0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Search results for exploits by request: Serial
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 335
Security Risk Critical
D
Download
C
CVE-2022-1471
CVE-2023-43654
CVE-2023-43654
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
3 997
Security Risk Critical
D
Download
C
CVE-2023-34634
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
4 129
Security Risk High
D
Download
C
CVE-2023-1133
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
4 353
Security Risk Critical
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Maurice Lambert
Exploits:
1
BusinessLevel:
1
4 666
Security Risk Medium
D
Download
C
CVE-2022-34668
Verified by 0day Admin
free
You can open this exploit for free
Elias Hohl
Exploits:
5
BusinessLevel:
1
5 064
Security Risk Critical
D
Download
C
CVE-2022-2992
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
4 811
Security Risk Critical
D
Download
C
CVE-2023-0669
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
10 138
Security Risk Critical
D
Download
C
CVE-2021-42321
CVE-2022-23277
CVE-2022-23277
Verified by 0day Admin
free
You can open this exploit for free
zcgonvh
Exploits:
2
BusinessLevel:
4
9 556
Security Risk High
D
Download
C
CVE-2022-35405
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
9 570
Security Risk Critical
D
Download
C
CVE-2020-28653
CVE-2021-3287
CVE-2021-3287
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
9 177
Security Risk High
D
Download
C
CVE-2021-26914
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
Apache OFBiz SOAP Java Deserialization Exploit
Comments:
0
9 577
Security Risk Critical
D
Download
C
CVE-2021-26295
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
9 375
Security Risk High
D
Download
C
CVE-2020-9496
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
9 331
Security Risk Critical
D
Download
C
CVE-2020-7200
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
9 541
Security Risk Critical
D
Download
C
CVE-2020-15505
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
10 243
Security Risk High
D
Download
C
CVE-2017-11317
CVE-2019-18935
CVE-2019-18935
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
12 117
Security Risk Critical
D
Download
C
CVE-2017-10003
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
10 574
Security Risk High
D
Download
C
CVE-2020-9496
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
10 651
Security Risk High
D
Download
C
CVE-2020-1147
Verified by 0day Admin
free
You can open this exploit for free
Soroush Dalili
Exploits:
15
BusinessLevel:
10
11 352
Security Risk Critical
D
Download
C
CVE-2020-2883
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
3 762
Security Risk Medium
D
Download
C
CVE-2023-34634
Verified by 0day Admin
free
You can open this exploit for free
p4r4bellum
Exploits:
1
BusinessLevel:
1
8 856
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
ibby
Exploits:
2
BusinessLevel:
1
7 403
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
ibby
Exploits:
2
BusinessLevel:
1
10 202
Security Risk Medium
D
Download
C
CVE-2021-24040
Verified by 0day Admin
free
You can open this exploit for free
Abhiram V
Exploits:
2
BusinessLevel:
2
Protection Licensing Toolkit ReadyAPI 3.2.5 Code Execution / Deserialization Vulnerability
Comments:
0
9 790
Security Risk High
D
Download
C
CVE-2020-12835
Verified by 0day Admin
free
You can open this exploit for free
Moritz Bechler
Exploits:
7
BusinessLevel:
4
4 398
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Matteo Malvica
Exploits:
8
BusinessLevel:
4
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Restricted Shell Escape Vulnerability
Comments:
0
6 391
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
761
BusinessLevel:
48
4 665
Security Risk High
D
Download
-
Not verified yet
free
You can open this exploit for free
b33f
Exploits:
12
BusinessLevel:
7
5 258
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
Todor Donev
Exploits:
108
BusinessLevel:
12
3 960
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
Stefan Esser
Exploits:
31
BusinessLevel:
11
3 796
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
Stefan Esser
Exploits:
31
BusinessLevel:
11
3 646
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
Stefan Esser
Exploits:
31
BusinessLevel:
11
3 757
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
Stefan Esser
Exploits:
31
BusinessLevel:
11
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
1 377
Security Risk Critical
D
Download
C
CVE-2024-24725
Verified by 0day Admin
free
You can open this exploit for free
h00die-gr3y
Exploits:
5
BusinessLevel:
1
1 760
Security Risk Critical
D
Download
C
CVE-2024-2054
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
2 250
Security Risk High
D
Download
C
CVE-2024-2054
Verified by 0day Admin
free
You can open this exploit for free
Jim Becher
Exploits:
20
BusinessLevel:
3
5 821
Security Risk Medium
D
Download
C
CVE-2022-30981
CVE-2022-30982
CVE-2022-30982
Verified by 0day Admin
free
You can open this exploit for free
Steffen Robertz
Exploits:
6
BusinessLevel:
2
4 121
Security Risk Medium
D
Download
C
CVE-2022-24108
Verified by 0day Admin
free
You can open this exploit for free
Daniil Sigalov
Exploits:
1
BusinessLevel:
1
WordPress Booking Calendar 9.1 PHP Object Injection / Insecure Deserialization Vulnerabilities
Comments:
0
3 972
Security Risk High
D
Download
C
CVE-2022-1463
Verified by 0day Admin
free
You can open this exploit for free
Ramuel Gall
Exploits:
8
BusinessLevel:
2
ApacheOfBiz 17.12.01 - Remote Command Execution via Unsafe Deserialization of XMLRPC arguments
Comments:
0
2 925
Security Risk Critical
D
Download
C
CVE-2020-9496
Verified by 0day Admin
free
You can open this exploit for free
Adrián Díaz
Exploits:
1
BusinessLevel:
2
Dell OpenManage Enterprise Hardcoded Credentails / Privilege Escalation / Deserialization
Comments:
0
2 400
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Pierre Kim
Exploits:
20
BusinessLevel:
6
2 268
Security Risk Critical
D
Download
C
CVE-2017-5941
Verified by 0day Admin
free
You can open this exploit for free
Beren Kuday GÖRÜN
Exploits:
3
BusinessLevel:
3
2 357
Security Risk Critical
D
Download
C
CVE-2017-5941
Verified by 0day Admin
free
You can open this exploit for free
UndeadLarva
Exploits:
1
BusinessLevel:
2
2 140
Security Risk Medium
D
Download
C
CVE-2020-4280
Verified by 0day Admin
free
You can open this exploit for free
Securify B.V.
