0day.today - Dunyanin En Buyuk Exploit Veritabani
![](/img/logo_green.jpg)
Biz sadece bir adet ana domain kullaniyoruz DOMAIN_LINK
Eger exploit satin alacaksaniz ve ya hizmet icin odeme yapacaksaniz, altin almaniz gerekmekte. Biz sitemizi hack amacli kullanmak istemiyoruz, yani her turlu dogru olmayan, kanunsuz ve illegal yapilan eylemler diger hesaplari olumsuz yonde etkileyebilir ve sonrasinda buna yol acan/lar, web sitelerimize ve verilere erisimi tamamen kesilir, banlanir ve hesabini tarafimizca yok edilir.
Sadece bu sitenin yonetimine itibar edin. Sahtelere Dikkat!
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
Please, beware of scammers!
- Oku [ anlasma ]
- Oku [ Gonder ] kurallar
- Ziyaret et [ SSS ] page
- [ Uye Ol ] profil
- [ FIYAT ]
- Eger istiyorsaniz [ satmak ]
- Eger istiyorsaniz [ almak ]
- Eger kaybederseniz [ Hesap ]
- Herhangi bir sorunuz [ [email protected] ]
- Yetkili sayfa
- Uyelik sayfasi
- Hesap sayfasini geri yukle
- SSS sayfasi
- Iletisim sayfasi
- Paylasim kurallari
- Anlasma sayfasi
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Bize ulasabilirsiniz:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
0day.today Private exploits and 0day exploits Market
Zero-day exploits target zero-day vulnerabilities. Zero-day vulnerabilities are those for which no official patch has been released by the vendor. This means that no days [zero days] have elapsed between the time the vulnerability was discovered and the time an official patch was made available. Therefore, the administrators have had zero days to fix the flaw. It ceases to be a zero day once a fix is available.
Private category sells private Exploits and Vulnerabilities. Users can buy exploits using Gold [registered users] or using incognito mode [unregistered users], specify only mail to get material.
[ highlight ]
Highlight category
In this category published paid 0day exploits / vulnerabilities worthy of your attention. You can buy, sell and highlighted the material in red for sale. A zero-day (or 0day) attack or threat is an attack that exploits a previously unknown vulnerability in a computer application, one that developers have not had time to address and patch. It is called a "zero-day" because the programmer has had zero days to fix the flaw (in other words, a patch is not available). Once a patch is available, it is no longer a "zero-day exploit". It is common for individuals or companies who discover zero-day attacks to sell them to government agencies for use in cyberwarfare.
Malware writers are able to exploit zero-day vulnerabilities through several different attack vectors. Web browsers are a particular target because of their widespread distribution and usage. Attackers can also send e-mail attachments, which exploit vulnerabilities in the application opening the attachment. Exploits that take advantage of common file types are listed in databases like US-CERT. Malware can be engineered to take advantage of these file type exploits to compromise attacked systems or steal confidential data such as banking passwords and personal identity information
An attack that takes place immediately after a security vulnerability is announced. If a user discovers a vulnerability, it might wind up on one or two blogs, and the news travels fast. If a software vendor finds it, the tendency is to keep it under wraps until it has a patch to fix it. However, in many cases, vendors have to announce the flaw because users may be able to avoid the problem by steering clear of a Web site or being sure to not open a certain e-mail attachment
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Instagram bypass Access Account Private Method Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
53
70 754
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
V
Contains video proof
![](/img/check.png)
Verified by
![](/img/btc.png)
0.032
Open this exploit for 0.032 BTC
Open this exploit for 2 000 FIYAT
smokzz
Exploit:
8
BusinessLevel:
7
Twitter reset account Private Method 0day Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
19
31 367
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.032
Open this exploit for 0.032 BTC
Open this exploit for 2 000 FIYAT
0day Today Team
Exploit:
293
BusinessLevel:
31
WordPress 5.9.0 core Remote Code Execution 0day Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
23
38 852
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.111
Open this exploit for 0.111 BTC
Open this exploit for 7 000 FIYAT
smokzz
Exploit:
8
BusinessLevel:
7
Hotmail.com reset account 0day Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
28
29 196
![](/img/risk/critlow_4.gif)
Security Risk Critical
%
Open this exploit for 0.048 0.041 BTC
Open this exploit for 3 000 2 600 FIYAT
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.041
Open this exploit for 0.048 0.041 BTC
Open this exploit for 3 000 2 600 FIYAT
0day Today Team
Exploit:
293
