0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Search results for exploits by request: PDF
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Adobe Acrobat Reader Silent PDF Exploit 0day
Rate up:
0
Rate down:
0
Comments:
5
15 352
Security Risk Critical
D
Download
-
Verified by 0day Admin
0.024
Open this exploit for 0.024 BTC
Open this exploit for 2 300 GOLD
0day Today Team
Exploits:
293
BusinessLevel:
31
Documalis Free PDF Editor 5.7.2.26 / Documalis Free PDF Scanner 5.7.2.122 Buffer Overflow Exploit
Comments:
0
10 656
Security Risk Critical
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
11 112
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
10 921
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
5 682
Security Risk High
D
Download
C
CVE-2017-9096
Verified by 0day Admin
free
You can open this exploit for free
Benjamin Bruppacher
Exploits:
1
BusinessLevel:
4
PDF Shaper Buffer Overflow Exploit
Comments:
0
4 109
Security Risk Critical
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
6 290
Security Risk Critical
D
Download
C
CVE-2015-0816
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
4 644
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
4 738
Security Risk High
D
Download
C
CVE-2013-3248
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
4 523
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
Ruby Gem md2pdf Command Injection Vulnerability
Comments:
0
6 032
Security Risk High
D
Download
C
CVE-2013-1948
Verified by 0day Admin
free
You can open this exploit for free
Larry Cashdollar
Exploits:
62
BusinessLevel:
11
4 810
Security Risk High
D
Download
C
CVE-2012-4914
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
iPhone PDF Reader Pro 2.3 Directory Traversal
Comments:
0
4 634
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
Khashayar Fereida.
Exploits:
4
BusinessLevel:
7
4 307
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
bz1p
Exploits:
2
BusinessLevel:
7
5 448
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
indoushka
Exploits:
453
BusinessLevel:
33
4 388
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
Jambalaya
Exploits:
2
BusinessLevel:
9
unsorted
4 124
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
SkD
Exploits:
16
BusinessLevel:
9
unsorted
3 657
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
Alfons Luja
Exploits:
14
BusinessLevel:
9
unsorted
3 857
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
Marco Torti
Exploits:
2
BusinessLevel:
8
unsorted
3 592
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
DeltahackingTEAM
Exploits:
33
BusinessLevel:
11
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
7 469
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
George Washington
Exploits:
1
BusinessLevel:
0
pdfkit v0.8.7.2 - Command Injection Exploit
Comments:
0
4 236
Security Risk Critical
D
Download
Verified by 0day Admin
free
You can open this exploit for free
UNICORD
Exploits:
3
BusinessLevel:
1
8 339
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Hejap Zairy
Exploits:
31
BusinessLevel:
3
PDFCOMPLETE Corporate Edition 4.1.45 - (pdfcDispatcher) Unquoted Service Path Vulnerability
Comments:
0
8 641
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Ismael Nava
Exploits:
18
BusinessLevel:
4
8 680
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Zaira Alquicira
Exploits:
1
BusinessLevel:
2
PDF Explorer 1.5.66.2 - SEH Local Exploit
Comments:
0
3 972
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Achilles
Exploits:
42
BusinessLevel:
8
5 338
Security Risk High
D
Download
C
CVE-2018-9948
CVE-2018-9958
CVE-2018-9958
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
4 251
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Alex Inführ
Exploits:
1
BusinessLevel:
3
4 613
Security Risk Critical
D
Download
C
CVE-2017-7442
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
4 529
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
rootexploit
Exploits:
3
BusinessLevel:
4
4 671
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Joey Lane
Exploits:
11
BusinessLevel:
5
4 624
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Saeed Hasanzadeh
Exploits:
3
BusinessLevel:
4
3 660
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Robbie Corley
Exploits:
7
BusinessLevel:
5
4 094
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Robbie Corley
Exploits:
7
BusinessLevel:
5
4 077
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Robbie Corley
Exploits:
7
BusinessLevel:
5
ChiefPDF Software 2.0 - Buffer Overflow Exploit
Comments:
0
3 759
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
4 440
Security Risk High
D
Download
C
CVE-2015-4495
Verified by 0day Admin
free
You can open this exploit for free
In Ming Loh
Exploits:
1
BusinessLevel:
5
PDF Shaper Buffer Overflow Exploit
Comments:
0
3 736
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
4 754
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Francis Provencher
Exploits:
54
BusinessLevel:
10
5 594
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
bot
Exploits:
156
BusinessLevel:
13
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Dompdf 1.2.1 - Remote Code Execution Exploit
Comments:
0
3 286
Security Risk Critical
D
Download
C
CVE-2022-28368
Verified by 0day Admin
free
You can open this exploit for free
Ravindu Wickramasinghe
Exploits:
2
BusinessLevel:
1
2 708
Security Risk Low
D
Download
C
CVE-2022-35583
Verified by 0day Admin
free
You can open this exploit for free
Momen Eldawakhly
Exploits:
18
BusinessLevel:
2
mPDF 7.0 - Local File Inclusion Exploit
Comments:
0
4 396
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Musyoka Ian
Exploits:
7
BusinessLevel:
3
4 116
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
UnD3sc0n0c1d0
Exploits:
6
BusinessLevel:
3
4 038
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Hassan Khan Yusufzai
Exploits:
10
BusinessLevel:
2
4 073
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Hejap Zairy
Exploits:
31
BusinessLevel:
3
4 090
Security Risk Critical
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Hejap Zairy
Exploits:
31
BusinessLevel:
3
4 002
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Hejap Zairy
Exploits:
31
BusinessLevel:
3
4 230
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Saud Alenazi
Exploits:
32
BusinessLevel:
3
2 735
Security Risk High
D
Download
C
CVE-2019-10000
CVE-2019-10102
CVE-2019-10102
Verified by 0day Admin
free
You can open this exploit for free
Christian Lerrahn
Exploits:
1
BusinessLevel:
3
2 768
Security Risk Critical
D
Download
C
CVE-2018-17057
Verified by 0day Admin
free
You can open this exploit for free
polict
Exploits:
2
BusinessLevel:
3
3 244
Security Risk Critical
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
dd_
Exploits:
3
BusinessLevel:
3
4 413
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Fikri Fadzil
Exploits:
6
BusinessLevel:
5
3 059
Security Risk Low
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Madhu Akula
Exploits:
10
BusinessLevel:
5
Scuolabook purchased e-books on .pdf format Download Exploit
Rate up:
0
Rate down:
0
Comments:
2
12 903
Security Risk Low
D
Download
-
Verified by 0day Admin
0.001
Open this exploit for 0.001 BTC
Open this exploit for 100 GOLD
MrUke
Exploits:
1
BusinessLevel:
5
4 095
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Filippo Roncari
Exploits:
5
BusinessLevel:
5
4 689
Security Risk Critical
D
Download
C
CVE-2014-6235
Verified by 0day Admin
free
You can open this exploit for free
RedTeam
Exploits:
62
BusinessLevel:
9
5 470
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Claudio Viviani
Exploits:
38
BusinessLevel:
7
8 326
Security Risk Critical
D
Download
-
Not verified yet
free
You can open this exploit for free
Aloulou
Exploits:
19
BusinessLevel:
6
dompdf 0.6.0 Arbitrary File Read Vulnerability
Comments:
0
4 166
Security Risk High
D
Download
C
CVE-2014-2383
Verified by 0day Admin
free
You can open this exploit for free
Portcullis
Exploits:
16
BusinessLevel:
6
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
pdfresurrect 0.15 - Buffer Overflow Exploit
Comments:
1
13 281
Security Risk High
D
Download
C
CVE-2019-14267
Verified by 0day Admin
free
You can open this exploit for free
j0lama
Exploits:
3
BusinessLevel:
4
Encrypt PDF 2.3 - Denial of Service Exploit
Comments:
0
12 278
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Alejandra Sánchez
Exploits:
36
BusinessLevel:
5
3 563
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Gionathan Reale
Exploits:
42
BusinessLevel:
5
4 392
Security Risk Medium
D
Download
C
CVE-2018-8036
Verified by 0day Admin
free
You can open this exploit for free
Tobias Ospelt
Exploits:
1
BusinessLevel:
3
3 237
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Hamm3r.py
Exploits:
3
BusinessLevel:
3
3 639
Security Risk Critical
D
Download
C
CVE-2018-7264
Verified by 0day Admin
free
You can open this exploit for free
François Goichon
Exploits:
3
BusinessLevel:
4
2 881
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
2 906
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 179
Security Risk Medium
D
Download
C
CVE-2017-5991
Verified by 0day Admin
free
You can open this exploit for free
Kamil Frankowicz
Exploits:
1
BusinessLevel:
4
4 416
Security Risk Medium
D
Download
C
CVE-2017-6060
Verified by 0day Admin
free
You can open this exploit for free
Agostino Sarubbo
Exploits:
3
BusinessLevel:
4
Foxit PDF Reader 1.0.1.0925 - CPDF_StreamContentParser::~CPDF_StreamContentParser Heap Based Memory
Comments:
0
3 507
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 475
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 523
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Foxit PDF Reader 1.0.1.0925 - kdu_core::kdu_codestream::get_subsampling Memory Corruption
Comments:
0
3 428
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 406
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 483
Security Risk Medium
D
Download
C
CVE-2016-0954
Verified by 0day Admin
free
You can open this exploit for free
Pier-Luc Maltais
Exploits:
3
BusinessLevel:
5
3 116
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 374
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 277
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 762
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Francis Provencher
Exploits:
54
BusinessLevel:
10