[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database
Search:
 
 
 
Category:   Platform:
 
Price from:   Price to:
 
Author login:   CVE:
The minimum length of a search query is 3 symbols

Search results for exploits with selected filters

[ remote exploits ]

Remote exploits and vulnerabilities category


A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 265
Security Risk Critical
R
D
Download
C
CVE-2022-28171
Verified by 0day Admin
free
You can open this exploit for free
Thurein Soe
Exploits:
6
BusinessLevel:
1
4 306
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
732
BusinessLevel:
46
4 194
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Aryan Chehreghani
Exploits:
21
BusinessLevel:
3
4 610
Security Risk Critical
R
D
Download
C
CVE-2022-38108
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
5 348
Security Risk Critical
R
D
Download
C
CVE-2022-47966
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
9 938
Security Risk Critical
R
D
Download
C
CVE-2021-42321
CVE-2022-23277
Verified by 0day Admin
free
You can open this exploit for free
zcgonvh
Exploits:
2
BusinessLevel:
4
8 647
Security Risk High
R
D
Download
C
CVE-2022-29457
Verified by 0day Admin
free
You can open this exploit for free
Metin Yunus Kandemir
Exploits:
29
BusinessLevel:
4
8 737
Security Risk High
R
D
Download
C
CVE-2022-28810
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
8 549
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Metin Yunus Kandemir
Exploits:
29
BusinessLevel:
4
8 395
Security Risk Critical
R
D
Download
C
CVE-2019-10655
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
8 274
Security Risk Critical
R
D
Download
C
CVE-2020-5722
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
13 392
Security Risk Critical
R
D
Download
C
CVE-2019-10655
Verified by 0day Admin
free
You can open this exploit for free
Brendan Coles
Exploits:
18
BusinessLevel:
7
9 036
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Cody Sixteen
Exploits:
13
BusinessLevel:
4
8 594
Security Risk Critical
R
D
Download
C
CVE-2021-40539
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
9 328
Security Risk Critical
R
D
Download
C
CVE-2021-29449
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
9 306
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Mohammed Hadi
Exploits:
1
BusinessLevel:
2
9 556
Security Risk Critical
R
D
Download
C
CVE-2021-21220
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
9 900
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Harrison Neal
Exploits:
4
BusinessLevel:
4
12 572
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
 
0.026
Open this exploit for 0.026 BTC
Open this exploit for 1 500 GOLD
0day Today Team
Exploits:
293
BusinessLevel:
31
12 465
Security Risk High
R
D
Download
C
CVE-2010-3904
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92

[ local exploits ]

Local exploits and vulnerabilities category


A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 534
Security Risk Critical
R
D
Download
C
CVE-2023-45887
Verified by 0day Admin
free
You can open this exploit for free
MikeIsAStar
Exploits:
1
BusinessLevel:
0
4 758
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Moein Shahabi
Exploits:
1
BusinessLevel:
0
3 993
Security Risk High
R
D
Download
C
CVE-2022-30759
Verified by 0day Admin
free
You can open this exploit for free
Giacomo Sighinolfi
Exploits:
1
BusinessLevel:
1
3 959
Security Risk High
R
D
Download
C
CVE-2022-31244
Verified by 0day Admin
free
You can open this exploit for free
Valerio Casalino
Exploits:
1
BusinessLevel:
1
4 205
Security Risk Medium
R
D
Download
C
CVE-2022-2841
Verified by 0day Admin
free
You can open this exploit for free
Fortunato Lodari
Exploits:
3
BusinessLevel:
2
5 140
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
732
BusinessLevel:
46
8 256
Security Risk Medium
R
D
Download
C
CVE-2022-32802
Verified by 0day Admin
free
You can open this exploit for free
Ivan Fratric
Exploits:
2
BusinessLevel:
2
8 266
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Luis Martínez
Exploits:
57
BusinessLevel:
7
8 811
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Mert Daş
Exploits:
10
BusinessLevel:
2
13 855
Security Risk High
R
D
Download
C
CVE-2021-22555
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
14 014
Security Risk High
R
D
Download
C
CVE-2021-3490
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
8 727
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Julio Aviña
Exploits:
7
BusinessLevel:
2
8 549
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Alejandra Sánchez
Exploits:
36
BusinessLevel:
5
8 386
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
SamAlucard
Exploits:
15
BusinessLevel:
3
8 414
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
SamAlucard
Exploits:
15
BusinessLevel:
3
8 470
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Hector Gerbacio
Exploits:
2
BusinessLevel:
2
8 557
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Jair Amezcua
Exploits:
2
BusinessLevel:
2
8 401
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Mohammed Alshehri
Exploits:
18
BusinessLevel:
3
8 402
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Erick Galindo
Exploits:
12
BusinessLevel:
2
10 018
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Jann Horn
Exploits:
26
BusinessLevel:
6