BusinessLevel:
31
[ with video ]
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
TP-Link ER605 Unauthent LAN-side Remote Code Execution Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
0
13 320
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
V
Contains video proof
![](/img/check.png)
Verified by
![](/img/btc.png)
0.024
Open this exploit for 0.024 BTC
Open this exploit for 1 500 FIYAT
lychain1337
Exploit:
1
BusinessLevel:
0
Instagram bypass Access Account Private Method Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
53
70 754
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
V
Contains video proof
![](/img/check.png)
Verified by
![](/img/btc.png)
0.032
Open this exploit for 0.032 BTC
Open this exploit for 2 000 FIYAT
smokzz
Exploit:
8
BusinessLevel:
7
Bustabit Bitcoin Server Seed way of earning Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
15
18 391
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
V
Contains video proof
![](/img/check.png)
Verified by
![](/img/btc.png)
0.04
Open this exploit for 0.04 BTC
Open this exploit for 2 500 FIYAT
cryptomike
Exploit:
1
BusinessLevel:
2
Microsoft Exchange Server Unpublished Pre-Authentication Remote Code Execution Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
0
16 402
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
V
Contains video proof
![](/img/check.png)
Verified by
![](/img/btc.png)
0.127
Open this exploit for 0.127 BTC
Open this exploit for 8 000 FIYAT
liver
Exploit:
1
BusinessLevel:
2
Magento 2.4.0 / 2.3.5p1 (and earlier) Arbitrary Code Execution 0day Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
2
7 461
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
V
Contains video proof
![](/img/check.png)
Verified by
![](/img/btc.png)
0.048
Open this exploit for 0.048 BTC
Open this exploit for 3 000 FIYAT
unic0rn
Exploit:
1
BusinessLevel:
2
QBOT Botnet C2 Panel - Authentication Bypass Vulnerability
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
0
14 520
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
V
Contains video proof
![](/img/check.png)
Verified by
![](/img/btc.png)
0.011
Open this exploit for 0.011 BTC
Open this exploit for 700 FIYAT
nullp0int3rx
Exploit:
1
BusinessLevel:
2
Adobe Acrobat Reader Silent PDF Exploit 0day
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
4
14 640
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
V
Contains video proof
![](/img/check.png)
Verified by
![](/img/btc.png)
0.037
Open this exploit for 0.037 BTC
Open this exploit for 2 300 FIYAT
0day Today Team
Exploit:
293
BusinessLevel:
31
Microsoft Office Word (2003/2007/2010/2013 +2016) Universal Silent 0day Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
6
13 637
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
V
Contains video proof
![](/img/check.png)
Verified by
![](/img/btc.png)
0.04
Open this exploit for 0.04 BTC
Open this exploit for 2 500 FIYAT
0day Today Team
Exploit:
293
BusinessLevel:
31
Pornhub User Account takeover Privilage Escalation Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
0
6 239
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
V
Contains video proof
![](/img/check.png)
Verified by
![](/img/btc.png)
0.024
Open this exploit for 0.024 BTC
Open this exploit for 1 500 FIYAT
nexcorp
Exploit:
1
BusinessLevel:
4
Whatsapp Desktop (session hijacking) Payload 0day Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
0
16 950
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
V
Contains video proof
![](/img/check.png)
Verified by
![](/img/btc.png)
0.048
Open this exploit for 0.048 BTC
Open this exploit for 3 000 FIYAT
0day Today Team
Exploit:
293
BusinessLevel:
31
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
VMware Cloud Director - Bypass identity verification Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
0
12 815
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2023-34060
![](/img/check.png)
Verified by
![](/img/btc.png)
0.032
Open this exploit for 0.032 BTC
Open this exploit for 2 000 FIYAT
absholi7ly
Exploit:
1
BusinessLevel:
0
TP-Link ER605 Unauthent LAN-side Remote Code Execution Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
0
13 320
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
V
Contains video proof
![](/img/check.png)
Verified by
![](/img/btc.png)
0.024
Open this exploit for 0.024 BTC
Open this exploit for 1 500 FIYAT
lychain1337
Exploit:
1
BusinessLevel:
0
Microsoft Outlook Remote Code Execution 0day Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
0
20 479
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.127
Open this exploit for 0.127 BTC
Open this exploit for 8 000 FIYAT
Protocol.8
Exploit:
5
BusinessLevel:
5
Powershell Code Arbitary Execution Builder FUD Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
0
22 197
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.016
Open this exploit for 0.016 BTC
Open this exploit for 1 000 FIYAT
