0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 574
Security Risk Critical
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
SensePost
Exploits:
1
BusinessLevel:
4
Microsoft Windows 7 SP1 x86 - GDI Palette Objects Local Privilege Escalation (MS17-017) Exploit
Comments:
0
5 971
Security Risk Critical
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Saif
Exploits:
15
BusinessLevel:
11
6 771
Security Risk Critical
D
Download
C
CVE-2017-8464
Verified by 0day Admin
free
You can open this exploit for free
nixawk
Exploits:
5
BusinessLevel:
4
Linux Kernel 4.12 Race Condition Vulnerability
Comments:
0
5 590
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Shixiong Zhao
Exploits:
1
BusinessLevel:
4
DNSTracer 1.9 - Buffer Overflow Exploit
Comments:
0
4 827
Security Risk High
D
Download
C
CVE-2017-9430
Verified by 0day Admin
free
You can open this exploit for free
j0lama
Exploits:
3
BusinessLevel:
4
4 507
Security Risk High
D
Download
C
CVE-2017-10204
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
VirtualBox 5.1.22 - Windows Process DLL UNC Path Signature Bypass Privilege Escalation Exploit
Comments:
0
4 269
Security Risk High
D
Download
C
CVE-2017-10129
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 621
Security Risk Critical
D
Download
C
CVE-2017-7442
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
4 767
Security Risk High
D
Download
C
CVE-2017-7047
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 683
Security Risk High
D
Download
C
CVE-2017-8870
Verified by 0day Admin
free
You can open this exploit for free
Muhann4d
Exploits:
6
BusinessLevel:
4
4 546
Security Risk High
D
Download
C
CVE-2017-8869
Verified by 0day Admin
free
You can open this exploit for free
Muhann4d
Exploits:
6
BusinessLevel:
4
8 147
Security Risk Critical
D
Download
C
CVE-2017-8464
Verified by 0day Admin
free
You can open this exploit for free
Yorick Koster
Exploits:
36
BusinessLevel:
8
MAWK 1.3.3-17 - Local Buffer Overflow Exploit
Comments:
0
6 847
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Juan Sacco
Exploits:
46
BusinessLevel:
12
Razer Synapse rzpnk.sys ZwOpenProcess Exploit
Comments:
0
4 743
Security Risk High
D
Download
C
CVE-2017-9769
Verified by 0day Admin
free
You can open this exploit for free
Spencer McIntyre
Exploits:
3
BusinessLevel:
7
5 806
Security Risk Critical
D
Download
C
CVE-2017-7642
Verified by 0day Admin
free
You can open this exploit for free
Mark Wadham
Exploits:
17
BusinessLevel:
5
6 030
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Grant Hernandez
Exploits:
1
BusinessLevel:
4
xfrm Out-Of-Bounds Read Vulnerability
Comments:
0
6 323
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
bo Zhang
Exploits:
1
BusinessLevel:
4
6 714
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
775
BusinessLevel:
48
5 762
Security Risk High
D
Download
C
CVE-2017-6970
Verified by 0day Admin
free
You can open this exploit for free
Paul Taylor
Exploits:
9
BusinessLevel:
4
6 932
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Micha Borrmann
Exploits:
9
BusinessLevel:
4
6 297
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Stefan Kanthak
Exploits:
16
BusinessLevel:
5
8 176
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Matthew Bergin
Exploits:
43
BusinessLevel:
10
6 597
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Yorick Koster
Exploits:
36
BusinessLevel:
8
18 212
Security Risk High
D
Download
C
CVE-2017-3629
CVE-2017-3630
CVE-2017-3631
CVE-2017-3630
CVE-2017-3631
Verified by 0day Admin
free
You can open this exploit for free
Qualys Corporation
Exploits:
21
BusinessLevel:
6
Linux Kernel (Debian 7/8/9/10 / Fedora 23/24/25 / CentOS 5.3/5.11/6.0/6.8/7.2.1511) - ldso_hwcap Loc
Comments:
0
8 841
Security Risk High
D
Download
C
CVE-2017-10003
CVE-2017-10003
CVE-2017-10003
Verified by 0day Admin
free
You can open this exploit for free
Qualys Corporation
Exploits:
21
BusinessLevel:
6
Linux Kernel (Debian 7.7/8.5/9.0 / Ubuntu 14.04.2/16.04.2/17.04 / Fedora 22/25 / CentOS 7.3.1611) -
Comments:
0
8 572
Security Risk High
D
Download
C
CVE-2017-10003
CVE-2017-10003
CVE-2017-10003
Verified by 0day Admin
free
You can open this exploit for free
Qualys Corporation
Exploits:
21
BusinessLevel:
6
Linux Kernel (Debian 9/10 / Ubuntu 14.04.5/16.04.2/17.04 / Fedora 23/24/25) - ldso_dynamic Local Pri
Comments:
0
8 739
Security Risk High
D
Download
C
CVE-2017-10003
CVE-2017-10003
CVE-2017-10003
Verified by 0day Admin
free
You can open this exploit for free
Qualys Corporation
Exploits:
21
BusinessLevel:
6
Linux Kernel - offset2lib Stack Clash Exploit
Comments:
0
8 835
Security Risk High
D
Download
C
CVE-2017-10003
CVE-2017-10003
CVE-2017-10003
Verified by 0day Admin
free
You can open this exploit for free
Qualys Corporation
Exploits:
21
BusinessLevel:
6
5 044
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Chako
Exploits:
12
BusinessLevel:
6
5 225
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Juan Sacco
Exploits:
46
BusinessLevel:
12