[ authorization ] [ registration ] [ استعادة ]
اتصل بنا
يمكنكم الاتصال بنا من خلال:
0day.today Exploits Market and 0day Exploits Database
البحث:
 
 
 
الصنف:   المنصة:
 
Price from:   Price to:
 
Author login:   CVE:
The minimum length of a search query is 3 symbols

Search results for exploits with selected filters

[ remote exploits ]

Remote exploits and vulnerabilities category


A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
1 237
Security Risk Medium
R
D
Download
C
CVE-2021-38283
Verified by
مجاني
You can open this exploit for free
ub3rsick
الثغرات:
2
BusinessLevel:
0
2 328
Security Risk Critical
R
D
Download
C
CVE-2024-30850
CVE-2024-31839
Verified by
مجاني
You can open this exploit for free
metasploit
الثغرات:
1635
BusinessLevel:
93
2 602
Security Risk Critical
R
D
Download
C
CVE-2024-3400
Verified by
مجاني
You can open this exploit for free
metasploit
الثغرات:
1635
BusinessLevel:
93
2 692
Security Risk High
R
D
Download
C
CVE-2024-3400
Verified by
مجاني
You can open this exploit for free
Kr0ff
الثغرات:
4
BusinessLevel:
2
2 890
Security Risk Critical
R
D
Download
C
CVE-2024-30850
CVE-2024-31839
Verified by
مجاني
You can open this exploit for free
chebuya
الثغرات:
1
BusinessLevel:
0
2 902
Security Risk High
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
LiquidWorm
الثغرات:
732
BusinessLevel:
46
3 416
Security Risk High
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
semaja2
الثغرات:
1
BusinessLevel:
0
3 226
Security Risk High
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Sean Pesce
الثغرات:
1
BusinessLevel:
0
4 437
Security Risk Low
R
D
Download
C
CVE-2023-6538
Verified by
مجاني
You can open this exploit for free
Arslan Masood
الثغرات:
2
BusinessLevel:
0
5 535
Security Risk Critical
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
LiquidWorm
الثغرات:
732
BusinessLevel:
46
1 766
Security Risk High
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Thomas Heverin
الثغرات:
1
BusinessLevel:
0
3 446
Security Risk Critical
R
D
Download
C
CVE-2023-20198
CVE-2023-20273
Verified by
مجاني
You can open this exploit for free
metasploit
الثغرات:
1635
BusinessLevel:
93
3 492
Security Risk High
R
D
Download
C
CVE-2023-34039
Verified by
مجاني
You can open this exploit for free
metasploit
الثغرات:
1635
BusinessLevel:
93
3 879
Security Risk High
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
RoseSecurity
الثغرات:
5
BusinessLevel:
2
3 863
Security Risk Critical
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Riyan Firmansyah
الثغرات:
1
BusinessLevel:
1
3 938
Security Risk Critical
R
D
Download
C
CVE-2023-33148
Verified by
مجاني
You can open this exploit for free
nu11secur1ty
الثغرات:
215
BusinessLevel:
13
3 862
Security Risk Critical
R
D
Download
C
CVE-2023-33131
Verified by
مجاني
You can open this exploit for free
nu11secur1ty
الثغرات:
215
BusinessLevel:
13
3 990
Security Risk Critical
R
D
Download
C
CVE-2023-28285
Verified by
مجاني
You can open this exploit for free
nu11secur1ty
الثغرات:
215
BusinessLevel:
13
3 761
Security Risk High
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
nu11secur1ty
الثغرات:
215
BusinessLevel:
13
4 155
Security Risk High
R
D
Download
C
CVE-2023-25187
Verified by
مجاني
You can open this exploit for free
Amirhossein Bahramizadeh
الثغرات:
20
BusinessLevel:
2

[ local exploits ]

