0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Search results for exploits by request: management
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
10 328
Security Risk High
D
Download
C
CVE-2020-8010
CVE-2020-8012
CVE-2020-8012
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
11 326
Security Risk Medium
D
Download
C
CVE-2019-5392
Verified by 0day Admin
free
You can open this exploit for free
Lazy Hacker
Exploits:
1
BusinessLevel:
3
Cisco UCS Director, Cisco Integrated Management Controller Supervisor - Multiple Vulnerabilities
Comments:
0
11 108
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Pedro Ribeiro
Exploits:
50
BusinessLevel:
8
8 200
Security Risk Critical
D
Download
C
CVE-2019-1663
Verified by 0day Admin
free
You can open this exploit for free
Quentin Kaiser
Exploits:
5
BusinessLevel:
4
8 946
Security Risk High
D
Download
C
CVE-2018-17936
Verified by 0day Admin
free
You can open this exploit for free
Pedro Ribeiro
Exploits:
50
BusinessLevel:
8
Nuuo Central Management SQL Injection Exploit
Comments:
0
8 856
Security Risk High
D
Download
C
CVE-2018-18982
Verified by 0day Admin
free
You can open this exploit for free
Pedro Ribeiro
Exploits:
50
BusinessLevel:
8
6 327
Security Risk Critical
D
Download
C
CVE-2017-12557
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
15 864
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
15 545
Security Risk High
D
Download
C
CVE-2018-11138
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
3 836
Security Risk Critical
D
Download
C
CVE-2018-7466
Verified by 0day Admin
free
You can open this exploit for free
Manish Tanwar
Exploits:
23
BusinessLevel:
6
3 611
Security Risk Critical
D
Download
C
CVE-2018-7466
Verified by 0day Admin
free
You can open this exploit for free
Manish Tanwar
Exploits:
23
BusinessLevel:
6
6 221
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Matthew Bergin
Exploits:
43
BusinessLevel:
10
6 178
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Matthew Bergin
Exploits:
43
BusinessLevel:
10
7 456
Security Risk Critical
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Matthew Bergin
Exploits:
43
BusinessLevel:
10
Microsoft Windows - ManagementObject Arbitrary .NET Serialization Remote Code Execution Exploit
Comments:
0
10 648
Security Risk Critical
D
Download
C
CVE-2017-0160
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
6 071
Security Risk Critical
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
hantwister
Exploits:
7
BusinessLevel:
4
3 904
Security Risk Critical
D
Download
C
CVE-2016-6433
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
4 290
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Halil Dalabasmaz
Exploits:
13
BusinessLevel:
6
4 205
Security Risk Critical
D
Download
C
CVE-2016-1525
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
4 853
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Stefan Viehbock
Exploits:
10
BusinessLevel:
5
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
5 911
Security Risk High
D
Download
C
CVE-2023-32479
Verified by 0day Admin
free
You can open this exploit for free
Amirhossein Bahramizadeh
Exploits:
20
BusinessLevel:
2
Intel(R) Management Engine Components 6.0.0.1189 - (LMS) Unquoted Service Path Vulnerability
Comments:
0
8 554
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
SamAlucard
Exploits:
16
BusinessLevel:
3
9 578
Security Risk Critical
D
Download
C
CVE-2021-38648
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
9 612
Security Risk Critical
D
Download
C
CVE-2021-38647
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
Intel Management and Security Application 5.2 - User Notification Service Unquoted Service Path Vuln
Comments:
0
8 571
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Metin Yunus Kandemir
Exploits:
29
BusinessLevel:
4
Microsoft Window Manager (Windows 7 x86) - Menu Management Component UAF Privilege Elevation Exploit
Comments:
0
3 854
Security Risk High
D
Download
C
CVE-2017-0263
Verified by 0day Admin
free
You can open this exploit for free
xiaodaozhi
Exploits:
3
BusinessLevel:
3
4 750
Security Risk High
D
Download
C
CVE-2012-3274
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
4 080
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
4 041
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Joey Lane
Exploits:
11
BusinessLevel:
5
Cisco Firepower Threat Management Console 6.0.1 - Hard-Coded MySQL Credentials Vulnerability
Comments:
0
4 698
Security Risk Medium
D
Download
C
CVE-2016-6434
Verified by 0day Admin
free
You can open this exploit for free
KoreLogic
Exploits:
12
BusinessLevel:
6
3 495
Security Risk Critical
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Cr4sh
Exploits:
2
BusinessLevel:
4
4 607
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
3 754
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
Beenu Arora
Exploits:
12
BusinessLevel:
8
4 530
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
Securitum
Exploits:
2
BusinessLevel:
8
4 495
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
MoAB
Exploits:
21
BusinessLevel:
10
4 400
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
MoAB
Exploits:
21
BusinessLevel:
10
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
1 934
Security Risk Medium
D
Download
C
CVE-2024-41333
Verified by 0day Admin
free
You can open this exploit for free
Sampath Kumar Kadajari
Exploits:
2
BusinessLevel:
0
1 664
Security Risk High
D
Download
C
CVE-2024-41332
Verified by 0day Admin
free
You can open this exploit for free
Sampath Kumar Kadajari
Exploits:
2
BusinessLevel:
0
2 141
Security Risk Critical
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Muhammet Ali Dak
Exploits:
1
BusinessLevel:
0
1 008
Security Risk High
D
Download
C
CVE-2024-40502
Verified by 0day Admin
free
You can open this exploit for free
0xMykull
Exploits:
1
BusinessLevel:
0
1 649
Security Risk Critical
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Jerry Thomas
Exploits:
2
BusinessLevel:
0
1 629
Security Risk High
D
Download
C
CVE-2024-36840
