[ authorization ] [ registration ] [ Восстановление ]
Свяжитесь с нами
Вы можете связаться с нами по:
0day.today   магазин эксплоитов и 0day база данных эксплоитов
Поиск:
 
 
 
Категория:   Платформа:
 
Price from:   Price to:
 
Author login:   CVE:

Search results for exploits by request: All

[ remote exploits ]

Remote exploits and vulnerabilities category


A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
3 471
Security Risk Critical
R
D
Download
C
CVE-2023-36845
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1625
BusinessLevel:
92
7 339
Security Risk Critical
R
D
Download
C
CVE-2022-30525
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1625
BusinessLevel:
92
8 413
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
Achilles
Эксплоиты:
42
BusinessLevel:
8
9 331
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
Yehia Elghaly
Эксплоиты:
25
BusinessLevel:
3
8 806
Security Risk Medium
R
D
Download
C
CVE-2022-28381
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1625
BusinessLevel:
92
9 075
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
Yehia Elghaly
Эксплоиты:
25
BusinessLevel:
3
8 256
Security Risk Critical
R
D
Download
C
CVE-2021-1472
CVE-2021-1473
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1625
BusinessLevel:
92
13 603
Security Risk Critical
R
D
Download
C
CVE-2021-20039
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1625
BusinessLevel:
92
9 609
Security Risk Medium
R
D
Download
C
CVE-2021-3394
Verified by
free
You can open this exploit for free
Andrea Intilangelo
Эксплоиты:
16
BusinessLevel:
3
11 072
Security Risk High
R
D
Download
C
CVE-2020-1313
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1625
BusinessLevel:
92
10 334
Security Risk Medium
R
D
Download
C
CVE-2020-16137
CVE-2020-16138
CVE-2020-16139
Verified by
free
You can open this exploit for free
Cody Martin
Эксплоиты:
3
BusinessLevel:
2
10 022
Security Risk Medium
R
D
Download
C
CVE-2020-6514
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
11 596
Security Risk Critical
R
D
Download
C
CVE-2020-7961
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1625
BusinessLevel:
92
12 495
Security Risk Critical
R
D
Download
C
CVE-2019-16662
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1625
BusinessLevel:
92
11 991
Security Risk High
R
D
Download
C
CVE-2019-1914
CVE-2019-1913
CVE-2019-1912
Verified by
free
You can open this exploit for free
bashis
Эксплоиты:
19
BusinessLevel:
5
10 432
Security Risk High
R
D
Download
-
Verified by
free
You can open this exploit for free
Nassim Asrir
Эксплоиты:
28
BusinessLevel:
5
7 804
Security Risk Critical
R
D
Download
-
Verified by
free
You can open this exploit for free
AkkuS
Эксплоиты:
75
BusinessLevel:
7
7 579
Security Risk Critical
R
D
Download
C
CVE-2016-3510
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1625
BusinessLevel:
92
12 107
Security Risk High
R
D
Download
C
CVE-2019-3924
Verified by
free
You can open this exploit for free
Jacob Baines
Эксплоиты:
17
BusinessLevel:
5
7 012
Security Risk Critical
R
D
Download
-
Verified by
free
You can open this exploit for free
Green-m
Эксплоиты:
4
BusinessLevel:
3

[ local exploits ]

Local exploits and vulnerabilities category


A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
5 907
Security Risk High
R
D
Download
-
Verified by
free
You can open this exploit for free
George Washington
Эксплоиты:
1
BusinessLevel:
0
4 073
Security Risk Medium
R
D
Download
C
CVE-2022-2841
Verified by
free
You can open this exploit for free
Fortunato Lodari
Эксплоиты:
3
BusinessLevel:
2
7 836
Security Risk High
R
D
Download
C
CVE-2022-30526
Verified by
free
You can open this exploit for free
Martin Heiland
Эксплоиты:
8
BusinessLevel:
5
8 825
Security Risk High
R
D
Download
C
CVE-2021-44596
Verified by
free
You can open this exploit for free
Netanel Cohen
Эксплоиты:
3
BusinessLevel:
1
8 494
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
Mohamed Alzhrani
Эксплоиты:
1
BusinessLevel:
1
7 346
Security Risk High
R
D
Download
C
CVE-2020-26950
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1625
BusinessLevel:
92
8 639
Security Risk Medium
R
D
Download
C
CVE-2020-5147
Verified by
free
You can open this exploit for free
shinnai
Эксплоиты:
159
BusinessLevel:
17
8 610
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
Julio Aviña
Эксплоиты:
7
BusinessLevel:
2
8 427
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
Mayur Parmar
Эксплоиты:
6
BusinessLevel:
2
8 312
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
JOK3R
Эксплоиты:
3
BusinessLevel:
5
8 274
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
Luis Sandoval
Эксплоиты:
1
BusinessLevel:
2
8 243
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
SamAlucard
Эксплоиты:
15
BusinessLevel:
3
9 368
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
JOK3R
Эксплоиты:
3
BusinessLevel:
5
9 044
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
Angelo D\'Amato
Эксплоиты:
1
BusinessLevel:
2
8 613
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
Gobinathan
Эксплоиты:
2
BusinessLevel:
2
9 818
Security Risk High
R
D
Download
C
CVE-2020-3894
Verified by
free
You can open this exploit for free
Glazvunov
Эксплоиты:
9
BusinessLevel:
3

