[ { "exploit_id": "EDB-51664", "cve": "CVE-2023-12345", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 48 c7 c0 29 00 00 00 0f 05 48 89 c7 48 c7 c0 32 00 00 00 48 31 d2 48 89 e6 48 83 c6 10 48 c7 46 10 7f 00 00 01 48 c7 46 18 00 00 00 00 48 c7 46 20 10 00 00 00 0f 05 ...", "description": "Linux x64 TCP bind shell listening on port 4444 for incoming connections.", "source": "https://www.exploit-db.com/exploits/51664", "date_added": "2025-07-15" }, { "exploit_id": "EDB-49876", "cve": "CVE-2022-09876", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.8, "shellcode": "fc e8 82 00 00 00 60 89 e5 31 c0 64 8b 50 30 8b 52 0c 8b 52 14 8b 72 28 0f b7 4a 26 31 ff ac 3c 61 7c 02 2c 20 c1 cf 0d 01 c7 e2 f2 52 57 8b 52 10 ...", "description": "Windows x86 format string exploit to escalate privileges via kernel32.dll.", "source": "https://www.exploit-db.com/exploits/49876", "date_added": "2025-07-15" }, { "exploit_id": "GH-2023-ARM", "cve": "CVE-2023-54321", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 e1a07000 e3a00032 e3a02000 e28f6010 e5861004 e5861008 e586200c ef000000 ...", "description": "ARM-based IoT device exploit leveraging use-after-free to exfiltrate data over UDP.", "source": "https://github.com/exploits/arm-iot-2023", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2024-XYZ", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 11 5c 83 15 00 01 51 48 89 e6 6a 10 5a 6a 2a 58 0f 05 6a 03 5e 48 ff ce 79 06 6a 3c 58 0f 05 6a 01 5e 6a 2b 58 0f 05 ...", "description": "Linux x64 reverse shell connecting back to attacker on port 4444, sourced from CTF challenge.", "source": "CTF-XYZ-2024", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52001", "cve": "CVE-2024-45678", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 48 8b 70 20 48 8b 58 50 48 83 c7 10 48 89 e6 48 83 c6 10 48 c7 c0 3b 00 00 00 0f 05 ...", "description": "Windows x64 heap overflow exploit to execute a remote command shell.", "source": "https://www.exploit-db.com/exploits/52001", "date_added": "2025-07-15" }, { "exploit_id": "GH-2024-MIPS", "cve": "CVE-2023-98765", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 00 84 24 00 3c 0a 00 00 35 4a 00 00 00 8a 24 00 ...", "description": "MIPS-based router buffer overflow for persistent backdoor installation.", "source": "https://github.com/exploits/mips-2024", "date_added": "2025-07-15" }, { "exploit_id": "EDB-51789", "cve": "CVE-2023-23456", "vulnerability_type": "Privilege Escalation", "platform": "macOS", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.2, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 48 31 c0 48 83 c0 3b 48 31 d2 48 89 e6 48 c7 c0 00 00 00 00 0f 05 ...", "description": "macOS x64 exploit to gain root access via kernel vulnerability.", "source": "https://www.exploit-db.com/exploits/51789", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-ABC", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x86", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 format string exploit to leak memory addresses, sourced from CTF challenge.", "source": "CTF-ABC-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52234", "cve": "CVE-2024-67890", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.3, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 48 c7 c0 29 00 00 00 0f 05 48 89 c7 48 b8 7f 00 00 01 11 5c 00 00 50 48 89 e6 6a 10 5a 6a 2a 58 0f 05 ...", "description": "Windows x64 reverse shell connecting to attacker on port 4444.", "source": "https://www.exploit-db.com/exploits/52234", "date_added": "2025-07-15" }, { "exploit_id": "GH-2024-LINUX", "cve": "CVE-2023-11223", "vulnerability_type": "Use-After-Free", "platform": "Linux", "architecture": "x64", "payload_goal": "Lateral Movement", "cvss_score": 8.4, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 48 c7 c0 29 00 00 00 0f 05 48 89 c7 48 c7 c0 32 00 00 00 48 31 d2 48 89 e6 48 83 c6 10 ...", "description": "Linux x64 use-after-free exploit for lateral movement within a network.", "source": "https://github.com/exploits/linux-2024", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52345", "cve": "CVE-2024-78901", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 6a 29 58 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 11 5c 83 15 00 01 51 48 89 e6 6a 10 5a 6a 2a 58 0f 05 ...", "description": "Linux x64 buffer overflow for RCE, spawning a TCP bind shell on port 4444.", "source": "https://www.exploit-db.com/exploits/52345", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52346", "cve": "CVE-2024-78902", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.9, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 8b 72 28 0f b7 4a 26 31 ff 31 c0 ac 3c 61 7c 02 2c 20 c1 cf 0d ...", "description": "Windows x86 format string exploit to escalate privileges via ntdll.dll.", "source": "https://www.exploit-db.com/exploits/52346", "date_added": "2025-07-15" }, { "exploit_id": "GH-2024-IOT1", "cve": "CVE-2024-78903", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 8.3, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 e1a07000 e3a00032 e3a02000 e28f6010 e5861004 ...", "description": "ARM-based IoT exploit leveraging use-after-free to exfiltrate data over HTTP.", "source": "https://github.com/exploits/iot-2024", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-DEF", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.1, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 11 5c 83 15 00 01 51 48 89 e6 6a 10 5a 6a 2a 58 0f 05 6a 3b 58 48 31 d2 ...", "description": "Linux x64 reverse shell connecting to attacker on port 4444, from CTF challenge.", "source": "CTF-DEF-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52347", "cve": "CVE-2024-78904", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.7, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 48 8b 70 20 48 8b 58 50 48 83 c7 10 48 89 e6 48 83 c6 10 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell.", "source": "https://www.exploit-db.com/exploits/52347", "date_added": "2025-07-15" }, { "exploit_id": "GH-2024-MIPS1", "cve": "CVE-2024-78905", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Persistence", "cvss_score": 7.6, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 00 84 24 00 3c 0a 00 00 35 4a 00 00 ...", "description": "MIPS-based router buffer overflow for persistent backdoor.", "source": "https://github.com/exploits/mips-2024", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52348", "cve": "CVE-2024-78906", "vulnerability_type": "Privilege Escalation", "platform": "macOS", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.4, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 48 31 c0 48 83 c0 3b 48 31 d2 48 89 e6 ...", "description": "macOS x64 exploit for root access via kernel exploit.", "source": "https://www.exploit-db.com/exploits/52348", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-GHI", "cve": "N/A", "vulnerability_type": "Integer Overflow", "platform": "Linux", "architecture": "x86", "payload_goal": "Memory Leak", "cvss_score": 6.8, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge.", "source": "CTF-GHI-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52349", "cve": "CVE-2024-78907", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.2, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 48 c7 c0 29 00 00 00 0f 05 48 89 c7 48 b8 7f 00 00 01 ...", "description": "Windows x64 reverse shell connecting to attacker on port 5555.", "source": "https://www.exploit-db.com/exploits/52349", "date_added": "2025-07-15" }, { "exploit_id": "GH-2024-LINUX1", "cve": "CVE-2024-78908", "vulnerability_type": "Race Condition", "platform": "Linux", "architecture": "x64", "payload_goal": "Lateral Movement", "cvss_score": 8.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 48 c7 c0 29 00 00 00 0f 05 ...", "description": "Linux x64 race condition exploit for lateral movement in a network.", "source": "https://github.com/exploits/linux-2024", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52350", "cve": "CVE-2024-78909", "vulnerability_type": "Buffer Overflow", "platform": "Android", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.7, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM buffer overflow to exfiltrate user data.", "source": "https://www.exploit-db.com/exploits/52350", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52351", "cve": "CVE-2024-78910", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x86", "payload_goal": "Remote Code Execution", "cvss_score": 8.9, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 format string exploit for RCE, spawning a shell.", "source": "https://www.exploit-db.com/exploits/52351", "date_added": "2025-07-15" }, { "exploit_id": "GH-2024-WIN1", "cve": "CVE-2024-78911", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 8.1, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 48 8b 70 20 ...", "description": "Windows x64 use-after-free exploit for privilege escalation.", "source": "https://github.com/exploits/windows-2024", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-JKL", "cve": "N/A", "vulnerability_type": "Race Condition", "platform": "macOS", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.3, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 48 31 c0 ...", "description": "macOS x64 race condition exploit for root access, from CTF challenge.", "source": "CTF-JKL-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52352", "cve": "CVE-2024-78912", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 11 5c 83 15 00 01 ...", "description": "Linux x64 heap overflow for reverse shell on port 6666.", "source": "https://www.exploit-db.com/exploits/52352", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52353", "cve": "CVE-2024-78913", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.4, "shellcode": "48 31 c0 48 31 db 48 31 d2 6a 29 58 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 11 5d 83 15 00 01 51 48 89 e6 ...", "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 5555.", "source": "https://www.exploit-db.com/exploits/52353", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52354", "cve": "CVE-2024-78914", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.7, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 8b 72 28 0f b7 4a 26 ...", "description": "Windows x86 format string exploit to escalate privileges via user32.dll.", "source": "https://www.exploit-db.com/exploits/52354", "date_added": "2025-07-15" }, { "exploit_id": "GH-2024-IOT2", "cve": "CVE-2024-78915", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data portable", "cvss_score": 8.2, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 e1a07000 ...", "description": "ARM-based IoT use-after-free exploit to exfiltrate data via FTP.", "source": "https://github.com/exploits/iot-2024", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-MNO", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 11 5e 83 15 00 01 51 48 89 e6 6a 10 5a ...", "description": "Linux x64 reverse shell connecting to attacker on port 6666, from CTF challenge.", "source": "CTF-MNO-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52355", "cve": "CVE-2024-78916", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.6, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 48 8b 70 20 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell.", "source": "https://www.exploit-db.com/exploits/52355", "date_added": "2025-07-15" }, { "exploit_id": "GH-2024-MIPS2", "cve": "CVE-2024-78917", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Persistence", "cvss_score": 7.4, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 00 84 24 00 ...", "description": "MIPS-based router buffer overflow for persistent backdoor installation.", "source": "https://github.com/exploits/mips-2024", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52356", "cve": "CVE-2024-78918", "vulnerability_type": "Privilege Escalation", "platform": "macOS", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.5, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 48 31 c0 ...", "description": "macOS x64 exploit for root access via kernel vulnerability.", "source": "https://www.exploit-db.com/exploits/52356", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-PQR", "cve": "N/A", "vulnerability_type": "Integer Overflow", "platform": "Linux", "architecture": "x86", "payload_goal": "Memory Leak", "cvss_score": 6.7, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge.", "source": "CTF-PQR-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52357", "cve": "CVE-2024-78919", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.1, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 48 c7 c0 29 00 00 00 ...", "description": "Windows x64 reverse shell connecting to attacker on port 7777.", "source": "https://www.exploit-db.com/exploits/52357", "date_added": "2025-07-15" }, { "exploit_id": "GH-2024-LINUX2", "cve": "CVE-2024-78920", "vulnerability_type": "Race Condition", "platform": "Linux", "architecture": "x64", "payload_goal": "Lateral Movement", "cvss_score": 7.9, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 race condition exploit for lateral movement in a network.", "source": "https://github.com/exploits/linux-2024", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52358", "cve": "CVE-2024-78921", "vulnerability_type": "Buffer Overflow", "platform": "Android", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.8, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM buffer overflow to exfiltrate user data via HTTPS.", "source": "https://www.exploit-db.com/exploits/52358", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52359", "cve": "CVE-2024-78922", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x86", "payload_goal": "Remote Code Execution", "cvss_score": 8.8, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 format string exploit for RCE, spawning a shell.", "source": "https://www.exploit-db.com/exploits/52359", "date_added": "2025-07-15" }, { "exploit_id": "GH-2024-WIN2", "cve": "CVE-2024-78923", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 8.0, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 use-after-free exploit for privilege escalation.", "source": "https://github.com/exploits/windows-2024", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-STU", "cve": "N/A", "vulnerability_type": "Race Condition", "platform": "macOS", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.2, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 race condition exploit for root access, from CTF challenge.", "source": "CTF-STU-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52360", "cve": "CVE-2024-78924", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 11 5f 83 15 00 01 ...", "description": "Linux x64 heap overflow for reverse shell on port 8888.", "source": "https://www.exploit-db.com/exploits/52360", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52361", "cve": "CVE-2024-78925", "vulnerability_type": "Buffer Overflow", "platform": "Windows", "architecture": "x86", "payload_goal": "Remote Code Execution", "cvss_score": 9.3, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 buffer overflow for RCE, executing a command shell.", "source": "https://www.exploit-db.com/exploits/52361", "date_added": "2025-07-15" }, { "exploit_id": "GH-2024-IOT3", "cve": "CVE-2024-78926", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", "description": "ARM-based IoT use-after-free exploit for persistent backdoor.", "source": "https://github.com/exploits/iot-2024", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52362", "cve": "CVE-2024-78927", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 11 60 83 15 00 01 ...", "description": "Linux x64 reverse shell connecting to attacker on port 9999.", "source": "https://www.exploit-db.com/exploits/52362", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-VWX", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.6, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 format string exploit to leak memory, from CTF challenge.", "source": "CTF-VWX-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52363", "cve": "CVE-2024-78928", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.3, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "Linux x64 exploit for root access via kernel vulnerability.", "source": "https://www.exploit-db.com/exploits/52363", "date_added": "2025-07-15" }, { "exploit_id": "GH-2024-WIN3", "cve": "CVE-2024-78929", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.7, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell.", "source": "https://github.com/exploits/windows-2024", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52364", "cve": "CVE-2024-78930", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Data Exfiltration", "cvss_score": 7.6, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for data exfiltration via HTTP.", "source": "https://www.exploit-db.com/exploits/52364", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-YZA", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x86", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 reverse shell connecting to attacker on port 12345, from CTF challenge.", "source": "CTF-YZA-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52365", "cve": "CVE-2024-78931", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.8, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 use-after-free exploit for privilege escalation.", "source": "https://www.exploit-db.com/exploits/52365", "date_added": "2025-07-15" }, { "exploit_id": "GH-2024-LINUX3", "cve": "CVE-2024-78932", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 buffer overflow for persistent backdoor installation.", "source": "https://github.com/exploits/linux-2024", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52366", "cve": "CVE-2024-78933", "vulnerability_type": "Format String", "platform": "macOS", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 format string exploit to leak memory addresses.", "source": "https://www.exploit-db.com/exploits/52366", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-BCD", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows x64 reverse shell connecting to attacker on port 54321, from CTF challenge.", "source": "CTF-BCD-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52367", "cve": "CVE-2024-78934", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 11 61 83 15 00 01 ...", "description": "Linux x64 heap overflow for data exfiltration via UDP.", "source": "https://www.exploit-db.com/exploits/52367", "date_added": "2025-07-15" }, { "exploit_id": "GH-2024-IOT4", "cve": "CVE-2024-78935", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT buffer overflow for RCE, spawning a shell.", "source": "https://github.com/exploits/iot-2024", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52368", "cve": "CVE-2024-78936", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.4, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 exploit for privilege escalation via kernel exploit.", "source": "https://www.exploit-db.com/exploits/52368", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-EFG", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x86", "payload_goal": "Memory Leak", "cvss_score": 6.4, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 format string exploit to leak memory, from CTF challenge.", "source": "CTF-EFG-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52369", "cve": "CVE-2024-78937", "vulnerability_type": "Remote Code Execution", "platform": "macOS", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.1, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "macOS x64 reverse shell connecting to attacker on port 11111.", "source": "https://www.exploit-db.com/exploits/52369", "date_added": "2025-07-15" }, { "exploit_id": "GH-2024-WIN4", "cve": "CVE-2024-78938", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x64", "payload_goal": "Data Exfiltration", "cvss_score": 8.0, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 use-after-free exploit for data exfiltration via HTTPS.", "source": "https://github.com/exploits/windows-2024", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52370", "cve": "CVE-2024-78939", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.3, "shellcode": "48 31 c0 48 31 db 48 31 d2 6a 29 58 6a 02 5f 6a 01 5e 0f 05 ...", "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 22222.", "source": "https://www.exploit-db.com/exploits/52370", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-HIJ", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x86", "payload_goal": "Reverse Shell", "cvss_score": 8.8, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 reverse shell connecting to attacker on port 33333, from CTF challenge.", "source": "CTF-HIJ-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52371", "cve": "CVE-2024-78940", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Persistence", "cvss_score": 7.7, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 11 62 83 15 00 01 ...", "description": "Linux x64 heap overflow for persistent backdoor installation.", "source": "https://www.exploit-db.com/exploits/52371", "date_added": "2025-07-15" }, { "exploit_id": "GH-2024-IOT5", "cve": "CVE-2024-78941", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", "description": "ARM-based IoT use-after-free exploit for data exfiltration via SMTP.", "source": "https://github.com/exploits/iot-2024", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52372", "cve": "CVE-2024-78942", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.5, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 exploit for privilege escalation via kernel exploit.", "source": "https://www.exploit-db.com/exploits/52372", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-KLM", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 format string exploit to leak memory, from CTF challenge.", "source": "CTF-KLM-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52373", "cve": "CVE-2024-78943", "vulnerability_type": "Remote Code Execution", "platform": "Android", "architecture": "ARM", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM reverse shell connecting to attacker on port 44444.", "source": "https://www.exploit-db.com/exploits/52373", "date_added": "2025-07-15" }, { "exploit_id": "GH-2024-WIN5", "cve": "CVE-2024-78944", "vulnerability_type": "Buffer Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 buffer overflow for data exfiltration via FTP.", "source": "https://github.com/exploits/windows-2024", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52374", "cve": "CVE-2024-78945", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 11 63 83 15 00 01 ...", "description": "Linux x64 heap overflow for RCE, spawning a bind shell on port 33333.", "source": "https://www.exploit-db.com/exploits/52374", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-NOP", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "macOS", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "macOS x64 reverse shell connecting to attacker on port 55555, from CTF challenge.", "source": "CTF-NOP-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52401", "cve": "CVE-2025-10001", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 6a 29 58 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 12 34 83 15 00 01 51 48 89 e6 6a 10 5a ...", "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1234.", "source": "https://www.exploit-db.com/exploits/52401", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52402", "cve": "CVE-2025-10002", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.8, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 8b 72 28 ...", "description": "Windows x86 format string exploit to escalate privileges via kernel32.dll.", "source": "https://www.exploit-db.com/exploits/52402", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT1", "cve": "CVE-2025-10003", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 8.2, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT use-after-free exploit for data exfiltration via HTTP.", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-ABC", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.1, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 12 35 83 15 00 01 51 48 89 e6 6a 10 5a ...", "description": "Linux x64 reverse shell connecting to attacker on port 1235, from CTF challenge.", "source": "CTF-ABC-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52403", "cve": "CVE-2025-10004", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.7, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 48 8b 70 20 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell.", "source": "https://www.exploit-db.com/exploits/52403", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-MIPS1", "cve": "CVE-2025-10005", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 00 84 24 00 ...", "description": "MIPS-based router buffer overflow for persistent backdoor.", "source": "https://github.com/exploits/mips-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52407", "cve": "CVE-2025-10007", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.4, "shellcode": "48 31 c0 48 31 db 48 31 d2 6a 29 58 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 12 36 83 15 00 01 51 48 89 e6 6a 10 5a ...", "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1236.", "source": "https://www.exploit-db.com/exploits/52407", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52408", "cve": "CVE-2025-10008", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.7, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 8b 72 28 ...", "description": "Windows x86 format string exploit to escalate privileges via ntdll.dll.", "source": "https://www.exploit-db.com/exploits/52408", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT2", "cve": "CVE-2025-10009", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT use-after-free exploit for data exfiltration via FTP.", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-DEF", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 12 37 83 15 00 01 51 48 89 e6 6a 10 5a ...", "description": "Linux x64 reverse shell connecting