0day.today - Dunyanin En Buyuk Exploit Veritabani
Bu konuda bilmeniz gerekenler:
Biz sadece bir adet ana domain kullaniyoruz DOMAIN_LINK
Eger exploit satin alacaksaniz ve ya hizmet icin odeme yapacaksaniz, altin almaniz gerekmekte. Biz sitemizi hack amacli kullanmak istemiyoruz, yani her turlu dogru olmayan, kanunsuz ve illegal yapilan eylemler diger hesaplari olumsuz yonde etkileyebilir ve sonrasinda buna yol acan/lar, web sitelerimize ve verilere erisimi tamamen kesilir, banlanir ve hesabini tarafimizca yok edilir.
Sadece bu sitenin yonetimine itibar edin. Sahtelere Dikkat!
Biz sadece bir adet ana domain kullaniyoruz DOMAIN_LINK
Eger exploit satin alacaksaniz ve ya hizmet icin odeme yapacaksaniz, altin almaniz gerekmekte. Biz sitemizi hack amacli kullanmak istemiyoruz, yani her turlu dogru olmayan, kanunsuz ve illegal yapilan eylemler diger hesaplari olumsuz yonde etkileyebilir ve sonrasinda buna yol acan/lar, web sitelerimize ve verilere erisimi tamamen kesilir, banlanir ve hesabini tarafimizca yok edilir.
Sadece bu sitenin yonetimine itibar edin. Sahtelere Dikkat!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Oku [ anlasma ]
- Oku [ Gonder ] kurallar
- Ziyaret et [ SSS ] page
- [ Uye Ol ] profil
- [ FIYAT ]
- Eger istiyorsaniz [ satmak ]
- Eger istiyorsaniz [ almak ]
- Eger kaybederseniz [ Hesap ]
- Herhangi bir sorunuz [ [email protected] ]
- Yetkili sayfa
- Uyelik sayfasi
- Hesap sayfasini geri yukle
- SSS sayfasi
- Iletisim sayfasi
- Paylasim kurallari
- Anlasma sayfasi
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Bize ulasabilirsiniz:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Search results for exploits by request: Microsoft Windows
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 686
Security Risk Critical
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
hyp3rlinx
Exploit:
253
BusinessLevel:
17
5 694
Security Risk Critical
D
Download
C
CVE-2022-44666
Verified by
Ucretsiz
You can open this exploit for free
hyp3rlinx
Exploit:
253
BusinessLevel:
17
9 203
Security Risk High
D
Download
C
CVE-2017-8461
Verified by
Ucretsiz
You can open this exploit for free
metasploit
Exploit:
1626
BusinessLevel:
92
11 112
Security Risk High
D
Download
C
CVE-2020-1313
Verified by
Ucretsiz
You can open this exploit for free
metasploit
Exploit:
1626
BusinessLevel:
92
11 096
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
hyp3rlinx
Exploit:
253
BusinessLevel:
17
12 843
Security Risk Critical
D
Download
C
CVE-2020-0796
Verified by
Ucretsiz
You can open this exploit for free
chompie1337
Exploit:
1
BusinessLevel:
2
12 058
Security Risk Critical
D
Download
C
CVE-2020-1113
Verified by
Ucretsiz
You can open this exploit for free
Sylvain Heiniger
Exploit:
6
BusinessLevel:
4
13 505
Security Risk Critical
D
Download
C
CVE-2020-0796
Verified by
Ucretsiz
You can open this exploit for free
Ventsislav Varbanovski
Exploit:
2
BusinessLevel:
2
14 744
Security Risk Critical
D
Download
C
CVE-2019-0708
Verified by
Ucretsiz
You can open this exploit for free
0xeb-bp
Exploit:
1
BusinessLevel:
2
12 446
Security Risk Critical
D
Download
C
CVE-2015-0009
Verified by
Ucretsiz
You can open this exploit for free
Thomas Zuk
Exploit:
4
BusinessLevel:
3
12 821
Security Risk Critical
D
Download
C
CVE-2015-0008
Verified by
Ucretsiz
You can open this exploit for free
Thomas Zuk
Exploit:
4
BusinessLevel:
3
13 685
Security Risk Critical
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
metasploit
Exploit:
1626
BusinessLevel:
92
13 766
Security Risk Critical
D
Download
C
CVE-2019-0708
Verified by
Ucretsiz
You can open this exploit for free
metasploit
Exploit:
1626
BusinessLevel:
92