ALLPlayer 7.6 Buffer Overflow Exploit

Комметариев:
0
8 172
Security Risk High
R
D
Download
-
Verified by
free
You can open this exploit for free
Xenofon Vassilakopoulos
Эксплоиты:
14
BusinessLevel:
3
5 895
Security Risk High
R
D
Download
-
Verified by
free
You can open this exploit for free
antonio
Эксплоиты:
7
BusinessLevel:
6
5 834
Security Risk High
R
D
Download
-
Verified by
free
You can open this exploit for free
antonio
Эксплоиты:
7
BusinessLevel:
6
5 572
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
Sainadh Jamalpur
Эксплоиты:
6
BusinessLevel:
3

[ web applications ]

Webapplication (webapps) exploits and vulnerabilities category


This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
1 961
Security Risk High
R
D
Download
C
CVE-2023-46024
Verified by
free
You can open this exploit for free
Ersin Erenler
Эксплоиты:
3
BusinessLevel:
0

Wallos Shell Upload Vulnerability

Комметариев:
0
1 367
Security Risk Critical
R
D
Download
-
Verified by
free
You can open this exploit for free
bot
Эксплоиты:
154
BusinessLevel:
13
1 545
Security Risk Critical
R
D
Download
-
Verified by
free
You can open this exploit for free
Melvin Mejia
Эксплоиты:
1
BusinessLevel:
0
1 232
Security Risk Critical
R
D
Download
-
Verified by
free
You can open this exploit for free
whiteOwl
Эксплоиты:
1
BusinessLevel:
1
2 592
Security Risk Critical
R
D
Download
-
Verified by
free
You can open this exploit for free
Mirabbas Ağalarov
Эксплоиты:
51
BusinessLevel:
3
2 629
Security Risk Medium
R
D
Download
C
CVE-2023-38911
Verified by
free
You can open this exploit for free
Daniel González
Эксплоиты:
2
BusinessLevel:
0
3 287
Security Risk High
R
D
Download
-
Verified by
free
You can open this exploit for free
Ramil Mustafayev
Эксплоиты:
3
BusinessLevel:
2
3 298
Security Risk Critical
R
D
Download
-
Verified by
free
You can open this exploit for free
Mirabbas Ağalarov
Эксплоиты:
51
BusinessLevel:
3
3 319
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
Mirabbas Ağalarov
Эксплоиты:
51
BusinessLevel:
3
3 237
Security Risk High
R
D
Download
C
CVE-2023-0963
Verified by
free
You can open this exploit for free
Muhammad Navaid Zafar Ansari
Эксплоиты:
16
BusinessLevel:
1
3 208
Security Risk High
R
D
Download
C
CVE-2023-0962
Verified by
free
You can open this exploit for free
Muhammad Navaid Zafar Ansari
Эксплоиты:
16
BusinessLevel:
1
3 201
Security Risk High
R
D
Download
C
CVE-2023-0961
Verified by
free
You can open this exploit for free
Muhammad Navaid Zafar Ansari
Эксплоиты:
16
BusinessLevel:
1
3 221
Security Risk High
R
D
Download
C
CVE-2023-0938
Verified by
free
You can open this exploit for free
Muhammad Navaid Zafar Ansari
Эксплоиты:
16
BusinessLevel:
1
3 117
Security Risk High
R
D
Download
C
CVE-2023-23156
Verified by
free
You can open this exploit for free
Yogesh Verma
Эксплоиты:
1
BusinessLevel:
1
2 842
Security Risk High
R
D
Download
C
CVE-2023-23163
Verified by
free
You can open this exploit for free
Rahul Patwari
Эксплоиты:
3
BusinessLevel:
1
2 842
Security Risk High
R
D
Download
C
CVE-2023-23162
Verified by
free
You can open this exploit for free
Rahul Patwari
Эксплоиты:
3
BusinessLevel:
1
2 842
Security Risk Medium
R
D
Download
C
CVE-2023-23161
Verified by
free
You can open this exploit for free
Rahul Patwari
Эксплоиты:
3
BusinessLevel:
1
3 070
Security Risk Critical
R
D
Download
C
CVE-2022-1565
Verified by
free
You can open this exploit for free
AkuCyberSec
Эксплоиты:
3
BusinessLevel:
1
2 206
Security Risk High
R
D
Download
-
Verified by
free
You can open this exploit for free
Edd13Mora
Эксплоиты:
2
BusinessLevel:
1
2 236
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
Abdulhakim Öner
Эксплоиты:
9
BusinessLevel:
1

