[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database
Search:
 
 
 
Category:   Platform:
 
Price from:   Price to:
 
Author login:   CVE:

Search results for exploits by request: EMO

[ remote exploits ]

Remote exploits and vulnerabilities category


A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
285
Security Risk Critical
R
D
Download
C
CVE-2024-24809
CVE-2024-31214
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1655
BusinessLevel:
94
471
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Jeremy Brown
Exploits:
61
BusinessLevel:
11
1 174
Security Risk Critical
R
D
Download
C
CVE-2024-8517
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1655
BusinessLevel:
94
1 422
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Jean Pereira
Exploits:
2
BusinessLevel:
1
1 694
Security Risk Critical
R
D
Download
C
CVE-2024-3116
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1655
BusinessLevel:
94
1 348
Security Risk Critical
R
D
Download
C
CVE-2024-42845
Verified by 0day Admin
free
You can open this exploit for free
Alessio Romano
Exploits:
2
BusinessLevel:
0
1 253
Security Risk Critical
R
D
Download
C
CVE-2023-48022
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1655
BusinessLevel:
94
1 496
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1655
BusinessLevel:
94
1 360
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
chebuya
Exploits:
2
BusinessLevel:
0
1 170
Security Risk Critical
R
D
Download
C
CVE-2024-27348
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1655
BusinessLevel:
94
1 483
Security Risk Critical
R
D
Download
C
CVE-2013-3632
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1655
BusinessLevel:
94
1 789
Security Risk Critical
R
D
Download
C
CVE-2022-1373
CVE-2022-2334
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1655
BusinessLevel:
94

OpenSSH 9.6 Remote Code Execution Exploit

Rate up:
0
Rate down:
0
Comments:
0
4 852
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
 
0.107
Open this exploit for 0.107 BTC
Open this exploit for 7 000 GOLD
0day Today Team
Exploits:
293
BusinessLevel:
31
2 214
Security Risk Critical
R
D
Download
C
CVE-2024-36401
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1655
BusinessLevel:
94
2 334
Security Risk Critical
R
D
Download
C
CVE-2024-21683
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1655
BusinessLevel:
94
2 404
Security Risk Critical
R
D
Download
C
CVE-2024-29824
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1655
BusinessLevel:
94
3 469
Security Risk Critical
R
D
Download
C
CVE-2024-6387
Verified by 0day Admin
free
You can open this exploit for free
Qualys Security
Exploits:
2
BusinessLevel:
2
3 152
Security Risk Critical
R
D
Download
C
CVE-2024-22729
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1655
BusinessLevel:
94
3 177
Security Risk Critical
R
D
Download
C
CVE-2024-1800
CVE-2024-4358
Verified by 0day Admin
free
You can open this exploit for free
Soroush Dalili
Exploits:
15
BusinessLevel:
10
3 106
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1655
BusinessLevel:
94

[ local exploits ]

