0day.today – Biggest Exploit Database in the World.

- We use one main domain: https://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn
GOLD
Administration of this site uses the official contacts. Beware of impostors!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ [email protected] ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Jabber:
Facebook:
Twitter:
Inj3ct0r
You can contact us by:
Inj3ct0r is the ultimate database of exploits and vulnerabilities and a great resource for vulnerability researchers and security professionals.
Our aim is to collect exploits from submittals and various mailing lists and concentrate them in one, easy-to-navigate database.
This was written solely for educational purposes. Use it at your own risk. The author will be not responsible for any damage. // r0073r
0day.today Available within TOR at http://mvfjfugdwgc5uwho.onion
Our aim is to collect exploits from submittals and various mailing lists and concentrate them in one, easy-to-navigate database.
This was written solely for educational purposes. Use it at your own risk. The author will be not responsible for any damage. // r0073r
0day.today Available within TOR at http://mvfjfugdwgc5uwho.onion
Local exploits and vulnerabilities category
A “local exploit” requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
[ local exploits ]
Local exploits and vulnerabilities category
A “local exploit” requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
50
Security Risk High
D
Download
C
CVE-2018-7289
Verified by 0day Admin
free
You can open this exploit for free
Souhail Hammou
Exploits:
3
BusinessLevel:
0
Warnings:
0
71
Security Risk High
D
Download
C
CVE-2018-6947
Verified by 0day Admin
free
You can open this exploit for free
Fidus InfoSecurity
Exploits:
4
BusinessLevel:
0
Warnings:
0
36
Security Risk High
D
Download
C
CVE-2018-6947
Verified by 0day Admin
free
You can open this exploit for free
Fidus InfoSecurity
Exploits:
4
BusinessLevel:
0
Warnings:
0
Microsoft Windows – StorSvc SvcMoveFileInheritSecurity Arbitrary File Creation Privilege Escalation
Comments:
0
149
Security Risk Medium
D
Download
C
CVE-2018-0826
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
701
BusinessLevel:
37
Warnings:
0
99
Security Risk High
D
Download
C
CVE-2018-0821
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
701
BusinessLevel:
37
Warnings:
0
Microsoft Windows – NPFS Symlink Security Feature Bypass/Elevation of Privilege/Dangerous Behavior E
Comments:
0
70
Security Risk High
D
Download
C
CVE-2018-0823
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
701
BusinessLevel:
37
Warnings:
0
Microsoft Windows – Global Reparse Point Security Feature Bypass/Elevation of Privilege Exploit
Comments:
0
81
Security Risk High
D
Download
C
CVE-2018-0822
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
701
BusinessLevel:
37
Warnings:
0
70
Security Risk High
D
Download
C
CVE-2017-6516
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1038
BusinessLevel:
59
Warnings:
1
ABRT – raceabrt Privilege Escalation Exploit
Comments:
0
157
Security Risk High
D
Download
C
CVE-2015-3315
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1038
BusinessLevel:
59
Warnings:
1
Juju-run Agent Privilege Escalation Exploit
Comments:
0
189
Security Risk High
D
Download
C
CVE-2017-9232
Verified by 0day Admin
free
You can open this exploit for free
Brendan Coles
Exploits:
12
BusinessLevel:
4
Warnings:
1
298
Security Risk High
D
Download
C
CVE-2010-3847
CVE-2010-3856
CVE-2010-3856
Verified by 0day Admin
free
You can open this exploit for free
Brendan Coles
Exploits:
12
BusinessLevel:
4
Warnings:
1
303
Security Risk High
D
Download
C
CVE-2010-3847
Verified by 0day Admin
free
You can open this exploit for free
Tavis Ormandy
Exploits:
29
BusinessLevel:
7
Warnings:
0
176
Security Risk High
D
Download
–
Verified by 0day Admin
free
You can open this exploit for free
Matthew Bergin
Exploits:
37
BusinessLevel:
6
Warnings:
0
242
Security Risk Medium
D
Download
C
CVE-2018-10000
CVE-2018-10000
CVE-2018-10000
CVE-2018-10000
CVE-2018-10000
CVE-2018-10000
CVE-2018-10000
CVE-2018-10000
CVE-2018-10000
Verified by 0day Admin
free
You can open this exploit for free
Rene Freingruber
Exploits:
1
BusinessLevel:
0
Warnings:
0
Marked2 – Local File Disclosure Vulnerability
Comments:
0
204
Security Risk Medium
D
Download
–
Verified by 0day Admin
free
You can open this exploit for free
Corben Leo
Exploits:
1
BusinessLevel:
0
Warnings:
0
315
Security Risk Medium
D
Download
C
CVE-2018-6461
Verified by 0day Admin
free
You can open this exploit for free
hyp3rlinx
Exploits:
158
BusinessLevel:
9
Warnings:
2
BOCHS 2.6-5 – Local Buffer Overflow Exploit
Comments:
0
268
Security Risk High
D
Download
–
Verified by 0day Admin
free
You can open this exploit for free
Juan Sacco
Exploits:
37
BusinessLevel:
12
Warnings:
0
379
Security Risk High
D
Download
C
CVE-2018-6593
Verified by 0day Admin
free
You can open this exploit for free
Souhail Hammou
Exploits:
3
BusinessLevel:
0
Warnings:
0
394
Security Risk High
D
Download
C
CVE-2018-0743
Verified by 0day Admin
free
You can open this exploit for free
Saar Amar
Exploits:
1
BusinessLevel:
0
Warnings:
0
systemd (systemd-tmpfiles) < 236 – fs.protected_hardlinks=0 Local Privilege Escalation Vulnerabil
Comments:
0
224
Security Risk High
D
Download
C
CVE-2017-18078
Verified by 0day Admin
free
You can open this exploit for free
Michael Orlitzky
Exploits:
1
BusinessLevel:
0
Warnings:
0
308
Security Risk High
D
Download
C
CVE-2018-5701
Verified by 0day Admin
free
You can open this exploit for free
Parvez Anwar
Exploits:
14
BusinessLevel:
2
Warnings:
0
199
Security Risk High
D
Download
C
CVE-2017-16945
Verified by 0day Admin
free
You can open this exploit for free
Mark Wadham
Exploits:
16
BusinessLevel:
1
Warnings:
0
210
Security Risk High
D
Download
C
CVE-2017-16928
Verified by 0day Admin
free
You can open this exploit for free
Mark Wadham
Exploits:
16
BusinessLevel:
1
Warnings:
0
411
Security Risk High
D
Download
C
CVE-2018-2698
Verified by 0day Admin
free
You can open this exploit for free
SecuriTeam
Exploits:
18
BusinessLevel:
1
Warnings:
0
270
Security Risk High
D
Download
C
CVE-2017-7310
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1038
BusinessLevel:
59
Warnings:
1
274
Security Risk Medium
D
Download
–
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
701
BusinessLevel:
37
Warnings:
0
446
Security Risk High
D
Download
C
CVE-2017-14355
Verified by 0day Admin
free
You can open this exploit for free
Peter Lapp
Exploits:
8
BusinessLevel:
2
Warnings:
0
Docker Sudo Privilege Escalation Exploit
Comments:
0
394
Security Risk Medium
D
Download
–
Verified by 0day Admin
free
You can open this exploit for free
Pype
Exploits:
1
BusinessLevel:
0
Warnings:
0
1 010
Security Risk High
D
Download
C
CVE-2018-10000
Verified by 0day Admin
free
You can open this exploit for free
halfdog
Exploits:
17
BusinessLevel:
4
Warnings:
0
Python smtplib 2.7.11 / 3.4.4 / 3.5.1 – Man In The Middle StartTLS Stripping Vulnerability
Comments:
0
389
Security Risk High
D
Download
C
CVE-2016-0772
Verified by 0day Admin
free
You can open this exploit for free
tintinweb
Exploits:
9
BusinessLevel:
1
Warnings:
0
















How to buy exploit? Two ways to buy required exploit. Currency, that we accept.
What is 0day.today 1337day Gold? How to buy 0day.today 1337day Gold? How to earn 0day.today 1337day Gold?