Blog
Jan 7, 2014
Exploit Database Hosted on GitHub
We have recently completed some renovations on the Exploit Database backend systems and moved the EDB exploit repository to Github. This means that it’s now easier than ever to copy, clone or fork the whole repository. The previous SVN CVS has been retired.
1 min read

We have recently completed some renovations on our Exploit Database backend systems and have taken this opportunity to transition our SVN server to an EDB repository hosted on GitHub. This means that it’s now easier than ever to copy, clone, or fork the whole repository. The previous SVN CVS has been retired. To clone the latest version of EDB exploits, you can simply run the following:
[cc lang=”bash”]
git clone https://github.com/offensive-security/exploit-database
[/cc]
With this transition to GitHub, we have also changed the repository update interval from weekly to daily so you can stay on the bleeding edge far more easily.
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Research & Tutorials
CVE-2024-2928: MLflow Local File Inclusion via URI Fragment Manipulation
Read about an LFI vulnerability disclosed in MLflow which allowed unauthenticated remote attackers to read arbitrary files by exploiting URI fragments containing directory traversal sequences.
May 15, 2025
3 min read

Research & Tutorials
CVE-2025-23211: Tandoor Recipes Jinja2 SSTI to Remote Code Execution
A critical SSTI vulnerability was discovered in the open-source meal planning application Tandoor Recipes leading to a full system compromise.
May 8, 2025
2 min read

Research & Tutorials
CVE-2025-29927: Next.js Middleware Authorization Bypass
In this CVE blog, we explore a vulnerability in Next.js stemming from the improper trust of the x-middleware-subrequest header.
May 1, 2025
3 min read