viper_8080
Exploit:
5
BusinessLevel:
1
Microsoft Office Excel Silent Builder Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
0
23 324
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.016
Open this exploit for 0.016 BTC
Open this exploit for 1 000 FIYAT
viper_8080
Exploit:
5
BusinessLevel:
1
Microsoft Office Project Universal Silent Builder Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
0
12 649
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.037
Open this exploit for 0.037 BTC
Open this exploit for 2 300 FIYAT
viper_8080
Exploit:
5
BusinessLevel:
1
Microsoft Office Visio VSD Silent Builder Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
0
11 780
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.04
Open this exploit for 0.04 BTC
Open this exploit for 2 500 FIYAT
viper_8080
Exploit:
5
BusinessLevel:
1
Microsoft Office Word DOC Silent Arbitrary Code Execution Builder Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
8
13 368
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.032
Open this exploit for 0.032 BTC
Open this exploit for 2 000 FIYAT
viper_8080
Exploit:
5
BusinessLevel:
1
TikTok reset account password Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
4
14 460
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.048
Open this exploit for 0.048 BTC
Open this exploit for 3 000 FIYAT
smokzz
Exploit:
8
BusinessLevel:
7
JPG Silent Arbitrary Code Execution Builder Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
14
21 690
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.037
Open this exploit for 0.037 BTC
Open this exploit for 2 300 FIYAT
0day Today Team
Exploit:
293
BusinessLevel:
31
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Microsoft Office Word (2003/2007/2010/2013 +2016) Universal Silent 0day Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
6
13 637
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
V
Contains video proof
![](/img/check.png)
Verified by
![](/img/btc.png)
0.04
Open this exploit for 0.04 BTC
Open this exploit for 2 500 FIYAT
0day Today Team
Exploit:
293
BusinessLevel:
31
PowerPoint 2003/2007/2010 Silent Builder Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
0
12 015
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.048
Open this exploit for 0.048 BTC
Open this exploit for 3 000 FIYAT
0day Today Team
Exploit:
293
BusinessLevel:
31
Microsoft Office Word 2003+2007+2010 Universal 0day Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
0
11 293
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.06
Open this exploit for 0.06 BTC
Open this exploit for 3 800 FIYAT
0day Today Team
Exploit:
293
BusinessLevel:
31
Microsoft Office 2007/2010 Download and Execute Vulnerability
Artan Oran:
2
Dusen Oran:
1
Yorumlar:
0
12 732
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.024
Open this exploit for 0.024 BTC
Open this exploit for 1 500 FIYAT
crash.poc
Exploit:
5
BusinessLevel:
6
iOS 12 / 13 / 14 Passcode Bypass 0day Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
2
28 976
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
V
Contains video proof
![](/img/check.png)
Verified by
![](/img/btc.png)
0.064
Open this exploit for 0.064 BTC
Open this exploit for 4 000 FIYAT
0day Today Team
Exploit:
293
BusinessLevel:
31
Apple iOS 11.1.1 kernel DoS Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
2
16 179
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
V
Contains video proof
![](/img/check.png)
Verified by
![](/img/btc.png)
0.08
Open this exploit for 0.08 BTC
Open this exploit for 5 000 FIYAT
muxbear
Exploit:
1
BusinessLevel:
3
macOS 10.11.* / 10.12.* Kernel Code Execution - SIP bypass 0day Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
0
12 483
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
V
Contains video proof
![](/img/check.png)
Verified by
![](/img/btc.png)
0.048
Open this exploit for 0.048 BTC
Open this exploit for 3 000 FIYAT
macos0day
Exploit:
1
BusinessLevel:
4
OS X 10.10.2-10.10.4 Privilege Escalation Exploit 0day
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
5
11 137
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
V
Contains video proof
![](/img/check.png)
Verified by
![](/img/btc.png)
0.016
Open this exploit for 0.016 BTC
Open this exploit for 1 000 FIYAT
jiehu
Exploit:
1
BusinessLevel:
5
Office 2003 SP3, Office 2007 SP2, Office 2011 Stack-based buffer overflow
Artan Oran:
3
Dusen Oran:
0
Yorumlar:
18
20 323
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
V
Contains video proof
![](/img/check.png)
Verified by
![](/img/btc.png)
0
Open this exploit for 0 BTC
Open this exploit for 30 FIYAT
!m0Nk3y_
Exploit:
1
BusinessLevel:
6
uTorrent 3.x app exploit 0day
Artan Oran:
3
Dusen Oran:
1
Yorumlar:
6
21 022
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/warning.png)
Not verified yet
![](/img/btc.png)
0.002
Open this exploit for 0.002 BTC
Open this exploit for 99 FIYAT
_null_
Exploit:
1