Exploits:
2
BusinessLevel:
5
2 510
Security Risk Critical
D
Download
C
CVE-2015-7808
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
6 105
Security Risk High
D
Download
C
CVE-2020-0688
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
5 744
Security Risk Critical
D
Download
C
CVE-2019-18935
Verified by 0day Admin
free
You can open this exploit for free
Bishop Fox
Exploits:
2
BusinessLevel:
3
4 192
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
mm0r1
Exploits:
3
BusinessLevel:
3
3 702
Security Risk Critical
D
Download
C
CVE-2019-11080
Verified by 0day Admin
free
You can open this exploit for free
Jarad Kopf
Exploits:
2
BusinessLevel:
3
2 753
Security Risk Critical
D
Download
C
CVE-2018-17057
Verified by 0day Admin
free
You can open this exploit for free
polict
Exploits:
2
BusinessLevel:
3
3 808
Security Risk Critical
D
Download
C
CVE-2019-6340
Verified by 0day Admin
free
You can open this exploit for free
wvu
Exploits:
1
BusinessLevel:
3
3 723
Security Risk Medium
D
Download
C
CVE-2018-19276
Verified by 0day Admin
free
You can open this exploit for free
Bishop Fox
Exploits:
2
BusinessLevel:
3
2 824
Security Risk High
D
Download
C
CVE-2018-20221
Verified by 0day Admin
free
You can open this exploit for free
Anthony Cole
Exploits:
6
BusinessLevel:
4
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
15 730
Security Risk Medium
D
Download
C
CVE-2019-8661
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
12 555
Security Risk Medium
D
Download
C
CVE-2019-8646
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
iMessage - NSArray Deserialization can Invoke Subclass that does not Retain References Exploit
Comments:
0
12 413
Security Risk Medium
D
Download
C
CVE-2019-8647
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
11 786
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Alejandra Sánchez
Exploits:
36
BusinessLevel:
5
10 338
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Alejandra Sánchez
Exploits:
36
BusinessLevel:
5
10 252
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Alejandra Sánchez
Exploits:
36
BusinessLevel:
5
2 896
Security Risk Medium
D
Download
C
CVE-2018-16068
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Denial of Service Vulnerability
Comments:
0
6 260
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
761
BusinessLevel:
48
6 664
Security Risk Medium
D
Download
C
CVE-2017-10003
Verified by 0day Admin
free
You can open this exploit for free
SecuriTeam
Exploits:
20
BusinessLevel:
5
5 073
Security Risk Medium
D
Download
C
CVE-2016-9936
Verified by 0day Admin
free
You can open this exploit for free
taoguangchen
Exploits:
2
BusinessLevel:
4
3 684
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Yakir Wizman
Exploits:
78
BusinessLevel:
13
3 788
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Taoguang Chen
Exploits:
11
BusinessLevel:
6
3 548
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Taoguang Chen
Exploits:
11
BusinessLevel:
6
3 509
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Taoguang Chen
Exploits:
11
BusinessLevel:
6
3 786
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Taoguang Chen
Exploits:
11
BusinessLevel:
6
PHP unserialize() Use-After-Free Vulnerabilities
Comments:
0
3 586
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Taoguang Chen
Exploits:
11
BusinessLevel:
6
5 501
Security Risk Medium
D
Download
-
Not verified yet
free
You can open this exploit for free
condis
Exploits:
8
BusinessLevel:
8
4 940
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
prdelka
Exploits:
28
BusinessLevel:
11
3 627
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
Stefan Esser
Exploits:
31
BusinessLevel:
11
4 080
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
Stefan Esser
Exploits:
31
BusinessLevel:
11
[ shellcode ]
Shellcode category
In computer security, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called "shellcode" because it typically starts a command shell from which the attacker can control the compromised machine, but any piece of code that performs a similar task can be called shellcode. Because the function of a payload is not limited to merely spawning a shell, some have suggested that the name shellcode is insufficient. Shellcode is commonly written in machine code.
Classification:
There are several methods of classifying exploits. The most common is by how the exploit contacts the vulnerable software. A remote exploit works over a network and exploits the security vulnerability without any prior access to the vulnerable system. A local exploit requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with a client application. Exploits against client applications may also require some interaction with the user and thus may be used in combination with the social engineering method. Another classification is by the action against the vulnerable system; unauthorized data access, arbitrary code execution, and denial of service are examples. Many exploits are designed to provide superuser-level access to a computer system. However, it is also possible to use several exploits, first to gain low-level access, then to escalate privileges repeatedly until one reaches root. Normally a single exploit can only take advantage of a specific software vulnerability. Often, when an exploit is published, the vulnerability is fixed through a patch and the exploit becomes obsolete until newer versions of the software become available Shellcodes any types.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR