0day.today 1337day.com – Größte Exploit-Datenbank der Welt.

Wir benutzen eine Hauptdomain DOMAIN_LINK
Wenn Du den Exploit kaufen, oder für einen Service bezahlen möchtest, musst Du Gold kaufen. Wir wollen nicht, dass Du unsere Seite als ein Werkzeug für Aktivitäten wie Hacking verwendest. Illegale Aktionen, die andere Benutzer oder Webseiten betreffen, für die Du keine Zugriffsrechte hast, führen dazu, dass der Account gebannt und alle Daten von diesem unwiderruflich gelöscht werden.
Die Administratoren dieser Seite benutzen nur die offiziellen Kontaktdaten. Achte auf Betrüger!
- Lies [ Vereinbarung ]
- Lies [ Senden ] Regeln
- Besuche [ FAQ ] page
- [ Registrieren ] Profil
- Bekommen [ GOLD ]
- Wenn Du möchtest [ Verkaufen ]
- Wenn Du möchtest [ Kaufen ]
- Wenn Du vergessen hast [ Account ]
- Fragen [ [email protected] ]
- Anmeldungsseite
- Registrierungsseite
- Seite für Accountwiederherstellung
- FAQ Seite
- Kontakt
- Regeln für Veröffentlichungen
- Vereinbarungsseite
Mail:
Jabber:
Facebook:
Twitter:
Inj3ct0r
You can contact us by:
Inj3ct0r ist die ultimative Datenbank voller Exploits und Schwachstellen und eine fantastische Ressource für Schwachstellenforscher und Sicherheitsspezialisten.
Unser Ziel ist es, Exploits von Einsendungen und diversen Mailinglisten zu sammeln und sie in einer einfach zu durchsuchenden Datenbank zusammenzufassen.
Diese Seite wurde ausschließlich für Bildungszwecke geschrieben. Benutzung auf eigene Verantwortung. Der Autor ist nicht für eventuelle Schäden verantwortlich. // r0073r
Unser Ziel ist es, Exploits von Einsendungen und diversen Mailinglisten zu sammeln und sie in einer einfach zu durchsuchenden Datenbank zusammenzufassen.
Diese Seite wurde ausschließlich für Bildungszwecke geschrieben. Benutzung auf eigene Verantwortung. Der Autor ist nicht für eventuelle Schäden verantwortlich. // r0073r
0day.today 1337day Private exploits and 0day exploits Market
Zero-day exploits target zero-day vulnerabilities. Zero-day vulnerabilities are those for which no official patch has been released by the vendor. This means that no days [zero days] have elapsed between the time the vulnerability was discovered and the time an official patch was made available. Therefore, the administrators have had zero days to fix the flaw. It ceases to be a zero day once a fix is available.
Private category sells private Exploits and Vulnerabilities. Users can buy exploits using Gold [registered users] or using incognito mode [unregistered users], specify only mail to get material.
[ highlight ]
Highlight category
In this category published paid 0day exploits / vulnerabilities worthy of your attention. You can buy, sell and highlighted the material in red for sale. A zero-day (or 0day) attack or threat is an attack that exploits a previously unknown vulnerability in a computer application, one that developers have not had time to address and patch. It is called a “zero-day” because the programmer has had zero days to fix the flaw (in other words, a patch is not available). Once a patch is available, it is no longer a “zero-day exploit”. It is common for individuals or companies who discover zero-day attacks to sell them to government agencies for use in cyberwarfare.
Malware writers are able to exploit zero-day vulnerabilities through several different attack vectors. Web browsers are a particular target because of their widespread distribution and usage. Attackers can also send e-mail attachments, which exploit vulnerabilities in the application opening the attachment. Exploits that take advantage of common file types are listed in databases like US-CERT. Malware can be engineered to take advantage of these file type exploits to compromise attacked systems or steal confidential data such as banking passwords and personal identity information
An attack that takes place immediately after a security vulnerability is announced. If a user discovers a vulnerability, it might wind up on one or two blogs, and the news travels fast. If a software vendor finds it, the tendency is to keep it under wraps until it has a patch to fix it. However, in many cases, vendors have to announce the flaw because users may be able to avoid the problem by steering clear of a Web site or being sure to not open a certain e-mail attachment
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Twitter reset account Private Method 0day Exploit
Positiv:
0
Negativ:
0
Kommentare:
16
36 543
Security Risk Critical
D
Download
–
Verified by

0.281
Open this exploit for 0.281 BTC
Open this exploit for 2 300 GOLD
0day Today Team
Exploits:
271
BusinessLevel:
26
Warnungen:
5
Instagram bypass Access Account Private Method Exploit
Positiv:
0
Negativ:
0
Kommentare:
59
47 991
Security Risk Critical
D
Download
–
Verified by