to attacker on port 1237, from CTF challenge.", "source": "CTF-DEF-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52409", "cve": "CVE-2025-10010", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.6, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 48 8b 70 20 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell.", "source": "https://www.exploit-db.com/exploits/52409", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-MIPS2", "cve": "CVE-2025-10011", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Persistence", "cvss_score": 7.4, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 00 84 24 00 ...", "description": "MIPS-based router buffer overflow for persistent backdoor.", "source": "https://github.com/exploits/mips-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52410", "cve": "CVE-2025-10012", "vulnerability_type": "Privilege Escalation", "platform": "macOS", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.3, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 exploit for root access via kernel vulnerability.", "source": "https://www.exploit-db.com/exploits/52410", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-GHI", "cve": "N/A", "vulnerability_type": "Integer Overflow", "platform": "Linux", "architecture": "x86", "payload_goal": "Memory Leak", "cvss_score": 6.6, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge.", "source": "CTF-GHI-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52411", "cve": "CVE-2025-10013", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.1, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 48 c7 c0 29 00 00 00 ...", "description": "Windows x64 reverse shell connecting to attacker on port 1238.", "source": "https://www.exploit-db.com/exploits/52411", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX1", "cve": "CVE-2025-10014", "vulnerability_type": "Race Condition", "platform": "Linux", "architecture": "x64", "payload_goal": "Lateral Movement", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 race condition exploit for lateral movement in a network.", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52412", "cve": "CVE-2025-10015", "vulnerability_type": "Buffer Overflow", "platform": "Android", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM buffer overflow for data exfiltration via HTTPS.", "source": "https://www.exploit-db.com/exploits/52412", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52413", "cve": "CVE-2025-10016", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x86", "payload_goal": "Remote Code Execution", "cvss_score": 8.8, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 format string exploit for RCE, spawning a shell.", "source": "https://www.exploit-db.com/exploits/52413", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN1", "cve": "CVE-2025-10017", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 8.0, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 use-after-free exploit for privilege escalation.", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-JKL", "cve": "N/A", "vulnerability_type": "Race Condition", "platform": "macOS", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.2, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 race condition exploit for root access, from CTF challenge.", "source": "CTF-JKL-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52414", "cve": "CVE-2025-10018", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 12 38 83 15 00 01 ...", "description": "Linux x64 heap overflow for reverse shell on port 1238.", "source": "https://www.exploit-db.com/exploits/52414", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52415", "cve": "CVE-2025-10019", "vulnerability_type": "Buffer Overflow", "platform": "Windows", "architecture": "x86", "payload_goal": "Remote Code Execution", "cvss_score": 9.3, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 buffer overflow for RCE, executing a command shell.", "source": "https://www.exploit-db.com/exploits/52415", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT3", "cve": "CVE-2025-10020", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", "description": "ARM-based IoT use-after-free exploit for persistent backdoor.", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52416", "cve": "CVE-2025-10021", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 12 39 83 15 00 01 ...", "description": "Linux x64 reverse shell connecting to attacker on port 1239.", "source": "https://www.exploit-db.com/exploits/52416", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-MNO", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 format string exploit to leak memory, from CTF challenge.", "source": "CTF-MNO-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52417", "cve": "CVE-2025-10022", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.3, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "Linux x64 exploit for root access via kernel vulnerability.", "source": "https://www.exploit-db.com/exploits/52417", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN2", "cve": "CVE-2025-10023", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.7, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell.", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52418", "cve": "CVE-2025-10024", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Data Exfiltration", "cvss_score": 7.6, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for data exfiltration via HTTP.", "source": "https://www.exploit-db.com/exploits/52418", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-PQR", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x86", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 reverse shell connecting to attacker on port 1240, from CTF challenge.", "source": "CTF-PQR-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52419", "cve": "CVE-2025-10025", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.8, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 use-after-free exploit for privilege escalation.", "source": "https://www.exploit-db.com/exploits/52419", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX2", "cve": "CVE-2025-10026", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 buffer overflow for persistent backdoor installation.", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52420", "cve": "CVE-2025-10027", "vulnerability_type": "Format String", "platform": "macOS", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 format string exploit to leak memory addresses.", "source": "https://www.exploit-db.com/exploits/52420", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-STU", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows x64 reverse shell connecting to attacker on port 1241, from CTF challenge.", "source": "CTF-STU-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52421", "cve": "CVE-2025-10028", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 12 40 83 15 00 01 ...", "description": "Linux x64 heap overflow for data exfiltration via UDP.", "source": "https://www.exploit-db.com/exploits/52421", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT4", "cve": "CVE-2025-10029", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT buffer overflow for RCE, spawning a shell.", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52422", "cve": "CVE-2025-10030", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.4, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 exploit for privilege escalation via kernel exploit.", "source": "https://www.exploit-db.com/exploits/52422", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-VWX", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x86", "payload_goal": "Memory Leak", "cvss_score": 6.4, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 format string exploit to leak memory, from CTF challenge.", "source": "CTF-VWX-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52423", "cve": "CVE-2025-10031", "vulnerability_type": "Remote Code Execution", "platform": "macOS", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.1, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "macOS x64 reverse shell connecting to attacker on port 1242.", "source": "https://www.exploit-db.com/exploits/52423", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN3", "cve": "CVE-2025-10032", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x64", "payload_goal": "Data Exfiltration", "cvss_score": 8.0, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 use-after-free exploit for data exfiltration via HTTPS.", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52424", "cve": "CVE-2025-10033", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.3, "shellcode": "48 31 c0 48 31 db 48 31 d2 6a 29 58 6a 02 5f 6a 01 5e 0f 05 ...", "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1243.", "source": "https://www.exploit-db.com/exploits/52424", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-YZA", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x86", "payload_goal": "Reverse Shell", "cvss_score": 8.8, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 reverse shell connecting to attacker on port 1244, from CTF challenge.", "source": "CTF-YZA-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52425", "cve": "CVE-2025-10034", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Persistence", "cvss_score": 7.7, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 12 41 83 15 00 01 ...", "description": "Linux x64 heap overflow for persistent backdoor installation.", "source": "https://www.exploit-db.com/exploits/52425", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT5", "cve": "CVE-2025-10035", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", "description": "ARM-based IoT use-after-free exploit for data exfiltration via SMTP.", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52426", "cve": "CVE-2025-10036", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.5, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 exploit for privilege escalation via kernel exploit.", "source": "https://www.exploit-db.com/exploits/52426", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-BCD", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 format string exploit to leak memory, from CTF challenge.", "source": "CTF-BCD-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52427", "cve": "CVE-2025-10037", "vulnerability_type": "Remote Code Execution", "platform": "Android", "architecture": "ARM", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM reverse shell connecting to attacker on port 1245.", "source": "https://www.exploit-db.com/exploits/52427", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN4", "cve": "CVE-2025-10038", "vulnerability_type": "Buffer Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 buffer overflow for data exfiltration via FTP.", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52428", "cve": "CVE-2025-10039", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 12 42 83 15 00 01 ...", "description": "Linux x64 heap overflow for RCE, spawning a bind shell on port 1246.", "source": "https://www.exploit-db.com/exploits/52428", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-EFG", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "macOS", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "macOS x64 reverse shell connecting to attacker on port 1247, from CTF challenge.", "source": "CTF-EFG-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52429", "cve": "CVE-2025-10040", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for persistent backdoor.", "source": "https://www.exploit-db.com/exploits/52429", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX3", "cve": "CVE-2025-10041", "vulnerability_type": "Use-After-Free", "platform": "Linux", "architecture": "x64", "payload_goal": "Data Exfiltration", "cvss_score": 8.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 use-after-free exploit for data exfiltration via HTTPS.", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52430", "cve": "CVE-2025-10042", "vulnerability_type": "Privilege Escalation", "platform": "Android", "architecture": "ARM", "payload_goal": "Root Access", "cvss_score": 8.4, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM exploit for root access via kernel vulnerability.", "source": "https://www.exploit-db.com/exploits/52430", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-HIJ", "cve": "N/A", "vulnerability_type": "Integer Overflow", "platform": "Linux", "architecture": "x86", "payload_goal": "Memory Leak", "cvss_score": 6.6, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge.", "source": "CTF-HIJ-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52431", "cve": "CVE-2025-10043", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.1, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows x64 reverse shell connecting to attacker on port 1248.", "source": "https://www.exploit-db.com/exploits/52431", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT6", "cve": "CVE-2025-10044", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT buffer overflow for data exfiltration via SMTP.", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52432", "cve": "CVE-2025-10045", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 format string exploit for RCE, spawning a shell.", "source": "https://www.exploit-db.com/exploits/52432", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-KLM", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "macOS", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "macOS x64 reverse shell connecting to attacker on port 1249, from CTF challenge.", "source": "CTF-KLM-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52461", "cve": "CVE-2025-10046", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 6a 29 58 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 00 83 15 00 01 51 48 89 e6 6a 10 5a ...", "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1300.", "source": "https://www.exploit-db.com/exploits/52461", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52462", "cve": "CVE-2025-10047", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.8, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 8b 72 28 ...", "description": "Windows x86 format string exploit to escalate privileges via kernel32.dll.", "source": "https://www.exploit-db.com/exploits/52462", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT7", "cve": "CVE-2025-10048", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 8.2, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT use-after-free exploit for data exfiltration via HTTP.", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-NOP", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.1, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 01 83 15 00 01 51 48 89 e6 6a 10 5a ...", "description": "Linux x64 reverse shell connecting to attacker on port 1301, from CTF challenge.", "source": "CTF-NOP-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52463", "cve": "CVE-2025-10049", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.7, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 48 8b 70 20 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell.", "source": "https://www.exploit-db.com/exploits/52463", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-MIPS3", "cve": "CVE-2025-10050", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 00 84 24 00 ...", "description": "MIPS-based router buffer overflow for persistent backdoor.", "source": "https://github.com/exploits/mips-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52464", "cve": "CVE-2025-10051", "vulnerability_type": "Privilege Escalation", "platform": "macOS", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.4, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 exploit for root access via kernel vulnerability.", "source": "https://www.exploit-db.com/exploits/52464", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-QRS", "cve": "N/A", "vulnerability_type": "Integer Overflow", "platform": "Linux", "architecture": "x86", "payload_goal": "Memory Leak", "cvss_score": 6.6, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge.", "source": "CTF-QRS-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52465", "cve": "CVE-2025-10052", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.1, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 48 c7 c0 29 00 00 00 ...", "description": "Windows x64 reverse shell connecting to attacker on port 1302.", "source": "https://www.exploit-db.com/exploits/52465", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX4", "cve": "CVE-2025-10053", "vulnerability_type": "Race Condition", "platform": "Linux", "architecture": "x64", "payload_goal": "Lateral Movement", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 race condition exploit for lateral movement in a network.", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52466", "cve": "CVE-2025-10054", "vulnerability_type": "Buffer Overflow", "platform": "Android", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM buffer overflow for data exfiltration via HTTPS.", "source": "https://www.exploit-db.com/exploits/52466", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52467", "cve": "CVE-2025-10055", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x86", "payload_goal": "Remote Code Execution", "cvss_score": 8.8, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 format string exploit for RCE, spawning a shell.", "source": "https://www.exploit-db.com/exploits/52467", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN5", "cve": "CVE-2025-10056", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 8.0, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 use-after-free exploit for privilege escalation.", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-TUV", "cve": "N/A", "vulnerability_type": "Race Condition", "platform": "macOS", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.2, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 race condition exploit for root access, from CTF challenge.", "source": "CTF-TUV-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52468", "cve": "CVE-2025-10057", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 02 83 15 00 01 ...", "description": "Linux x64 heap overflow for reverse shell on port 1303.", "source": "https://www.exploit-db.com/exploits/52468", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52469", "cve": "CVE-2025-10058", "vulnerability_type": "Buffer Overflow", "platform": "Windows", "architecture": "x86", "payload_goal": "Remote Code Execution", "cvss_score": 9.3, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 buffer overflow for RCE, executing a command shell.", "source": "https://www.exploit-db.com/exploits/52469", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT8", "cve": "CVE-2025-10059", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", "description": "ARM-based IoT use-after-free exploit for persistent backdoor.", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52470", "cve": "CVE-2025-10060", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 03 83 15 00 01 ...", "description": "Linux x64 reverse shell connecting to attacker on port 1304.", "source": "https://www.exploit-db.com/exploits/52470", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-WXY", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 format string exploit to leak memory, from CTF challenge.", "source": "CTF-WXY-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52471", "cve": "CVE-2025-10061", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.3, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "Linux x64 exploit for root access via kernel vulnerability.", "source": "https://www.exploit-db.com/exploits/52471", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN6", "cve": "CVE-2025-10062", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.7, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell.", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52472", "cve": "CVE-2025-10063", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Data Exfiltration", "cvss_score": 7.6, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for data exfiltration via HTTP.", "source": "https://www.exploit-db.com/exploits/52472", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-ZAB", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x86", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 reverse shell connecting to attacker on port 1305, from CTF challenge.", "source": "CTF-ZAB-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52473", "cve": "CVE-2025-10064", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.8, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 use-after-free exploit for privilege escalation.", "source": "https://www.exploit-db.com/exploits/52473", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX5", "cve": "CVE-2025-10065", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 buffer overflow for persistent backdoor installation.", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52474", "cve": "CVE-2025-10066", "vulnerability_type": "Format String", "platform": "macOS", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 format string exploit to leak memory addresses.", "source": "https://www.exploit-db.com/exploits/52474", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-CDE", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows x64 reverse shell connecting to attacker on port 1306, from CTF challenge.", "source": "CTF-CDE-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52476", "cve": "CVE-2025-10068", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.4, "shellcode": "48 31 c0 48 31 db 48 31 d2 6a 29 58 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 04 83 15 00 01 51 48 89 e6 6a 10 5a ...", "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1307.", "source": "https://www.exploit-db.com/exploits/52476", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52477", "cve": "CVE-2025-10069", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.7, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 8b 72 28 ...", "description": "Windows x86 format string exploit to escalate privileges via user32.dll.", "source": "https://www.exploit-db.com/exploits/52477", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT9", "cve": "CVE-2025-10070", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT use-after-free exploit for data exfiltration via FTP.", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-FGH", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 05 83 15 00 01 51 48 89 e6 6a 10 5a ...", "description": "Linux x64 reverse shell connecting to attacker on port 1308, from CTF challenge.", "source": "CTF-FGH-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52478", "cve": "CVE-2025-10071", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.6, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 48 8b 70 20 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell.", "source": "https://www.exploit-db.com/exploits/52478", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-MIPS4", "cve": "CVE-2025-10072", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Persistence", "cvss_score": 7.4, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 00 84 24 00 ...", "description": "MIPS-based router buffer overflow for persistent backdoor.", "source": "https://github.com/exploits/mips-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52479", "cve": "CVE-2025-10073", "vulnerability_type": "Privilege Escalation", "platform": "macOS", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.3, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 exploit for root access via kernel vulnerability.", "source": "https://www.exploit-db.com/exploits/52479", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-IJK", "cve": "N/A", "vulnerability_type": "Integer Overflow", "platform": "Linux", "architecture": "x86", "payload_goal": "Memory Leak", "cvss_score": 6.6, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge.", "source": "CTF-IJK-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52480", "cve": "CVE-2025-10074", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.1, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 48 c7 c0 29 00 00 00 ...", "description": "Windows x64 reverse shell connecting to attacker on port 1309.", "source": "https://www.exploit-db.com/exploits/52480", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX6", "cve": "CVE-2025-10075", "vulnerability_type": "Race Condition", "platform": "Linux", "architecture": "x64", "payload_goal": "Lateral Movement", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 race condition exploit for lateral movement in a network.", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52481", "cve": "CVE-2025-10076", "vulnerability_type": "Buffer Overflow", "platform": "Android", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM buffer overflow for data exfiltration via HTTPS.", "source": "https://www.exploit-db.com/exploits/52481", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52482", "cve": "CVE-2025-10077", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x86", "payload_goal": "Remote Code Execution", "cvss_score": 8.8, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 format string exploit for RCE, spawning a shell.", "source": "https://www.exploit-db.com/exploits/52482", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN7", "cve": "CVE-2025-10078", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 8.0, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 use-after-free exploit for privilege escalation.", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-LMN", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "macOS", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "macOS x64 reverse shell connecting to attacker on port 1310, from CTF challenge.", "source": "CTF-LMN-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52483", "cve": "CVE-2025-10079", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 06 83 15 00 01 ...", "description": "Linux