BusinessLevel:
6
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Moodle 4.3 Remote Code Execution 0day Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
0
13 126
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.04
Open this exploit for 0.04 BTC
Open this exploit for 2 500 FIYAT
smokzz
Exploit:
8
BusinessLevel:
7
Joomla! 4.1.2 Shell Upload 0day Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
0
9 923
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.095
Open this exploit for 0.095 BTC
Open this exploit for 6 000 FIYAT
smokzz
Exploit:
8
BusinessLevel:
7
Moodle Pre-Auth Remote Code Execution 0day Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
0
6 191
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.088
Open this exploit for 0.088 BTC
Open this exploit for 5 500 FIYAT
0day Today Team
Exploit:
293
BusinessLevel:
31
Instagram bypass Access Account Private Method Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
53
70 754
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
V
Contains video proof
![](/img/check.png)
Verified by
![](/img/btc.png)
0.032
Open this exploit for 0.032 BTC
Open this exploit for 2 000 FIYAT
smokzz
Exploit:
8
BusinessLevel:
7
WordPress 5.9.0 core Remote Code Execution 0day Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
23
38 852
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.111
Open this exploit for 0.111 BTC
Open this exploit for 7 000 FIYAT
smokzz
Exploit:
8
BusinessLevel:
7
Magento 2.4.0 / 2.3.5p1 (and earlier) Arbitrary Code Execution 0day Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
2
7 461
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
V
Contains video proof
![](/img/check.png)
Verified by
![](/img/btc.png)
0.048
Open this exploit for 0.048 BTC
Open this exploit for 3 000 FIYAT
unic0rn
Exploit:
1
BusinessLevel:
2
Paypal bypass email verify logins Vulnerability
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
0
5 594
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.035
Open this exploit for 0.035 BTC
Open this exploit for 2 200 FIYAT
lulz0day
Exploit:
2
BusinessLevel:
5
facebook - Grabbing permanent access token which Never expires of your accounts and pages .
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
10
16 612
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.032
Open this exploit for 0.032 BTC
Open this exploit for 2 000 FIYAT
deep007
Exploit:
1
BusinessLevel:
5
Pornhub User Account takeover Privilage Escalation Exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
0
6 239
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
V
Contains video proof
![](/img/check.png)
Verified by
![](/img/btc.png)
0.024
Open this exploit for 0.024 BTC
Open this exploit for 1 500 FIYAT
nexcorp
Exploit:
1
BusinessLevel:
4
Tebilisim Remote File Read Vulnerability
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
0
15 266
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.008
Open this exploit for 0.008 BTC
Open this exploit for 500 FIYAT
Zedros
Exploit:
1
BusinessLevel:
3
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
OpenSSL OCSP Status Request Extension Unbounded Memory Growth Vulnerability
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
0
12 001
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2016-6304
![](/img/check.png)
Verified by
![](/img/btc.png)
0.001
Open this exploit for 0.001 BTC
Open this exploit for 70 FIYAT
teneciousD
Exploit:
1
BusinessLevel:
4
Word 2003 SP2 .doc fork bomb on WinXP SP3
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
0
19 524
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/warning.png)
Not verified yet
![](/img/btc.png)
0.002
Open this exploit for 0.002 BTC
Open this exploit for 150 FIYAT
sult4n
Exploit:
1
BusinessLevel:
6
Mozilla FireFox 24/25 All OS Freeze & Crash Exploit
Artan Oran:
2
Dusen Oran:
0
Yorumlar:
3
20 187
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0
Open this exploit for 0 BTC
Open this exploit for 30 FIYAT
The Black Devils
Exploit:
135
BusinessLevel:
16
IOS 7.0.3 freeze & crash exploit
Artan Oran:
0
Dusen Oran:
0
Yorumlar:
1
22 349
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.001
Open this exploit for 0.001 BTC
Open this exploit for 40 FIYAT
XoDer
Exploit:
4
BusinessLevel:
6
Apache/IIS/nginx Multiple HTTP Servers (Memory Exhaustion) DoS
Artan Oran:
13
Dusen Oran:
0
Yorumlar:
11
28 359
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
V
Contains video proof
![](/img/check.png)
Verified by
![](/img/btc.png)
0.008
Open this exploit for 0.008 BTC
Open this exploit for 500 FIYAT
Xianur0
Exploit:
10
BusinessLevel:
9
MS12-020 Microsoft RDP Vulnerability Exploit PoC
Artan Oran:
254
Dusen Oran:
1
Yorumlar:
4
27 020
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
V
Contains video proof
![](/img/check.png)
Verified by
![](/img/btc.png)
0.005
Open this exploit for 0.005 BTC
Open this exploit for 300 FIYAT
sabu
Exploit:
1
BusinessLevel:
6