0.244
Open this exploit for 0.244 BTC
Open this exploit for 2 000 GOLD
smokzz
Exploits:
1
BusinessLevel:
2
Warnungen:
2
SMF 2.1 Beta 2 Remote Code Execution 0day Exploit
Positiv:
0
Negativ:
0
Kommentare:
2
10 300
Security Risk Critical
D
Download
–
Verified by

0.428
Open this exploit for 0.428 BTC
Open this exploit for 3 500 GOLD
Protocol.8
Exploits:
2
BusinessLevel:
2
Warnungen:
2
SMF 2.0.x Remote Code Execution 0day Exploit
Positiv:
0
Negativ:
0
Kommentare:
18
26 250
Security Risk Critical
D
Download
–
Verified by

0.611
Open this exploit for 0.611 BTC
Open this exploit for 5 000 GOLD
Protocol.8
Exploits:
2
BusinessLevel:
2
Warnungen:
2
Elastix PBX 2.x.x Remote Command Execution 0day Exploit
Positiv:
3
Negativ:
1
Kommentare:
6
23 835
Security Risk Critical
D
Download
–
Verified by

0.367
Open this exploit for 0.367 BTC
Open this exploit for 3 000 GOLD
RusH
Exploits:
33
BusinessLevel:
9
Warnungen:
0
[ remote exploits ]
Remote exploits and vulnerabilities category
A “remote exploit” works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Instagram info disclosure (email + phone) 0day Exploit
Positiv:
0
Negativ:
0
Kommentare:
0
4 159
Security Risk High
D
Download
–
Verified by

0.171
Open this exploit for 0.171 BTC
Open this exploit for 1 400 GOLD
HXO1
Exploits:
1
BusinessLevel:
0
Warnungen:
0
iCloud reset mail Account Authentication Elevation Of Privilege 0day Exploit
Positiv:
0
Negativ:
0
Kommentare:
2
3 698
Security Risk Critical
D
Download
–
Verified by

0.55
Open this exploit for 0.55 BTC
Open this exploit for 4 500 GOLD
0day Today Team
Exploits:
271
BusinessLevel:
26
Warnungen:
5
GovRAT 2.0 – FUD unknown RAT with special functions
Positiv:
2
Negativ:
0
Kommentare:
5
1 970
Security Risk Critical
D
Download
–
Not verified yet

0.367
Open this exploit for 0.367 BTC
Open this exploit for 3 000 GOLD
spdrman
Exploits:
3
BusinessLevel:
3
Warnungen:
0
Windows 10 RCE (Sendbox Escape/Bypass ASLR/Bypass DEP) 0day Exploit
Positiv:
0
Negativ:
0
Kommentare:
0
8 610
Security Risk Critical
D
Download
–
Verified by

0.733
Open this exploit for 0.733 BTC
Open this exploit for 6 000 GOLD
0day Today Team
Exploits:
271
BusinessLevel:
26
Warnungen:
5
Google Chrome RCE + Sandbox Escape 0day Exploit
Positiv:
0
Negativ:
0
Kommentare:
7
11 493
Security Risk Critical
D
Download
–
Verified by

0.636
Open this exploit for 0.636 BTC
Open this exploit for 5 200 GOLD
0day Today Team
Exploits:
271
BusinessLevel:
26
Warnungen:
5
Vanilla Forums 2.0.18.7 Remote Code Execution Exploit
Positiv:
0
Negativ:
0
Kommentare:
3
4 692
Security Risk Critical
D
Download
C
CVE-2013-3527
Verified by

0.012
Open this exploit for 0.012 BTC
Open this exploit for 99 GOLD
seven.fire.seven
Exploits:
1
BusinessLevel:
0
Warnungen:
2
Adobe Acrobat Reader DC Memory Corruption Remote Code Execution Exploit
Positiv:
0
Negativ:
0
Kommentare:
14
5 147
Security Risk Critical
D
Download
–
Verified by

0.196
Open this exploit for 0.196 BTC
Open this exploit for 1 600 GOLD
0day Today Team
Exploits:
271
BusinessLevel:
26
Warnungen:
5
Adobe Flash Player MediaPlayer Out-Of-Bounds Access Remote Code Execution Exploit
Positiv:
0
Negativ:
0
Kommentare:
4
3 621
Security Risk Critical
D
Download
C
CVE-2017-2994
Verified by