x64 heap overflow for reverse shell on port 1311.", "source": "https://www.exploit-db.com/exploits/52483", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52484", "cve": "CVE-2025-10080", "vulnerability_type": "Buffer Overflow", "platform": "Windows", "architecture": "x86", "payload_goal": "Remote Code Execution", "cvss_score": 9.3, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 buffer overflow for RCE, executing a command shell.", "source": "https://www.exploit-db.com/exploits/52484", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT10", "cve": "CVE-2025-10081", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", "description": "ARM-based IoT use-after-free exploit for persistent backdoor.", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52485", "cve": "CVE-2025-10082", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 07 83 15 00 01 ...", "description": "Linux x64 reverse shell connecting to attacker on port 1312.", "source": "https://www.exploit-db.com/exploits/52485", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-OPQ", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 format string exploit to leak memory, from CTF challenge.", "source": "CTF-OPQ-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52486", "cve": "CVE-2025-10083", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.3, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "Linux x64 exploit for root access via kernel vulnerability.", "source": "https://www.exploit-db.com/exploits/52486", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN8", "cve": "CVE-2025-10084", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.7, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell.", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52487", "cve": "CVE-2025-10085", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Data Exfiltration", "cvss_score": 7.6, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for data exfiltration via HTTP.", "source": "https://www.exploit-db.com/exploits/52487", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-RST", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x86", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 reverse shell connecting to attacker on port 1313, from CTF challenge.", "source": "CTF-RST-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52488", "cve": "CVE-2025-10086", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.8, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 use-after-free exploit for privilege escalation.", "source": "https://www.exploit-db.com/exploits/52488", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX7", "cve": "CVE-2025-10087", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 buffer overflow for persistent backdoor installation.", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52489", "cve": "CVE-2025-10088", "vulnerability_type": "Format String", "platform": "macOS", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 format string exploit to leak memory addresses.", "source": "https://www.exploit-db.com/exploits/52489", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-UVW", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows x64 reverse shell connecting to attacker on port 1314, from CTF challenge.", "source": "CTF-UVW-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52490", "cve": "CVE-2025-10089", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 08 83 15 00 01 ...", "description": "Linux x64 heap overflow for data exfiltration via UDP.", "source": "https://www.exploit-db.com/exploits/52490", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT11", "cve": "CVE-2025-10090", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT buffer overflow for RCE, spawning a shell.", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52491", "cve": "CVE-2025-10091", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.5, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 exploit for privilege escalation via kernel exploit.", "source": "https://www.exploit-db.com/exploits/52491", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-XYZ", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 format string exploit to leak memory, from CTF challenge.", "source": "CTF-XYZ-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52492", "cve": "CVE-2025-10092", "vulnerability_type": "Remote Code Execution", "platform": "Android", "architecture": "ARM", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM reverse shell connecting to attacker on port 1315.", "source": "https://www.exploit-db.com/exploits/52492", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN9", "cve": "CVE-2025-10093", "vulnerability_type": "Buffer Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 buffer overflow for data exfiltration via FTP.", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52493", "cve": "CVE-2025-10094", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 09 83 15 00 01 ...", "description": "Linux x64 heap overflow for RCE, spawning a bind shell on port 1316.", "source": "https://www.exploit-db.com/exploits/52493", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-ABC", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "macOS", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "macOS x64 reverse shell connecting to attacker on port 1317, from CTF challenge.", "source": "CTF-ABC-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52494", "cve": "CVE-2025-10095", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT buffer overflow for data exfiltration via SMTP.", "source": "https://www.exploit-db.com/exploits/52494", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX8", "cve": "CVE-2025-10096", "vulnerability_type": "Use-After-Free", "platform": "Linux", "architecture": "x64", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 use-after-free exploit for persistent backdoor installation.", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52495", "cve": "CVE-2025-10097", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 format string exploit for RCE, spawning a shell.", "source": "https://www.exploit-db.com/exploits/52495", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-DEF", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Android", "architecture": "ARM", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM reverse shell connecting to attacker on port 1318, from CTF challenge.", "source": "CTF-DEF-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-48512", "cve": "CVE-2021-3156", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 8.1, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Sudo heap-based buffer overflow for root privilege escalation, no authentication required. Affects Ubuntu, Debian, Fedora (2021).", "source": "https://www.exploit-db.com/exploits/48512", "date_added": "2021-01-26" }, { "exploit_id": "EDB-49763", "cve": "CVE-2022-0601", "vulnerability_type": "Buffer Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.3, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows CryptoAPI buffer overflow via malicious ECC certificate for RCE (2022).", "source": "https://www.exploit-db.com/exploits/49763", "date_added": "2022-02-15" }, { "exploit_id": "EDB-49812", "cve": "CVE-2022-0796", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.8, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 10 83 15 00 01 ...", "description": "OpenSSL heap buffer overflow affecting Linux, Windows, macOS for arbitrary code execution (2022).", "source": "https://www.exploit-db.com/exploits/49812", "date_added": "2022-03-20" }, { "exploit_id": "GH-2021-LINUX1", "cve": "CVE-2021-4034", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "Polkit pkexec local privilege escalation to root via environment variable manipulation (2021).", "source": "https://github.com/exploits/linux-2021", "date_added": "2021-12-10" }, { "exploit_id": "CTF-2021-XYZ", "cve": "N/A", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x86", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 reverse shell exploit from CTF challenge, connects to attacker on port 1319 (2021).", "source": "CTF-XYZ-2021", "date_added": "2021-11-05" }, { "exploit_id": "EDB-50234", "cve": "CVE-2023-0179", "vulnerability_type": "Use-After-Free", "platform": "Linux", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux kernel use-after-free exploit for local privilege escalation (2023).", "source": "https://www.exploit-db.com/exploits/50234", "date_added": "2023-01-15" }, { "exploit_id": "EDB-50567", "cve": "CVE-2023-22809", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.1, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 11 83 15 00 01 ...", "description": "Linux sudoedit buffer overflow for RCE, spawning a bind shell on port 1320 (2023).", "source": "https://www.exploit-db.com/exploits/50567", "date_added": "2023-03-10" }, { "exploit_id": "GH-2022-WIN1", "cve": "CVE-2022-30190", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 48 c7 c0 29 00 00 00 ...", "description": "Windows MSDT (Follina) RCE exploit for reverse shell on port 1321 (2022).", "source": "https://github.com/exploits/windows-2022", "date_added": "2022-06-01" }, { "exploit_id": "EDB-51023", "cve": "CVE-2024-1086", "vulnerability_type": "Use-After-Free", "platform": "Linux", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux kernel use-after-free exploit for local root access (2024).", "source": "https://www.exploit-db.com/exploits/51023", "date_added": "2024-02-20" }, { "exploit_id": "CTF-2022-ABC", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x86", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 format string exploit to leak memory addresses, from CTF challenge (2022).", "source": "CTF-ABC-2022", "date_added": "2022-09-15" }, { "exploit_id": "EDB-51545", "cve": "CVE-2024-21338", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.4, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows kernel privilege escalation via AppLocker driver vulnerability (2024).", "source": "https://www.exploit-db.com/exploits/51545", "date_added": "2024-03-05" }, { "exploit_id": "GH-2023-IOT1", "cve": "CVE-2023-25136", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Remote Code Execution", "cvss_score": 9.0, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for RCE, spawning a shell (2023).", "source": "https://github.com/exploits/iot-2023", "date_added": "2023-04-12" }, { "exploit_id": "EDB-52012", "cve": "CVE-2024-30078", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows Wi-Fi driver RCE for reverse shell on port 1322 (2024).", "source": "https://www.exploit-db.com/exploits/52012", "date_added": "2024-06-10" }, { "exploit_id": "CTF-2023-DEF", "cve": "N/A", "vulnerability_type": "Race Condition", "platform": "Linux", "architecture": "x64", "payload_goal": "Lateral Movement", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 race condition exploit for lateral movement, from CTF challenge (2023).", "source": "CTF-DEF-2023", "date_added": "2023-07-20" }, { "exploit_id": "EDB-52234", "cve": "CVE-2024-38063", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows IPv6 privilege escalation exploit for root access (2024).", "source": "https://www.exploit-db.com/exploits/52234", "date_added": "2024-08-15" }, { "exploit_id": "GH-2024-ANDROID1", "cve": "CVE-2024-29745", "vulnerability_type": "Use-After-Free", "platform": "Android", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM use-after-free exploit for data exfiltration via HTTPS (2024).", "source": "https://github.com/exploits/android-2024", "date_added": "2024-04-05" }, { "exploit_id": "EDB-52496", "cve": "CVE-2025-10098", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.4, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 12 83 15 00 01 ...", "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1323 (2025).", "source": "https://www.exploit-db.com/exploits/52496", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52497", "cve": "CVE-2025-10099", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.7, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 format string exploit for privilege escalation via kernel32.dll (2025).", "source": "https://www.exploit-db.com/exploits/52497", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT12", "cve": "CVE-2025-10100", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT use-after-free exploit for data exfiltration via FTP (2025).", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-GHI", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 13 83 15 00 01 ...", "description": "Linux x64 reverse shell connecting to attacker on port 1324, from CTF challenge (2025).", "source": "CTF-GHI-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52498", "cve": "CVE-2025-10101", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.6, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", "source": "https://www.exploit-db.com/exploits/52498", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-MIPS5", "cve": "CVE-2025-10102", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Persistence", "cvss_score": 7.4, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for persistent backdoor (2025).", "source": "https://github.com/exploits/mips-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52499", "cve": "CVE-2025-10103", "vulnerability_type": "Privilege Escalation", "platform": "macOS", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.3, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 exploit for root access via kernel vulnerability (2025).", "source": "https://www.exploit-db.com/exploits/52499", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-JKL", "cve": "N/A", "vulnerability_type": "Integer Overflow", "platform": "Linux", "architecture": "x86", "payload_goal": "Memory Leak", "cvss_score": 6.6, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge (2025).", "source": "CTF-JKL-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52500", "cve": "CVE-2025-10104", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.1, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows x64 reverse shell connecting to attacker on port 1325 (2025).", "source": "https://www.exploit-db.com/exploits/52500", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX9", "cve": "CVE-2025-10105", "vulnerability_type": "Race Condition", "platform": "Linux", "architecture": "x64", "payload_goal": "Lateral Movement", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 race condition exploit for lateral movement in a network (2025).", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52501", "cve": "CVE-2025-10106", "vulnerability_type": "Buffer Overflow", "platform": "Android", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2025).", "source": "https://www.exploit-db.com/exploits/52501", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52502", "cve": "CVE-2025-10107", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x86", "payload_goal": "Remote Code Execution", "cvss_score": 8.8, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 format string exploit for RCE, spawning a shell (2025).", "source": "https://www.exploit-db.com/exploits/52502", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN10", "cve": "CVE-2025-10108", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 8.0, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 use-after-free exploit for privilege escalation (2025).", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-MNO", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "macOS", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "macOS x64 reverse shell connecting to attacker on port 1326, from CTF challenge (2025).", "source": "CTF-MNO-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52503", "cve": "CVE-2025-10109", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 14 83 15 00 01 ...", "description": "Linux x64 heap overflow for reverse shell on port 1327 (2025).", "source": "https://www.exploit-db.com/exploits/52503", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52504", "cve": "CVE-2025-10110", "vulnerability_type": "Buffer Overflow", "platform": "Windows", "architecture": "x86", "payload_goal": "Remote Code Execution", "cvss_score": 9.3, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 buffer overflow for RCE, executing a command shell (2025).", "source": "https://www.exploit-db.com/exploits/52504", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT13", "cve": "CVE-2025-10111", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", "description": "ARM-based IoT use-after-free exploit for persistent backdoor (2025).", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52505", "cve": "CVE-2025-10112", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 15 83 15 00 01 ...", "description": "Linux x64 reverse shell connecting to attacker on port 1328 (2025).", "source": "https://www.exploit-db.com/exploits/52505", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-PQR", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 format string exploit to leak memory, from CTF challenge (2025).", "source": "CTF-PQR-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52506", "cve": "CVE-2025-10113", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.3, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "Linux x64 exploit for root access via kernel vulnerability (2025).", "source": "https://www.exploit-db.com/exploits/52506", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN11", "cve": "CVE-2025-10114", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.7, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52507", "cve": "CVE-2025-10115", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Data Exfiltration", "cvss_score": 7.6, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for data exfiltration via HTTP (2025).", "source": "https://www.exploit-db.com/exploits/52507", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-STU", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x86", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 reverse shell connecting to attacker on port 1329, from CTF challenge (2025).", "source": "CTF-STU-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52508", "cve": "CVE-2025-10116", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.8, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 use-after-free exploit for privilege escalation (2025).", "source": "https://www.exploit-db.com/exploits/52508", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX10", "cve": "CVE-2025-10117", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 buffer overflow for persistent backdoor installation (2025).", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52509", "cve": "CVE-2025-10118", "vulnerability_type": "Format String", "platform": "macOS", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 format string exploit to leak memory addresses (2025).", "source": "https://www.exploit-db.com/exploits/52509", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-VWX", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows x64 reverse shell connecting to attacker on port 1330, from CTF challenge (2025).", "source": "CTF-VWX-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52510", "cve": "CVE-2025-10119", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 16 83 15 00 01 ...", "description": "Linux x64 heap overflow for data exfiltration via UDP (2025).", "source": "https://www.exploit-db.com/exploits/52510", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT14", "cve": "CVE-2025-10120", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT buffer overflow for RCE, spawning a shell (2025).", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52511", "cve": "CVE-2025-10121", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.5, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 exploit for privilege escalation via kernel exploit (2025).", "source": "https://www.exploit-db.com/exploits/52511", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-YZA", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 format string exploit to leak memory, from CTF challenge (2025).", "source": "CTF-YZA-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52512", "cve": "CVE-2025-10122", "vulnerability_type": "Remote Code Execution", "platform": "Android", "architecture": "ARM", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM reverse shell connecting to attacker on port 1331 (2025).", "source": "https://www.exploit-db.com/exploits/52512", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN12", "cve": "CVE-2025-10123", "vulnerability_type": "Buffer Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 buffer overflow for data exfiltration via FTP (2025).", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52513", "cve": "CVE-2025-10124", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 17 83 15 00 01 ...", "description": "Linux x64 heap overflow for RCE, spawning a bind shell on port 1332 (2025).", "source": "https://www.exploit-db.com/exploits/52513", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-BCD", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "macOS", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "macOS x64 reverse shell connecting to attacker on port 1333, from CTF challenge (2025).", "source": "CTF-BCD-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52514", "cve": "CVE-2025-10125", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT buffer overflow for data exfiltration via SMTP (2025).", "source": "https://www.exploit-db.com/exploits/52514", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX11", "cve": "CVE-2025-10126", "vulnerability_type": "Use-After-Free", "platform": "Linux", "architecture": "x64", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 use-after-free exploit for persistent backdoor installation (2025).", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52515", "cve": "CVE-2025-10127", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 format string exploit for RCE, spawning a shell (2025).", "source": "https://www.exploit-db.com/exploits/52515", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-EFG", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Android", "architecture": "ARM", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM reverse shell connecting to attacker on port 1334, from CTF challenge (2025).", "source": "CTF-EFG-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-48965", "cve": "CVE-2021-3493", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "Linux x64 privilege escalation via OverlayFS vulnerability, granting root access (2021).", "source": "https://www.exploit-db.com/exploits/48965", "date_added": "2021-04-20" }, { "exploit_id": "EDB-49321", "cve": "CVE-2021-3560", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Polkit privilege escalation exploit for root access on Linux systems (2021).", "source": "https://www.exploit-db.com/exploits/49321", "date_added": "2021-06-10" }, { "exploit_id": "GH-2021-WIN1", "cve": "CVE-2021-36934", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows HiveNightmare (SeriousSAM) exploit for local privilege escalation (2021).", "source": "https://github.com/exploits/windows-2021", "date_added": "2021-07-20" }, { "exploit_id": "EDB-49654", "cve": "CVE-2022-0847", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux Dirty Pipe vulnerability for local privilege escalation to root (2022).", "source": "https://www.exploit-db.com/exploits/49654", "date_added": "2022-03-07" }, { "exploit_id": "CTF-2021-ABC", "cve": "N/A", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x86", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 reverse shell exploit, connects to attacker on port 1335, from CTF challenge (2021).", "source": "CTF-ABC-2021", "date_added": "2021-10-15" }, { "exploit_id": "EDB-50012", "cve": "CVE-2022-25636", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "Linux netfilter privilege escalation for root access (2022).", "source": "https://www.exploit-db.com/exploits/50012", "date_added": "2022-02-24" }, { "exploit_id": "GH-2022-IOT1", "cve": "CVE-2022-28388", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Remote Code Execution", "cvss_score": 9.0, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for RCE, spawning a shell (2022).", "source": "https://github.com/exploits/iot-2022", "date_added": "2022-04-10" }, { "exploit_id": "EDB-50345", "cve": "CVE-2022-40684", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Fortinet FortiOS RCE for reverse shell on port 1336 (2022).", "source": "https://www.exploit-db.com/exploits/50345", "date_added": "2022-10-10" }, { "exploit_id": "CTF-2022-DEF", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x86", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 format string exploit to leak memory, from CTF challenge (2022).", "source": "CTF-DEF-2022", "date_added": "2022-08-20" }, { "exploit_id": "EDB-50789", "cve": "CVE-2023-0386", "vulnerability_type": "Use-After-Free", "platform": "Linux", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux kernel use-after-free exploit for local root access (2023).", "source": "https://www.exploit-db.com/exploits/50789", "date_added": "2023-02-15" }, { "exploit_id": "GH-2023-ANDROID1", "cve": "CVE-2023-20963", "vulnerability_type": "Buffer Overflow", "platform": "Android", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2023).", "source": "https://github.com/exploits/android-2023", "date_added": "2023-03-10" }, { "exploit_id": "EDB-51045", "cve": "CVE-2023-28252", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 8.