Microsoft Internet Explorer Windows 10 1809 17763.316 - Scripting Engine Memory Corruption Exploit
Yorumlar:
0
8 752
Security Risk High
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Simon Zuckerbraun
Exploit:
2
BusinessLevel:
3
Microsoft Windows VCF or Contact File - URL Manipulation-Spoof Arbitrary Code Execution Exploit
Yorumlar:
0
8 656
Security Risk Critical
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Eduardo Braun Prado
Exploit:
16
BusinessLevel:
5
12 648
Security Risk Critical
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
hyp3rlinx
Exploit:
253
BusinessLevel:
17
5 829
Security Risk Critical
D
Download
C
CVE-2017-11885
Verified by
Ucretsiz
You can open this exploit for free
vportal
Exploit:
8
BusinessLevel:
4
Microsoft Windows SMB MS17-010 EternalRomance / EternalSynergy / EternalChampion Remote Code Executi
Yorumlar:
0
7 508
Security Risk Critical
D
Download
C
CVE-2017-0143
CVE-2017-0146
CVE-2017-0147
CVE-2017-0146
CVE-2017-0147
Verified by
Ucretsiz
You can open this exploit for free
metasploit
Exploit:
1626
BusinessLevel:
92
6 280
Security Risk Critical
D
Download
C
CVE-2015-0095
CVE-2017-8464
CVE-2017-8464
Verified by
Ucretsiz
You can open this exploit for free
metasploit
Exploit:
1626
BusinessLevel:
92
6 801
Security Risk Critical
D
Download
C
CVE-2017-8759
Verified by
Ucretsiz
You can open this exploit for free
Voulnet
Exploit:
2
BusinessLevel:
3
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
2 304
Security Risk Critical
D
Download
C
CVE-2024-21338
Verified by
Ucretsiz
You can open this exploit for free
E1 Coders
Exploit:
2
BusinessLevel:
0
Microsoft Windows Defender / Trojan.Win32/Powessere.G - Detection Mitigation Bypass Vulnerability
Yorumlar:
0
4 810
Security Risk High
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
hyp3rlinx
Exploit:
253
BusinessLevel:
17
4 579
Security Risk High
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
hyp3rlinx
Exploit:
253
BusinessLevel:
17
4 332
Security Risk High
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
hyp3rlinx
Exploit:
253
BusinessLevel:
17
2 364
Security Risk Critical
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
hyp3rlinx
Exploit:
253
BusinessLevel:
17
4 635
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Moein Shahabi
Exploit:
1
BusinessLevel:
0
10 340
Security Risk Critical
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
hyp3rlinx
Exploit:
253
BusinessLevel:
17
9 832
Security Risk High
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
hyp3rlinx
Exploit:
253
BusinessLevel:
17
10 313
Security Risk Critical
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
usiegl00
Exploit:
1
BusinessLevel:
1
10 316
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Eduardo Braun Prado
Exploit:
16
BusinessLevel:
5
10 290
Security Risk Low
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Eduardo Braun Prado
Exploit:
16
BusinessLevel:
5
9 290
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
hyp3rlinx
Exploit:
253
BusinessLevel:
17
8 733
Security Risk Critical
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
metasploit
Exploit:
1626
BusinessLevel:
92
8 508
Security Risk High
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Stefan Kanthak
Exploit:
16
BusinessLevel:
4
8 426
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Marc Nimmerrichte
Exploit:
1
BusinessLevel:
2
8 491
Security Risk High
D
Download
C
CVE-2021-26891
Verified by
Ucretsiz
You can open this exploit for free
James Forshaw
Exploit:
6
BusinessLevel:
5
8 685
Security Risk High
D
Download
C
CVE-2020-1054
Verified by
Ucretsiz
You can open this exploit for free
metasploit
Exploit:
1626
BusinessLevel:
92
8 619
Security Risk High
