[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database
Search:
 
 
 
Category:   Platform:
 
Price from:   Price to:
 
Author login:   CVE:

Search results for exploits by request: NTP

[ remote exploits ]

Remote exploits and vulnerabilities category


A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
11 564
Security Risk Critical
R
D
Download
C
CVE-2020-7357
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
3 840
Security Risk Critical
R
D
Download
C
CVE-2010-1549
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
3 672
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
3 246
Security Risk Critical
R
D
Download
C
CVE-2016-3962
CVE-2016-3989
Verified by 0day Admin
free
You can open this exploit for free
b0yd
Exploits:
1
BusinessLevel:
4
4 217
Security Risk High
R
D
Download
C
CVE-2013-4800
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
4 188
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
s4squatch
Exploits:
14
BusinessLevel:
8
unsorted
3 394
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
eyas
Exploits:
2
BusinessLevel:
10
unsorted
3 793
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Adik
Exploits:
2
BusinessLevel:
10

[ local exploits ]

Local exploits and vulnerabilities category


A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
9 227
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Angel Canseco
Exploits:
4
BusinessLevel:
2
3 931
Security Risk High
R
D
Download
C
CVE-2018-7182
Verified by 0day Admin
free
You can open this exploit for free
Magnus Klaaborg Stubman
Exploits:
10
BusinessLevel:
4
5 128
Security Risk High
R
D
Download
C
CVE-2016-0727
Verified by 0day Admin
free
You can open this exploit for free
halfdog
Exploits:
17
BusinessLevel:
7
3 856
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
3 880
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
drone
Exploits:
13
BusinessLevel:
6

[ web applications ]

Webapplication (webapps) exploits and vulnerabilities category


This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
1 375
Security Risk High
R
D
Download
C
CVE-2024-22899
Verified by 0day Admin
free
You can open this exploit for free
Valentin Lobstein
Exploits:
7
BusinessLevel:
2
4 724
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
RedTeam
Exploits:
62
BusinessLevel:
9
4 493
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
RedTeam
Exploits:
62
BusinessLevel:
9
4 466
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
RedTeam
Exploits:
62
BusinessLevel:
9
4 252
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
RedTeam
Exploits:
62
BusinessLevel:
9
5 167
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
KedAns-Dz
Exploits:
292
BusinessLevel:
24
4 289
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Shamus
Exploits:
6
BusinessLevel:
7
5 743
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Li0n-PaL
Exploits:
18
BusinessLevel:
8
3 720
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
newbie_043
Exploits:
1
BusinessLevel:
7
4 241
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
n/a
Exploits:
233
BusinessLevel:
22
unsorted
3 237
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
darkjoker
Exploits:
29
BusinessLevel:
9
unsorted
3 371
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
S@BUN
Exploits:
86
BusinessLevel:
13
unsorted
3 210
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
GoLd_M
Exploits:
172
BusinessLevel:
17
unsorted
3 090
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Kacper
Exploits:
144
BusinessLevel:
16
unsorted
3 128
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Drago84
Exploits:
18
BusinessLevel:
10

[ dos / poc ]

DOS exploits and vulnerabilities category


PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.

PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
7 297
Security Risk Medium
R
D
Download
C
CVE-2019-6445
Verified by 0day Admin
free
You can open this exploit for free
Magnus Klaaborg Stubman
Exploits:
10
BusinessLevel:
4
7 106
Security Risk Medium
R
D
Download
C
CVE-2019-6443
Verified by 0day Admin
free
You can open this exploit for free
Magnus Klaaborg Stubman
Exploits:
10
BusinessLevel:
4
6 904
Security Risk Medium
R
D
Download
C
CVE-2019-6444
Verified by 0day Admin
free
You can open this exploit for free
Magnus Klaaborg Stubman
Exploits:
10
BusinessLevel:
4
6 746
Security Risk Medium
R
D
Download
C
CVE-2019-6442
Verified by 0day Admin
free
You can open this exploit for free
Magnus Klaaborg Stubman
Exploits:
10
BusinessLevel:
4
4 284
Security Risk Low
R
D
Download
C
CVE-2018-12327
Verified by 0day Admin
free
You can open this exploit for free
Fakhri Zulkifli
Exploits:
8
BusinessLevel:
3
3 919
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 642
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Todor Donev
Exploits:
108
BusinessLevel:
12
3 592
Security Risk Medium
R
D
Download
C
CVE-2016-7434
Verified by 0day Admin
free
You can open this exploit for free
Magnus Klaaborg Stubman
Exploits:
10
BusinessLevel:
4
4 745
Security Risk High
R
D
Download
C
CVE-2016-4273
Verified by 0day Admin
free
You can open this exploit for free
COSIG
Exploits:
17
BusinessLevel:
5
4 601
Security Risk Medium
R
D
Download
C
CVE-2016-7084
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 397
Security Risk High
R
D
Download
C
CVE-2016-7083
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 379
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
6 009
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Marcin Kozlowski
Exploits:
12
BusinessLevel:
9
3 616
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Todor Donev
Exploits:
108
BusinessLevel:
12
4 993
Security Risk Medium
R
D
Download
C
CVE-2013-5211
Verified by 0day Admin
free
You can open this exploit for free
Danilo PC
Exploits:
1
BusinessLevel:
5
4 660
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
n/a
Exploits:
233
BusinessLevel:
22
5 079
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
TrOoN
Exploits:
12
BusinessLevel:
7
6 811
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
mr_me
Exploits:
109
BusinessLevel:
13
4 194
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
s4squatch
Exploits:
14
BusinessLevel:
8
unsorted
3 322
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Maurycy Prodeus
Exploits:
3
BusinessLevel:
10