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows CLFS driver use-after-free for privilege escalation (2023).", "source": "https://www.exploit-db.com/exploits/51045", "date_added": "2023-04-12" }, { "exploit_id": "EDB-51234", "cve": "CVE-2023-34362", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "MOVEit Transfer RCE for reverse shell on port 1337 (2023).", "source": "https://www.exploit-db.com/exploits/51234", "date_added": "2023-06-05" }, { "exploit_id": "CTF-2023-GHI", "cve": "N/A", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 18 83 15 00 01 ...", "description": "Linux x64 reverse shell exploit, connects to attacker on port 1338, from CTF challenge (2023).", "source": "CTF-GHI-2023", "date_added": "2023-07-15" }, { "exploit_id": "EDB-51567", "cve": "CVE-2024-21334", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows OOB RCE in OpenSSH for reverse shell on port 1339 (2024).", "source": "https://www.exploit-db.com/exploits/51567", "date_added": "2024-03-10" }, { "exploit_id": "GH-2024-IOT2", "cve": "CVE-2024-23897", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT buffer overflow for RCE, spawning a shell (2024).", "source": "https://github.com/exploits/iot-2024", "date_added": "2024-02-15" }, { "exploit_id": "EDB-51890", "cve": "CVE-2024-29973", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "Linux kernel privilege escalation via filesystem vulnerability (2024).", "source": "https://www.exploit-db.com/exploits/51890", "date_added": "2024-04-20" }, { "exploit_id": "CTF-2024-JKL", "cve": "N/A", "vulnerability_type": "Format String", "platform": "macOS", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 format string exploit to leak memory, from CTF challenge (2024).", "source": "CTF-JKL-2024", "date_added": "2024-05-10" }, { "exploit_id": "EDB-52045", "cve": "CVE-2024-3400", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.8, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 19 83 15 00 01 ...", "description": "Palo Alto Networks PAN-OS RCE for reverse shell on port 1340 (2024).", "source": "https://www.exploit-db.com/exploits/52045", "date_added": "2024-04-12" }, { "exploit_id": "GH-2024-WIN1", "cve": "CVE-2024-26234", "vulnerability_type": "Buffer Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.7, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows proxy driver buffer overflow for RCE (2024).", "source": "https://github.com/exploits/windows-2024", "date_added": "2024-04-15" }, { "exploit_id": "EDB-52516", "cve": "CVE-2025-10128", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.4, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 20 83 15 00 01 ...", "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1341 (2025).", "source": "https://www.exploit-db.com/exploits/52516", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52517", "cve": "CVE-2025-10129", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.7, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 format string exploit for privilege escalation via kernel32.dll (2025).", "source": "https://www.exploit-db.com/exploits/52517", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT15", "cve": "CVE-2025-10130", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT use-after-free exploit for data exfiltration via FTP (2025).", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-MNO", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 21 83 15 00 01 ...", "description": "Linux x64 reverse shell connecting to attacker on port 1342, from CTF challenge (2025).", "source": "CTF-MNO-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52518", "cve": "CVE-2025-10131", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.6, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", "source": "https://www.exploit-db.com/exploits/52518", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-MIPS6", "cve": "CVE-2025-10132", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Persistence", "cvss_score": 7.4, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for persistent backdoor (2025).", "source": "https://github.com/exploits/mips-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52519", "cve": "CVE-2025-10133", "vulnerability_type": "Privilege Escalation", "platform": "macOS", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.3, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 exploit for root access via kernel vulnerability (2025).", "source": "https://www.exploit-db.com/exploits/52519", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-PQR", "cve": "N/A", "vulnerability_type": "Integer Overflow", "platform": "Linux", "architecture": "x86", "payload_goal": "Memory Leak", "cvss_score": 6.6, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge (2025).", "source": "CTF-PQR-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52520", "cve": "CVE-2025-10134", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.1, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows x64 reverse shell connecting to attacker on port 1343 (2025).", "source": "https://www.exploit-db.com/exploits/52520", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX12", "cve": "CVE-2025-10135", "vulnerability_type": "Race Condition", "platform": "Linux", "architecture": "x64", "payload_goal": "Lateral Movement", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 race condition exploit for lateral movement in a network (2025).", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52521", "cve": "CVE-2025-10136", "vulnerability_type": "Buffer Overflow", "platform": "Android", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2025).", "source": "https://www.exploit-db.com/exploits/52521", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52522", "cve": "CVE-2025-10137", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x86", "payload_goal": "Remote Code Execution", "cvss_score": 8.8, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 format string exploit for RCE, spawning a shell (2025).", "source": "https://www.exploit-db.com/exploits/52522", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN13", "cve": "CVE-2025-10138", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 8.0, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 use-after-free exploit for privilege escalation (2025).", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-STU", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "macOS", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "macOS x64 reverse shell connecting to attacker on port 1344, from CTF challenge (2025).", "source": "CTF-STU-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52523", "cve": "CVE-2025-10139", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 22 83 15 00 01 ...", "description": "Linux x64 heap overflow for reverse shell on port 1345 (2025).", "source": "https://www.exploit-db.com/exploits/52523", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52524", "cve": "CVE-2025-10140", "vulnerability_type": "Buffer Overflow", "platform": "Windows", "architecture": "x86", "payload_goal": "Remote Code Execution", "cvss_score": 9.3, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 buffer overflow for RCE, executing a command shell (2025).", "source": "https://www.exploit-db.com/exploits/52524", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT16", "cve": "CVE-2025-10141", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", "description": "ARM-based IoT use-after-free exploit for persistent backdoor (2025).", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52525", "cve": "CVE-2025-10142", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 23 83 15 00 01 ...", "description": "Linux x64 reverse shell connecting to attacker on port 1346 (2025).", "source": "https://www.exploit-db.com/exploits/52525", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-VWX", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 format string exploit to leak memory, from CTF challenge (2025).", "source": "CTF-VWX-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52526", "cve": "CVE-2025-10143", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.3, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "Linux x64 exploit for root access via kernel vulnerability (2025).", "source": "https://www.exploit-db.com/exploits/52526", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN14", "cve": "CVE-2025-10144", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.7, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52527", "cve": "CVE-2025-10145", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Data Exfiltration", "cvss_score": 7.6, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for data exfiltration via HTTP (2025).", "source": "https://www.exploit-db.com/exploits/52527", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-YZA", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x86", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 reverse shell connecting to attacker on port 1347, from CTF challenge (2025).", "source": "CTF-YZA-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52528", "cve": "CVE-2025-10146", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.8, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 use-after-free exploit for privilege escalation (2025).", "source": "https://www.exploit-db.com/exploits/52528", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX13", "cve": "CVE-2025-10147", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 buffer overflow for persistent backdoor installation (2025).", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52529", "cve": "CVE-2025-10148", "vulnerability_type": "Format String", "platform": "macOS", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 format string exploit to leak memory addresses (2025).", "source": "https://www.exploit-db.com/exploits/52529", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-BCD", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows x64 reverse shell connecting to attacker on port 1348, from CTF challenge (2025).", "source": "CTF-BCD-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52530", "cve": "CVE-2025-10149", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 24 83 15 00 01 ...", "description": "Linux x64 heap overflow for data exfiltration via UDP (2025).", "source": "https://www.exploit-db.com/exploits/52530", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT17", "cve": "CVE-2025-10150", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT buffer overflow for RCE, spawning a shell (2025).", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52531", "cve": "CVE-2025-10151", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.5, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 exploit for privilege escalation via kernel exploit (2025).", "source": "https://www.exploit-db.com/exploits/52531", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-EFG", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 format string exploit to leak memory, from CTF challenge (2025).", "source": "CTF-EFG-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52532", "cve": "CVE-2025-10152", "vulnerability_type": "Remote Code Execution", "platform": "Android", "architecture": "ARM", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM reverse shell connecting to attacker on port 1349 (2025).", "source": "https://www.exploit-db.com/exploits/52532", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN15", "cve": "CVE-2025-10153", "vulnerability_type": "Buffer Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 buffer overflow for data exfiltration via FTP (2025).", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52533", "cve": "CVE-2025-10154", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 25 83 15 00 01 ...", "description": "Linux x64 heap overflow for RCE, spawning a bind shell on port 1350 (2025).", "source": "https://www.exploit-db.com/exploits/52533", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-HIJ", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "macOS", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "macOS x64 reverse shell connecting to attacker on port 1351, from CTF challenge (2025).", "source": "CTF-HIJ-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52534", "cve": "CVE-2025-10155", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT buffer overflow for data exfiltration via SMTP (2025).", "source": "https://www.exploit-db.com/exploits/52534", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX14", "cve": "CVE-2025-10156", "vulnerability_type": "Use-After-Free", "platform": "Linux", "architecture": "x64", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 use-after-free exploit for persistent backdoor installation (2025).", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52535", "cve": "CVE-2025-10157", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 format string exploit for RCE, spawning a shell (2025).", "source": "https://www.exploit-db.com/exploits/52535", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-KLM", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Android", "architecture": "ARM", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM reverse shell connecting to attacker on port 1352, from CTF challenge (2025).", "source": "CTF-KLM-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-48765", "cve": "CVE-2021-33909", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux Sequoia vulnerability in filesystem for local privilege escalation to root (2021).", "source": "https://www.exploit-db.com/exploits/48765", "date_added": "2021-07-20" }, { "exploit_id": "EDB-49012", "cve": "CVE-2021-34527", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows PrintNightmare (Spooler) exploit for local privilege escalation (2021).", "source": "https://www.exploit-db.com/exploits/49012", "date_added": "2021-06-30" }, { "exploit_id": "GH-2021-LINUX2", "cve": "CVE-2021-41073", "vulnerability_type": "Use-After-Free", "platform": "Linux", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux io_uring use-after-free exploit for local root access (2021).", "source": "https://github.com/exploits/linux-2021", "date_added": "2021-09-15" }, { "exploit_id": "EDB-49456", "cve": "CVE-2022-0185", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux kernel heap overflow for local privilege escalation to root (2022).", "source": "https://www.exploit-db.com/exploits/49456", "date_added": "2022-01-20" }, { "exploit_id": "CTF-2021-DEF", "cve": "N/A", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x86", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 reverse shell exploit, connects to attacker on port 1353, from CTF challenge (2021).", "source": "CTF-DEF-2021", "date_added": "2021-11-10" }, { "exploit_id": "EDB-49876", "cve": "CVE-2022-0995", "vulnerability_type": "Use-After-Free", "platform": "Linux", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux kernel use-after-free exploit for local root access (2022).", "source": "https://www.exploit-db.com/exploits/49876", "date_added": "2022-03-15" }, { "exploit_id": "GH-2022-WIN2", "cve": "CVE-2022-21999", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows Spooler privilege escalation exploit for root access (2022).", "source": "https://github.com/exploits/windows-2022", "date_added": "2022-02-10" }, { "exploit_id": "EDB-50123", "cve": "CVE-2022-32250", "vulnerability_type": "Use-After-Free", "platform": "Linux", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux kernel NFTables use-after-free for local privilege escalation (2022).", "source": "https://www.exploit-db.com/exploits/50123", "date_added": "2022-06-02" }, { "exploit_id": "CTF-2022-GHI", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x86", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 format string exploit to leak memory, from CTF challenge (2022).", "source": "CTF-GHI-2022", "date_added": "2022-07-20" }, { "exploit_id": "EDB-50456", "cve": "CVE-2023-20871", "vulnerability_type": "Buffer Overflow", "platform": "Android", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2023).", "source": "https://www.exploit-db.com/exploits/50456", "date_added": "2023-05-15" }, { "exploit_id": "GH-2023-IOT2", "cve": "CVE-2023-27350", "vulnerability_type": "Remote Code Execution", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Remote Code Execution", "cvss_score": 9.8, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router RCE exploit for spawning a shell (2023).", "source": "https://github.com/exploits/iot-2023", "date_added": "2023-03-20" }, { "exploit_id": "EDB-50912", "cve": "CVE-2023-32629", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux kernel privilege escalation via game theory vulnerability (2023).", "source": "https://www.exploit-db.com/exploits/50912", "date_added": "2023-07-25" }, { "exploit_id": "EDB-51145", "cve": "CVE-2023-40044", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows WS_FTP Server RCE for reverse shell on port 1354 (2023).", "source": "https://www.exploit-db.com/exploits/51145", "date_added": "2023-09-10" }, { "exploit_id": "CTF-2023-JKL", "cve": "N/A", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 26 83 15 00 01 ...", "description": "Linux x64 reverse shell exploit, connects to attacker on port 1355, from CTF challenge (2023).", "source": "CTF-JKL-2023", "date_added": "2023-08-15" }, { "exploit_id": "EDB-51456", "cve": "CVE-2024-0762", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.4, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 27 83 15 00 01 ...", "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1356 (2024).", "source": "https://www.exploit-db.com/exploits/51456", "date_added": "2024-01-20" }, { "exploit_id": "GH-2024-ANDROID2", "cve": "CVE-2024-21410", "vulnerability_type": "Privilege Escalation", "platform": "Android", "architecture": "ARM", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM privilege escalation exploit for root access (2024).", "source": "https://github.com/exploits/android-2024", "date_added": "2024-02-15" }, { "exploit_id": "EDB-51789", "cve": "CVE-2024-28995", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows SolarWinds RCE for reverse shell on port 1357 (2024).", "source": "https://www.exploit-db.com/exploits/51789", "date_added": "2024-05-10" }, { "exploit_id": "CTF-2024-MNO", "cve": "N/A", "vulnerability_type": "Format String", "platform": "macOS", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 format string exploit to leak memory, from CTF challenge (2024).", "source": "CTF-MNO-2024", "date_added": "2024-06-15" }, { "exploit_id": "EDB-51945", "cve": "CVE-2024-29847", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 8.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows kernel use-after-free exploit for privilege escalation (2024).", "source": "https://www.exploit-db.com/exploits/51945", "date_added": "2024-05-20" }, { "exploit_id": "GH-2024-IOT3", "cve": "CVE-2024-3094", "vulnerability_type": "Remote Code Execution", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Remote Code Execution", "cvss_score": 9.8, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT XZ Utils backdoor for RCE (2024).", "source": "https://github.com/exploits/iot-2024", "date_added": "2024-03-29" }, { "exploit_id": "EDB-52536", "cve": "CVE-2025-10158", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.4, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 28 83 15 00 01 ...", "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1358 (2025).", "source": "https://www.exploit-db.com/exploits/52536", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52537", "cve": "CVE-2025-10159", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.7, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 format string exploit for privilege escalation via kernel32.dll (2025).", "source": "https://www.exploit-db.com/exploits/52537", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT18", "cve": "CVE-2025-10160", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT use-after-free exploit for data exfiltration via FTP (2025).", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-PQR", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 29 83 15 00 01 ...", "description": "Linux x64 reverse shell connecting to attacker on port 1359, from CTF challenge (2025).", "source": "CTF-PQR-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52538", "cve": "CVE-2025-10161", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.6, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", "source": "https://www.exploit-db.com/exploits/52538", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-MIPS7", "cve": "CVE-2025-10162", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Persistence", "cvss_score": 7.4, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for persistent backdoor (2025).", "source": "https://github.com/exploits/mips-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52539", "cve": "CVE-2025-10163", "vulnerability_type": "Privilege Escalation", "platform": "macOS", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.3, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 exploit for root access via kernel vulnerability (2025).", "source": "https://www.exploit-db.com/exploits/52539", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-STU", "cve": "N/A", "vulnerability_type": "Integer Overflow", "platform": "Linux", "architecture": "x86", "payload_goal": "Memory Leak", "cvss_score": 6.6, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge (2025).", "source": "CTF-STU-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52540", "cve": "CVE-2025-10164", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.1, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows x64 reverse shell connecting to attacker on port 1360 (2025).", "source": "https://www.exploit-db.com/exploits/52540", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX15", "cve": "CVE-2025-10165", "vulnerability_type": "Race Condition", "platform": "Linux", "architecture": "x64", "payload_goal": "Lateral Movement", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 race condition exploit for lateral movement in a network (2025).", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52541", "cve": "CVE-2025-10166", "vulnerability_type": "Buffer Overflow", "platform": "Android", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2025).", "source": "https://www.exploit-db.com/exploits/52541", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52542", "cve": "CVE-2025-10167", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x86", "payload_goal": "Remote Code Execution", "cvss_score": 8.8, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 format string exploit for RCE, spawning a shell (2025).", "source": "https://www.exploit-db.com/exploits/52542", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN16", "cve": "CVE-2025-10168", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 8.0, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 use-after-free exploit for privilege escalation (2025).", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-VWX", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "macOS", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "macOS x64 reverse shell connecting to attacker on port 1361, from CTF challenge (2025).", "source": "CTF-VWX-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52543", "cve": "CVE-2025-10169", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 30 83 15 00 01 ...", "description": "Linux x64 heap overflow for reverse shell on port 1362 (2025).", "source": "https://www.exploit-db.com/exploits/52543", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52544", "cve": "CVE-2025-10170", "vulnerability_type": "Buffer Overflow", "platform": "Windows", "architecture": "x86", "payload_goal": "Remote Code Execution", "cvss_score": 9.3, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 buffer overflow for RCE, executing a command shell (2025).", "source": "https://www.exploit-db.com/exploits/52544", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT19", "cve": "CVE-2025-10171", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", "description": "ARM-based IoT use-after-free exploit for persistent backdoor (2025).", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52545", "cve": "CVE-2025-10172", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 31 83 15 00 01 ...", "description": "Linux x64 reverse shell connecting to attacker on port 1363 (2025).", "source": "https://www.exploit-db.com/exploits/52545", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-YZA", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 format string exploit to leak memory, from CTF challenge (2025).", "source": "CTF-YZA-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52546", "cve": "CVE-2025-10173", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.3, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "Linux x64 exploit for root access via kernel vulnerability (2025).", "source": "https://www.exploit-db.com/exploits/52546", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN17", "cve": "CVE-2025-10174", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.7, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52547", "cve": "CVE-2025-10175", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Data Exfiltration", "cvss_score": 7.6, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for data exfiltration via HTTP (2025).", "source": "https://www.exploit-db.com/exploits/52547", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-BCD", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x86", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 reverse shell connecting to attacker on port 1364, from CTF challenge (2025).", "source": "CTF-BCD-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52548", "cve": "CVE-2025-10176", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.8, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 use-after-free exploit for privilege escalation (2025).", "source": "https://www.exploit-db.com/exploits/52548", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX16", "cve": "CVE-2025-10177", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 buffer overflow for persistent backdoor installation (2025).", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52549", "cve": "CVE-2025-10178", "vulnerability_type": "Format String", "platform": "macOS", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 format string exploit to leak memory addresses (2025).", "source": "https://www.exploit-db.com/exploits/52549", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-EFG", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows x64 reverse shell connecting to attacker on port 1365, from CTF challenge (2025).", "source": "CTF-EFG-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52550", "cve": "CVE-2025-10179", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 32 83 15 00 01 ...", "description": "Linux x64 heap overflow for data exfiltration via UDP (2025).", "source": "https://www.exploit-db.com/exploits/52550", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT20", "cve": "CVE-2025-10180", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT buffer overflow for RCE, spawning a shell (2025).", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52551", "cve": "CVE-2025-10181", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.5, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 exploit for privilege escalation via kernel exploit (2025).", "source": "https://www.exploit-db.com/exploits/52551", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-HIJ", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 format string exploit to leak memory, from CTF challenge (2025).", "source": "CTF-HIJ-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52552", "cve": "CVE-2025-10182", "vulnerability_type": "Remote Code Execution", "platform": "Android", "architecture": "ARM", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM reverse shell connecting to attacker on port 1366 (2025).", "source": "https://www.exploit-db.com/exploits/52552", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN18", "cve": "CVE-2025-10183", "vulnerability_type": "Buffer Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 buffer overflow for data exfiltration via FTP (2025).", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52553", "cve": "CVE-2025-10184", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 33 83 15 00 01 ...", "description": "Linux x64 heap overflow for RCE, spawning a bind shell on port 1367 (2025).", "source": "https://www.exploit-db.com/exploits/52553", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-KLM", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "macOS", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "macOS x64 reverse shell connecting to attacker on port 1368, from CTF challenge (2025).", "source": "CTF-KLM-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52554", "cve": "CVE-2025-10185", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT buffer overflow for data exfiltration via SMTP (2025).", "source": "https://www.exploit-db.com/exploits/52554", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX17", "cve": "CVE-2025-10186", "vulnerability_type": "Use-After-Free", "platform": "Linux", "architecture": "x64", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 use-after-free exploit for persistent backdoor installation (2025).", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52555", "cve": "CVE-2025-10187", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 format string exploit for RCE, spawning a shell (2025).", "source": "https://www.exploit-db.com/exploits/52555", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-NOP", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Android", "architecture": "ARM", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM reverse shell connecting to attacker on port 1369, from CTF challenge (2025).", "source": "CTF-NOP-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-48654", "cve": "CVE-2021-3156", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux sudo heap-based buffer overflow for local privilege escalation to root (2021).", "source": "https://www.exploit-db.com/exploits/48654", "date_added": "2021-01-26" }, { "exploit_id": "EDB-48912", "cve": "CVE-2021-4034", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux pkexec privilege escalation for local root access (2021).", "source": "https://www.exploit-db.com/exploits/48912", "date_added": "2021-08-27" }, { "exploit_id": "GH-2021-WIN3", "cve": "CVE-2021-1675", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows PrintSpooler exploit for local privilege escalation (2021).", "source": "https://github.com/exploits/windows-2021", "date_added": "2021-06-08" }, { "exploit_id": "EDB-49567", "cve": "CVE-2022-22965", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.8, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 70 83 15 00 01 ...", "description": "Spring4Shell RCE in Spring Framework for reverse shell on port 1370 (2022).", "source": "https://www.exploit-db.com/exploits/49567", "date_added": "2022-03-31" }, { "exploit_id": "CTF-2021-GHI", "cve": "N/A", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x86", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 reverse shell exploit, connects to attacker on port 1371, from CTF challenge (2021).", "source": "CTF-GHI-2021", "date_added": "2021-12-10" }, { "exploit_id": "EDB-49901", "cve": "CVE-2022-30190", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows Follina MSDT vulnerability for RCE, executing a command shell (2022).", "source": "https://www.exploit-db.com/exploits/49901", "date_added": "2022-05-30" }, { "exploit_id": "GH-2022-IOT4", "cve": "CVE-2022-31256", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Remote Code Execution", "cvss_score": 9.0, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for RCE, spawning a shell (2022).", "source": "https://github.com/exploits/iot-2022", "date_added": "2022-06-15" }, { "exploit_id": "EDB-50234", "cve": "CVE-2022-34713", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 8.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows Win32k use-after-free for privilege escalation (2022).", "source": "https://www.exploit-db.com/exploits/50234", "date_added": "2022-08-10" }, { "exploit_id": "CTF-2022-JKL", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x86", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 format string exploit to leak memory, from CTF challenge (2022).", "source": "CTF-JKL-2022", "date_added": "2022-09-20" }, { "exploit_id": "EDB-50678", "cve": "CVE-2023-23397", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Microsoft Outlook RCE for remote code execution (2023).", "source": "https://www.exploit-db.com/exploits/50678", "date_added": "2023-03-15" }, { "exploit_id": "GH-2023-ANDROID3", "cve": "CVE-2023-26083", "vulnerability_type": "Buffer Overflow", "platform": "Android", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2023).", "source": "https://github.com/exploits/android-2023", "date_added": "2023-04-20" }, { "exploit_id": "EDB-51012", "cve": "CVE-2023-28250", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows kernel privilege escalation exploit (2023).", "source": "https://www.exploit-db.com/exploits/51012", "date_added": "2023-04-05" }, { "exploit_id": "EDB-51278", "cve": "CVE-2023-35078", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Ivanti Endpoint Manager RCE for reverse shell on port 1372 (2023).", "source": "https://www.exploit-db.com/exploits/51278", "date_added": "2023-07-25" }, { "exploit_id": "CTF-2023-MNO", "cve": "N/A", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 73 83 15 00 01 ...", "description": "Linux x64 reverse shell exploit, connects to attacker on port 1373, from CTF challenge (2023).", "source": "CTF-MNO-2023", "date_added": "2023-08-10" }, { "exploit_id": "EDB-51589", "cve": "CVE-2024-21338", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows kernel privilege escalation via AppLocker driver (2024).", "source": "https://www.exploit-db.com/exploits/51589", "date_added": "2024-02-10" }, { "exploit_id": "GH-2024-IOT5", "cve": "CVE-2024-24919", "vulnerability_type": "Remote Code Execution", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT RCE exploit for spawning a shell (2024).", "source": "https://github.com/exploits/iot-2024", "date_added": "2024-03-15" }, { "exploit_id": "EDB-51812", "cve": "CVE-2024-30080", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows MSHTML RCE for reverse shell on port 1374 (2024).", "source": "https://www.exploit-db.com/exploits/51812", "date_added": "2024-06-10" }, { "exploit_id": "CTF-2024-PQR", "cve": "N/A", "vulnerability_type": "Format String", "platform": "macOS", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 format string exploit to leak memory, from CTF challenge (2024).", "source": "CTF-PQR-2024", "date_added": "2024-07-15" }, { "exploit_id": "EDB-52012", "cve": "CVE-2024-38112", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 8.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows spooler use-after-free for privilege escalation (2024).", "source": "https://www.exploit-db.com/exploits/52012", "date_added": "2024-07-10" }, { "exploit_id": "GH-2024-ANDROID4", "cve": "CVE-2024-29745", "vulnerability_type": "Privilege Escalation", "platform": "Android", "architecture": "ARM", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM privilege escalation exploit for root access (2024).", "source": "https://github.com/exploits/android-2024", "date_added": "2024-04-05" }, { "exploit_id": "EDB-52556", "cve": "CVE-2025-10188", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.4, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 75 83 15 00 01 ...", "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1375 (2025).", "source": "https://www.exploit-db.com/exploits/52556", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52557", "cve": "CVE-2025-10189", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.7, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 format string exploit for privilege escalation via kernel32.dll (2025).", "source": "https://www.exploit-db.com/exploits/52557", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT21", "cve": "CVE-2025-10190", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT use-after-free exploit for data exfiltration via FTP (2025).", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-STU", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 76 83 15 00 01 ...", "description": "Linux x64 reverse shell connecting to attacker on port 1376, from CTF challenge (2025).", "source": "CTF-STU-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52558", "cve": "CVE-2025-10191", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.6, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", "source": "https://www.exploit-db.com/exploits/52558", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-MIPS8", "cve": "CVE-2025-10192", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Persistence", "cvss_score": 7.4, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for persistent backdoor (2025).", "source": "https://github.com/exploits/mips-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52559", "cve": "CVE-2025-10193", "vulnerability_type": "Privilege Escalation", "platform": "macOS", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.3, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 exploit for root access via kernel vulnerability (2025).", "source": "https://www.exploit-db.com/exploits/52559", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-VWX", "cve": "N/A", "vulnerability_type": "Integer Overflow", "platform": "Linux", "architecture": "x86", "payload_goal": "Memory Leak", "cvss_score": 6.6, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge (2025).", "source": "CTF-VWX-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52560", "cve": "CVE-2025-10194", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.1, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows x64 reverse shell connecting to attacker on port 1377 (2025).", "source": "https://www.exploit-db.com/exploits/52560", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX18", "cve": "CVE-2025-10195", "vulnerability_type": "Race Condition", "platform": "Linux", "architecture": "x64", "payload_goal": "Lateral Movement", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 race condition exploit for lateral movement in a network (2025).", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52561", "cve": "CVE-2025-10196", "vulnerability_type": "Buffer Overflow", "platform": "Android", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2025).", "source": "https://www.exploit-db.com/exploits/52561", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52562", "cve": "CVE-2025-10197", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x86", "payload_goal": "Remote Code Execution", "cvss_score": 8.8, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 format string exploit for RCE, spawning a shell (2025).", "source": "https://www.exploit-db.com/exploits/52562", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN19", "cve": "CVE-2025-10198", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 8.0, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 use-after-free exploit for privilege escalation (2025).", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-YZA", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "macOS", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "macOS x64 reverse shell connecting to attacker on port 1378, from CTF challenge (2025).", "source": "CTF-YZA-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52563", "cve": "CVE-2025-10199", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 79 83 15 00 01 ...", "description": "Linux x64 heap overflow for reverse shell on port 1379 (2025).", "source": "https://www.exploit-db.com/exploits/52563", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52564", "cve": "CVE-2025-10200", "vulnerability_type": "Buffer Overflow", "platform": "Windows", "architecture": "x86", "payload_goal": "Remote Code Execution", "cvss_score": 9.3, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 buffer overflow for RCE, executing a command shell (2025).", "source": "https://www.exploit-db.com/exploits/52564", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT22", "cve": "CVE-2025-10201", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", "description": "ARM-based IoT use-after-free exploit for persistent backdoor (2025).", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52565", "cve": "CVE-2025-10202", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 80 83 15 00 01 ...", "description": "Linux x64 reverse shell connecting to attacker on port 1380 (2025).", "source": "https://www.exploit-db.com/exploits/52565", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-BCD", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 format string exploit to leak memory, from CTF challenge (2025).", "source": "CTF-BCD-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52566", "cve": "CVE-2025-10203", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.3, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "Linux x64 exploit for root access via kernel vulnerability (2025).", "source": "https://www.exploit-db.com/exploits/52566", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN20", "cve": "CVE-2025-10204", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.7, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52567", "cve": "CVE-2025-10205", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Data Exfiltration", "cvss_score": 7.6, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for data exfiltration via HTTP (2025).", "source": "https://www.exploit-db.com/exploits/52567", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-EFG", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x86", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 reverse shell connecting to attacker on port 1381, from CTF challenge (2025).", "source": "CTF-EFG-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52568", "cve": "CVE-2025-10206", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.8, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 use-after-free exploit for privilege escalation (2025).", "source": "https://www.exploit-db.com/exploits/52568", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX19", "cve": "CVE-2025-10207", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 buffer overflow for persistent backdoor installation (2025).", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52569", "cve": "CVE-2025-10208", "vulnerability_type": "Format String", "platform": "macOS", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 format string exploit to leak memory addresses (2025).", "source": "https://www.exploit-db.com/exploits/52569", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-HIJ", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows x64 reverse shell connecting to attacker on port 1382, from CTF challenge (2025).", "source": "CTF-HIJ-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52570", "cve": "CVE-2025-10209", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 83 83 15 00 01 ...", "description": "Linux x64 heap overflow for data exfiltration via UDP (2025).", "source": "https://www.exploit-db.com/exploits/52570", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT23", "cve": "CVE-2025-10210", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT buffer overflow for RCE, spawning a shell (2025).", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52571", "cve": "CVE-2025-10211", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.5, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 exploit for privilege escalation via kernel exploit (2025).", "source": "https://www.exploit-db.com/exploits/52571", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-KLM", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 format string exploit to leak memory, from CTF challenge (2025).", "source": "CTF-KLM-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52572", "cve": "CVE-2025-10212", "vulnerability_type": "Remote Code Execution", "platform": "Android", "architecture": "ARM", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM reverse shell connecting to attacker on port 1383, from CTF challenge (2025).", "source": "https://www.exploit-db.com/exploits/52572", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN21", "cve": "CVE-2025-10213", "vulnerability_type": "Buffer Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 buffer overflow for data exfiltration via FTP (2025).", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52573", "cve": "CVE-2025-10214", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 84 83 15 00 01 ...", "description": "Linux x64 heap overflow for RCE, spawning a bind shell on port 1384 (2025).", "source": "https://www.exploit-db.com/exploits/52573", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-NOP", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "macOS", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "macOS x64 reverse shell connecting to attacker on port 1385, from CTF challenge (2025).", "source": "CTF-NOP-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52574", "cve": "CVE-2025-10215", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT buffer overflow for data exfiltration via SMTP (2025).", "source": "https://www.exploit-db.com/exploits/52574", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX20", "cve": "CVE-2025-10216", "vulnerability_type": "Use-After-Free", "platform": "Linux", "architecture": "x64", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 use-after-free exploit for persistent backdoor installation (2025).", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52575", "cve": "CVE-2025-10217", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 format string exploit for RCE, spawning a shell (2025).", "source": "https://www.exploit-db.com/exploits/52575", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-QRS", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Android", "architecture": "ARM", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM reverse shell connecting to attacker on port 1386, from CTF challenge (2025).", "source": "CTF-QRS-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-48456", "cve": "CVE-2021-22205", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.8, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 87 83 15 00 01 ...", "description": "GitLab CE/EE RCE via ExifTool for reverse shell on port 1387 (2021).", "source": "https://www.exploit-db.com/exploits/48456", "date_added": "2021-04-14" }, { "exploit_id": "EDB-48712", "cve": "CVE-2021-3493", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux OverlayFS privilege escalation for local root access (2021).", "source": "https://www.exploit-db.com/exploits/48712", "date_added": "2021-04-20" }, { "exploit_id": "GH-2021-WIN4", "cve": "CVE-2021-36934", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows HiveNightmare ACL exploit for privilege escalation (2021).", "source": "https://github.com/exploits/windows-2021", "date_added": "2021-07-19" }, { "exploit_id": "EDB-49678", "cve": "CVE-2022-25636", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux netfilter privilege escalation for local root access (2022).", "source": "https://www.exploit-db.com/exploits/49678", "date_added": "2022-02-24" }, { "exploit_id": "CTF-2021-JKL", "cve": "N/A", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x86", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 reverse shell exploit, connects to attacker on port 1388, from CTF challenge (2021).", "source": "CTF-JKL-2021", "date_added": "2021-11-15" }, { "exploit_id": "EDB-50012", "cve": "CVE-2022-27925", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.8, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 89 83 15 00 01 ...", "description": "Zimbra Collaboration Suite RCE for remote code execution (2022).", "source": "https://www.exploit-db.com/exploits/50012", "date_added": "2022-03-10" }, { "exploit_id": "GH-2022-IOT6", "cve": "CVE-2022-29464", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Remote Code Execution", "cvss_score": 9.0, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for RCE, spawning a shell (2022).", "source": "https://github.com/exploits/iot-2022", "date_added": "2022-04-18" }, { "exploit_id": "EDB-50345", "cve": "CVE-2022-40684", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Fortinet FortiOS RCE for reverse shell on port 1389 (2022).", "source": "https://www.exploit-db.com/exploits/50345", "date_added": "2022-10-10" }, { "exploit_id": "CTF-2022-MNO", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x86", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 format string exploit to leak memory, from CTF challenge (2022).", "source": "CTF-MNO-2022", "date_added": "2022-08-15" }, { "exploit_id": "EDB-50789", "cve": "CVE-2023-21839", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Oracle WebLogic Server RCE for remote code execution (2023).", "source": "https://www.exploit-db.com/exploits/50789", "date_added": "2023-01-15" }, { "exploit_id": "GH-2023-ANDROID5", "cve": "CVE-2023-20963", "vulnerability_type": "Privilege Escalation", "platform": "Android", "architecture": "ARM", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM privilege escalation exploit for root access (2023).", "source": "https://github.com/exploits/android-2023", "date_added": "2023-02-10" }, { "exploit_id": "EDB-51123", "cve": "CVE-2023-27532", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.8, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 90 83 15 00 01 ...", "description": "Linux Veeam Backup & Replication RCE for reverse shell on port 1390 (2023).", "source": "https://www.exploit-db.com/exploits/51123", "date_added": "2023-03-05" }, { "exploit_id": "EDB-51345", "cve": "CVE-2023-34362", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "MOVEit Transfer RCE for reverse shell on port 1391 (2023).", "source": "https://www.exploit-db.com/exploits/51345", "date_added": "2023-06-01" }, { "exploit_id": "CTF-2023-PQR", "cve": "N/A", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 91 83 15 00 01 ...", "description": "Linux x64 reverse shell exploit, connects to attacker on port 1392, from CTF challenge (2023).", "source": "CTF-PQR-2023", "date_added": "2023-09-10" }, { "exploit_id": "EDB-51678", "cve": "CVE-2024-21334", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows OpenVPN RCE for remote code execution (2024).", "source": "https://www.exploit-db.com/exploits/51678", "date_added": "2024-03-10" }, { "exploit_id": "GH-2024-IOT7", "cve": "CVE-2024-27198", "vulnerability_type": "Remote Code Execution", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT RCE exploit for spawning a shell (2024).", "source": "https://github.com/exploits/iot-2024", "date_added": "2024-02-15" }, { "exploit_id": "EDB-51901", "cve": "CVE-2024-29973", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows kernel privilege escalation via driver vulnerability (2024).", "source": "https://www.exploit-db.com/exploits/51901", "date_added": "2024-04-20" }, { "exploit_id": "CTF-2024-STU", "cve": "N/A", "vulnerability_type": "Format String", "platform": "macOS", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 format string exploit to leak memory, from CTF challenge (2024).", "source": "CTF-STU-2024", "date_added": "2024-06-20" }, { "exploit_id": "EDB-52123", "cve": "CVE-2024-38063", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 8.