[ web applications ]

Webapplication (webapps) exploits and vulnerabilities category


This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
155
Security Risk High
R
D
Download
C
CVE-2024-5947
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
732
BusinessLevel:
46
710
Security Risk High
R
D
Download
C
CVE-2024-28999
Verified by 0day Admin
free
You can open this exploit for free
Elhussain Fathy
Exploits:
1
BusinessLevel:
0
1 256
Security Risk Critical
R
D
Download
C
CVE-2023-38965
Verified by 0day Admin
free
You can open this exploit for free
Or4nG.M4N
Exploits:
21
BusinessLevel:
8
3 005
Security Risk Low
R
D
Download
C
CVE-2023-4168
Verified by 0day Admin
free
You can open this exploit for free
CraCkEr
Exploits:
93
BusinessLevel:
13
3 140
Security Risk Medium
R
D
Download
C
CVE-2023-38357
Verified by 0day Admin
free
You can open this exploit for free
RedTeam
Exploits:
62
BusinessLevel:
9
3 076
Security Risk Medium
R
D
Download
C
CVE-2023-36346
Verified by 0day Admin
free
You can open this exploit for free
Amirhossein Bahramizadeh
Exploits:
20
BusinessLevel:
2
3 490
Security Risk Medium
R
D
Download
C
CVE-2023-0527
Verified by 0day Admin
free
You can open this exploit for free
AFFAN AHMED
Exploits:
5
BusinessLevel:
1
3 480
Security Risk High
R
D
Download
C
CVE-2023-28153
CVE-2023-29078
CVE-2023-29079
Verified by 0day Admin
free
You can open this exploit for free
Fabian Densborn
Exploits:
1
BusinessLevel:
1
3 317
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Mirabbas Ağalarov
Exploits:
51
BusinessLevel:
3
3 049
Security Risk High
R
D
Download
C
CVE-2022-31056
Verified by 0day Admin
free
You can open this exploit for free
Nuri Çilengir
Exploits:
9
BusinessLevel:
1
3 955
Security Risk Critical
R
D
Download
C
CVE-2022-45359
Verified by 0day Admin
free
You can open this exploit for free
Dave Jong
Exploits:
1
BusinessLevel:
1
3 751
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
CraCkEr
Exploits:
93
BusinessLevel:
13
3 520
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
CraCkEr
Exploits:
93
BusinessLevel:
13
4 515
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Overthinker1877
Exploits:
1
BusinessLevel:
1
3 838
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Sant268
Exploits:
3
BusinessLevel:
1
3 814
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Sant268
Exploits:
3
BusinessLevel:
1
3 766
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Sant268
Exploits:
3
BusinessLevel:
1
4 478
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
twseptian
Exploits:
5
BusinessLevel:
1
4 444
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
twseptian
Exploits:
5
BusinessLevel:
1
3 183
Security Risk Medium
R
D
Download
C
CVE-2021-39316
Verified by 0day Admin
free
You can open this exploit for free
Uriel Yochpaz
Exploits:
2
BusinessLevel:
2

[ dos / poc ]

DOS exploits and vulnerabilities category


PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.

PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
8 909
Security Risk Medium
R
D
Download
C
CVE-2023-6246
Verified by 0day Admin
free
You can open this exploit for free
Qualys Security Advisory
Exploits:
8
BusinessLevel:
4
10 224
Security Risk High
R
D
Download
C
CVE-2022-0995
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
8 755
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Vincent Wolterman
Exploits:
2
BusinessLevel:
2
10 785
Security Risk Medium
R
D
Download
C
CVE-2020-15598
Verified by 0day Admin
free
You can open this exploit for free
Christian Folini
Exploits:
1
BusinessLevel:
2
12 230
Security Risk Medium
R
D
Download
C
CVE-2020-9802
Verified by 0day Admin
free
You can open this exploit for free
saelo
Exploits:
9
BusinessLevel:
6
16 138
Security Risk Medium
R
D
Download
C
CVE-2020-3837
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
17 301
Security Risk Medium
R
D
Download
C
CVE-2019-1347
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
16 765
Security Risk Medium
R
D
Download
C
CVE-2019-1346
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
16 798
Security Risk Medium
R
D
Download
C
CVE-2019-1345
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
16 765
Security Risk Medium
R
D
Download
C
CVE-2019-1344
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
16 907
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
14 858
Security Risk Medium
R
D
Download
C
CVE-2019-8641
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
13 559
Security Risk Medium
R
D
Download
C
CVE-2019-1244
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
12 435
Security Risk Medium
R
D
Download
C
CVE-2019-8649
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
15 536
Security Risk Medium
R
D
Download
C
CVE-2019-8624
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
22 512
Security Risk Medium
R
D
Download
C
CVE-2019-2107
Verified by 0day Admin
free
You can open this exploit for free
Marcin Kozlowski
Exploits:
12
BusinessLevel:
9
13 831
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
saelo
Exploits:
9
BusinessLevel:
6
11 635
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Victor Mondragón
Exploits:
50
BusinessLevel:
5
12 028
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
11 830
Security Risk Medium
R
D
Download
C
CVE-2019-9017
Verified by 0day Admin
free
You can open this exploit for free
Dino Barlattani
Exploits:
5
BusinessLevel:
3

[ shellcode ]

Shellcode category


In computer security, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called "shellcode" because it typically starts a command shell from which the attacker can control the compromised machine, but any piece of code that performs a similar task can be called shellcode. Because the function of a payload is not limited to merely spawning a shell, some have suggested that the name shellcode is insufficient. Shellcode is commonly written in machine code.

Classification:
There are several methods of classifying exploits. The most common is by how the exploit contacts the vulnerable software. A remote exploit works over a network and exploits the security vulnerability without any prior access to the vulnerable system. A local exploit requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with a client application. Exploits against client applications may also require some interaction with the user and thus may be used in combination with the social engineering method. Another classification is by the action against the vulnerable system; unauthorized data access, arbitrary code execution, and denial of service are examples. Many exploits are designed to provide superuser-level access to a computer system. However, it is also possible to use several exploits, first to gain low-level access, then to escalate privileges repeatedly until one reaches root. Normally a single exploit can only take advantage of a specific software vulnerability. Often, when an exploit is published, the vulnerability is fixed through a patch and the exploit becomes obsolete until newer versions of the software become available Shellcodes any types.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
11 638
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
d7x
Exploits:
7
BusinessLevel:
3
11 664
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
boku
Exploits:
42
BusinessLevel:
4
13 277
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Joao Batista
Exploits:
1
BusinessLevel:
3
14 005
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Anurag Srivastava
Exploits:
22
BusinessLevel:
5
13 205
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Cody Tubbs
Exploits:
5
BusinessLevel:
10
10 381
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
JollyFrogs
Exploits:
1
BusinessLevel:
4
10 430
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
AJITH KP
Exploits:
15
BusinessLevel:
5
10 649
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
AJITH KP
Exploits:
15
BusinessLevel:
5
10 465
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Sathish kumar
Exploits:
7
BusinessLevel:
4
10 524
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
d4sh&r
Exploits:
4
BusinessLevel:
5
10 762
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
b3mb4m
Exploits:
15
BusinessLevel:
6
unsorted
12 778
Security Risk Critical
R
D
Download
-
Not verified yet
free
You can open this exploit for free
n/a
Exploits:
233
BusinessLevel:
22
13 543
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
TrOoN
Exploits:
12
BusinessLevel:
7
9 148
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
KedAns-Dz
Exploits:
292
BusinessLevel:
24
5 769
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Jonathan Salwan
Exploits:
63
BusinessLevel:
11
5 677
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Daniel Godas-Lope.
Exploits:
4
BusinessLevel:
7
4 983
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
beosroot
Exploits:
4
BusinessLevel:
7
5 504
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Blake
Exploits:
52
BusinessLevel:
10
4 273
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
condis
Exploits:
8
BusinessLevel:
8
4 458
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
beosroot
Exploits:
4
BusinessLevel:
7