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
nu11secur1ty
Exploit:
215
BusinessLevel:
13
8 519
Security Risk High
D
Download
C
CVE-2020-1337
CVE-2020-17001
CVE-2020-17001
Verified by
Ucretsiz
You can open this exploit for free
James Forshaw
Exploit:
6
BusinessLevel:
5
9 639
Security Risk High
D
Download
C
CVE-2019-1458
Verified by
Ucretsiz
You can open this exploit for free
metasploit
Exploit:
1626
BusinessLevel:
92
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 070
Security Risk Medium
D
Download
C
CVE-2018-0878
Verified by
Ucretsiz
You can open this exploit for free
Nabeel Ahmed
Exploit:
6
BusinessLevel:
4
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
5 509
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Milad karimi
Exploit:
28
BusinessLevel:
4
Microsoft Windows UTF-8 Buffer Overruns Exploit
Yorumlar:
0
5 591
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Stefan Kanthak
Exploit:
16
BusinessLevel:
4
Microsoft Windows 10 (1903/1909) - SMBGhost SMB3.1.1 SMB2_COMPRESSION_CAPABILITIES Buffer Overflow
Yorumlar:
0
14 863
Security Risk Medium
D
Download
C
CVE-2020-0796
Verified by
Ucretsiz
You can open this exploit for free
eerykitty
Exploit:
1
BusinessLevel:
2
Microsoft Windows VCF Denial Of Service Exploit
Yorumlar:
0
15 175
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
hyp3rlinx
Exploit:
253
BusinessLevel:
17
12 807
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
vportal
Exploit:
8
BusinessLevel:
4
Microsoft Windows cryptoapi - SymCrypt Modular Inverse Algorithm Denial of Service Exploit
Yorumlar:
0
13 519
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
1019
BusinessLevel:
56
13 523
Security Risk High
D
Download
C
CVE-2019-0708
Verified by
Ucretsiz
You can open this exploit for free
RAMELLA Sebastien
Exploit:
1
BusinessLevel:
2
12 858
Security Risk Medium
D
Download
C
CVE-2019-0943
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
1019
BusinessLevel:
56
Microsoft Windows - CmpAddRemoveContainerToCLFSLog Arbitrary File/Directory Creation Exploit
Yorumlar:
0
12 715
Security Risk Medium
D
Download
C
CVE-2019-0959
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
1019
BusinessLevel:
56
14 090
Security Risk High
D
Download
C
CVE-2019-0708
Verified by
Ucretsiz
You can open this exploit for free
Spencer
Exploit:
1
BusinessLevel:
3
11 689
Security Risk Medium
D
Download
C
CVE-2019-0808
Verified by
Ucretsiz
You can open this exploit for free
ze0r
Exploit:
2
BusinessLevel:
7
Microsoft Windows 10 - RestrictedErrorInfo Unmarshal Section Handle Use-After-Free Exploit
Yorumlar:
0
6 951
Security Risk Medium
D
Download
C
CVE-2019-0570
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
1019
BusinessLevel:
56
4 350
Security Risk Medium
D
Download
C
CVE-2018-8631
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
1019
BusinessLevel:
56
3 725
Security Risk Medium
D
Download
C
CVE-2018-8411
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
1019
BusinessLevel:
56
4 164
Security Risk Medium
D
Download
C
CVE-2018-8410
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
1019
BusinessLevel:
56
3 984
Security Risk Medium
D
Download
C
CVE-2018-8449
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
1019
BusinessLevel:
56
4 836
Security Risk High
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Ghaaf
Exploit:
1
BusinessLevel:
6
4 250
Security Risk High
D
Download
C
CVE-2018-8353
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
1019
BusinessLevel:
56
4 770
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
vportal
Exploit:
8
BusinessLevel:
4
4 909
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Victor Portal Gonzalez
Exploit:
1
BusinessLevel:
3