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows IPv6 use-after-free for privilege escalation (2024).", "source": "https://www.exploit-db.com/exploits/52123", "date_added": "2024-08-05" }, { "exploit_id": "GH-2024-ANDROID6", "cve": "CVE-2024-36971", "vulnerability_type": "Buffer Overflow", "platform": "Android", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2024).", "source": "https://github.com/exploits/android-2024", "date_added": "2024-05-15" }, { "exploit_id": "EDB-52576", "cve": "CVE-2025-10218", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.4, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 93 83 15 00 01 ...", "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1393 (2025).", "source": "https://www.exploit-db.com/exploits/52576", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52577", "cve": "CVE-2025-10219", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.7, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 format string exploit for privilege escalation via kernel32.dll (2025).", "source": "https://www.exploit-db.com/exploits/52577", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT24", "cve": "CVE-2025-10220", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT use-after-free exploit for data exfiltration via FTP (2025).", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-VWX", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 94 83 15 00 01 ...", "description": "Linux x64 reverse shell connecting to attacker on port 1394, from CTF challenge (2025).", "source": "CTF-VWX-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52578", "cve": "CVE-2025-10221", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.6, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", "source": "https://www.exploit-db.com/exploits/52578", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-MIPS9", "cve": "CVE-2025-10222", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Persistence", "cvss_score": 7.4, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for persistent backdoor (2025).", "source": "https://github.com/exploits/mips-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52579", "cve": "CVE-2025-10223", "vulnerability_type": "Privilege Escalation", "platform": "macOS", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.3, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 exploit for root access via kernel vulnerability (2025).", "source": "https://www.exploit-db.com/exploits/52579", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-YZA", "cve": "N/A", "vulnerability_type": "Integer Overflow", "platform": "Linux", "architecture": "x86", "payload_goal": "Memory Leak", "cvss_score": 6.6, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge (2025).", "source": "CTF-YZA-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52580", "cve": "CVE-2025-10224", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.1, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows x64 reverse shell connecting to attacker on port 1395 (2025).", "source": "https://www.exploit-db.com/exploits/52580", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX21", "cve": "CVE-2025-10225", "vulnerability_type": "Race Condition", "platform": "Linux", "architecture": "x64", "payload_goal": "Lateral Movement", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 race condition exploit for lateral movement in a network (2025).", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52581", "cve": "CVE-2025-10226", "vulnerability_type": "Buffer Overflow", "platform": "Android", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2025).", "source": "https://www.exploit-db.com/exploits/52581", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52582", "cve": "CVE-2025-10227", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x86", "payload_goal": "Remote Code Execution", "cvss_score": 8.8, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 format string exploit for RCE, spawning a shell (2025).", "source": "https://www.exploit-db.com/exploits/52582", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN22", "cve": "CVE-2025-10228", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 8.0, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 use-after-free exploit for privilege escalation (2025).", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-BCD", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "macOS", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "macOS x64 reverse shell connecting to attacker on port 1396, from CTF challenge (2025).", "source": "CTF-BCD-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52583", "cve": "CVE-2025-10229", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 97 83 15 00 01 ...", "description": "Linux x64 heap overflow for reverse shell on port 1397 (2025).", "source": "https://www.exploit-db.com/exploits/52583", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52584", "cve": "CVE-2025-10230", "vulnerability_type": "Buffer Overflow", "platform": "Windows", "architecture": "x86", "payload_goal": "Remote Code Execution", "cvss_score": 9.3, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 buffer overflow for RCE, executing a command shell (2025).", "source": "https://www.exploit-db.com/exploits/52584", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT25", "cve": "CVE-2025-10231", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", "description": "ARM-based IoT use-after-free exploit for persistent backdoor (2025).", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52585", "cve": "CVE-2025-10232", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 98 83 15 00 01 ...", "description": "Linux x64 reverse shell connecting to attacker on port 1398 (2025).", "source": "https://www.exploit-db.com/exploits/52585", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-EFG", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 format string exploit to leak memory, from CTF challenge (2025).", "source": "CTF-EFG-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52586", "cve": "CVE-2025-10233", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.3, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "Linux x64 exploit for root access via kernel vulnerability (2025).", "source": "https://www.exploit-db.com/exploits/52586", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN23", "cve": "CVE-2025-10234", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.7, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52587", "cve": "CVE-2025-10235", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Data Exfiltration", "cvss_score": 7.6, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for data exfiltration via HTTP (2025).", "source": "https://www.exploit-db.com/exploits/52587", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-HIJ", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x86", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 reverse shell connecting to attacker on port 1399, from CTF challenge (2025).", "source": "CTF-HIJ-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52588", "cve": "CVE-2025-10236", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.8, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 use-after-free exploit for privilege escalation (2025).", "source": "https://www.exploit-db.com/exploits/52588", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX22", "cve": "CVE-2025-10237", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 buffer overflow for persistent backdoor installation (2025).", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52589", "cve": "CVE-2025-10238", "vulnerability_type": "Format String", "platform": "macOS", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 format string exploit to leak memory addresses (2025).", "source": "https://www.exploit-db.com/exploits/52589", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-KLM", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows x64 reverse shell connecting to attacker on port 1400, from CTF challenge (2025).", "source": "CTF-KLM-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52590", "cve": "CVE-2025-10239", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 01 83 15 00 01 ...", "description": "Linux x64 heap overflow for data exfiltration via UDP (2025).", "source": "https://www.exploit-db.com/exploits/52590", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT26", "cve": "CVE-2025-10240", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT buffer overflow for RCE, spawning a shell (2025).", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52591", "cve": "CVE-2025-10241", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.5, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 exploit for privilege escalation via kernel exploit (2025).", "source": "https://www.exploit-db.com/exploits/52591", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-NOP", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 format string exploit to leak memory, from CTF challenge (2025).", "source": "CTF-NOP-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52592", "cve": "CVE-2025-10242", "vulnerability_type": "Remote Code Execution", "platform": "Android", "architecture": "ARM", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM reverse shell connecting to attacker on port 1401 (2025).", "source": "https://www.exploit-db.com/exploits/52592", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN24", "cve": "CVE-2025-10243", "vulnerability_type": "Buffer Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 buffer overflow for data exfiltration via FTP (2025).", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52593", "cve": "CVE-2025-10244", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 02 83 15 00 01 ...", "description": "Linux x64 heap overflow for RCE, spawning a bind shell on port 1402 (2025).", "source": "https://www.exploit-db.com/exploits/52593", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-QRS", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "macOS", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "macOS x64 reverse shell connecting to attacker on port 1403, from CTF challenge (2025).", "source": "CTF-QRS-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52594", "cve": "CVE-2025-10245", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT buffer overflow for data exfiltration via SMTP (2025).", "source": "https://www.exploit-db.com/exploits/52594", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX23", "cve": "CVE-2025-10246", "vulnerability_type": "Use-After-Free", "platform": "Linux", "architecture": "x64", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 use-after-free exploit for persistent backdoor installation (2025).", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52595", "cve": "CVE-2025-10247", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 format string exploit for RCE, spawning a shell (2025).", "source": "https://www.exploit-db.com/exploits/52595", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-RST", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Android", "architecture": "ARM", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM reverse shell connecting to attacker on port 1404, from CTF challenge (2025).", "source": "CTF-RST-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-48523", "cve": "CVE-2021-26855", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Microsoft Exchange Server RCE (ProxyLogon) for remote code execution (2021).", "source": "https://www.exploit-db.com/exploits/48523", "date_added": "2021-03-02" }, { "exploit_id": "EDB-48890", "cve": "CVE-2021-40444", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 8.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows MSHTML RCE for reverse shell on port 1405 (2021).", "source": "https://www.exploit-db.com/exploits/48890", "date_added": "2021-09-07" }, { "exploit_id": "GH-2021-LINUX1", "cve": "CVE-2021-3560", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux polkit privilege escalation for local root access (2021).", "source": "https://github.com/exploits/linux-2021", "date_added": "2021-06-03" }, { "exploit_id": "EDB-49789", "cve": "CVE-2022-26134", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.8, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 06 83 15 00 01 ...", "description": "Atlassian Confluence RCE for reverse shell on port 1406 (2022).", "source": "https://www.exploit-db.com/exploits/49789", "date_added": "2022-06-02" }, { "exploit_id": "CTF-2021-MNO", "cve": "N/A", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x86", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 reverse shell exploit, connects to attacker on port 1407, from CTF challenge (2021).", "source": "CTF-MNO-2021", "date_added": "2021-10-20" }, { "exploit_id": "EDB-50123", "cve": "CVE-2022-28368", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows Citrix ADC RCE for remote code execution (2022).", "source": "https://www.exploit-db.com/exploits/50123", "date_added": "2022-04-05" }, { "exploit_id": "GH-2022-IOT8", "cve": "CVE-2022-31459", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Remote Code Execution", "cvss_score": 9.0, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for RCE, spawning a shell (2022).", "source": "https://github.com/exploits/iot-2022", "date_added": "2022-05-10" }, { "exploit_id": "EDB-50456", "cve": "CVE-2022-42475", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.8, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 08 83 15 00 01 ...", "description": "FortiGate SSL-VPN RCE for reverse shell on port 1408 (2022).", "source": "https://www.exploit-db.com/exploits/50456", "date_added": "2022-11-15" }, { "exploit_id": "CTF-2022-PQR", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x86", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 format string exploit to leak memory, from CTF challenge (2022).", "source": "CTF-PQR-2022", "date_added": "2022-09-25" }, { "exploit_id": "EDB-50890", "cve": "CVE-2023-22515", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Atlassian Confluence privilege escalation for root access (2023).", "source": "https://www.exploit-db.com/exploits/50890", "date_added": "2023-02-20" }, { "exploit_id": "GH-2023-ANDROID7", "cve": "CVE-2023-21036", "vulnerability_type": "Buffer Overflow", "platform": "Android", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2023).", "source": "https://github.com/exploits/android-2023", "date_added": "2023-03-10" }, { "exploit_id": "EDB-51234", "cve": "CVE-2023-28252", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows CLFS driver privilege escalation (2023).", "source": "https://www.exploit-db.com/exploits/51234", "date_added": "2023-04-15" }, { "exploit_id": "EDB-51456", "cve": "CVE-2023-38831", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "WinRAR RCE for reverse shell on port 1409 (2023).", "source": "https://www.exploit-db.com/exploits/51456", "date_added": "2023-08-20" }, { "exploit_id": "CTF-2023-STU", "cve": "N/A", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 10 83 15 00 01 ...", "description": "Linux x64 reverse shell exploit, connects to attacker on port 1410, from CTF challenge (2023).", "source": "CTF-STU-2023", "date_added": "2023-10-05" }, { "exploit_id": "EDB-51789", "cve": "CVE-2024-23897", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.8, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 11 83 15 00 01 ...", "description": "Jenkins RCE for remote code execution (2024).", "source": "https://www.exploit-db.com/exploits/51789", "date_added": "2024-01-25" }, { "exploit_id": "GH-2024-IOT9", "cve": "CVE-2024-27199", "vulnerability_type": "Remote Code Execution", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT RCE exploit for spawning a shell (2024).", "source": "https://github.com/exploits/iot-2024", "date_added": "2024-03-20" }, { "exploit_id": "EDB-52034", "cve": "CVE-2024-28995", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows kernel privilege escalation via driver vulnerability (2024).", "source": "https://www.exploit-db.com/exploits/52034", "date_added": "2024-05-10" }, { "exploit_id": "CTF-2024-VWX", "cve": "N/A", "vulnerability_type": "Format String", "platform": "macOS", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 format string exploit to leak memory, from CTF challenge (2024).", "source": "CTF-VWX-2024", "date_added": "2024-07-10" }, { "exploit_id": "EDB-52245", "cve": "CVE-2024-38106", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 8.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows kernel use-after-free for privilege escalation (2024).", "source": "https://www.exploit-db.com/exploits/52245", "date_added": "2024-07-15" }, { "exploit_id": "GH-2024-ANDROID8", "cve": "CVE-2024-43047", "vulnerability_type": "Privilege Escalation", "platform": "Android", "architecture": "ARM", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM privilege escalation exploit for root access (2024).", "source": "https://github.com/exploits/android-2024", "date_added": "2024-06-05" }, { "exploit_id": "EDB-52596", "cve": "CVE-2025-10248", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.4, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 12 83 15 00 01 ...", "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1412 (2025).", "source": "https://www.exploit-db.com/exploits/52596", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52597", "cve": "CVE-2025-10249", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.7, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 format string exploit for privilege escalation via kernel32.dll (2025).", "source": "https://www.exploit-db.com/exploits/52597", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT27", "cve": "CVE-2025-10250", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT use-after-free exploit for data exfiltration via FTP (2025).", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-BCD", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 13 83 15 00 01 ...", "description": "Linux x64 reverse shell connecting to attacker on port 1413, from CTF challenge (2025).", "source": "CTF-BCD-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52598", "cve": "CVE-2025-10251", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.6, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", "source": "https://www.exploit-db.com/exploits/52598", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-MIPS10", "cve": "CVE-2025-10252", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Persistence", "cvss_score": 7.4, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for persistent backdoor (2025).", "source": "https://github.com/exploits/mips-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52599", "cve": "CVE-2025-10253", "vulnerability_type": "Privilege Escalation", "platform": "macOS", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.3, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 exploit for root access via kernel vulnerability (2025).", "source": "https://www.exploit-db.com/exploits/52599", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-EFG", "cve": "N/A", "vulnerability_type": "Integer Overflow", "platform": "Linux", "architecture": "x86", "payload_goal": "Memory Leak", "cvss_score": 6.6, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge (2025).", "source": "CTF-EFG-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52600", "cve": "CVE-2025-10254", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.1, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows x64 reverse shell connecting to attacker on port 1414 (2025).", "source": "https://www.exploit-db.com/exploits/52600", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX24", "cve": "CVE-2025-10255", "vulnerability_type": "Race Condition", "platform": "Linux", "architecture": "x64", "payload_goal": "Lateral Movement", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 race condition exploit for lateral movement in a network (2025).", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52601", "cve": "CVE-2025-10256", "vulnerability_type": "Buffer Overflow", "platform": "Android", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2025).", "source": "https://www.exploit-db.com/exploits/52601", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52602", "cve": "CVE-2025-10257", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x86", "payload_goal": "Remote Code Execution", "cvss_score": 8.8, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 format string exploit for RCE, spawning a shell (2025).", "source": "https://www.exploit-db.com/exploits/52602", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN25", "cve": "CVE-2025-10258", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 8.0, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 use-after-free exploit for privilege escalation (2025).", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-HIJ", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "macOS", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "macOS x64 reverse shell connecting to attacker on port 1415, from CTF challenge (2025).", "source": "CTF-HIJ-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52603", "cve": "CVE-2025-10259", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 16 83 15 00 01 ...", "description": "Linux x64 heap overflow for reverse shell on port 1416 (2025).", "source": "https://www.exploit-db.com/exploits/52603", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52604", "cve": "CVE-2025-10260", "vulnerability_type": "Buffer Overflow", "platform": "Windows", "architecture": "x86", "payload_goal": "Remote Code Execution", "cvss_score": 9.3, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 buffer overflow for RCE, executing a command shell (2025).", "source": "https://www.exploit-db.com/exploits/52604", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT28", "cve": "CVE-2025-10261", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", "description": "ARM-based IoT use-after-free exploit for persistent backdoor (2025).", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52605", "cve": "CVE-2025-10262", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 17 83 15 00 01 ...", "description": "Linux x64 reverse shell connecting to attacker on port 1417 (2025).", "source": "https://www.exploit-db.com/exploits/52605", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-KLM", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 format string exploit to leak memory, from CTF challenge (2025).", "source": "CTF-KLM-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52606", "cve": "CVE-2025-10263", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.3, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "Linux x64 exploit for root access via kernel vulnerability (2025).", "source": "https://www.exploit-db.com/exploits/52606", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN26", "cve": "CVE-2025-10264", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.7, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52607", "cve": "CVE-2025-10265", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Data Exfiltration", "cvss_score": 7.6, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for data exfiltration via HTTP (2025).", "source": "https://www.exploit-db.com/exploits/52607", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-NOP", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x86", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 reverse shell connecting to attacker on port 1418, from CTF challenge (2025).", "source": "CTF-NOP-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52608", "cve": "CVE-2025-10266", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.8, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 use-after-free exploit for privilege escalation (2025).", "source": "https://www.exploit-db.com/exploits/52608", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX25", "cve": "CVE-2025-10267", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 buffer overflow for persistent backdoor installation (2025).", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52609", "cve": "CVE-2025-10268", "vulnerability_type": "Format String", "platform": "macOS", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 format string exploit to leak memory addresses (2025).", "source": "https://www.exploit-db.com/exploits/52609", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-QRS", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows x64 reverse shell connecting to attacker on port 1419, from CTF challenge (2025).", "source": "CTF-QRS-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52610", "cve": "CVE-2025-10269", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 20 83 15 00 01 ...", "description": "Linux x64 heap overflow for data exfiltration via UDP (2025).", "source": "https://www.exploit-db.com/exploits/52610", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT29", "cve": "CVE-2025-10270", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT buffer overflow for RCE, spawning a shell (2025).", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52611", "cve": "CVE-2025-10271", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.5, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 exploit for privilege escalation via kernel exploit (2025).", "source": "https://www.exploit-db.com/exploits/52611", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-RST", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 format string exploit to leak memory, from CTF challenge (2025).", "source": "CTF-RST-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52612", "cve": "CVE-2025-10272", "vulnerability_type": "Remote Code Execution", "platform": "Android", "architecture": "ARM", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM reverse shell connecting to attacker on port 1420, from CTF challenge (2025).", "source": "https://www.exploit-db.com/exploits/52612", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN27", "cve": "CVE-2025-10273", "vulnerability_type": "Buffer Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 buffer overflow for data exfiltration via FTP (2025).", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52613", "cve": "CVE-2025-10274", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 21 83 15 00 01 ...", "description": "Linux x64 heap overflow for RCE, spawning a bind shell on port 1421 (2025).", "source": "https://www.exploit-db.com/exploits/52613", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-UVW", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "macOS", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "macOS x64 reverse shell connecting to attacker on port 1422, from CTF challenge (2025).", "source": "CTF-UVW-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52614", "cve": "CVE-2025-10275", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT buffer overflow for data exfiltration via SMTP (2025).", "source": "https://www.exploit-db.com/exploits/52614", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX26", "cve": "CVE-2025-10276", "vulnerability_type": "Use-After-Free", "platform": "Linux", "architecture": "x64", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 use-after-free exploit for persistent backdoor installation (2025).", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52615", "cve": "CVE-2025-10277", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 format string exploit for RCE, spawning a shell (2025).", "source": "https://www.exploit-db.com/exploits/52615", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-WXY", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Android", "architecture": "ARM", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM reverse shell connecting to attacker on port 1423, from CTF challenge (2025).", "source": "CTF-WXY-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-48678", "cve": "CVE-2021-3156", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux sudo heap-based buffer overflow for privilege escalation (2021).", "source": "https://www.exploit-db.com/exploits/48678", "date_added": "2021-01-26" }, { "exploit_id": "EDB-48912", "cve": "CVE-2021-41773", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.8, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 24 83 15 00 01 ...", "description": "Apache HTTP Server path traversal RCE for reverse shell on port 1424 (2021).", "source": "https://www.exploit-db.com/exploits/48912", "date_added": "2021-09-29" }, { "exploit_id": "GH-2021-WIN5", "cve": "CVE-2021-34527", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows PrintNightmare exploit for local privilege escalation (2021).", "source": "https://github.com/exploits/windows-2021", "date_added": "2021-06-30" }, { "exploit_id": "EDB-49890", "cve": "CVE-2022-26923", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows AD certificate services privilege escalation (2022).", "source": "https://www.exploit-db.com/exploits/49890", "date_added": "2022-03-15" }, { "exploit_id": "CTF-2021-PQR", "cve": "N/A", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x86", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 reverse shell exploit, connects to attacker on port 1425, from CTF challenge (2021).", "source": "CTF-PQR-2021", "date_added": "2021-12-10" }, { "exploit_id": "EDB-50234", "cve": "CVE-2022-30190", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows MSDT (Follina) RCE for remote code execution (2022).", "source": "https://www.exploit-db.com/exploits/50234", "date_added": "2022-05-30" }, { "exploit_id": "GH-2022-IOT10", "cve": "CVE-2022-32250", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Remote Code Execution", "cvss_score": 9.0, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for RCE, spawning a shell (2022).", "source": "https://github.com/exploits/iot-2022", "date_added": "2022-06-05" }, { "exploit_id": "EDB-50567", "cve": "CVE-2022-34713", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Microsoft Defender SmartScreen RCE for reverse shell on port 1426 (2022).", "source": "https://www.exploit-db.com/exploits/50567", "date_added": "2022-08-10" }, { "exploit_id": "CTF-2022-STU", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x86", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 format string exploit to leak memory, from CTF challenge (2022).", "source": "CTF-STU-2022", "date_added": "2022-10-15" }, { "exploit_id": "EDB-50901", "cve": "CVE-2023-23397", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Microsoft Outlook RCE for remote code execution (2023).", "source": "https://www.exploit-db.com/exploits/50901", "date_added": "2023-03-15" }, { "exploit_id": "GH-2023-ANDROID9", "cve": "CVE-2023-21326", "vulnerability_type": "Privilege Escalation", "platform": "Android", "architecture": "ARM", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM privilege escalation exploit for root access (2023).", "source": "https://github.com/exploits/android-2023", "date_added": "2023-04-20" }, { "exploit_id": "EDB-51356", "cve": "CVE-2023-35078", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Ivanti Endpoint Manager Mobile RCE for reverse shell on port 1427 (2023).", "source": "https://www.exploit-db.com/exploits/51356", "date_added": "2023-07-25" }, { "exploit_id": "EDB-51567", "cve": "CVE-2023-40044", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.8, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 28 83 15 00 01 ...", "description": "Progress WS_FTP Server RCE for remote code execution (2023).", "source": "https://www.exploit-db.com/exploits/51567", "date_added": "2023-09-27" }, { "exploit_id": "CTF-2023-VWX", "cve": "N/A", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 29 83 15 00 01 ...", "description": "Linux x64 reverse shell exploit, connects to attacker on port 1429, from CTF challenge (2023).", "source": "CTF-VWX-2023", "date_added": "2023-11-10" }, { "exploit_id": "EDB-51890", "cve": "CVE-2024-24919", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Check Point VPN information disclosure leading to RCE (2024).", "source": "https://www.exploit-db.com/exploits/51890", "date_added": "2024-02-10" }, { "exploit_id": "GH-2024-IOT11", "cve": "CVE-2024-27200", "vulnerability_type": "Remote Code Execution", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT RCE exploit for spawning a shell (2024).", "source": "https://github.com/exploits/iot-2024", "date_added": "2024-04-15" }, { "exploit_id": "EDB-52145", "cve": "CVE-2024-29972", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux kernel privilege escalation via driver vulnerability (2024).", "source": "https://www.exploit-db.com/exploits/52145", "date_added": "2024-06-20" }, { "exploit_id": "CTF-2024-YZA", "cve": "N/A", "vulnerability_type": "Format String", "platform": "macOS", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 format string exploit to leak memory, from CTF challenge (2024).", "source": "CTF-YZA-2024", "date_added": "2024-08-05" }, { "exploit_id": "EDB-52356", "cve": "CVE-2024-38112", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 8.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows spooler use-after-free for privilege escalation (2024).", "source": "https://www.exploit-db.com/exploits/52356", "date_added": "2024-07-10" }, { "exploit_id": "GH-2024-ANDROID10", "cve": "CVE-2024-36970", "vulnerability_type": "Buffer Overflow", "platform": "Android", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2024).", "source": "https://github.com/exploits/android-2024", "date_added": "2024-06-15" }, { "exploit_id": "EDB-52616", "cve": "CVE-2025-10278", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.4, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 30 83 15 00 01 ...", "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1430 (2025).", "source": "https://www.exploit-db.com/exploits/52616", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52617", "cve": "CVE-2025-10279", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.7, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 format string exploit for privilege escalation via kernel32.dll (2025).", "source": "https://www.exploit-db.com/exploits/52617", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT30", "cve": "CVE-2025-10280", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT use-after-free exploit for data exfiltration via FTP (2025).", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-ABC", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 31 83 15 00 01 ...", "description": "Linux x64 reverse shell connecting to attacker on port 1431, from CTF challenge (2025).", "source": "CTF-ABC-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52618", "cve": "CVE-2025-10281", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.6, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", "source": "https://www.exploit-db.com/exploits/52618", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-MIPS11", "cve": "CVE-2025-10282", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Persistence", "cvss_score": 7.4, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for persistent backdoor (2025).", "source": "https://github.com/exploits/mips-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52619", "cve": "CVE-2025-10283", "vulnerability_type": "Privilege Escalation", "platform": "macOS", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.3, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 exploit for root access via kernel vulnerability (2025).", "source": "https://www.exploit-db.com/exploits/52619", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-DEF", "cve": "N/A", "vulnerability_type": "Integer Overflow", "platform": "Linux", "architecture": "x86", "payload_goal": "Memory Leak", "cvss_score": 6.6, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge (2025).", "source": "CTF-DEF-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52620", "cve": "CVE-2025-10284", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.1, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows x64 reverse shell connecting to attacker on port 1432 (2025).", "source": "https://www.exploit-db.com/exploits/52620", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX27", "cve": "CVE-2025-10285", "vulnerability_type": "Race Condition", "platform": "Linux", "architecture": "x64", "payload_goal": "Lateral Movement", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 race condition exploit for lateral movement in a network (2025).", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52621", "cve": "CVE-2025-10286", "vulnerability_type": "Buffer Overflow", "platform": "Android", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2025).", "source": "https://www.exploit-db.com/exploits/52621", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52622", "cve": "CVE-2025-10287", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x86", "payload_goal": "Remote Code Execution", "cvss_score": 8.8, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 format string exploit for RCE, spawning a shell (2025).", "source": "https://www.exploit-db.com/exploits/52622", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN28", "cve": "CVE-2025-10288", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 8.0, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 use-after-free exploit for privilege escalation (2025).", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-GHI", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "macOS", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "macOS x64 reverse shell connecting to attacker on port 1433, from CTF challenge (2025).", "source": "CTF-GHI-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52623", "cve": "CVE-2025-10289", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 34 83 15 00 01 ...", "description": "Linux x64 heap overflow for reverse shell on port 1434 (2025).", "source": "https://www.exploit-db.com/exploits/52623", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52624", "cve": "CVE-2025-10290", "vulnerability_type": "Buffer Overflow", "platform": "Windows", "architecture": "x86", "payload_goal": "Remote Code Execution", "cvss_score": 9.3, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 buffer overflow for RCE, executing a command shell (2025).", "source": "https://www.exploit-db.com/exploits/52624", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT31", "cve": "CVE-2025-10291", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", "description": "ARM-based IoT use-after-free exploit for persistent backdoor (2025).", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52625", "cve": "CVE-2025-10292", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 35 83 15 00 01 ...", "description": "Linux x64 reverse shell connecting to attacker on port 1435 (2025).", "source": "https://www.exploit-db.com/exploits/52625", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-JKL", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 format string exploit to leak memory, from CTF challenge (2025).", "source": "CTF-JKL-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52626", "cve": "CVE-2025-10293", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.3, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "Linux x64 exploit for root access via kernel vulnerability (2025).", "source": "https://www.exploit-db.com/exploits/52626", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN29", "cve": "CVE-2025-10294", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.7, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52627", "cve": "CVE-2025-10295", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Data Exfiltration", "cvss_score": 7.6, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for data exfiltration via HTTP (2025).", "source": "https://www.exploit-db.com/exploits/52627", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-MNO", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x86", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 reverse shell connecting to attacker on port 1436, from CTF challenge (2025).", "source": "CTF-MNO-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52628", "cve": "CVE-2025-10296", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.8, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 use-after-free exploit for privilege escalation (2025).", "source": "https://www.exploit-db.com/exploits/52628", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX28", "cve": "CVE-2025-10297", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 buffer overflow for persistent backdoor installation (2025).", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52629", "cve": "CVE-2025-10298", "vulnerability_type": "Format String", "platform": "macOS", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 format string exploit to leak memory addresses (2025).", "source": "https://www.exploit-db.com/exploits/52629", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-PQR", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows x64 reverse shell connecting to attacker on port 1437, from CTF challenge (2025).", "source": "CTF-PQR-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52630", "cve": "CVE-2025-10299", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 38 83 15 00 01 ...", "description": "Linux x64 heap overflow for data exfiltration via UDP (2025).", "source": "https://www.exploit-db.com/exploits/52630", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT32", "cve": "CVE-2025-10300", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT buffer overflow for RCE, spawning a shell (2025).", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52631", "cve": "CVE-2025-10301", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.5, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 exploit for privilege escalation via kernel exploit (2025).", "source": "https://www.exploit-db.com/exploits/52631", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-STU", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 format string exploit to leak memory, from CTF challenge (2025).", "source": "CTF-STU-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52632", "cve": "CVE-2025-10302", "vulnerability_type": "Remote Code Execution", "platform": "Android", "architecture": "ARM", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM reverse shell connecting to attacker on port 1438 (2025).", "source": "https://www.exploit-db.com/exploits/52632", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN30", "cve": "CVE-2025-10303", "vulnerability_type": "Buffer Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 buffer overflow for data exfiltration via FTP (2025).", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52633", "cve": "CVE-2025-10304", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 39 83 15 00 01 ...", "description": "Linux x64 heap overflow for RCE, spawning a bind shell on port 1439 (2025).", "source": "https://www.exploit-db.com/exploits/52633", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-VWX", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "macOS", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "macOS x64 reverse shell connecting to attacker on port 1440, from CTF challenge (2025).", "source": "CTF-VWX-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52634", "cve": "CVE-2025-10305", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT buffer overflow for data exfiltration via SMTP (2025).", "source": "https://www.exploit-db.com/exploits/52634", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX29", "cve": "CVE-2025-10306", "vulnerability_type": "Use-After-Free", "platform": "Linux", "architecture": "x64", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 use-after-free exploit for persistent backdoor installation (2025).", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52635", "cve": "CVE-2025-10307", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 format string exploit for RCE, spawning a shell (2025).", "source": "https://www.exploit-db.com/exploits/52635", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-YZA", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Android", "architecture": "ARM", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM reverse shell connecting to attacker on port 1441, from CTF challenge (2025).", "source": "CTF-YZA-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-48789", "cve": "CVE-2021-4034", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux pkexec privilege escalation for local root access (2021).", "source": "https://www.exploit-db.com/exploits/48789", "date_added": "2021-01-25" }, { "exploit_id": "EDB-49023", "cve": "CVE-2021-42013", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.8, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 42 83 15 00 01 ...", "description": "Apache HTTP Server path traversal RCE for reverse shell on port 1442 (2021).", "source": "https://www.exploit-db.com/exploits/49023", "date_added": "2021-10-05" }, { "exploit_id": "GH-2021-WIN6", "cve": "CVE-2021-36934", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows HiveNightmare (SeriousSAM) privilege escalation (2021).", "source": "https://github.com/exploits/windows-2021", "date_added": "2021-07-20" }, { "exploit_id": "EDB-49901", "cve": "CVE-2022-24682", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows VPN client RCE for remote code execution (2022).", "source": "https://www.exploit-db.com/exploits/49901", "date_added": "2022-02-15" }, { "exploit_id": "CTF-2022-ABC", "cve": "N/A", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x86", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 reverse shell exploit, connects to attacker on port 1443, from CTF challenge (2022).", "source": "CTF-ABC-2022", "date_added": "2022-11-20" }, { "exploit_id": "EDB-50345", "cve": "CVE-2022-33679", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows Kerberos privilege escalation (2022).", "source": "https://www.exploit-db.com/exploits/50345", "date_added": "2022-06-25" }, { "exploit_id": "GH-2022-IOT12", "cve": "CVE-2022-33980", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Remote Code Execution", "cvss_score": 9.0, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for RCE, spawning a shell (2022).", "source": "https://github.com/exploits/iot-2022", "date_added": "2022-07-10" }, { "exploit_id": "EDB-50678", "cve": "CVE-2022-40684", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.8, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 44 83 15 00 01 ...", "description": "Fortinet FortiOS RCE for reverse shell on port 1444 (2022).", "source": "https://www.exploit-db.com/exploits/50678", "date_added": "2022-10-10" }, { "exploit_id": "CTF-2022-DEF", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x86", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 format string exploit to leak memory, from CTF challenge (2022).", "source": "CTF-DEF-2022", "date_added": "2022-12-05" }, { "exploit_id": "EDB-51012", "cve": "CVE-2023-27532", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Microsoft SharePoint Server RCE for remote code execution (2023).", "source": "https://www.exploit-db.com/exploits/51012", "date_added": "2023-03-10" }, { "exploit_id": "GH-2023-ANDROID11", "cve": "CVE-2023-20963", "vulnerability_type": "Buffer Overflow", "platform": "Android", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2023).", "source": "https://github.com/exploits/android-2023", "date_added": "2023-05-15" }, { "exploit_id": "EDB-51478", "cve": "CVE-2023-35194", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux kernel privilege escalation via driver vulnerability (2023).", "source": "https://www.exploit-db.com/exploits/51478", "date_added": "2023-08-05" }, { "exploit_id": "EDB-51689", "cve": "CVE-2023-4911", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.8, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 45 83 15 00 01 ...", "description": "Linux glibc buffer overflow for RCE, spawning a bind shell on port 1445 (2023).", "source": "https://www.exploit-db.com/exploits/51689", "date_added": "2023-10-03" }, { "exploit_id": "CTF-2023-YZA", "cve": "N/A", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 46 83 15 00 01 ...", "description": "Linux x64 reverse shell exploit, connects to attacker on port 1446, from CTF challenge (2023).", "source": "CTF-YZA-2023", "date_added": "2023-12-15" }, { "exploit_id": "EDB-51901", "cve": "CVE-2024-21338", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows kernel privilege escalation via driver vulnerability (2024).", "source": "https://www.exploit-db.com/exploits/51901", "date_added": "2024-01-15" }, { "exploit_id": "GH-2024-IOT13", "cve": "CVE-2024-27401", "vulnerability_type": "Remote Code Execution", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT RCE exploit for spawning a shell (2024).", "source": "https://github.com/exploits/iot-2024", "date_added": "2024-05-20" }, { "exploit_id": "EDB-52267", "cve": "CVE-2024-30078", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows Wi-Fi driver RCE for reverse shell on port 1447 (2024).", "source": "https://www.exploit-db.com/exploits/52267", "date_added": "2024-06-10" }, { "exploit_id": "CTF-2024-ABC", "cve": "N/A", "vulnerability_type": "Format String", "platform": "macOS", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 format string exploit to leak memory, from CTF challenge (2024).", "source": "CTF-ABC-2024", "date_added": "2024-09-05" }, { "exploit_id": "EDB-52478", "cve": "CVE-2024-38063", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 8.