0day.today – Biggest Exploit Database in the World.

- We use one main domain: https://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn
GOLD
Administration of this site uses the official contacts. Beware of impostors!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ [email protected] ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Jabber:
Facebook:
Twitter:
Inj3ct0r
You can contact us by:
Inj3ct0r is the ultimate database of exploits and vulnerabilities and a great resource for vulnerability researchers and security professionals.
Our aim is to collect exploits from submittals and various mailing lists and concentrate them in one, easy-to-navigate database.
This was written solely for educational purposes. Use it at your own risk. The author will be not responsible for any damage. // r0073r
0day.today Available within TOR at http://mvfjfugdwgc5uwho.onion
Our aim is to collect exploits from submittals and various mailing lists and concentrate them in one, easy-to-navigate database.
This was written solely for educational purposes. Use it at your own risk. The author will be not responsible for any damage. // r0073r
0day.today Available within TOR at http://mvfjfugdwgc5uwho.onion
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
68
Security Risk Medium
D
Download
–
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
681
BusinessLevel:
36
Warnings:
0
WebKit – detachWrapper Use-After-Free Exploit
Comments:
0
68
Security Risk Medium
D
Download
C
CVE-2018-4089
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
681
BusinessLevel:
36
Warnings:
0
LibRaw 0.18.7 Denial Of Service Vulnerability
Comments:
0
78
Security Risk Medium
D
Download
C
CVE-2018-5800
CVE-2018-5801
CVE-2018-5802
CVE-2018-5801
CVE-2018-5802
Verified by 0day Admin
free
You can open this exploit for free
Laurent Delosieres
Exploits:
3
BusinessLevel:
0
Warnings:
0
71
Security Risk High
D
Download
–
Verified by 0day Admin
free
You can open this exploit for free
sec-consult
Exploits:
13
BusinessLevel:
3
Warnings:
0
99
Security Risk Medium
D
Download
–
Verified by 0day Admin
free
You can open this exploit for free
Miguel Mendez Z
Exploits:
2
BusinessLevel:
0
Warnings:
0
129
Security Risk Medium
D
Download
C
CVE-2018-4090
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
681
BusinessLevel:
36
Warnings:
0
Artifex MuJS 1.0.2 – Integer Overflow Exploit
Comments:
0
121
Security Risk Medium
D
Download
C
CVE-2018-5759
Verified by 0day Admin
free
You can open this exploit for free
Andrea Sindoni
Exploits:
5
BusinessLevel:
1
Warnings:
0
Artifex MuJS 1.0.2 – Denial of Service Exploit
Comments:
0
125
Security Risk Medium
D
Download
C
CVE-2018-6191
Verified by 0day Admin
free
You can open this exploit for free
Andrea Sindoni
Exploits:
5
BusinessLevel:
1
Warnings:
0
210
Security Risk Critical
D
Download
C
CVE-2018-4088
CVE-2018-4089
CVE-2018-4096
CVE-2017-7153
CVE-2017-7160
CVE-2017-7161
CVE-2017-7165
CVE-2017-13884
CVE-2017-13885
CVE-2018-4089
CVE-2018-4096
CVE-2017-7153
CVE-2017-7160
CVE-2017-7161
CVE-2017-7165
CVE-2017-13884
CVE-2017-13885
Verified by 0day Admin
free
You can open this exploit for free
bot
Exploits:
91
BusinessLevel:
7
Warnings:
0
131
Security Risk Medium
D
Download
C
CVE-2014-1201
Verified by 0day Admin
free
You can open this exploit for free
Pedro Ribeiro
Exploits:
43
BusinessLevel:
4
Warnings:
0
MixPad 5.00 – Buffer Overflow Exploit
Comments:
0
346
Security Risk Medium
D
Download
–
Verified by 0day Admin
free
You can open this exploit for free
bzyo
Exploits:
5
BusinessLevel:
0
Warnings:
0
RAVPower 2.000.056 – Memory Disclosure Exploit
Comments:
0
394
Security Risk Medium
D
Download
C
CVE-2018-5319
Verified by 0day Admin