0.183
Open this exploit for 0.183 BTC
Open this exploit for 1 500 GOLD
0day Today Team
Exploits:
271
BusinessLevel:
26
Warnungen:
5
[ local exploits ]
Local exploits and vulnerabilities category
A “local exploit” requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Apple iOS 11.1.1 kernel DoS Exploit
Positiv:
0
Negativ:
0
Kommentare:
2
4 098
Security Risk High
D
Download
–
Verified by

0.611
Open this exploit for 0.611 BTC
Open this exploit for 5 000 GOLD
muxbear
Exploits:
1
BusinessLevel:
0
Warnungen:
0
Microsoft Office Word 2003+2007+2010 Universal 0day Exploit
Positiv:
0
Negativ:
0
Kommentare:
4
11 936
Security Risk Critical
D
Download
–
Verified by

0.465
Open this exploit for 0.465 BTC
Open this exploit for 3 800 GOLD
0day Today Team
Exploits:
271
BusinessLevel:
26
Warnungen:
5
macOS 10.11.* / 10.12.* Kernel Code Execution – SIP bypass 0day Exploit
Positiv:
0
Negativ:
0
Kommentare:
0
3 804
Security Risk Critical
D
Download
–
Verified by

0.367
Open this exploit for 0.367 BTC
Open this exploit for 3 000 GOLD
macos0day
Exploits:
1
BusinessLevel:
1
Warnungen:
0
PowerPoint 2003/2007/2010 Silent Builder Exploit
Positiv:
0
Negativ:
0
Kommentare:
0
9 119
Security Risk Critical
D
Download
–
Verified by

0.367
Open this exploit for 0.367 BTC
Open this exploit for 3 000 GOLD
0day Today Team
Exploits:
271
BusinessLevel:
26
Warnungen:
5
OS X 10.10.2-10.10.4 Privilege Escalation Exploit 0day
Positiv:
0
Negativ:
0
Kommentare:
5
2 924
Security Risk Critical
D
Download
–
Verified by

0.122
Open this exploit for 0.122 BTC
Open this exploit for 1 000 GOLD
jiehu
Exploits:
1
BusinessLevel:
1
Warnungen:
0
OpenSSH rootkit backdoor tool with ssh sniffer
Positiv:
1
Negativ:
0
Kommentare:
2
20 051
Security Risk Critical
D
Download
–
Verified by

0.011
Open this exploit for 0.011 BTC
Open this exploit for 90 GOLD
florinu
Exploits:
5
BusinessLevel:
3
Warnungen:
0
Microsoft Office 2007/2010 Download and Execute Vulnerability
Positiv:
2
Negativ:
1
Kommentare:
5
14 219
Security Risk Critical
D
Download
–
Verified by

0.183
Open this exploit for 0.183 BTC
Open this exploit for 1 500 GOLD
crash.poc
Exploits:
5
BusinessLevel:
3
Warnungen:
0
Office 2003 SP3, Office 2007 SP2, Office 2011 Stack-based buffer overflow
Positiv:
3
Negativ:
0
Kommentare:
18
12 241
Security Risk Critical
D
Download
C
CVE-2010-3333
Verified by

0.004
Open this exploit for 0.004 BTC
Open this exploit for 30 GOLD
!m0Nk3y_
Exploits:
1
BusinessLevel:
3
Warnungen:
0
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Coinhive – Monero JavaScript Mining Information Disclosure (SecretKey) Vulnerability
Positiv:
0
Negativ:
0
Kommentare:
0
2 278
Security Risk High
D
Download
–
Verified by

0.147
Open this exploit for 0.147 BTC
Open this exploit for 1 200 GOLD
ogcrypto
Exploits:
1
BusinessLevel:
0
Warnungen:
0
INTERMEDIA CONSEIL – Remote Code Execution Exploit
Positiv:
0
Negativ:
0
Kommentare:
0
2 363
Security Risk Critical
D
Download
–
Verified by

0.018
Open this exploit for 0.018 BTC
Open this exploit for 150 GOLD
mr.oz1337
Exploits:
1
BusinessLevel:
0
Warnungen:
0
Paypal bypass email verify logins Vulnerability
Positiv:
0
Negativ:
0
Kommentare:
4
9 654
Security Risk Critical
D
Download
–
Verified by

0.306
Open this exploit for 0.306 BTC
Open this exploit for 2 500 GOLD
lulz0day
Exploits:
2
BusinessLevel:
1
Warnungen:
0
Brazzers Scenes Direct Download Private Video Vulnerability
Positiv:
0
Negativ:
0
Kommentare:
2
8 743
Security Risk High
D
Download
–
Verified by