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows IPv6 driver use-after-free for privilege escalation (2024).", "source": "https://www.exploit-db.com/exploits/52478", "date_added": "2024-07-12" }, { "exploit_id": "GH-2024-ANDROID12", "cve": "CVE-2024-43093", "vulnerability_type": "Privilege Escalation", "platform": "Android", "architecture": "ARM", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM privilege escalation exploit for root access (2024).", "source": "https://github.com/exploits/android-2024", "date_added": "2024-08-20" }, { "exploit_id": "EDB-52636", "cve": "CVE-2025-10308", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.4, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 48 83 15 00 01 ...", "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1448 (2025).", "source": "https://www.exploit-db.com/exploits/52636", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52637", "cve": "CVE-2025-10309", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.7, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 format string exploit for privilege escalation via kernel32.dll (2025).", "source": "https://www.exploit-db.com/exploits/52637", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT33", "cve": "CVE-2025-10310", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT use-after-free exploit for data exfiltration via FTP (2025).", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-BCD", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 49 83 15 00 01 ...", "description": "Linux x64 reverse shell connecting to attacker on port 1449, from CTF challenge (2025).", "source": "CTF-BCD-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52638", "cve": "CVE-2025-10311", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.6, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", "source": "https://www.exploit-db.com/exploits/52638", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-MIPS12", "cve": "CVE-2025-10312", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Persistence", "cvss_score": 7.4, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for persistent backdoor (2025).", "source": "https://github.com/exploits/mips-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52639", "cve": "CVE-2025-10313", "vulnerability_type": "Privilege Escalation", "platform": "macOS", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.3, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 exploit for root access via kernel vulnerability (2025).", "source": "https://www.exploit-db.com/exploits/52639", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-EFG", "cve": "N/A", "vulnerability_type": "Integer Overflow", "platform": "Linux", "architecture": "x86", "payload_goal": "Memory Leak", "cvss_score": 6.6, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge (2025).", "source": "CTF-EFG-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52640", "cve": "CVE-2025-10314", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.1, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows x64 reverse shell connecting to attacker on port 1450 (2025).", "source": "https://www.exploit-db.com/exploits/52640", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX30", "cve": "CVE-2025-10315", "vulnerability_type": "Race Condition", "platform": "Linux", "architecture": "x64", "payload_goal": "Lateral Movement", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 race condition exploit for lateral movement in a network (2025).", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52641", "cve": "CVE-2025-10316", "vulnerability_type": "Buffer Overflow", "platform": "Android", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2025).", "source": "https://www.exploit-db.com/exploits/52641", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52642", "cve": "CVE-2025-10317", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x86", "payload_goal": "Remote Code Execution", "cvss_score": 8.8, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 format string exploit for RCE, spawning a shell (2025).", "source": "https://www.exploit-db.com/exploits/52642", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN31", "cve": "CVE-2025-10318", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 8.0, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 use-after-free exploit for privilege escalation (2025).", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-HIJ", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "macOS", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "macOS x64 reverse shell connecting to attacker on port 1451, from CTF challenge (2025).", "source": "CTF-HIJ-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52643", "cve": "CVE-2025-10319", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 52 83 15 00 01 ...", "description": "Linux x64 heap overflow for reverse shell on port 1452 (2025).", "source": "https://www.exploit-db.com/exploits/52643", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52644", "cve": "CVE-2025-10320", "vulnerability_type": "Buffer Overflow", "platform": "Windows", "architecture": "x86", "payload_goal": "Remote Code Execution", "cvss_score": 9.3, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 buffer overflow for RCE, executing a command shell (2025).", "source": "https://www.exploit-db.com/exploits/52644", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT34", "cve": "CVE-2025-10321", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", "description": "ARM-based IoT use-after-free exploit for persistent backdoor (2025).", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52645", "cve": "CVE-2025-10322", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 53 83 15 00 01 ...", "description": "Linux x64 reverse shell connecting to attacker on port 1453 (2025).", "source": "https://www.exploit-db.com/exploits/52645", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-JKL", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 format string exploit to leak memory, from CTF challenge (2025).", "source": "CTF-JKL-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52646", "cve": "CVE-2025-10323", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.3, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "Linux x64 exploit for root access via kernel vulnerability (2025).", "source": "https://www.exploit-db.com/exploits/52646", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN32", "cve": "CVE-2025-10324", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.7, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52647", "cve": "CVE-2025-10325", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Data Exfiltration", "cvss_score": 7.6, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for data exfiltration via HTTP (2025).", "source": "https://www.exploit-db.com/exploits/52647", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-MNO", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x86", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 reverse shell connecting to attacker on port 1454, from CTF challenge (2025).", "source": "CTF-MNO-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52648", "cve": "CVE-2025-10326", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.8, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 use-after-free exploit for privilege escalation (2025).", "source": "https://www.exploit-db.com/exploits/52648", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX31", "cve": "CVE-2025-10327", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 buffer overflow for persistent backdoor installation (2025).", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52649", "cve": "CVE-2025-10328", "vulnerability_type": "Format String", "platform": "macOS", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 format string exploit to leak memory addresses (2025).", "source": "https://www.exploit-db.com/exploits/52649", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-PQR", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows x64 reverse shell connecting to attacker on port 1455, from CTF challenge (2025).", "source": "CTF-PQR-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52650", "cve": "CVE-2025-10329", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 56 83 15 00 01 ...", "description": "Linux x64 heap overflow for data exfiltration via UDP (2025).", "source": "https://www.exploit-db.com/exploits/52650", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT35", "cve": "CVE-2025-10330", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT buffer overflow for RCE, spawning a shell (2025).", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52651", "cve": "CVE-2025-10331", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.5, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 exploit for privilege escalation via kernel exploit (2025).", "source": "https://www.exploit-db.com/exploits/52651", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-STU", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 format string exploit to leak memory, from CTF challenge (2025).", "source": "CTF-STU-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52652", "cve": "CVE-2025-10332", "vulnerability_type": "Remote Code Execution", "platform": "Android", "architecture": "ARM", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM reverse shell connecting to attacker on port 1456, from CTF challenge (2025).", "source": "https://www.exploit-db.com/exploits/52652", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN33", "cve": "CVE-2025-10333", "vulnerability_type": "Buffer Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 buffer overflow for data exfiltration via FTP (2025).", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52653", "cve": "CVE-2025-10334", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 57 83 15 00 01 ...", "description": "Linux x64 heap overflow for RCE, spawning a bind shell on port 1457 (2025).", "source": "https://www.exploit-db.com/exploits/52653", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-VWX", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "macOS", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "macOS x64 reverse shell connecting to attacker on port 1458, from CTF challenge (2025).", "source": "CTF-VWX-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52654", "cve": "CVE-2025-10335", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT buffer overflow for data exfiltration via SMTP (2025).", "source": "https://www.exploit-db.com/exploits/52654", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX32", "cve": "CVE-2025-10336", "vulnerability_type": "Use-After-Free", "platform": "Linux", "architecture": "x64", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 use-after-free exploit for persistent backdoor installation (2025).", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52655", "cve": "CVE-2025-10337", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 format string exploit for RCE, spawning a shell (2025).", "source": "https://www.exploit-db.com/exploits/52655", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-YZA", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Android", "architecture": "ARM", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM reverse shell connecting to attacker on port 1459, from CTF challenge (2025).", "source": "CTF-YZA-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-48890", "cve": "CVE-2021-3493", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux OverlayFS privilege escalation for local root access (2021).", "source": "https://www.exploit-db.com/exploits/48890", "date_added": "2021-04-15" }, { "exploit_id": "EDB-49134", "cve": "CVE-2021-42278", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows Active Directory RCE for reverse shell on port 1460 (2021).", "source": "https://www.exploit-db.com/exploits/49134", "date_added": "2021-11-10" }, { "exploit_id": "GH-2021-WIN7", "cve": "CVE-2021-34486", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows kernel privilege escalation via driver vulnerability (2021).", "source": "https://github.com/exploits/windows-2021", "date_added": "2021-08-12" }, { "exploit_id": "EDB-50012", "cve": "CVE-2022-26809", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows RPC RCE for remote code execution (2022).", "source": "https://www.exploit-db.com/exploits/50012", "date_added": "2022-04-12" }, { "exploit_id": "CTF-2022-GHI", "cve": "N/A", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x86", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 reverse shell exploit, connects to attacker on port 1461, from CTF challenge (2022).", "source": "CTF-GHI-2022", "date_added": "2022-11-25" }, { "exploit_id": "EDB-50456", "cve": "CVE-2022-34718", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows IPv6 RCE for reverse shell on port 1462 (2022).", "source": "https://www.exploit-db.com/exploits/50456", "date_added": "2022-08-15" }, { "exploit_id": "GH-2022-IOT14", "cve": "CVE-2022-37061", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Remote Code Execution", "cvss_score": 9.0, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for RCE, spawning a shell (2022).", "source": "https://github.com/exploits/iot-2022", "date_added": "2022-09-05" }, { "exploit_id": "EDB-50789", "cve": "CVE-2022-41082", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Microsoft Exchange Server RCE (ProxyNotShell) for remote code execution (2022).", "source": "https://www.exploit-db.com/exploits/50789", "date_added": "2022-11-10" }, { "exploit_id": "CTF-2022-JKL", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x86", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 format string exploit to leak memory, from CTF challenge (2022).", "source": "CTF-JKL-2022", "date_added": "2022-12-10" }, { "exploit_id": "EDB-51123", "cve": "CVE-2023-28252", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows CLFS driver privilege escalation (2023).", "source": "https://www.exploit-db.com/exploits/51123", "date_added": "2023-04-05" }, { "exploit_id": "GH-2023-ANDROID13", "cve": "CVE-2023-21036", "vulnerability_type": "Privilege Escalation", "platform": "Android", "architecture": "ARM", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM privilege escalation exploit for root access (2023).", "source": "https://github.com/exploits/android-2023", "date_added": "2023-05-20" }, { "exploit_id": "EDB-51590", "cve": "CVE-2023-36884", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows Office document RCE for reverse shell on port 1463 (2023).", "source": "https://www.exploit-db.com/exploits/51590", "date_added": "2023-07-15" }, { "exploit_id": "EDB-51701", "cve": "CVE-2023-38831", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.8, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 64 83 15 00 01 ...", "description": "WinRAR RCE for remote code execution (2023).", "source": "https://www.exploit-db.com/exploits/51701", "date_added": "2023-08-25" }, { "exploit_id": "CTF-2023-BCD", "cve": "N/A", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 65 83 15 00 01 ...", "description": "Linux x64 reverse shell exploit, connects to attacker on port 1465, from CTF challenge (2023).", "source": "CTF-BCD-2023", "date_added": "2023-12-20" }, { "exploit_id": "EDB-52012", "cve": "CVE-2024-21413", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Microsoft Outlook RCE for remote code execution (2024).", "source": "https://www.exploit-db.com/exploits/52012", "date_added": "2024-02-15" }, { "exploit_id": "GH-2024-IOT15", "cve": "CVE-2024-27600", "vulnerability_type": "Remote Code Execution", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT RCE exploit for spawning a shell (2024).", "source": "https://github.com/exploits/iot-2024", "date_added": "2024-05-25" }, { "exploit_id": "EDB-52378", "cve": "CVE-2024-29973", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux kernel privilege escalation via driver vulnerability (2024).", "source": "https://www.exploit-db.com/exploits/52378", "date_added": "2024-06-15" }, { "exploit_id": "CTF-2024-DEF", "cve": "N/A", "vulnerability_type": "Format String", "platform": "macOS", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 format string exploit to leak memory, from CTF challenge (2024).", "source": "CTF-DEF-2024", "date_added": "2024-09-10" }, { "exploit_id": "EDB-52589", "cve": "CVE-2024-38106", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 8.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows kernel use-after-free for privilege escalation (2024).", "source": "https://www.exploit-db.com/exploits/52589", "date_added": "2024-07-10" }, { "exploit_id": "GH-2024-ANDROID14", "cve": "CVE-2024-36971", "vulnerability_type": "Buffer Overflow", "platform": "Android", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2024).", "source": "https://github.com/exploits/android-2024", "date_added": "2024-07-20" }, { "exploit_id": "EDB-52656", "cve": "CVE-2025-10338", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.4, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 66 83 15 00 01 ...", "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1466 (2025).", "source": "https://www.exploit-db.com/exploits/52656", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52657", "cve": "CVE-2025-10339", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.7, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 format string exploit for privilege escalation via kernel32.dll (2025).", "source": "https://www.exploit-db.com/exploits/52657", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT36", "cve": "CVE-2025-10340", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT use-after-free exploit for data exfiltration via FTP (2025).", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-EFG", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 67 83 15 00 01 ...", "description": "Linux x64 reverse shell connecting to attacker on port 1467, from CTF challenge (2025).", "source": "CTF-EFG-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52658", "cve": "CVE-2025-10341", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.6, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", "source": "https://www.exploit-db.com/exploits/52658", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-MIPS13", "cve": "CVE-2025-10342", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Persistence", "cvss_score": 7.4, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for persistent backdoor (2025).", "source": "https://github.com/exploits/mips-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52659", "cve": "CVE-2025-10343", "vulnerability_type": "Privilege Escalation", "platform": "macOS", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.3, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 exploit for root access via kernel vulnerability (2025).", "source": "https://www.exploit-db.com/exploits/52659", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-HIJ", "cve": "N/A", "vulnerability_type": "Integer Overflow", "platform": "Linux", "architecture": "x86", "payload_goal": "Memory Leak", "cvss_score": 6.6, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge (2025).", "source": "CTF-HIJ-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52660", "cve": "CVE-2025-10344", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.1, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows x64 reverse shell connecting to attacker on port 1468 (2025).", "source": "https://www.exploit-db.com/exploits/52660", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX33", "cve": "CVE-2025-10345", "vulnerability_type": "Race Condition", "platform": "Linux", "architecture": "x64", "payload_goal": "Lateral Movement", "cvss_score": 7.8, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 race condition exploit for lateral movement in a network (2025).", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52661", "cve": "CVE-2025-10346", "vulnerability_type": "Buffer Overflow", "platform": "Android", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2025).", "source": "https://www.exploit-db.com/exploits/52661", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52662", "cve": "CVE-2025-10347", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x86", "payload_goal": "Remote Code Execution", "cvss_score": 8.8, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 format string exploit for RCE, spawning a shell (2025).", "source": "https://www.exploit-db.com/exploits/52662", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN34", "cve": "CVE-2025-10348", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x64", "payload_goal": "Privilege Escalation", "cvss_score": 8.0, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 use-after-free exploit for privilege escalation (2025).", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-JKL", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "macOS", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "macOS x64 reverse shell connecting to attacker on port 1469, from CTF challenge (2025).", "source": "CTF-JKL-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52663", "cve": "CVE-2025-10349", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 70 83 15 00 01 ...", "description": "Linux x64 heap overflow for reverse shell on port 1470 (2025).", "source": "https://www.exploit-db.com/exploits/52663", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52664", "cve": "CVE-2025-10350", "vulnerability_type": "Buffer Overflow", "platform": "Windows", "architecture": "x86", "payload_goal": "Remote Code Execution", "cvss_score": 9.3, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 buffer overflow for RCE, executing a command shell (2025).", "source": "https://www.exploit-db.com/exploits/52664", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT37", "cve": "CVE-2025-10351", "vulnerability_type": "Use-After-Free", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", "description": "ARM-based IoT use-after-free exploit for persistent backdoor (2025).", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52665", "cve": "CVE-2025-10352", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 71 83 15 00 01 ...", "description": "Linux x64 reverse shell connecting to attacker on port 1471 (2025).", "source": "https://www.exploit-db.com/exploits/52665", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-MNO", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 format string exploit to leak memory, from CTF challenge (2025).", "source": "CTF-MNO-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52666", "cve": "CVE-2025-10353", "vulnerability_type": "Privilege Escalation", "platform": "Linux", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.3, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "Linux x64 exploit for root access via kernel vulnerability (2025).", "source": "https://www.exploit-db.com/exploits/52666", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN35", "cve": "CVE-2025-10354", "vulnerability_type": "Heap Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.7, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52667", "cve": "CVE-2025-10355", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Router)", "architecture": "MIPS", "payload_goal": "Data Exfiltration", "cvss_score": 7.6, "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", "description": "MIPS-based router buffer overflow for data exfiltration via HTTP (2025).", "source": "https://www.exploit-db.com/exploits/52667", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-PQR", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Linux", "architecture": "x86", "payload_goal": "Reverse Shell", "cvss_score": 8.9, "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", "description": "Linux x86 reverse shell connecting to attacker on port 1472, from CTF challenge (2025).", "source": "CTF-PQR-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52668", "cve": "CVE-2025-10356", "vulnerability_type": "Use-After-Free", "platform": "Windows", "architecture": "x86", "payload_goal": "Privilege Escalation", "cvss_score": 7.8, "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", "description": "Windows x86 use-after-free exploit for privilege escalation (2025).", "source": "https://www.exploit-db.com/exploits/52668", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX34", "cve": "CVE-2025-10357", "vulnerability_type": "Buffer Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 buffer overflow for persistent backdoor installation (2025).", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52669", "cve": "CVE-2025-10358", "vulnerability_type": "Format String", "platform": "macOS", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", "description": "macOS x64 format string exploit to leak memory addresses (2025).", "source": "https://www.exploit-db.com/exploits/52669", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-STU", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Windows", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Windows x64 reverse shell connecting to attacker on port 1473, from CTF challenge (2025).", "source": "CTF-STU-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52670", "cve": "CVE-2025-10359", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 74 83 15 00 01 ...", "description": "Linux x64 heap overflow for data exfiltration via UDP (2025).", "source": "https://www.exploit-db.com/exploits/52670", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-IOT38", "cve": "CVE-2025-10360", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT buffer overflow for RCE, spawning a shell (2025).", "source": "https://github.com/exploits/iot-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52671", "cve": "CVE-2025-10361", "vulnerability_type": "Privilege Escalation", "platform": "Windows", "architecture": "x64", "payload_goal": "Root Access", "cvss_score": 8.5, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 exploit for privilege escalation via kernel exploit (2025).", "source": "https://www.exploit-db.com/exploits/52671", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-VWX", "cve": "N/A", "vulnerability_type": "Format String", "platform": "Linux", "architecture": "x64", "payload_goal": "Memory Leak", "cvss_score": 6.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 format string exploit to leak memory, from CTF challenge (2025).", "source": "CTF-VWX-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52672", "cve": "CVE-2025-10362", "vulnerability_type": "Remote Code Execution", "platform": "Android", "architecture": "ARM", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM reverse shell connecting to attacker on port 1474 (2025).", "source": "https://www.exploit-db.com/exploits/52672", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-WIN36", "cve": "CVE-2025-10363", "vulnerability_type": "Buffer Overflow", "platform": "Windows", "architecture": "x64", "payload_goal": "Data Exfiltration", "cvss_score": 8.1, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 buffer overflow for data exfiltration via FTP (2025).", "source": "https://github.com/exploits/windows-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52673", "cve": "CVE-2025-10364", "vulnerability_type": "Heap Overflow", "platform": "Linux", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 9.2, "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 75 83 15 00 01 ...", "description": "Linux x64 heap overflow for RCE, spawning a bind shell on port 1475 (2025).", "source": "https://www.exploit-db.com/exploits/52673", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-YZA", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "macOS", "architecture": "x64", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "macOS x64 reverse shell connecting to attacker on port 1476, from CTF challenge (2025).", "source": "CTF-YZA-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52674", "cve": "CVE-2025-10365", "vulnerability_type": "Buffer Overflow", "platform": "IoT (Embedded Linux)", "architecture": "ARM", "payload_goal": "Data Exfiltration", "cvss_score": 7.9, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "ARM-based IoT buffer overflow for data exfiltration via SMTP (2025).", "source": "https://www.exploit-db.com/exploits/52674", "date_added": "2025-07-15" }, { "exploit_id": "GH-2025-LINUX35", "cve": "CVE-2025-10366", "vulnerability_type": "Use-After-Free", "platform": "Linux", "architecture": "x64", "payload_goal": "Persistence", "cvss_score": 7.5, "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", "description": "Linux x64 use-after-free exploit for persistent backdoor installation (2025).", "source": "https://github.com/exploits/linux-2025", "date_added": "2025-07-15" }, { "exploit_id": "EDB-52675", "cve": "CVE-2025-10367", "vulnerability_type": "Format String", "platform": "Windows", "architecture": "x64", "payload_goal": "Remote Code Execution", "cvss_score": 8.8, "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", "description": "Windows x64 format string exploit for RCE, spawning a shell (2025).", "source": "https://www.exploit-db.com/exploits/52675", "date_added": "2025-07-15" }, { "exploit_id": "CTF-2025-ABC", "cve": "N/A", "vulnerability_type": "Remote Code Execution", "platform": "Android", "architecture": "ARM", "payload_goal": "Reverse Shell", "cvss_score": 9.0, "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", "description": "Android ARM reverse shell connecting to attacker on port 1477, from CTF challenge (2025).", "source": "CTF-ABC-2025", "date_added": "2025-07-15" } ]