platform

  7. Microsoft Windows .NET Framework - Remote Code Execution - Exploit …

    Sep 13, 2017 · Microsoft Windows .NET Framework - Remote Code Execution. CVE-2017-8759 . remote exploit for Windows platform

  8. Apache HTTP Server 2.4.49 - Exploit Database

    Oct 6, 2021 · Apache HTTP Server 2.4.49 - Path Traversal & Remote Code Execution (RCE). CVE-2021-41773 . webapps exploit for Multiple platform

  9. Windows File Explorer Windows 11 (23H2) - Exploit Database

    May 29, 2025 · Windows File Explorer Windows 11 (23H2) - NTLM Hash Disclosure. CVE-2025-24071 . remote exploit for Windows platform

  10. Exploit Database FAQ

    Why did you not accept my submitted exploit? Do you hold on to exploits before publishing them? Do you have some nefarious scheme whereby you siphon off exploits for your own use? I sent you an …