Local exploits and vulnerabilities category


A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 637
Security Risk Critical
R
D
Download
C
CVE-2023-45887
Verified by 0day Admin
free
You can open this exploit for free
MikeIsAStar
Exploits:
1
BusinessLevel:
0
4 425
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Waqas Ahmed Faroouqi
Exploits:
2
BusinessLevel:
1
3 730
Security Risk Medium
R
D
Download
C
CVE-2023-30367
Verified by 0day Admin
free
You can open this exploit for free
Maximilian Barz
Exploits:
2
BusinessLevel:
2
4 563
Security Risk Critical
R
D
Download
C
CVE-2023-33863
CVE-2023-33864
CVE-2023-33865
Verified by 0day Admin
free
You can open this exploit for free
Qualys Security Advisory
Exploits:
8
BusinessLevel:
4
4 022
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
8bitsec
Exploits:
54
BusinessLevel:
6
4 284
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Neil Kettle
Exploits:
2
BusinessLevel:
6
4 279
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
737
BusinessLevel:
46
5 725
Security Risk High
R
D
Download
C
CVE-2022-3699
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1655
BusinessLevel:
94
9 006
Security Risk Medium
R
D
Download
C
CVE-2022-26364
Verified by 0day Admin
free
You can open this exploit for free
Jann Horn
Exploits:
28
BusinessLevel:
6
8 527
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Eduardo Braun Prado
Exploits:
16
BusinessLevel:
5
8 415
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Eduardo Braun Prado
Exploits:
16
BusinessLevel:
5
9 066
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Saud Alenazi
Exploits:
32
BusinessLevel:
3
10 423
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Yehia Elghaly
Exploits:
25
BusinessLevel:
3
10 883
Security Risk Critical
R
D
Download
C
CVE-2021-40444
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1655
BusinessLevel:
94
9 045
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Salman Asad
Exploits:
8
BusinessLevel:
2
13 033
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Jeremy Brown
Exploits:
61
BusinessLevel:
11
8 999
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Salman Asad
Exploits:
8
BusinessLevel:
2
8 701
Security Risk High
R
D
Download
C
CVE-2021-21551
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1655
BusinessLevel:
94
8 612
Security Risk Medium
R
D
Download
C
CVE-2021-26419
Verified by 0day Admin
free
You can open this exploit for free
Ivan Fratric
Exploits:
2
BusinessLevel:
2
8 694
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
737
BusinessLevel:
46

[ web applications ]

Webapplication (webapps) exploits and vulnerabilities category


This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
150
Security Risk Critical
R
D
Download
C
CVE-2024-6298
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
737
BusinessLevel:
46
947
Security Risk Critical
R
D
Download
C
CVE-2024-8504
Verified by 0day Admin
free
You can open this exploit for free
Jaggar Henry
Exploits:
8
BusinessLevel:
0
1 209
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Hosein Vita
Exploits:
6
BusinessLevel:
2
754
Security Risk High
R
D
Download
C
CVE-2024-6891
Verified by 0day Admin
free
You can open this exploit for free
Jaggar Henry
Exploits:
8
BusinessLevel:
0
2 198
Security Risk Critical
R
D
Download
C
CVE-2024-38458
Verified by 0day Admin
free
You can open this exploit for free
EgiX
Exploits:
131
BusinessLevel:
15
2 164
Security Risk High
R
D
Download
C
CVE-2024-5947
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
737
BusinessLevel:
46
1 571
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Jerry Thomas
Exploits:
2
BusinessLevel:
0
1 893
Security Risk Critical
R
D
Download
C
CVE-2024-4577
Verified by 0day Admin
free
You can open this exploit for free
Yesith Alvarez
Exploits:
1
BusinessLevel:
0
1 351
Security Risk Critical
R
D
Download
C
CVE-2024-36598
Verified by 0day Admin
free
You can open this exploit for free
Aslam Anwar Mahimkar
Exploits:
3
BusinessLevel:
0
1 908
Security Risk Critical
R
D
Download
C
CVE-2024-5084
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1655
BusinessLevel:
94
1 409
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Ahmet Ümit BAYRAM
Exploits:
75
BusinessLevel:
7
1 383
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Ahmet Ümit BAYRAM
Exploits:
75
BusinessLevel:
7
1 294
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Ahmet Ümit BAYRAM
Exploits:
75
BusinessLevel:
7
1 171
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Ahmet Ümit BAYRAM
Exploits:
75
BusinessLevel:
7
1 063
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Ahmet Ümit BAYRAM
Exploits:
75
BusinessLevel:
7
915
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Ahmet Ümit BAYRAM
Exploits:
75
BusinessLevel:
7
1 029
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Cold z3ro
Exploits:
2
BusinessLevel:
2
2 374
Security Risk Critical
R
D
Download
C
CVE-2022-35914
Verified by 0day Admin
free
You can open this exploit for free
Miguel Redondo
Exploits:
1
BusinessLevel:
0
1 346
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Ahmet Ümit BAYRAM
Exploits:
75
BusinessLevel:
7
1 370
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Ahmet Ümit BAYRAM
Exploits:
75
BusinessLevel:
7

[ dos / poc ]

DOS exploits and vulnerabilities category


PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.

PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
1 496
Security Risk Critical
R
D
Download
C
CVE-2024-38063
Verified by 0day Admin
free
You can open this exploit for free
Photubias
Exploits:
13
BusinessLevel:
5
3 944
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
737
BusinessLevel:
46
7 104
Security Risk Medium
R
D
Download
C
CVE-2022-31212
CVE-2022-31213
Verified by 0day Admin
free
You can open this exploit for free
Tim Weber
Exploits:
29
BusinessLevel:
10
7 452
Security Risk Medium
R
D
Download
C
CVE-2022-21820
Verified by 0day Admin
free
You can open this exploit for free
Jeremy Brown
Exploits:
61
BusinessLevel:
11
7 100
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Jeremy Brown
Exploits:
61
BusinessLevel:
11
9 994
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Yehia Elghaly
Exploits:
25
BusinessLevel:
3
9 090
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LinxzSec
Exploits:
2
BusinessLevel:
2
8 907
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Mark Brand
Exploits:
1
BusinessLevel:
2
18 146
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Geovanni Ruiz
Exploits:
12
BusinessLevel:
2
8 593
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
xynmaps
Exploits:
4
BusinessLevel:
2
9 323
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
xynmaps
Exploits:
4
BusinessLevel:
2
8 662
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
xynmaps
Exploits:
4
BusinessLevel:
2
8 625
Security Risk Medium
R
D
Download
C
CVE-2021-27804
Verified by 0day Admin
free
You can open this exploit for free
van Hauser
Exploits:
1
BusinessLevel:
2
8 862
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
xynmaps
Exploits:
4
BusinessLevel:
2
9 935
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
737
BusinessLevel:
46
9 125
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Qian Chen
Exploits:
5
BusinessLevel:
2
10 224
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Saeed reza Zamanian
Exploits:
12
BusinessLevel:
5
11 210
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Marcin Ressel
Exploits:
11
BusinessLevel:
8
26 091
Security Risk Medium
R
D
Download
C
CVE-2020-0022
Verified by 0day Admin
free
You can open this exploit for free
nu11secur1ty
Exploits:
215
BusinessLevel:
13
11 569
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Cem Onat Karagun
Exploits:
1
BusinessLevel:
2

[ shellcode ]

Shellcode category


In computer security, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called "shellcode" because it typically starts a command shell from which the attacker can control the compromised machine, but any piece of code that performs a similar task can be called shellcode. Because the function of a payload is not limited to merely spawning a shell, some have suggested that the name shellcode is insufficient. Shellcode is commonly written in machine code.

Classification:
There are several methods of classifying exploits. The most common is by how the exploit contacts the vulnerable software. A remote exploit works over a network and exploits the security vulnerability without any prior access to the vulnerable system. A local exploit requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with a client application. Exploits against client applications may also require some interaction with the user and thus may be used in combination with the social engineering method. Another classification is by the action against the vulnerable system; unauthorized data access, arbitrary code execution, and denial of service are examples. Many exploits are designed to provide superuser-level access to a computer system. However, it is also possible to use several exploits, first to gain low-level access, then to escalate privileges repeatedly until one reaches root. Normally a single exploit can only take advantage of a specific software vulnerability. Often, when an exploit is published, the vulnerability is fixed through a patch and the exploit becomes obsolete until newer versions of the software become available Shellcodes any types.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
12 926
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Tarek Ahmed
Exploits:
2
BusinessLevel:
1
12 236
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Armando Huesca Prida
Exploits:
3
BusinessLevel:
2
19 157
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Roziul Hasan Khan Shifat
Exploits:
26
BusinessLevel:
5
15 638
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Roziul Hasan Khan Shifat
Exploits:
26
BusinessLevel:
5
11 047
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
kyzer
Exploits:
6
BusinessLevel:
5
15 916
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Hamza.Megahed
Exploits:
5
BusinessLevel:
6
8 795
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
KedAns-Dz
Exploits:
292
BusinessLevel:
25
5 692
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Jonathan Salwan
Exploits:
63
BusinessLevel:
11
3 989
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
sloth
Exploits:
1
BusinessLevel:
10