0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Search results for exploits by request: hijack
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Whatsapp Desktop (session hijacking) Payload 0day Exploit
Rate up:
0
Rate down:
0
Comments:
0
17 525
Security Risk Critical
D
Download
-
Verified by 0day Admin
0.034
Open this exploit for 0.034 BTC
Open this exploit for 3 000 GOLD
0day Today Team
Exploits:
293
BusinessLevel:
31
Telegram Desktop (session hijacking) Payload Exploit
Rate up:
0
Rate down:
0
Comments:
0
19 602
Security Risk Critical
D
Download
-
Verified by 0day Admin
0.017
Open this exploit for 0.017 BTC
Open this exploit for 1 500 GOLD
cy4n
Exploits:
1
BusinessLevel:
3
QQ Mail hijacking account 0day Exploit
Rate up:
0
Rate down:
0
Comments:
6
14 535
Security Risk Critical
D
Download
-
Verified by 0day Admin
0.026
Open this exploit for 0.026 BTC
Open this exploit for 2 300 GOLD
smokzz
Exploits:
8
BusinessLevel:
7
6 224
Security Risk Critical
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
7 693
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Matthew Bergin
Exploits:
43
BusinessLevel:
10
unsorted
2 807
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
ste jones
Exploits:
1
BusinessLevel:
10
4 313
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
Yaroslav Polyakov
Exploits:
1
BusinessLevel:
10
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
2 337
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Yehia Elghaly
Exploits:
25
BusinessLevel:
3
4 954
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Moein Shahabi
Exploits:
1
BusinessLevel:
1
3 761
Security Risk Medium
D
Download
C
CVE-2022-47636
Verified by 0day Admin
free
You can open this exploit for free
shinnai
Exploits:
159
BusinessLevel:
17
3 932
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Ahsan Azad
Exploits:
1
BusinessLevel:
1
4 599
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Bilal Qureshi
Exploits:
1
BusinessLevel:
1
10 966
Security Risk High
D
Download
C
CVE-2022-0847
Verified by 0day Admin
free
You can open this exploit for free
blasty
Exploits:
4
BusinessLevel:
10
9 961
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Yehia Elghaly
Exploits:
25
BusinessLevel:
3
8 727
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
8 761
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
761
BusinessLevel:
48
Microsoft Windows - UAC Protection Bypass (Via Slui File Handler Hijack) (PowerShell) Exploit
Comments:
0
5 392
Security Risk Critical
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Gushmazuko
Exploits:
1
BusinessLevel:
3
Huawei eSpace 1.1.11.103 - DLL Hijacking Exploit
Comments:
0
6 125
Security Risk Medium
D
Download
C
CVE-2014-9416
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
761
BusinessLevel:
48
4 789
Security Risk Medium
D
Download
C
CVE-2019-5526
Verified by 0day Admin
free
You can open this exploit for free
Miguel Mendez
Exploits:
2
BusinessLevel:
4
VMware Workstation 14.1.5 / VMware Player 15 Host VMX Process COM Class Hijack Privilege Escalation
Comments:
0
10 006
Security Risk High
D
Download
C
CVE-2019-5512
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
VMware Workstation 14.1.5 / VMware Player 15.0.2 - Host VMX Process Impersonation Hijack Privilege
Comments:
0
9 803
Security Risk High
D
Download
C
CVE-2018-5511
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
8 602
Security Risk Medium
D
Download
C
CVE-2018-15515
Verified by 0day Admin
free
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
4 131
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Stefan Kanthak
Exploits:
16
BusinessLevel:
5
4 634
Security Risk Critical
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
7 505
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Yorick Koster
Exploits:
36
BusinessLevel:
8
4 621
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Felipe Azevedo
Exploits:
1
BusinessLevel:
4
Audacity 2.1.2 DLL Hijacking Vulnerability
Comments:
0
3 591
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Breno Cunha
Exploits:
1
BusinessLevel:
4
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
CmsMadeSimple v2.2.17 - session hijacking via Server-Side Template Injection Vulnerability
Comments:
0
3 064
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Mirabbas Ağalarov
Exploits:
51
BusinessLevel:
3
3 613
Security Risk Medium
D
Download
C
CVE-2023-30056
CVE-2023-30057
CVE-2023-30057
Verified by 0day Admin
free
You can open this exploit for free
Matei Josephs
Exploits:
1
BusinessLevel:
1
3 239
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
nu11secur1ty
Exploits:
215
BusinessLevel:
13
Osprey Pump Controller 1.0.1 Predictable Session Token / Session Hijacking Vulnerabilities
Comments:
0
2 652
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
761
BusinessLevel:
48
3 991
Security Risk High
D
Download
C
CVE-2022-31325
Verified by 0day Admin
free
You can open this exploit for free
nu11secur1ty
Exploits:
215
BusinessLevel:
13
3 100
Security Risk High
D
Download
C
CVE-2021-44151
Verified by 0day Admin
free
You can open this exploit for free
Andreas Fyhn Andersen
Exploits:
5
BusinessLevel:
2
2 071
Security Risk Low
D
Download
C
CVE-2021-32403
Verified by 0day Admin
free
You can open this exploit for free
Rodolfo Mariano
Exploits:
3
BusinessLevel:
2
Citadel WebCit < 926 - Session Hijacking Exploit
Comments:
0
1 523
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Simone Quatrini
Exploits:
1
BusinessLevel:
3
4 157
Security Risk Medium
D
Download
C
CVE-2019-19844
Verified by 0day Admin
free
You can open this exploit for free
Ryuji Tsutsui
Exploits:
1
BusinessLevel:
2
3 121
Security Risk Low
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Nainsi Gupta
Exploits:
2
BusinessLevel:
3
3 305
Security Risk High
D
Download
C
CVE-2017-15012
Verified by 0day Admin
free
You can open this exploit for free
Andrey Panfilov
Exploits:
9
BusinessLevel:
5
3 226
Security Risk Critical
D
Download
C
CVE-2017-6526
CVE-2017-6527
CVE-2017-6528
CVE-2017-6529
CVE-2017-6527
CVE-2017-6528
CVE-2017-6529
Verified by 0day Admin
free
You can open this exploit for free
Nicholas von Pechmann
Exploits:
1
BusinessLevel:
4
3 287
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Rahul Pratap Singh
Exploits:
9
BusinessLevel:
5
Aol account hijack sessions 0day
Rate up:
0
Rate down:
0
Comments:
12
8 441
Security Risk Critical
D
Download
-
Verified by 0day Admin
0.005
Open this exploit for 0.005 BTC
Open this exploit for 400 GOLD
lulz0day
Exploits:
2
BusinessLevel:
5
CS-Cart 4.2.0 Session Hijacking Vulnerability
Comments:
0
4 038
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Nik Cubrilovic
Exploits:
3
BusinessLevel:
5
4 438
Security Risk Critical
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Mehmet Ince
Exploits:
26
BusinessLevel:
8
Facebook Comment's Picture Hijacking
Comments:
2
26 763
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
buglab
Exploits:
4
BusinessLevel:
10
6 751
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
Seth Alan Woolley
Exploits:
2
BusinessLevel:
10
4 000
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
pimpim
Exploits:
6
BusinessLevel:
7
unsorted
3 760
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
JosS
Exploits:
66
BusinessLevel:
12
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
5 606
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
5 222
Security Risk High
D
Download
C
CVE-2014-3860
Not verified yet
free
You can open this exploit for free
Osanda Malith
Exploits:
16
BusinessLevel:
6
unsorted
3 331
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
Aviv Raff
Exploits:
7
BusinessLevel:
10