[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database
Search:
 
 
 
Category:   Platform:
 
Price from:   Price to:
 
Author login:   CVE:

Search results for exploits by request: Serial

[ remote exploits ]

Remote exploits and vulnerabilities category


A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 335
Security Risk Critical
R
D
Download
C
CVE-2022-1471
CVE-2023-43654
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
3 997
Security Risk Critical
R
D
Download
C
CVE-2023-34634
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
4 129
Security Risk High
R
D
Download
C
CVE-2023-1133
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
4 353
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Maurice Lambert
Exploits:
1
BusinessLevel:
1
4 666
Security Risk Medium
R
D
Download
C
CVE-2022-34668
Verified by 0day Admin
free
You can open this exploit for free
Elias Hohl
Exploits:
5
BusinessLevel:
1
5 064
Security Risk Critical
R
D
Download
C
CVE-2022-2992
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
4 811
Security Risk Critical
R
D
Download
C
CVE-2023-0669
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
10 138
Security Risk Critical
R
D
Download
C
CVE-2021-42321
CVE-2022-23277
Verified by 0day Admin
free
You can open this exploit for free
zcgonvh
Exploits:
2
BusinessLevel:
4
9 556
Security Risk High
R
D
Download
C
CVE-2022-35405
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
9 570
Security Risk Critical
R
D
Download
C
CVE-2020-28653
CVE-2021-3287
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
9 177
Security Risk High
R
D
Download
C
CVE-2021-26914
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
9 577
Security Risk Critical
R
D
Download
C
CVE-2021-26295
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
9 375
Security Risk High
R
D
Download
C
CVE-2020-9496
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
9 331
Security Risk Critical
R
D
Download
C
CVE-2020-7200
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
9 541
Security Risk Critical
R
D
Download
C
CVE-2020-15505
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
10 243
Security Risk High
R
D
Download
C
CVE-2017-11317
CVE-2019-18935
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
12 117
Security Risk Critical
R
D
Download
C
CVE-2017-10003
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
10 574
Security Risk High
R
D
Download
C
CVE-2020-9496
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
10 651
Security Risk High
R
D
Download
C
CVE-2020-1147
Verified by 0day Admin
free
You can open this exploit for free
Soroush Dalili
Exploits:
15
BusinessLevel:
10
11 352
Security Risk Critical
R
D
Download
C
CVE-2020-2883
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94

[ local exploits ]

Local exploits and vulnerabilities category


A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
3 762
Security Risk Medium
R
D
Download
C
CVE-2023-34634
Verified by 0day Admin
free
You can open this exploit for free
p4r4bellum
Exploits:
1
BusinessLevel:
1
8 856
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
ibby
Exploits:
2
BusinessLevel:
1
7 403
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
ibby
Exploits:
2
BusinessLevel:
1
10 202
Security Risk Medium
R
D
Download
C
CVE-2021-24040
Verified by 0day Admin
free
You can open this exploit for free
Abhiram V
Exploits:
2
BusinessLevel:
2
9 790
Security Risk High
R
D
Download
C
CVE-2020-12835
Verified by 0day Admin
free
You can open this exploit for free
Moritz Bechler
Exploits:
7
BusinessLevel:
4
4 398
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Matteo Malvica
Exploits:
8
BusinessLevel:
4
6 391
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
761
BusinessLevel:
48
4 665
Security Risk High
R
D
Download
-
Not verified yet
free
You can open this exploit for free
b33f
Exploits:
12
BusinessLevel:
7
5 258
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Todor Donev
Exploits:
108
BusinessLevel:
12
3 960
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Stefan Esser
Exploits:
31
BusinessLevel:
11
3 796
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Stefan Esser
Exploits:
31
BusinessLevel:
11
3 646
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Stefan Esser
Exploits:
31
BusinessLevel:
11
3 757
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Stefan Esser
Exploits:
31
BusinessLevel:
11

[ web applications ]

