0day.today - Dunyanin En Buyuk Exploit Veritabani
Bu konuda bilmeniz gerekenler:
Biz sadece bir adet ana domain kullaniyoruz DOMAIN_LINK
Eger exploit satin alacaksaniz ve ya hizmet icin odeme yapacaksaniz, altin almaniz gerekmekte. Biz sitemizi hack amacli kullanmak istemiyoruz, yani her turlu dogru olmayan, kanunsuz ve illegal yapilan eylemler diger hesaplari olumsuz yonde etkileyebilir ve sonrasinda buna yol acan/lar, web sitelerimize ve verilere erisimi tamamen kesilir, banlanir ve hesabini tarafimizca yok edilir.
Sadece bu sitenin yonetimine itibar edin. Sahtelere Dikkat!
Biz sadece bir adet ana domain kullaniyoruz DOMAIN_LINK
Eger exploit satin alacaksaniz ve ya hizmet icin odeme yapacaksaniz, altin almaniz gerekmekte. Biz sitemizi hack amacli kullanmak istemiyoruz, yani her turlu dogru olmayan, kanunsuz ve illegal yapilan eylemler diger hesaplari olumsuz yonde etkileyebilir ve sonrasinda buna yol acan/lar, web sitelerimize ve verilere erisimi tamamen kesilir, banlanir ve hesabini tarafimizca yok edilir.
Sadece bu sitenin yonetimine itibar edin. Sahtelere Dikkat!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Oku [ anlasma ]
- Oku [ Gonder ] kurallar
- Ziyaret et [ SSS ] page
- [ Uye Ol ] profil
- [ FIYAT ]
- Eger istiyorsaniz [ satmak ]
- Eger istiyorsaniz [ almak ]
- Eger kaybederseniz [ Hesap ]
- Herhangi bir sorunuz [ [email protected] ]
- Yetkili sayfa
- Uyelik sayfasi
- Hesap sayfasini geri yukle
- SSS sayfasi
- Iletisim sayfasi
- Paylasim kurallari
- Anlasma sayfasi
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Bize ulasabilirsiniz:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
3 758
Security Risk Critical
D
Download
C
CVE-2023-42793
Verified by
Ucretsiz
You can open this exploit for free
ByteHunter
Exploit:
5
BusinessLevel:
0
3 768
Security Risk Critical
D
Download
C
CVE-2023-34060
Verified by
Ucretsiz
You can open this exploit for free
Abdualhadi khalifa
Exploit:
5
BusinessLevel:
0
TP-Link JetStream Smart Switch TL-SG2210P 5.0 Build 20211201 Privilege Escalation Vulnerability
Yorumlar:
0
5 621
Security Risk Medium
D
Download
C
CVE-2023-43318
Verified by
Ucretsiz
You can open this exploit for free
Shahnawaz Shaikh
Exploit:
1
BusinessLevel:
0
5 365
Security Risk Critical
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
LiquidWorm
Exploit:
730
BusinessLevel:
46
4 276
Security Risk Critical
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
LiquidWorm
Exploit:
730
BusinessLevel:
46
3 396
Security Risk Critical
D
Download
C
CVE-2023-46454
Verified by
Ucretsiz
You can open this exploit for free
cyberaz0r
Exploit:
3
BusinessLevel:
0
3 273
Security Risk Critical
D
Download
C
CVE-2023-46456
Verified by
Ucretsiz
You can open this exploit for free
cyberaz0r
Exploit:
3
BusinessLevel:
0
3 187
Security Risk High
D
Download
C
CVE-2023-46455
Verified by
Ucretsiz
You can open this exploit for free
cyberaz0r
Exploit:
3
BusinessLevel:
0
3 260
Security Risk High
D
Download
C
CVE-2023-46916
Verified by
Ucretsiz
You can open this exploit for free
Alok kumar
Exploit:
1
BusinessLevel:
0
3 248
Security Risk High
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Amirhossein Bahramizadeh
Exploit:
20
BusinessLevel:
1
BoidCMS 2.0.0 Command Injection Exploit
Yorumlar:
0
4 345
Security Risk Critical
D
Download
C
CVE-2023-38836