0.122
Open this exploit for 0.122 BTC
Open this exploit for 1 000 GOLD
shladwani
Exploits:
1
BusinessLevel:
1
Warnungen:
1
Pornhub User Account takeover Privilage Escalation Exploit
Positiv:
0
Negativ:
0
Kommentare:
2
6 346
Security Risk High
D
Download
–
Verified by

0.183
Open this exploit for 0.183 BTC
Open this exploit for 1 500 GOLD
nexcorp
Exploits:
1
BusinessLevel:
1
Warnungen:
0
Wix Remote Email PoC 0day
Positiv:
0
Negativ:
0
Kommentare:
4
4 869
Security Risk High
D
Download
–
Verified by

0.244
Open this exploit for 0.244 BTC
Open this exploit for 2 000 GOLD
acidobinario
Exploits:
1
BusinessLevel:
1
Warnungen:
0
Scuolabook purchased e-books on .pdf format Download Exploit
Positiv:
0
Negativ:
0
Kommentare:
2
4 626
Security Risk Low
D
Download
–
Verified by

0.012
Open this exploit for 0.012 BTC
Open this exploit for 100 GOLD
MrUke
Exploits:
1
BusinessLevel:
1
Warnungen:
0
SMF 2.1 Beta 2 Remote Code Execution 0day Exploit
Positiv:
0
Negativ:
0
Kommentare:
2
10 300
Security Risk Critical
D
Download
–
Verified by

0.428
Open this exploit for 0.428 BTC
Open this exploit for 3 500 GOLD
Protocol.8
Exploits:
2
BusinessLevel:
2
Warnungen:
2
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
OpenSSL OCSP Status Request Extension Unbounded Memory Growth Vulnerability
Positiv:
0
Negativ:
0
Kommentare:
0
3 497
Security Risk High
D
Download
C
CVE-2016-6304
Verified by

0.009
Open this exploit for 0.009 BTC
Open this exploit for 70 GOLD
teneciousD
Exploits:
1
BusinessLevel:
1
Warnungen:
0
Facebook official android apps crash exploit
Positiv:
1
Negativ:
0
Kommentare:
0
9 518
Security Risk High
D
Download
–
Verified by

0.122
Open this exploit for 0.122 BTC
Open this exploit for 1 000 GOLD
wormterm
Exploits:
1
BusinessLevel:
2
Warnungen:
0
Word 2003 SP2 .doc fork bomb on WinXP SP3
Positiv:
0
Negativ:
0
Kommentare:
0
11 611
Security Risk High
D
Download
–
Not verified yet

0.018
Open this exploit for 0.018 BTC
Open this exploit for 150 GOLD
sult4n
Exploits:
1
BusinessLevel:
3
Warnungen:
0
Mozilla FireFox 24/25 All OS Freeze & Crash Exploit
Positiv:
2
Negativ:
0
Kommentare:
3
11 977
Security Risk High
D
Download
–
Verified by

0.004
Open this exploit for 0.004 BTC
Open this exploit for 30 GOLD
The Black Devils
Exploits:
136
BusinessLevel:
13
Warnungen:
0
IOS 7.0.3 freeze & crash exploit
Positiv:
0
Negativ:
0
Kommentare:
1
13 944
Security Risk High
D
Download
–
Verified by

0.005
Open this exploit for 0.005 BTC
Open this exploit for 40 GOLD
XoDer
Exploits:
4
BusinessLevel:
3
Warnungen:
0
LogMeIn Hamachi <= 2.1.0.362 Remote DOS
Positiv:
1
Negativ:
0
Kommentare:
0
16 257
Security Risk High
D
Download
–
Verified by

0.002
Open this exploit for 0.002 BTC
Open this exploit for 20 GOLD
SnakingMax
Exploits:
6
BusinessLevel:
4
Warnungen:
0
Firefox/Chrome/Chromium Multiple Web Browsers (Memory Exhaustion)
Positiv:
0
Negativ:
0
Kommentare:
0
11 748
Security Risk Medium
D
Download
–
Verified by

0.009
Open this exploit for 0.009 BTC
Open this exploit for 70 GOLD
Xianur0
Exploits:
11
BusinessLevel:
6
Warnungen:
0
Apache/IIS/nginx Multiple HTTP Servers (Memory Exhaustion) DoS
Positiv:
13
Negativ:
0
Kommentare:
11
19 788
Security Risk High
D
Download
–
Verified by

0.061
Open this exploit for 0.061 BTC
Open this exploit for 500 GOLD
Xianur0
Exploits:
11
BusinessLevel:
6
Warnungen:
0












How to buy exploit? Two ways to buy required exploit. Currency, that we accept.
and buy required exploit in our database.
What is 0day.today 1337day Gold? How to buy 0day.today 1337day Gold? How to earn 0day.today 1337day Gold?