Webapplication (webapps) exploits and vulnerabilities category


This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
1 377
Security Risk Critical
R
D
Download
C
CVE-2024-24725
Verified by 0day Admin
free
You can open this exploit for free
h00die-gr3y
Exploits:
5
BusinessLevel:
1
1 760
Security Risk Critical
R
D
Download
C
CVE-2024-2054
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
2 250
Security Risk High
R
D
Download
C
CVE-2024-2054
Verified by 0day Admin
free
You can open this exploit for free
Jim Becher
Exploits:
20
BusinessLevel:
3
5 821
Security Risk Medium
R
D
Download
C
CVE-2022-30981
CVE-2022-30982
Verified by 0day Admin
free
You can open this exploit for free
Steffen Robertz
Exploits:
6
BusinessLevel:
2
4 121
Security Risk Medium
R
D
Download
C
CVE-2022-24108
Verified by 0day Admin
free
You can open this exploit for free
Daniil Sigalov
Exploits:
1
BusinessLevel:
1
3 972
Security Risk High
R
D
Download
C
CVE-2022-1463
Verified by 0day Admin
free
You can open this exploit for free
Ramuel Gall
Exploits:
8
BusinessLevel:
2
2 925
Security Risk Critical
R
D
Download
C
CVE-2020-9496
Verified by 0day Admin
free
You can open this exploit for free
Adrián Díaz
Exploits:
1
BusinessLevel:
2
2 400
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Pierre Kim
Exploits:
20
BusinessLevel:
6
2 268
Security Risk Critical
R
D
Download
C
CVE-2017-5941
Verified by 0day Admin
free
You can open this exploit for free
Beren Kuday GÖRÜN
Exploits:
3
BusinessLevel:
3
2 357
Security Risk Critical
R
D
Download
C
CVE-2017-5941
Verified by 0day Admin
free
You can open this exploit for free
UndeadLarva
Exploits:
1
BusinessLevel:
2
2 140
Security Risk Medium
R
D
Download
C
CVE-2020-4280
Verified by 0day Admin
free
You can open this exploit for free
Securify B.V.
Exploits:
2
BusinessLevel:
5
2 510
Security Risk Critical
R
D
Download
C
CVE-2015-7808
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
6 105
Security Risk High
R
D
Download
C
CVE-2020-0688
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
5 744
Security Risk Critical
R
D
Download
C
CVE-2019-18935
Verified by 0day Admin
free
You can open this exploit for free
Bishop Fox
Exploits:
2
BusinessLevel:
3
4 192
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
mm0r1
Exploits:
3
BusinessLevel:
3
3 702
Security Risk Critical
R
D
Download
C
CVE-2019-11080
Verified by 0day Admin
free
You can open this exploit for free
Jarad Kopf
Exploits:
2
BusinessLevel:
3
2 753
Security Risk Critical
R
D
Download
C
CVE-2018-17057
Verified by 0day Admin
free
You can open this exploit for free
polict
Exploits:
2
BusinessLevel:
3
3 808
Security Risk Critical
R
D
Download
C
CVE-2019-6340
Verified by 0day Admin
free
You can open this exploit for free
wvu
Exploits:
1
BusinessLevel:
3
3 723
Security Risk Medium
R
D
Download
C
CVE-2018-19276
Verified by 0day Admin
free
You can open this exploit for free
Bishop Fox
Exploits:
2
BusinessLevel:
3
2 824
Security Risk High
R
D
Download
C
CVE-2018-20221
Verified by 0day Admin
free
You can open this exploit for free
Anthony Cole
Exploits:
6
BusinessLevel:
4

[ dos / poc ]

DOS exploits and vulnerabilities category


PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.

PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
15 730
Security Risk Medium
R
D
Download
C
CVE-2019-8661
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
12 555
Security Risk Medium
R
D
Download
C
CVE-2019-8646
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
12 413
Security Risk Medium
R
D
Download
C
CVE-2019-8647
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
11 786
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Alejandra Sánchez
Exploits:
36
BusinessLevel:
5
10 338
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Alejandra Sánchez
Exploits:
36
BusinessLevel:
5
10 252
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Alejandra Sánchez
Exploits:
36
BusinessLevel:
5
2 896
Security Risk Medium
R
D
Download
C
CVE-2018-16068
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
6 260
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
761
BusinessLevel:
48
6 664
Security Risk Medium
R
D
Download
C
CVE-2017-10003
Verified by 0day Admin
free
You can open this exploit for free
SecuriTeam
Exploits:
20
BusinessLevel:
5
5 073
Security Risk Medium
R
D
Download
C
CVE-2016-9936
Verified by 0day Admin
free
You can open this exploit for free
taoguangchen
Exploits:
2
BusinessLevel:
4
3 684
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Yakir Wizman
Exploits:
78
BusinessLevel:
13
3 788
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Taoguang Chen
Exploits:
11
BusinessLevel:
6
3 548
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Taoguang Chen
Exploits:
11
BusinessLevel:
6
3 509
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Taoguang Chen
Exploits:
11
BusinessLevel:
6
3 786
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Taoguang Chen
Exploits:
11
BusinessLevel:
6
3 586
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Taoguang Chen
Exploits:
11
BusinessLevel:
6
5 501
Security Risk Medium
R
D
Download
-
Not verified yet
free
You can open this exploit for free
condis
Exploits:
8
BusinessLevel:
8
4 940
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
prdelka
Exploits:
28
BusinessLevel:
11
3 627
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Stefan Esser
Exploits:
31
BusinessLevel:
11
4 080
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Stefan Esser
Exploits:
31
BusinessLevel:
11

[ shellcode ]

Shellcode category


In computer security, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called "shellcode" because it typically starts a command shell from which the attacker can control the compromised machine, but any piece of code that performs a similar task can be called shellcode. Because the function of a payload is not limited to merely spawning a shell, some have suggested that the name shellcode is insufficient. Shellcode is commonly written in machine code.

Classification:
There are several methods of classifying exploits. The most common is by how the exploit contacts the vulnerable software. A remote exploit works over a network and exploits the security vulnerability without any prior access to the vulnerable system. A local exploit requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with a client application. Exploits against client applications may also require some interaction with the user and thus may be used in combination with the social engineering method. Another classification is by the action against the vulnerable system; unauthorized data access, arbitrary code execution, and denial of service are examples. Many exploits are designed to provide superuser-level access to a computer system. However, it is also possible to use several exploits, first to gain low-level access, then to escalate privileges repeatedly until one reaches root. Normally a single exploit can only take advantage of a specific software vulnerability. Often, when an exploit is published, the vulnerability is fixed through a patch and the exploit becomes obsolete until newer versions of the software become available Shellcodes any types.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 519
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
phar
Exploits:
4
BusinessLevel:
10