Verified by 0day Admin
free
You can open this exploit for free
CBKB
Exploits:
1
BusinessLevel:
0
1 411
Security Risk Critical
D
Download
C
CVE-2024-36598
Verified by 0day Admin
free
You can open this exploit for free
Aslam Anwar Mahimkar
Exploits:
3
BusinessLevel:
0
1 126
Security Risk High
D
Download
C
CVE-2024-36597
Verified by 0day Admin
free
You can open this exploit for free
Aslam Anwar Mahimkar
Exploits:
3
BusinessLevel:
0
AEGON LIFE v1.0 Life Insurance Management System - Stored cross-site scripting Vulnerability
Comments:
0
1 100
Security Risk Medium
D
Download
C
CVE-2024-36599
Verified by 0day Admin
free
You can open this exploit for free
Aslam Anwar Mahimkar
Exploits:
3
BusinessLevel:
0
1 418
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Sanjay Singh
Exploits:
7
BusinessLevel:
2
1 253
Security Risk Medium
D
Download
C
CVE-2024-4293
Verified by 0day Admin
free
You can open this exploit for free
SoSPiro
Exploits:
10
BusinessLevel:
1
1 329
Security Risk High
D
Download
C
CVE-2023-51951
Verified by 0day Admin
free
You can open this exploit for free
blu3ming
Exploits:
1
BusinessLevel:
0
1 166
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
nu11secur1ty
Exploits:
215
BusinessLevel:
13
1 094
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
nu11secur1ty
Exploits:
215
BusinessLevel:
13
1 116
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Yusuf DinC
Exploits:
1
BusinessLevel:
0
824
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
nu11secur1ty
Exploits:
215
BusinessLevel:
13
Employee Management System 1.0 - (txtusername) and (txtpassword) SQL Injection Vulnerability
Comments:
0
842
Security Risk High
D
Download
C
CVE-2024-24497
Verified by 0day Admin
free
You can open this exploit for free
Yevhenii Butenko
Exploits:
5
BusinessLevel:
1
816
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Sandeep Vishwakarma
Exploits:
2
BusinessLevel:
0
Employee Management System 1.0 - (txtfullname) and (txtphone) SQL Injection Vulnerability
Comments:
0
811
Security Risk High
D
Download
C
CVE-2024-24499
Verified by 0day Admin
free
You can open this exploit for free
Yevhenii Butenko
Exploits:
5
BusinessLevel:
1
801
Security Risk Critical
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Sandeep Vishwakarma
Exploits:
2
BusinessLevel:
0
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
15 011
Security Risk Medium
D
Download
C
CVE-2019-6192
Verified by 0day Admin
free
You can open this exploit for free
Nassim Asrir
Exploits:
28
BusinessLevel:
5
11 668
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
chuyreds
Exploits:
19
BusinessLevel:
4
12 361
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Alessandro Magnosi
Exploits:
3
BusinessLevel:
3
4 909
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Luis Martínez
Exploits:
57
BusinessLevel:
7
3 074
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
daniel
Exploits:
1
BusinessLevel:
6
3 572
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Gionathan Reale
Exploits:
42
BusinessLevel:
5
macOS / iOS - Multiple Kernel Use-After-Frees due to Incorrect IOKit Object Lifetime Management in I
Comments:
0
3 064
Security Risk High
D
Download
C
CVE-2017-13847
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Microsoft Color Management Module icm32.dll - icm32!Fill_ushort_ELUTs_from_lut16Tag Out-of-Bounds Re
Comments:
0
3 353
Security Risk Medium
D
Download
C
CVE-2017-0061
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Microsoft Color Management Module icm32.dll - icm32!LHCalc3toX_Di16_Do16_Lut8_G32 Out-of-Bounds Read
Comments:
0
3 328
Security Risk Medium
D
Download
C
CVE-2017-0063
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 094
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
5 440
Security Risk High
D
Download
-
Not verified yet
free
You can open this exploit for free
Luigi Auriemma
Exploits:
115
BusinessLevel:
16
4 651
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
Alexey Sintsov
Exploits:
15
BusinessLevel:
10
unsorted
4 142
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
rgod
Exploits:
255
BusinessLevel:
22
unsorted
3 153
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
snooq
Exploits:
3
BusinessLevel:
10
[ shellcode ]
Shellcode category
In computer security, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called "shellcode" because it typically starts a command shell from which the attacker can control the compromised machine, but any piece of code that performs a similar task can be called shellcode. Because the function of a payload is not limited to merely spawning a shell, some have suggested that the name shellcode is insufficient. Shellcode is commonly written in machine code.
Classification:
There are several methods of classifying exploits. The most common is by how the exploit contacts the vulnerable software. A remote exploit works over a network and exploits the security vulnerability without any prior access to the vulnerable system. A local exploit requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with a client application. Exploits against client applications may also require some interaction with the user and thus may be used in combination with the social engineering method. Another classification is by the action against the vulnerable system; unauthorized data access, arbitrary code execution, and denial of service are examples. Many exploits are designed to provide superuser-level access to a computer system. However, it is also possible to use several exploits, first to gain low-level access, then to escalate privileges repeatedly until one reaches root. Normally a single exploit can only take advantage of a specific software vulnerability. Often, when an exploit is published, the vulnerability is fixed through a patch and the exploit becomes obsolete until newer versions of the software become available Shellcodes any types.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
6 468
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
Gerry Eisenhaur
Exploits:
1
BusinessLevel:
7