[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

 How to buy exploit? Two ways to buy required exploit. Currency, that we accept.

  1. Anonymous buying of exploits is the way to buy exploit without registration. You buy it directly and anonymous and get exploit on mail.
  2. Another way to buy exploits is to became 0day.today user, get 0day.today Gold and buy required exploit in our database.
               
We accept Crypto Currencies: [contact admin to find more]

  What is 0day.today Gold? How to buy Gold? How to earn Gold?

  • 0day.today Gold is the currency of 0day.today project. It used for paying for the services, buying exploits, earning money, etc.
  • You can buy Gold: exchange money to Gold
  • You can earn Gold: selling exploits, helping with cracking hashes, etc.
               
We accept Crypto Currencies: [contact admin to find more]

  How to sell exploits? Earning 0day.today Gold.

  1. To sell exploits on 0day.today exploits database you need to be registered user. You can login or register
  2. You need to found new unique vulnerability or 0day exploit. Create description, make approve video, screenshots, other useful information.
  3. Publish it on our database site, wait for cheking it by 0day.today Administration. Then wait for customers and earn money!
  4. You also can make it more popular with Highlight service.
  5. After you earn the 0day.today Gold you can get it out from the system to payment ystem, that you use.
Search:              Extended search

Local exploits and vulnerabilities category


A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.

[ local exploits ]

Local exploits and vulnerabilities category


A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
unsorted
4 176
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
c0d3r
Exploits:
11
BusinessLevel:
11
5 494
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
RusH
Exploits:
33
BusinessLevel:
12
unsorted
3 454
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Kozan
Exploits:
31
BusinessLevel:
12
unsorted
3 437
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Kozan
Exploits:
31
BusinessLevel:
12
4 425
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Przemyslaw Frasunek
Exploits:
6
BusinessLevel:
10
4 314
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Przemyslaw Frasunek
Exploits:
6
BusinessLevel:
10
16 913
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
intropy
Exploits:
4
BusinessLevel:
10
16 814
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
intropy
Exploits:
4
BusinessLevel:
10
16 796
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
intropy
Exploits:
4
BusinessLevel:
10
4 130
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
intropy
Exploits:
4
BusinessLevel:
10
unsorted
3 466
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
ATmaCA
Exploits:
19
BusinessLevel:
11
unsorted
3 857
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Ilya Rabinovich
Exploits:
1
BusinessLevel:
10
3 679
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Qnix
Exploits:
9
BusinessLevel:
10
unsorted
3 262
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Cesar Cerrudo
Exploits:
7
BusinessLevel:
10
4 295
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Plugger
Exploits:
1
BusinessLevel:
10
16 693
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
watercloud
Exploits:
3
BusinessLevel:
10
3 640
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
newbug
Exploits:
2
BusinessLevel:
10
3 867
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Kevin Finisterre
Exploits:
40
BusinessLevel:
12
3 665
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Kevin Finisterre
Exploits:
40
BusinessLevel:
12
unsorted
3 422
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Reed Arvin
Exploits:
11
BusinessLevel:
11
unsorted
3 228
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Jean Luc
Exploits:
1
BusinessLevel:
10
3 572
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
sk
Exploits:
1
BusinessLevel:
10
unsorted
3 382
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
ZwelL
Exploits:
6
BusinessLevel:
10
unsorted
3 421
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Kozan
Exploits:
31
BusinessLevel:
12
unsorted
3 294
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Kozan
Exploits:
31
BusinessLevel:
12
unsorted
3 303
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Kozan
Exploits:
31
BusinessLevel:
12
unsorted
3 627
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Esteban Fayo
Exploits:
2
BusinessLevel:
10
unsorted
3 559
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Esteban Fayo
Exploits:
2
BusinessLevel:
10
unsorted
3 330
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Tal Zeltzer
Exploits:
5
BusinessLevel:
10
unsorted
2 991
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Stuart Pearson
Exploits:
1
BusinessLevel:
10
[«] « prev | 139 140 141 142 143 144 145 146 147 148 149 150 151 | next » [»]