free
You can open this exploit for free
Daniele Linguaglossa
Exploits:
6
BusinessLevel:
2
Warnings:
0
macOS 10.13 (17A365) – Kernel Memory Disclosure due to Lack of Bounds Checking in AppleIntelCapriCon
Comments:
0
211
Security Risk Medium
D
Download
C
CVE-2017-13878
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
681
BusinessLevel:
36
Warnings:
0
222
Security Risk Medium
D
Download
C
CVE-2017-12718
Verified by 0day Admin
free
You can open this exploit for free
Scott Gayou
Exploits:
1
BusinessLevel:
0
Warnings:
0
246
Security Risk Medium
D
Download
C
CVE-2018-0776
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
681
BusinessLevel:
36
Warnings:
0
267
Security Risk Medium
D
Download
C
CVE-2018-0780
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
681
BusinessLevel:
36
Warnings:
0
179
Security Risk Medium
D
Download
C
CVE-2018-0777
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
681
BusinessLevel:
36
Warnings:
0
189
Security Risk Medium
D
Download
C
CVE-2018-0775
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
681
BusinessLevel:
36
Warnings:
0
177
Security Risk Medium
D
Download
C
CVE-2018-0774
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
681
BusinessLevel:
36
Warnings:
0
Microsoft Edge Chakra – JavascriptGeneratorFunction::GetPropertyBuiltIns Type Confusion Exploit
Comments:
0
183
Security Risk Medium
D
Download
C
CVE-2017-11914
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
681
BusinessLevel:
36
Warnings:
0
161
Security Risk Medium
D
Download
C
CVE-2018-0769
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
681
BusinessLevel:
36
Warnings:
0
208
Security Risk Medium
D
Download
–
Verified by 0day Admin
free
You can open this exploit for free
ScrR1pTK1dd13
Exploits:
12
BusinessLevel:
1
Warnings:
0
ZyXEL P-660HW UDP Denial Of Service Exploit
Comments:
0
261
Security Risk Medium
D
Download
C
CVE-2018-5330
Verified by 0day Admin
free
You can open this exploit for free
Hosein Askari
Exploits:
8
BusinessLevel:
1
Warnings:
0
PyroBatchFTP < 3.19 – Buffer Overflow Exploit
Comments:
0
201
Security Risk Medium
D
Download
–
Verified by 0day Admin
free
You can open this exploit for free
Manuel Garcia Cardenas
Exploits:
20
BusinessLevel:
3
Warnings:
0
205
Security Risk Medium
D
Download
C
CVE-2017-7154
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
681
BusinessLevel:
36
Warnings:
0
Kentico CMS 11.0 – Buffer Overflow Vulnerability
Comments:
0
918
Security Risk Medium
D
Download
C
CVE-2018-5282
Verified by 0day Admin
free
You can open this exploit for free
bot
Exploits:
91
BusinessLevel:
7
Warnings:
0
Android – Hardware Service Manager Arbitrary Service Replacement due to getpidcon Exploit
Comments:
0
417
Security Risk High
D
Download
C
CVE-2017-13209
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
681
BusinessLevel:
36
Warnings:
0
Microsoft Windows SMB Server (v1 and v2) – Mount Point Arbitrary Device Open Privilege Escalation Ex
Comments:
0
742
Security Risk High
D
Download
C
CVE-2018-0749
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
681
BusinessLevel:
36
Warnings:
0
393
Security Risk Medium
D
Download
C
CVE-2018-0748
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
681
BusinessLevel:
36
Warnings:
0
Microsoft Windows – NtImpersonateAnonymousToken AC to Non-AC Privilege Escalation Exploit
Comments:
0
165
Security Risk Medium
D
Download
C
CVE-2018-0751
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
681
BusinessLevel:
36
Warnings:
0
















How to buy exploit? Two ways to buy required exploit. Currency, that we accept.
What is 0day.today 1337day Gold? How to buy 0day.today 1337day Gold? How to earn 0day.today 1337day Gold?