[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

 How to buy exploit? Two ways to buy required exploit. Currency, that we accept.

  1. Anonymous buying of exploits is the way to buy exploit without registration. You buy it directly and anonymous and get exploit on mail.
  2. Another way to buy exploits is to became 0day.today user, get 0day.today Gold and buy required exploit in our database.
               
We accept Crypto Currencies: [contact admin to find more]

  What is 0day.today Gold? How to buy Gold? How to earn Gold?

  • 0day.today Gold is the currency of 0day.today project. It used for paying for the services, buying exploits, earning money, etc.
  • You can buy Gold: exchange money to Gold
  • You can earn Gold: selling exploits, helping with cracking hashes, etc.
               
We accept Crypto Currencies: [contact admin to find more]

  How to sell exploits? Earning 0day.today Gold.

  1. To sell exploits on 0day.today exploits database you need to be registered user. You can login or register
  2. You need to found new unique vulnerability or 0day exploit. Create description, make approve video, screenshots, other useful information.
  3. Publish it on our database site, wait for cheking it by 0day.today Administration. Then wait for customers and earn money!
  4. You also can make it more popular with Highlight service.
  5. After you earn the 0day.today Gold you can get it out from the system to payment ystem, that you use.
Search:              Extended search

Local exploits and vulnerabilities category


A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.

[ local exploits ]

Local exploits and vulnerabilities category


A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
unsorted
5 473
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Core Security
Exploits:
91
BusinessLevel:
14
unsorted
5 313
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Core Security
Exploits:
91
BusinessLevel:
14
unsorted
3 613
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
iqlusion
Exploits:
1
BusinessLevel:
8
unsorted
5 234
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
mr_me
Exploits:
109
BusinessLevel:
13
unsorted
3 357
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
D3V!L FucK3r
Exploits:
2
BusinessLevel:
8
unsorted
3 687
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
corelanc0d3r
Exploits:
18
BusinessLevel:
9
unsorted
3 720
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Marsh Ray
Exploits:
1
BusinessLevel:
8
unsorted
3 921
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
bellick
Exploits:
4
BusinessLevel:
8
unsorted
3 547
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Carsten Eiram
Exploits:
1
BusinessLevel:
8
unsorted
3 987
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Felipe
Exploits:
2
BusinessLevel:
8
unsorted
4 982
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Sina Yazdanmehr
Exploits:
2
BusinessLevel:
8
unsorted
8 930
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Matthew Bergin
Exploits:
43
BusinessLevel:
10
unsorted
4 024
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
prdelka
Exploits:
28
BusinessLevel:
11
unsorted
3 712
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Dr_IDE
Exploits:
76
BusinessLevel:
12
unsorted
3 687
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
bellick
Exploits:
4
BusinessLevel:
8
unsorted
4 257
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Jeremy Brown
Exploits:
61
BusinessLevel:
11
unsorted
4 998
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Felipe
Exploits:
2
BusinessLevel:
8
unsorted
3 952
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Dr_IDE
Exploits:
76
BusinessLevel:
12
unsorted
4 779
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Tavis Ormandy
Exploits:
35
BusinessLevel:
11
unsorted
3 334
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Dr_IDE
Exploits:
76
BusinessLevel:
12
unsorted
3 115
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Pavel Machek
Exploits:
1
BusinessLevel:
8
unsorted
4 167
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Dr_IDE
Exploits:
76
BusinessLevel:
12
unsorted
3 473
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Dr_IDE
Exploits:
76
BusinessLevel:
12
unsorted
3 081
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
trompele
Exploits:
1
BusinessLevel:
8
unsorted
3 528
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
bellick
Exploits:
4
BusinessLevel:
8
unsorted
4 316
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
prdelka
Exploits:
28
BusinessLevel:
11
unsorted
3 462
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Adam Zabrocki
Exploits:
1
BusinessLevel:
8
unsorted
3 656
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Dragon Rider
Exploits:
1
BusinessLevel:
8
unsorted
3 426
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
dellnull
Exploits:
2
BusinessLevel:
8
unsorted
3 524
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
SirGod
Exploits:
82
BusinessLevel:
12
[«] « prev | 116 117 118 119 120 121 122 123 124 125 126 127 128 | next » [»]