{
	"id": "d885bfe0-027f-4390-ad4b-0324b676d2d7",
	"created_at": "2026-04-06T01:29:02.80391Z",
	"updated_at": "2026-04-10T03:20:18.658962Z",
	"deleted_at": null,
	"sha1_hash": "69a6d42f50017fcf1b01e9a73104e5e25bbbdf74",
	"title": "Exploit Database - Exploits for Penetration Testers, Researchers, and Ethical Hackers",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 170412,
	"plain_text": "EXPLOIT DATABASE\r\n󰠭 EXPLOITS\r\n󰜏 GHDB\r\n󰈤 PAPERS\r\n󰘚 SHELLCODES\r\n󰡦 SEARCH EDB\r\n󰗚 SEARCHSPLOIT MANUAL\r\n󰕒 SUBMISSIONS\r\n󰑴 ONLINE TRAINING\r\nShow details\r\nThis website uses cookies\r\nWe use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about\r\nyour use of our site with our social media, advertising and analytics partners who may combine it with other information that you’ve provided\r\nto them or that they’ve collected from your use of their services. You consent to our cookies if you continue to use our website.\r\nAllow all cookies\r\nUse necessary cookies only\r\nhttps://www.exploit-db.com/\r\nPage 1 of 3\n\n󰈲 Filters\r\n󰈵 Reset All\r\nShow 15\r\nSearch:\r\nDate D A V Title Type Platform Author\r\n2026-\r\n03-03 󰇚 󰅖\r\nWordPress Backup Migration 1.3.7 -\r\nRemote Command Execution WebApps Multiple dangwenjing\r\n2026-\r\n03-03 󰇚 󰅖\r\nmailcow 2025-01a - Host Header\r\nPassword Reset Poisoning\r\nWebApps Multiple alvarez\r\n2026-\r\n03-03 󰇚 󰅖\r\nEasy File Sharing Web Server v7.2 -\r\nBuffer Overflow WebApps Multiple diogo\r\n2026-\r\n03-03 󰇚 󰅖 WeGIA 3.5.0 - SQL Injection WebApps PHP onurdemir\r\n2026-\r\n03-03 󰇚 󰅖\r\nBoss Mini v1.4.0 - Local File\r\nInclusion (LFI) WebApps Multiple andersoncezar048\r\n2026-\r\n02-11 󰇚 󰅖 motionEye 0.43.1b4 - RCE WebApps Multiple prabhat\r\n2026-\r\n02-11 󰇚 󰅖\r\nWindows 10.0.17763.7009 -\r\nspoofing vulnerability\r\nRemote Windows beatrizfn\r\n2026-\r\n02-11 󰇚 󰅖 glibc 2.38 - Buffer Overflow Local Linux\r\nBeatriz Fresno\r\nNaumova\r\n2026-\r\n02-04 󰇚 󰅖\r\nwindows 10/11 - NTLM Hash\r\nDisclosure Spoofing\r\nRemote Windows beatrizfn\r\n2026-\r\n02-04 󰇚 󰅖 Redis 8.0.2 - RCE Remote Linux\r\nBeatriz Fresno\r\nNaumova\r\n2026-\r\n02-04 󰇚 󰅖 OctoPrint 1.11.2 - File Upload WebApps Multiple prabhat\r\n2026-\r\n02-04 󰇚 󰅖\r\nIngress-NGINX Admission\r\nController v1.11.1 - FD Injection to\r\nRCE\r\nRemote Multiple\r\nBeatriz Fresno\r\nNaumova\r\n2026-\r\n02-04 󰇚 󰅖\r\naiohttp 3.9.1 - directory traversal\r\nPoC\r\nWebApps Python\r\nBeatriz Fresno\r\nNaumova\r\n2026-\r\n02-04 󰇚 󰅖\r\nFortiWeb Fabric Connector 7.6.x -\r\nSQL Injection to Remote Code\r\nExecution\r\nWebApps Multiple Milad Karimi\r\n(Ex3ptionaL)\r\n2026-\r\n02-04 󰇚 󰅖\r\nDocker Desktop 4.44.3 -\r\nUnauthenticated API Exposure\r\nLocal Multiple aprillefou\r\nShowing 1 to 15 of 46,496 entries\r\nFIRST PREVIOUS\r\n2 3 4 5 … 3100 NEXT LAST\r\nDatabases\r\nLinks\r\nSites\r\nSolutions\r\n1\r\nEXPLOIT DATABASE\r\n󰠭 EXPLOITS\r\n󰜏 GHDB\r\n󰈤 PAPERS\r\n󰘚 SHELLCODES\r\n󰡦 SEARCH EDB\r\n󰗚 SEARCHSPLOIT MANUAL\r\n󰕒 SUBMISSIONS\r\n󰑴 ONLINE TRAINING\r\nShow details\r\nThis website uses cookies\r\nWe use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about\r\nyour use of our site with our social media, advertising and analytics partners who may combine it with other information that you’ve provided\r\nto them or that they’ve collected from your use of their services. You consent to our cookies if you continue to use our website.\r\nhttps://www.exploit-db.com/\r\nPage 2 of 3\n\n󰕄 󰈌 󰮠 󰑫 EXPLOIT DATABASE BY OFFSEC TERMS PRIVACY ABOUT US FAQ COOKIES\r\n©\r\nOffSec Services Limited 2026. All rights reserved.\r\nEXPLOIT DATABASE\r\n󰠭 EXPLOITS\r\n󰜏 GHDB\r\n󰈤 PAPERS\r\n󰘚 SHELLCODES\r\n󰡦 SEARCH EDB\r\n󰗚 SEARCHSPLOIT MANUAL\r\n󰕒 SUBMISSIONS\r\n󰑴 ONLINE TRAINING\r\nShow details\r\nThis website uses cookies\r\nWe use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about\r\nyour use of our site with our social media, advertising and analytics partners who may combine it with other information that you’ve provided\r\nto them or that they’ve collected from your use of their services. You consent to our cookies if you continue to use our website.\r\nhttps://www.exploit-db.com/\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://www.exploit-db.com/"
	],
	"report_names": [
		"www.exploit-db.com"
	],
	"threat_actors": [],
	"ts_created_at": 1775438942,
	"ts_updated_at": 1775791218,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/69a6d42f50017fcf1b01e9a73104e5e25bbbdf74.pdf",
		"text": "https://archive.orkl.eu/69a6d42f50017fcf1b01e9a73104e5e25bbbdf74.txt",
		"img": "https://archive.orkl.eu/69a6d42f50017fcf1b01e9a73104e5e25bbbdf74.jpg"
	}
}