Local exploits and vulnerabilities category


A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
3 252
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
dhteam
الثغرات:
1
BusinessLevel:
0
3 456
Security Risk Critical
R
D
Download
C
CVE-2024-21338
Verified by
مجاني
You can open this exploit for free
E1 Coders
الثغرات:
2
BusinessLevel:
0
2 741
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Saud Alenazi
الثغرات:
32
BusinessLevel:
3
5 151
Security Risk High
R
D
Download
C
CVE-2024-25003
Verified by
مجاني
You can open this exploit for free
DEFCESCO
الثغرات:
4
BusinessLevel:
0
5 919
Security Risk High
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
hyp3rlinx
الثغرات:
253
BusinessLevel:
17
6 066
Security Risk High
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
LiquidWorm
الثغرات:
732
BusinessLevel:
46
5 666
Security Risk High
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
hyp3rlinx
الثغرات:
253
BusinessLevel:
17
5 440
Security Risk High
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
hyp3rlinx
الثغرات:
253
BusinessLevel:
17
2 592
Security Risk High
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Ahmet Ümit BAYRAM
الثغرات:
75
BusinessLevel:
6
2 134
Security Risk High
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Ahmet Ümit BAYRAM
الثغرات:
75
BusinessLevel:
6
2 296
Security Risk High
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Emad Al-Mousa
الثغرات:
9
BusinessLevel:
1
2 522
Security Risk Critical
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
hyp3rlinx
الثغرات:
253
BusinessLevel:
17
2 956
Security Risk High
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
hyp3rlinx
الثغرات:
253
BusinessLevel:
17
4 768
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Moein Shahabi
الثغرات:
1
BusinessLevel:
0
4 442
Security Risk High
R
D
Download
C
CVE-2023-36874
Verified by
مجاني
You can open this exploit for free
metasploit
الثغرات:
1635
BusinessLevel:
93
4 076
Security Risk Medium
R
D
Download
C
CVE-2023-31468
Verified by
مجاني
You can open this exploit for free
shinnai
الثغرات:
159
BusinessLevel:
17
3 988
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
tmrswrr
الثغرات:
59
BusinessLevel:
4
4 084
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Mr Empy
الثغرات:
13
BusinessLevel:
2
4 141
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
msd0pe
الثغرات:
5
BusinessLevel:
1
4 206
Security Risk Medium
R
D
Download
C
CVE-2023-24892
Verified by
مجاني
You can open this exploit for free
nu11secur1ty
الثغرات:
215
BusinessLevel:
13

[ web applications ]

Webapplication (webapps) exploits and vulnerabilities category


This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
194
Security Risk High
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
bRpsd
الثغرات:
8
BusinessLevel:
5
364
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
tmrswrr
الثغرات:
59
BusinessLevel:
4
300
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
tmrswrr
الثغرات:
59
BusinessLevel:
4
259
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
tmrswrr
الثغرات:
59
BusinessLevel:
4
882
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Jerry Thomas
الثغرات:
2
BusinessLevel:
0
875
Security Risk High
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
tmrswrr
الثغرات:
59
BusinessLevel:
4
949
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Onur Göğebakan
الثغرات:
1
BusinessLevel:
0
599
Security Risk Medium
R
D
Download
C
CVE-2024-36599
Verified by
مجاني
You can open this exploit for free
Aslam Anwar Mahimkar
الثغرات:
3
BusinessLevel:
0
891
Security Risk Medium
R
D
Download
C
CVE-2023-27636
Verified by
مجاني
You can open this exploit for free
Aldi Saputra Wahyudi
الثغرات:
1
BusinessLevel:
0
494
Security Risk High
R
D
Download
C
CVE-2024-5410
CVE-2024-5411
Verified by
مجاني
You can open this exploit for free
Tim Weber
الثغرات:
28
BusinessLevel:
10
962
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
LiquidWorm
الثغرات:
732
BusinessLevel:
46
1 312
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
tmrswrr
الثغرات:
59
BusinessLevel:
4
1 487
Security Risk Medium
R
D
Download
C
CVE-2024-28736
Verified by
مجاني
You can open this exploit for free
Ihsan Cetin
الثغرات:
1
BusinessLevel:
0
1 544
Security Risk Medium
R
D
Download
C
CVE-2024-5230
Verified by
مجاني
You can open this exploit for free
CraCkEr
الثغرات:
93
BusinessLevel:
13
1 621
Security Risk Medium
R
D
Download
C
CVE-2023-23752
Verified by
مجاني
You can open this exploit for free
d4t4s3c
الثغرات:
1
BusinessLevel:
0
1 086
Security Risk Medium
R
D
Download
C
CVE-2024-34241
Verified by
مجاني
You can open this exploit for free
Sergio Medeiros
الثغرات:
1
BusinessLevel:
0
1 780
Security Risk Medium
R
D
Download
C
CVE-2024-3378
Verified by
مجاني
You can open this exploit for free
modrnProph3t
الثغرات:
1
BusinessLevel:
0
1 026
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
liquidsky
الثغرات:
7
BusinessLevel:
3
981
Security Risk Low
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
liquidsky
الثغرات:
7
BusinessLevel:
3
1 129
Security Risk Medium
R
D
Download
C
CVE-2024-4293
Verified by
مجاني
You can open this exploit for free
SoSPiro
الثغرات:
10
BusinessLevel:
1

[ dos / poc ]

DOS exploits and vulnerabilities category


PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.

PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 329
Security Risk Medium
R
D
Download
C
CVE-2024-27686
Verified by
مجاني
You can open this exploit for free
ice-wzl
الثغرات:
1
BusinessLevel:
0
7 070
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Anish Feroz
الثغرات:
3
BusinessLevel:
1
9 069
Security Risk Medium
R
D
Download
C
CVE-2023-31419
Verified by
مجاني
You can open this exploit for free
Touhami Kasbaoui
الثغرات:
6
BusinessLevel:
2
4 546
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Fernando Mengali
الثغرات:
26
BusinessLevel:
3
2 650
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Fernando Mengali
الثغرات:
26
BusinessLevel:
3
5 649
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Milad karimi
الثغرات:
28
BusinessLevel:
4
5 163
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Touhami Kasbaoui
الثغرات:
6
BusinessLevel:
2
4 857
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Rafael Pedrero
الثغرات:
44
BusinessLevel:
5
4 761
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Rafael Pedrero
الثغرات:
44
BusinessLevel:
5
4 579
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Rafael Pedrero
الثغرات:
44
BusinessLevel:
5
5 722
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Stefan Kanthak
الثغرات:
16
BusinessLevel:
5
5 007
Security Risk Medium
R
D
Download
C
CVE-2022-42867
Verified by
مجاني
You can open this exploit for free
Maddie Stone
الثغرات:
1
BusinessLevel:
1
19 268
Security Risk High
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Andres Ramos
الثغرات:
1
BusinessLevel:
1
18 353
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Geovanni Ruiz
الثغرات:
12
BusinessLevel:
2
18 290
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Luis Martínez
الثغرات:
57
BusinessLevel:
7
8 693
Security Risk Medium
R
D
Download
C
CVE-2020-13951
Verified by
مجاني
You can open this exploit for free
SunCSR
الثغرات:
22
BusinessLevel:
3
8 854
Security Risk High
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Cody Martin
الثغرات:
3
BusinessLevel:
2
9 541
Security Risk Medium
R
D
Download
C
CVE-2020-24214
Verified by
مجاني
You can open this exploit for free
Alexei Kojenov
الثغرات:
5
BusinessLevel:
2
9 049
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Qian Chen
الثغرات:
5
BusinessLevel:
2
19 209
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Luis Martínez
الثغرات:
57
BusinessLevel:
7

[ shellcode ]

Shellcode category


In computer security, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called "shellcode" because it typically starts a command shell from which the attacker can control the compromised machine, but any piece of code that performs a similar task can be called shellcode. Because the function of a payload is not limited to merely spawning a shell, some have suggested that the name shellcode is insufficient. Shellcode is commonly written in machine code.

Classification:
There are several methods of classifying exploits. The most common is by how the exploit contacts the vulnerable software. A remote exploit works over a network and exploits the security vulnerability without any prior access to the vulnerable system. A local exploit requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with a client application. Exploits against client applications may also require some interaction with the user and thus may be used in combination with the social engineering method. Another classification is by the action against the vulnerable system; unauthorized data access, arbitrary code execution, and denial of service are examples. Many exploits are designed to provide superuser-level access to a computer system. However, it is also possible to use several exploits, first to gain low-level access, then to escalate privileges repeatedly until one reaches root. Normally a single exploit can only take advantage of a specific software vulnerability. Often, when an exploit is published, the vulnerability is fixed through a patch and the exploit becomes obsolete until newer versions of the software become available Shellcodes any types.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
14 993
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Bobby Cooke
الثغرات:
26
BusinessLevel:
4
8 007
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Bobby Cooke
الثغرات:
26
BusinessLevel:
4
10 936
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Xenofon Vassilakopoulos
الثغرات:
14
BusinessLevel:
3
14 064
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Bobby Cooke
الثغرات:
26
BusinessLevel:
4
15 757
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
antonio
الثغرات:
7
BusinessLevel:
6
12 724
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Jonathan So
الثغرات:
3
BusinessLevel:
9
13 033
Security Risk High
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
strider
الثغرات:
11
BusinessLevel:
3
14 697
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Ken Kitahara
الثغرات:
23
BusinessLevel:
4
14 135
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Ken Kitahara
الثغرات:
23
BusinessLevel:
4
13 974
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Ken Kitahara
الثغرات:
23
BusinessLevel:
4
13 893
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Ken Kitahara
الثغرات:
23
BusinessLevel:
4
14 045
Security Risk Critical
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Ken Kitahara
الثغرات:
23
BusinessLevel:
4
13 914
Security Risk High
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Ray Doyle
الثغرات:
4
BusinessLevel:
3
13 290
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Christophe G
الثغرات:
4
BusinessLevel:
3
12 534
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
zbt
الثغرات:
4
BusinessLevel:
7
12 785
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Osanda Malith Jayathissa
الثغرات:
3
BusinessLevel:
3
12 510
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
0x4ndr3
الثغرات:
7
BusinessLevel:
4
12 721
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Osanda Malith Jayathissa
الثغرات:
3
BusinessLevel:
3
11 484
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Roziul Hasan Khan Shifat
الثغرات:
26
BusinessLevel:
5
11 681
Security Risk High
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Fitzl Csaba
الثغرات:
5
BusinessLevel:
5