[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database
Search:
 
 
 
Category:   Platform:
 
Price from:   Price to:
 
Author login:   CVE:

Search results for exploits by request: Ruby

[ remote exploits ]

Remote exploits and vulnerabilities category


A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
8 679
Security Risk Critical
R
D
Download
C
CVE-2019-5420
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
3 856
Security Risk High
R
D
Download
C
CVE-2017-0903
Verified by 0day Admin
free
You can open this exploit for free
Aaron Patterson
Exploits:
2
BusinessLevel:
6
4 623
Security Risk Critical
R
D
Download
C
CVE-2015-3224
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
6 372
Security Risk Critical
R
D
Download
C
CVE-2016-0752
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
5 761
Security Risk Critical
R
D
Download
C
CVE-2016-2098
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
5 271
Security Risk Critical
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
5 855
Security Risk High
R
D
Download
C
CVE-2014-2888
Verified by 0day Admin
free
You can open this exploit for free
Larry Cashdollar
Exploits:
62
BusinessLevel:
10
5 558
Security Risk High
R
D
Download
C
CVE-2014-2322
Verified by 0day Admin
free
You can open this exploit for free
Larry Cashdollar
Exploits:
62
BusinessLevel:
10
5 551
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
4 791
Security Risk High
R
D
Download
C
CVE-2013-4203
Verified by 0day Admin
free
You can open this exploit for free
Larry Cashdollar
Exploits:
62
BusinessLevel:
10
6 017
Security Risk High
R
D
Download
C
CVE-2013-1948
Verified by 0day Admin
free
You can open this exploit for free
Larry Cashdollar
Exploits:
62
BusinessLevel:
10
5 467
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Larry Cashdollar
Exploits:
62
BusinessLevel:
10
5 624
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Larry Cashdollar
Exploits:
62
BusinessLevel:
10
5 865
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Larry Cashdollar
Exploits:
62
BusinessLevel:
10
5 343
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Larry Cashdollar
Exploits:
62
BusinessLevel:
10
5 237
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Larry Cashdollar
Exploits:
62
BusinessLevel:
10
5 357
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Larry Cashdollar
Exploits:
62
BusinessLevel:
10
4 813
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
5 600
Security Risk High
R
D
Download
C
CVE-2013-0156
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
4 622
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94

[ local exploits ]

Local exploits and vulnerabilities category


A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
5 065
Security Risk Critical
R
D
Download
C
CVE-2017-17405
Verified by 0day Admin
free
You can open this exploit for free
Etienne Stalmans
Exploits:
2
BusinessLevel:
4
4 613
Security Risk High
R
D
Download
C
CVE-2017-0901
Verified by 0day Admin
free
You can open this exploit for free
mame
Exploits:
1
BusinessLevel:
4
4 563
Security Risk Medium
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
joernchen
Exploits:
3
BusinessLevel:
7
6 003
Security Risk High
R
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Larry Cashdollar
Exploits:
62
BusinessLevel:
10
unsorted
4 498
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
John Babio
Exploits:
5
BusinessLevel:
8
unsorted
4 494
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
vade79
Exploits:
31
BusinessLevel:
12

[ web applications ]

Webapplication (webapps) exploits and vulnerabilities category


This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
3 633
Security Risk Critical
R
D
Download
C
CVE-2020-8163
Verified by 0day Admin
free
You can open this exploit for free
Lucas Amorim
Exploits:
2
BusinessLevel:
2
4 520
Security Risk Medium
R
D
Download
C
CVE-2017-12098
Verified by 0day Admin
free
You can open this exploit for free
Zachary Sanchez
Exploits:
2
BusinessLevel:
4
4 340
Security Risk Medium
R
D
Download
C
CVE-2017-12097
Verified by 0day Admin
free
You can open this exploit for free
Zachary Sanchez
Exploits:
2
BusinessLevel:
4
4 818
Security Risk High
R
D
Download
C
CVE-2013-1933
Verified by 0day Admin
free
You can open this exploit for free
Larry Cashdollar
Exploits:
62
BusinessLevel:
10
unsorted
4 453
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
p0deje
Exploits:
4
BusinessLevel:
8

[ dos / poc ]

DOS exploits and vulnerabilities category


PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.

PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 502
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Laurent Gaffie
Exploits:
23
BusinessLevel:
10