[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database
Search:
 
 
 
Category:   Platform:
 
Price from:   Price to:
 
Author login:   CVE:

Search results for exploits by request: Authentication

[ remote exploits ]

Remote exploits and vulnerabilities category


A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
973
Security Risk Critical
R
D
Download
C
CVE-2024-1800
CVE-2024-4358
Verified by 0day Admin
free
You can open this exploit for free
Soroush Dalili
Exploits:
15
BusinessLevel:
10
2 596
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
731
BusinessLevel:
46
3 430
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Amirhossein Bahramizadeh
Exploits:
20
BusinessLevel:
2
4 184
Security Risk Critical
R
D
Download
C
CVE-2023-38035
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
3 946
Security Risk High
R
D
Download
C
CVE-2023-33383
Verified by 0day Admin
free
You can open this exploit for free
The Security Team
Exploits:
2
BusinessLevel:
1
4 478
Security Risk Critical
R
D
Download
C
CVE-2023-32315
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
4 819
Security Risk High
R
D
Download
C
CVE-2023-27350
Verified by 0day Admin
free
You can open this exploit for free
catatonicprime
Exploits:
5
BusinessLevel:
6
4 083
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
731
BusinessLevel:
46
4 135
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
731
BusinessLevel:
46
4 019
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
731
BusinessLevel:
46
4 034
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
731
BusinessLevel:
46
3 981
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
731
BusinessLevel:
46
3 910
Security Risk High
R
D
Download
C
CVE-2023-27823
Verified by 0day Admin
free
You can open this exploit for free
Anthony Cole
Exploits:
6
BusinessLevel:
4
4 101
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Justin Oberdorf
Exploits:
2
BusinessLevel:
5
4 235
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Parsa Rezaie Khiabanloo
Exploits:
4
BusinessLevel:
1
4 233
Security Risk Medium
R
D
Download
C
CVE-2023-27290
Verified by 0day Admin
free
You can open this exploit for free
Shahid Parvez
Exploits:
1
BusinessLevel:
1
4 584
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
George Tsimpidas
Exploits:
8
BusinessLevel:
2
6 320
Security Risk Critical
R
D
Download
C
CVE-2022-20705
CVE-2022-20707
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
6 090
Security Risk High
R
D
Download
C
CVE-2017-9947
Verified by 0day Admin
free
You can open this exploit for free
RoseSecurity
Exploits:
5
BusinessLevel:
1
6 040
Security Risk High
R
D
Download
C
CVE-2022-42953
Verified by 0day Admin
free
You can open this exploit for free
RedTeam
Exploits:
62
BusinessLevel:
9

[ local exploits ]

Local exploits and vulnerabilities category


A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 218
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
731
BusinessLevel:
46
9 448
Security Risk Critical
R
D
Download
C
CVE-2021-38648
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
9 461
Security Risk Critical
R
D
Download
C
CVE-2021-38647
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
9 757
Security Risk Medium
R
D
Download
C
CVE-2020-11723
Verified by 0day Admin
free
You can open this exploit for free
Matthew Bergin
Exploits:
43
BusinessLevel:
9
10 249
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
8 734
Security Risk High
R
D
Download
C
CVE-2019-19127
Verified by 0day Admin
free
You can open this exploit for free
Callum Murphy
Exploits:
2
BusinessLevel:
2
7 639
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Andrey Stoykov
Exploits:
19
BusinessLevel:
3
9 095
Security Risk High
R
D
Download
C
CVE-2019-0543
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 760
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
VortexNeoX64
Exploits:
2
BusinessLevel:
3
4 502
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Eric Sesterhenn
Exploits:
10
BusinessLevel:
6
4 238
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
VortexNeoX64
Exploits:
2
BusinessLevel:
3
3 797
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Klaus Tichmann
Exploits:
1
BusinessLevel:
4
4 806
Security Risk High
R
D
Download
C
CVE-2016-9111
Verified by 0day Admin
free
You can open this exploit for free
Rithwik Jayasimha
Exploits:
4
BusinessLevel:
4
5 211
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Matthias Deeg
Exploits:
27
BusinessLevel:
6
4 995
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Matthias Deeg
Exploits:
27
BusinessLevel:
6
4 778
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Matthias Deeg
Exploits:
27
BusinessLevel:
6
5 057
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Matthias Deeg
Exploits:
27
BusinessLevel:
6
4 644
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Matthias Deeg
Exploits:
27
BusinessLevel:
6
3 803
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Glaysson dos Santos
Exploits:
2
BusinessLevel:
5
6 779
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
bot
Exploits:
154
BusinessLevel:
13

[ web applications ]

