0day.today - Dunyanin En Buyuk Exploit Veritabani
Bu konuda bilmeniz gerekenler:
Biz sadece bir adet ana domain kullaniyoruz DOMAIN_LINK
Eger exploit satin alacaksaniz ve ya hizmet icin odeme yapacaksaniz, altin almaniz gerekmekte. Biz sitemizi hack amacli kullanmak istemiyoruz, yani her turlu dogru olmayan, kanunsuz ve illegal yapilan eylemler diger hesaplari olumsuz yonde etkileyebilir ve sonrasinda buna yol acan/lar, web sitelerimize ve verilere erisimi tamamen kesilir, banlanir ve hesabini tarafimizca yok edilir.
Sadece bu sitenin yonetimine itibar edin. Sahtelere Dikkat!
Biz sadece bir adet ana domain kullaniyoruz DOMAIN_LINK
Eger exploit satin alacaksaniz ve ya hizmet icin odeme yapacaksaniz, altin almaniz gerekmekte. Biz sitemizi hack amacli kullanmak istemiyoruz, yani her turlu dogru olmayan, kanunsuz ve illegal yapilan eylemler diger hesaplari olumsuz yonde etkileyebilir ve sonrasinda buna yol acan/lar, web sitelerimize ve verilere erisimi tamamen kesilir, banlanir ve hesabini tarafimizca yok edilir.
Sadece bu sitenin yonetimine itibar edin. Sahtelere Dikkat!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Oku [ anlasma ]
- Oku [ Gonder ] kurallar
- Ziyaret et [ SSS ] page
- [ Uye Ol ] profil
- [ FIYAT ]
- Eger istiyorsaniz [ satmak ]
- Eger istiyorsaniz [ almak ]
- Eger kaybederseniz [ Hesap ]
- Herhangi bir sorunuz [ [email protected] ]
- Yetkili sayfa
- Uyelik sayfasi
- Hesap sayfasini geri yukle
- SSS sayfasi
- Iletisim sayfasi
- Paylasim kurallari
- Anlasma sayfasi
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Bize ulasabilirsiniz:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Search results for exploits by request: MP3
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 529
Security Risk High
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
metasploit
Exploit:
1633
BusinessLevel:
92
4 938
Security Risk Unsored
D
Download
-
Not verified yet
Ucretsiz
You can open this exploit for free
KedAns-Dz
Exploit:
292
BusinessLevel:
24
4 696
Security Risk Unsored
D
Download
-
Not verified yet
Ucretsiz
You can open this exploit for free
indoushka
Exploit:
453
BusinessLevel:
33
4 140
Security Risk Unsored
D
Download
-
Not verified yet
Ucretsiz
You can open this exploit for free
indoushka
Exploit:
453
BusinessLevel:
33
4 560
Security Risk Unsored
D
Download
-
Not verified yet
Ucretsiz
You can open this exploit for free
MadjiX
Exploit:
22
BusinessLevel:
8
RSP MP3 Player OCX 3.2 ActiveX Buffer Overflow
Yorumlar:
0
4 543
Security Risk Unsored
D
Download
-
Not verified yet
Ucretsiz
You can open this exploit for free
Blake
Exploit:
52
BusinessLevel:
10
WsMp3d 0.x Remote Root Heap Overflow Exploit
Yorumlar:
0
3 857
Security Risk Unsored
D
Download
-
Not verified yet
Ucretsiz
You can open this exploit for free
Xpl017Elz
Exploit:
11
BusinessLevel:
11
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
6 713
Security Risk High
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
George Washington
Exploit:
1
BusinessLevel:
0
MP3 Convert Lord V1.0 Local Seh Exploit
Yorumlar:
0
5 647
Security Risk Low
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Achilles
Exploit:
42
BusinessLevel:
8
CD MP3 Terminator V2.07 Local Seh Exploit
Yorumlar:
0
5 883
Security Risk Low
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Achilles
Exploit:
42
BusinessLevel:
8
8 895
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Achilles
Exploit:
42
BusinessLevel:
8
8 402
Security Risk High
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
ZwX
Exploit:
91
BusinessLevel:
9
8 399
Security Risk Critical
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Vincent Wolterman
Exploit:
2
BusinessLevel:
2
ASX to MP3 converter 3.1.3.7.2010.11.05 - (.wax) Local Buffer Overflow (DEP,ASLR Bypass) Exploit
Yorumlar:
0
8 722
Security Risk High
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Paras Bhatia
Exploit:
11
BusinessLevel:
3
8 925
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Eduard Palisek
Exploit:
1
BusinessLevel:
2
7 554
Security Risk High
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Felipe Winsnes
Exploit:
14
BusinessLevel:
3
10 313
Security Risk High
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
metasploit
Exploit:
1633
BusinessLevel:
92
6 107
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
max7253
Exploit:
2
BusinessLevel:
2
3 598
Security Risk High
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Manpreet Singh Kheberi
Exploit:
1
BusinessLevel:
3
3 587
Security Risk High
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Matteo Malvica
Exploit:
8
BusinessLevel:
3
4 098
Security Risk High
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Gionathan Reale
Exploit:
42
BusinessLevel:
5
4 176
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Mr.0&1IRIH
Exploit:
1
BusinessLevel:
3
5 140
Security Risk High
D
Download
C
CVE-2015-7243
Verified by
Ucretsiz
You can open this exploit for free
metasploit
Exploit:
1633
BusinessLevel:
92
3 867
Security Risk High
D
Download
C
CVE-2017-15083
Verified by
Ucretsiz
You can open this exploit for free
Nitesh Shilpkar
Exploit:
1
BusinessLevel:
3
3 806
Security Risk High
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Anurag Srivastava
Exploit:
22
BusinessLevel:
5
4 015
Security Risk High
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
malwrforensics
Exploit:
6
BusinessLevel:
4
4 517
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
ZwX
Exploit:
91
BusinessLevel:
9
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
WordPress Ocim MP3 Plugin - SQL Injection
Yorumlar:
0
3 026
Security Risk High
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
xevil
Exploit:
1
BusinessLevel:
4
3 576
Security Risk High
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
KnocKout
Exploit:
99
BusinessLevel:
13
3 565
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Larry Cashdollar
Exploit:
62
BusinessLevel:
10
5 800
Security Risk High
D
Download
-
Not verified yet
Ucretsiz
You can open this exploit for free
Sammy FORGIT
Exploit:
121
BusinessLevel:
12
SoftMP3 SQL Injection Vulnerability
Yorumlar:
0
3 635
Security Risk Unsored
D
Download
-
Not verified yet
Ucretsiz
You can open this exploit for free
mArTi
Exploit:
1
BusinessLevel:
7
Mp3 Online Id Tag Editor RFI Vulnerability
Yorumlar:
0
3 997
Security Risk Unsored
D
Download
-
Not verified yet
Ucretsiz
You can open this exploit for free
indoushka
Exploit:
453
BusinessLevel:
33
Mp3 MuZik Data Base Download Vulnerability
Yorumlar:
0
4 080
Security Risk Unsored
D
Download
-
Not verified yet
Ucretsiz
You can open this exploit for free
indoushka
Exploit:
453
BusinessLevel:
33
unsorted
3 847
Security Risk Unsored
D
Download
-
Not verified yet
Ucretsiz
You can open this exploit for free
Thunder
Exploit:
4
BusinessLevel:
10
unsorted
3 508
Security Risk Unsored
D
Download
-
Not verified yet
Ucretsiz
You can open this exploit for free
Thunder
Exploit:
4
BusinessLevel:
10
unsorted
3 485
Security Risk Unsored
D
Download
-
Not verified yet
Ucretsiz
You can open this exploit for free
Thunder
Exploit:
4
BusinessLevel:
10
unsorted
3 061
Security Risk Unsored
D
Download
-
Not verified yet
Ucretsiz
You can open this exploit for free
IRCRASH
Exploit:
62
BusinessLevel:
11
unsorted
3 225
Security Risk Unsored
D
Download
-
Not verified yet
Ucretsiz
You can open this exploit for free
Crackers_Child
Exploit:
31
BusinessLevel:
11
unsorted
3 291
Security Risk Unsored
D
Download
-
Not verified yet
Ucretsiz
You can open this exploit for free
NoGe
Exploit:
59
BusinessLevel:
11
unsorted
3 078
Security Risk Unsored
D
Download
-
Not verified yet
Ucretsiz
You can open this exploit for free
NeoMorphS
Exploit:
1
BusinessLevel:
9
unsorted
3 211
Security Risk Unsored
D
Download
-
Not verified yet
Ucretsiz
You can open this exploit for free
xoron
Exploit:
108
BusinessLevel:
14
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
12 382
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Mohan Ravichandran
Exploit:
5
BusinessLevel:
3
11 893
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Alejandra Sánchez
Exploit:
36
BusinessLevel:
5
AnMing MP3 CD Burner 2.0 Local Dos Exploit
Yorumlar:
0
11 478
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Achilles
Exploit:
42
BusinessLevel:
8
9 974
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Alejandra Sánchez
Exploit:
36
BusinessLevel:
5
3 667
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Gionathan Reale
Exploit:
42
BusinessLevel:
5
3 041
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Kevin McGuigan
Exploit:
5
BusinessLevel:
4
libmad 0.15.1b - mp3 Memory Corruption Exploit
Yorumlar:
0
4 506
Security Risk High
D
Download
C
CVE-2017-11552
Verified by
Ucretsiz
You can open this exploit for free
qflb.wu
Exploit:
14
BusinessLevel:
4
Banshee 2.6.2 - '.mp3' Crash (PoC)
Yorumlar:
0
3 160
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Ilca Lucian
Exploit:
1
BusinessLevel:
4
3 134
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Charley Celice
Exploit:
3
BusinessLevel:
4
3 213
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
INSECT.B
Exploit:
4
BusinessLevel:
4
PotPlayer 1.6.5x - '.mp3' Crash (PoC)
Yorumlar:
0
3 430
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Shantanu Khandelwal
Exploit:
4
BusinessLevel:
4
3 908
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
ZwX
Exploit:
91
BusinessLevel:
9
4 216
Security Risk High
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Andrea Sindoni
Exploit:
5
BusinessLevel:
5
jetAudio 8.1.3 Basic (mp3) - Crash POC
Yorumlar:
0
4 986
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Drozdova Liudmila
Exploit:
2
BusinessLevel:
5
4 813
Security Risk High
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Akin Tosunlar
Exploit:
2
BusinessLevel:
6
4 314
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
G0li47h
Exploit:
1
BusinessLevel:
6
BestPlayRadio v1.0 (.mp3) Crash PoC
Yorumlar:
0
4 763
Security Risk Low
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
The Black Devils
Exploit:
135
BusinessLevel:
16
4 556
Security Risk High
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
metacom
Exploit:
56
BusinessLevel:
9
Hiro Player 1.6.0 (.mp3) Local Crash PoC
Yorumlar:
0
4 232
Security Risk Medium
D
Download
-
Not verified yet
Ucretsiz
You can open this exploit for free
DaOne
Exploit:
78
BusinessLevel:
10
4 627
Security Risk Medium
D
Download
-
Not verified yet
Ucretsiz
You can open this exploit for free
Dark-Puzzle
Exploit:
32
BusinessLevel:
8