[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database
Search:
 
 
 
Category:   Platform:
 
Price from:   Price to:
 
Author login:   CVE:

Search results for exploits by request: 360

[ remote exploits ]

Remote exploits and vulnerabilities category


A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
337
Security Risk Critical
R
D
Download
C
CVE-2024-22729
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
3 510
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Akil Gundogan
Exploits:
4
BusinessLevel:
1
4 724
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Daniel Godoy
Exploits:
36
BusinessLevel:
9
8 532
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Matthew Bergin
Exploits:
43
BusinessLevel:
9
7 035
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Matthew Bergin
Exploits:
43
BusinessLevel:
9
6 901
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Matthew Bergin
Exploits:
43
BusinessLevel:
9
6 867
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Matthew Bergin
Exploits:
43
BusinessLevel:
9
7 608
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Matthew Bergin
Exploits:
43
BusinessLevel:
9
3 869
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
3 680
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Rh0
Exploits:
12
BusinessLevel:
8
6 853
Security Risk High
R
D
Download
C
CVE-2014-3996
CVE-2014-3997
Verified by 0day Admin
free
You can open this exploit for free
Pedro Ribeiro
Exploits:
50
BusinessLevel:
8

[ local exploits ]

Local exploits and vulnerabilities category


A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 098
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Nathu Nandwani
Exploits:
9
BusinessLevel:
3
3 363
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
vr_system
Exploits:
5
BusinessLevel:
3
unsorted
4 928
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
anonymous
Exploits:
25
BusinessLevel:
9

[ web applications ]

Webapplication (webapps) exploits and vulnerabilities category


This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
3 375
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
r3m0t3nu11
Exploits:
4
BusinessLevel:
3
4 802
Security Risk High
R
D
Download
C
CVE-2014-5445
CVE-2014-5446
Verified by 0day Admin
free
You can open this exploit for free
Pedro Ribeiro
Exploits:
50
BusinessLevel:
8
5 001
Security Risk High
R
D
Download
C
CVE-2014-7863
CVE-2014-7864
Verified by 0day Admin
free
You can open this exploit for free
Pedro Ribeiro
Exploits:
50
BusinessLevel:
8
5 192
Security Risk High
R
D
Download
C
CVE-2014-6034
CVE-2014-6035
CVE-2014-6036
CVE-2014-7866
CVE-2014-7868
Verified by 0day Admin
free
You can open this exploit for free
Pedro Ribeiro
Exploits:
50
BusinessLevel:
8
4 918
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Ihsan Sencan
Exploits:
899
BusinessLevel:
49
3 508
Security Risk High
R
D
Download
C
CVE-2015-6237
Verified by 0day Admin
free
You can open this exploit for free
Specto
Exploits:
1
BusinessLevel:
4
4 153
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Shaker msallm
Exploits:
1
BusinessLevel:
5
5 820
Security Risk High
R
D
Download
C
CVE-2014-5445
CVE-2014-5446
Verified by 0day Admin
free
You can open this exploit for free
Pedro Ribeiro
Exploits:
50
BusinessLevel:
8
6 115
Security Risk High
R
D
Download
C
CVE-2014-7866
CVE-2014-7868
Verified by 0day Admin
free
You can open this exploit for free
Pedro Ribeiro
Exploits:
50
BusinessLevel:
8
3 803
Security Risk Low
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
MustLive
Exploits:
49
BusinessLevel:
10
3 986
Security Risk High
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Everett Griffiths
Exploits:
2
BusinessLevel:
5
4 366
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Everett Griffiths
Exploits:
2
BusinessLevel:
5
3 640
Security Risk High
R
D
Download
-
Not verified yet
free
You can open this exploit for free
KAI
Exploits:
2
BusinessLevel:
5
4 972
Security Risk Critical
R
D
Download
-
Not verified yet
free
You can open this exploit for free
drone
Exploits:
13
BusinessLevel:
6
4 194
Security Risk Low
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
The Black Devils
Exploits:
135
BusinessLevel:
16
3 735
Security Risk High
R
D
Download
-
Not verified yet
free
You can open this exploit for free
The Black Devils
Exploits:
135
BusinessLevel:
16
4 326
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Ratchet
Exploits:
4
BusinessLevel:
7
3 141
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Ignacio Garrido
Exploits:
3
BusinessLevel:
7
unsorted
2 858
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Ded MustD!e
Exploits:
3
BusinessLevel:
8

[ dos / poc ]

DOS exploits and vulnerabilities category


PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.

PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
unsorted
3 811
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
muts
Exploits:
43
BusinessLevel:
12