Webapplication (webapps) exploits and vulnerabilities category


This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
1 250
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Sanjay Singh
Exploits:
7
BusinessLevel:
2
1 996
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
731
BusinessLevel:
46
1 682
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
731
BusinessLevel:
46
1 701
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
731
BusinessLevel:
46
1 712
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
731
BusinessLevel:
46
1 682
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
731
BusinessLevel:
46
1 106
Security Risk High
R
D
Download
C
CVE-2024-31621
Verified by 0day Admin
free
You can open this exploit for free
Maerifat Majeed
Exploits:
1
BusinessLevel:
0
1 062
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Diyar Saadi
Exploits:
4
BusinessLevel:
0
2 019
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
731
BusinessLevel:
46
1 817
Security Risk High
R
D
Download
C
CVE-2023-48902
Verified by 0day Admin
free
You can open this exploit for free
Scott White
Exploits:
3
BusinessLevel:
0
3 592
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Daniele Linguaglossa
Exploits:
8
BusinessLevel:
5
2 093
Security Risk High
R
D
Download
C
CVE-2024-2055
Verified by 0day Admin
free
You can open this exploit for free
Jim Becher
Exploits:
20
BusinessLevel:
3
1 915
Security Risk High
R
D
Download
C
CVE-2023-22515
Verified by 0day Admin
free
You can open this exploit for free
Emir Polat
Exploits:
5
BusinessLevel:
2
2 575
Security Risk Critical
R
D
Download
C
CVE-2023-2437
CVE-2023-2446
CVE-2023-2448
CVE-2023-2449
CVE-2023-6009
Verified by 0day Admin
free
You can open this exploit for free
Istvan Marton
Exploits:
2
BusinessLevel:
0
2 426
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
nu11secur1ty
Exploits:
215
BusinessLevel:
13
3 026
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
731
BusinessLevel:
46
3 010
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
731
BusinessLevel:
46
2 931
Security Risk Critical
R
D
Download
C
CVE-2023-36618
CVE-2023-36619
Verified by 0day Admin
free
You can open this exploit for free
Armin Weihbold
Exploits:
1
BusinessLevel:
0
3 164
Security Risk High
R
D
Download
C
CVE-2023-3162
Verified by 0day Admin
free
You can open this exploit for free
Lana Codes
Exploits:
8
BusinessLevel:
1
2 936
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
thoughtfault
Exploits:
2
BusinessLevel:
1

[ dos / poc ]

DOS exploits and vulnerabilities category


PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.

PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
12 218
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Victor Mondragón
Exploits:
50
BusinessLevel:
5
12 220
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Victor Mondragón
Exploits:
50
BusinessLevel:
5
12 157
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Victor Mondragón
Exploits:
50
BusinessLevel:
5
12 429
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Victor Mondragón
Exploits:
50
BusinessLevel:
5
12 108
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Victor Mondragón
Exploits:
50
BusinessLevel:
5
5 564
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Matthias Deeg
Exploits:
27
BusinessLevel:
6
3 553
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Weber
Exploits:
1
BusinessLevel:
4
4 113
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Wh1t3Rh1n0
Exploits:
1
BusinessLevel:
5
4 583
Security Risk High
R
D
Download
C
CVE-2013-6765
Verified by 0day Admin
free
You can open this exploit for free
EccE
Exploits:
1
BusinessLevel:
6
6 705
Security Risk Medium
R
D
Download
-
Not verified yet
free
You can open this exploit for free
T355
Exploits:
1
BusinessLevel:
6
4 128
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Jeremy Brown
Exploits:
60
BusinessLevel:
11
4 367
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
loneferret
Exploits:
50
BusinessLevel:
10
4 264
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
loneferret
Exploits:
50
BusinessLevel:
10
4 430
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
loneferret
Exploits:
50
BusinessLevel:
10
unsorted
3 909
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
loneferret
Exploits:
50
BusinessLevel:
10
unsorted
3 585
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
loneferret
Exploits:
50
BusinessLevel:
10
unsorted
3 967
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
loneferret
Exploits:
50
BusinessLevel:
10
unsorted
4 686
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
desi
Exploits:
1
BusinessLevel:
8

[ shellcode ]

Shellcode category


In computer security, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called "shellcode" because it typically starts a command shell from which the attacker can control the compromised machine, but any piece of code that performs a similar task can be called shellcode. Because the function of a payload is not limited to merely spawning a shell, some have suggested that the name shellcode is insufficient. Shellcode is commonly written in machine code.

Classification:
There are several methods of classifying exploits. The most common is by how the exploit contacts the vulnerable software. A remote exploit works over a network and exploits the security vulnerability without any prior access to the vulnerable system. A local exploit requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with a client application. Exploits against client applications may also require some interaction with the user and thus may be used in combination with the social engineering method. Another classification is by the action against the vulnerable system; unauthorized data access, arbitrary code execution, and denial of service are examples. Many exploits are designed to provide superuser-level access to a computer system. However, it is also possible to use several exploits, first to gain low-level access, then to escalate privileges repeatedly until one reaches root. Normally a single exploit can only take advantage of a specific software vulnerability. Often, when an exploit is published, the vulnerability is fixed through a patch and the exploit becomes obsolete until newer versions of the software become available Shellcodes any types.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
12 439
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Sean Dillon
Exploits:
6
BusinessLevel:
5
4 573
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Gotfault Security
Exploits:
13
BusinessLevel:
10