EXPLOIT DATABASE
Documented vulnerabilities in human systems
Dopamine API Exploitation
CRITICAL/digital•2025-01-21
Memory Buffer Overflow
CRITICAL/cognitive•2025-01-20
Trust Protocol Injection
HIGH/social•2025-01-19
Attention Fragmentation Attack
HIGH/cognitive•2025-01-18
Screen Time Buffer Overflow
HIGH/digital•2025-01-16
Circadian Rhythm Manipulation
HIGH/biological•2025-01-15
Group Dynamics Exploit
MEDIUM/social•2025-01-14
Pattern Recognition Bypass
MEDIUM/cognitive•2025-01-12
Notification Hijack Vector
MEDIUM/digital•2025-01-11
Neurotransmitter Hijacking
CRITICAL/biological•2025-01-10
Authority Bypass Technique
HIGH/social•2025-01-08
Metabolic Pathway Exploit
MEDIUM/biological•2025-01-05