Verified by
Ucretsiz
You can open this exploit for free
metasploit
Exploit:
1626
BusinessLevel:
92
3 534
Security Risk Critical
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
LiquidWorm
Exploit:
730
BusinessLevel:
46
2 503
Security Risk High
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
decrazyo
Exploit:
1
BusinessLevel:
0
1 698
Security Risk Low
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
LiquidWorm
Exploit:
730
BusinessLevel:
46
2 277
Security Risk Critical
D
Download
C
CVE-2023-47218
Verified by
Ucretsiz
You can open this exploit for free
metasploit
Exploit:
1626
BusinessLevel:
92
2 194
Security Risk Critical
D
Download
C
CVE-2023-36661
CVE-2024-21887
CVE-2024-21893
CVE-2024-21887
CVE-2024-21893
Verified by
Ucretsiz
You can open this exploit for free
metasploit
Exploit:
1626
BusinessLevel:
92
Kafka UI 0.7.1 Command Injection Exploit
Yorumlar:
0
2 402
Security Risk Critical
D
Download
C
CVE-2023-52251
Verified by
Ucretsiz
You can open this exploit for free
metasploit
Exploit:
1626
BusinessLevel:
92
2 227
Security Risk High
D
Download
C
CVE-2024-22318
Verified by
Ucretsiz
You can open this exploit for free
hyp3rlinx
Exploit:
253
BusinessLevel:
17
Zyxel zysh - Format string Exploit
Yorumlar:
0
2 074
Security Risk Critical
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Marco Ivaldi
Exploit:
66
BusinessLevel:
13
KiTTY 0.76.1.13 Command Injection Exploit
Yorumlar:
0
2 534
Security Risk High
D
Download
C
CVE-2024-23749
Verified by
Ucretsiz
You can open this exploit for free
DEFCESCO
Exploit:
4
BusinessLevel:
0
2 190
Security Risk Critical
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Waqas Ahmed Faroouqi
Exploit:
2
BusinessLevel:
0
2 090
Security Risk Critical
D
Download
C
CVE-2023-42222
Verified by
Ucretsiz
You can open this exploit for free
ItsSixtyN3in
Exploit:
1
BusinessLevel:
0
1 770
Security Risk Critical
D
Download
C
CVE-2023-37679
CVE-2023-43208
CVE-2023-43208
Verified by
Ucretsiz
You can open this exploit for free
metasploit
Exploit:
1626
BusinessLevel:
92
1 867
Security Risk Medium
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
LiquidWorm
Exploit:
730
BusinessLevel:
46
Proxmox VE - TOTP Brute Force Exploit
Yorumlar:
0
2 108
Security Risk Medium
D
Download
C
CVE-2023-43320
Verified by
Ucretsiz
You can open this exploit for free
Cory Cline
Exploit:
1
BusinessLevel:
0
Atlassian Confluence SSTI Injection Exploit
Yorumlar:
0
1 845
Security Risk High
D
Download
C
CVE-2023-22527
Verified by
Ucretsiz
You can open this exploit for free
metasploit
Exploit:
1626
BusinessLevel:
92
1 625
Security Risk High
D
Download
-
Verified by
Ucretsiz
You can open this exploit for free
Thomas Heverin
Exploit:
1
BusinessLevel:
0
1 991
Security Risk Critical
D
Download
C
CVE-2023-50445
CVE-2023-50919
CVE-2023-50919
Verified by
Ucretsiz
You can open this exploit for free
metasploit
Exploit:
1626
BusinessLevel:
92
PRTG Authenticated Remote Code Execution Exploit
Yorumlar:
0
2 200
Security Risk Critical
D
Download
C
CVE-2023-32781
Verified by
Ucretsiz
You can open this exploit for free
metasploit
Exploit:
1626
BusinessLevel:
92
1 989
Security Risk Critical
D
Download
C
CVE-2023-46805
CVE-2024-21887
CVE-2024-21887
Verified by
Ucretsiz
You can open this exploit for free
metasploit
Exploit:
1626
BusinessLevel:
92