[ dos / poc ]

DOS exploits and vulnerabilities category


PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.

PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
7 448
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
Georgi Guninski
Эксплоиты:
16
BusinessLevel:
11
4 497
Security Risk Medium
R
D
Download
C
CVE-2022-46770
Verified by
free
You can open this exploit for free
Krzysztof Burghardt
Эксплоиты:
4
BusinessLevel:
3
4 946
Security Risk Medium
R
D
Download
C
CVE-2022-42905
Verified by
free
You can open this exploit for free
Maximilian Ammann
Эксплоиты:
3
BusinessLevel:
1
8 977
Security Risk Medium
R
D
Download
C
CVE-2020-25022
Verified by
free
You can open this exploit for free
Pietro Oliva
Эксплоиты:
16
BusinessLevel:
8
16 673
Security Risk Medium
R
D
Download
C
CVE-2019-1429
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
18 474
Security Risk High
R
D
Download
-
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
16 339
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
12 350
Security Risk Medium
R
D
Download
C
CVE-2019-8646
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
11 915
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
11 515
Security Risk Medium
R
D
Download
C
CVE-2016-4578
Verified by
free
You can open this exploit for free
wally0813
Эксплоиты:
2
BusinessLevel:
3
12 557
Security Risk Medium
R
D
Download
C
CVE-2019-2025
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
8 436
Security Risk Medium
R
D
Download
C
CVE-2019-6218
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
2 907
Security Risk Medium
R
D
Download
C
CVE-2018-4382
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
3 908
Security Risk Medium
R
D
Download
C
CVE-2018-8288
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
4 603
Security Risk Medium
R
D
Download
C
CVE-2018-10906
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
3 159
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
3 092
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
Achilles
Эксплоиты:
42
BusinessLevel:
8
3 112
Security Risk Medium
R
D
Download
C
CVE-2018-6065
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
3 342
Security Risk Medium
R
D
Download
C
CVE-2018-4139
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
2 802
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56

[ shellcode ]

Shellcode category


In computer security, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called "shellcode" because it typically starts a command shell from which the attacker can control the compromised machine, but any piece of code that performs a similar task can be called shellcode. Because the function of a payload is not limited to merely spawning a shell, some have suggested that the name shellcode is insufficient. Shellcode is commonly written in machine code.

Classification:
There are several methods of classifying exploits. The most common is by how the exploit contacts the vulnerable software. A remote exploit works over a network and exploits the security vulnerability without any prior access to the vulnerable system. A local exploit requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with a client application. Exploits against client applications may also require some interaction with the user and thus may be used in combination with the social engineering method. Another classification is by the action against the vulnerable system; unauthorized data access, arbitrary code execution, and denial of service are examples. Many exploits are designed to provide superuser-level access to a computer system. However, it is also possible to use several exploits, first to gain low-level access, then to escalate privileges repeatedly until one reaches root. Normally a single exploit can only take advantage of a specific software vulnerability. Often, when an exploit is published, the vulnerability is fixed through a patch and the exploit becomes obsolete until newer versions of the software become available Shellcodes any types.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
10 977
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
Bobby Cooke
Эксплоиты:
26
BusinessLevel:
3
14 637
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
boku
Эксплоиты:
42
BusinessLevel:
4
12 917
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
kiriknik
Эксплоиты:
1
BusinessLevel:
4
13 265
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
strider
Эксплоиты:
11
BusinessLevel:
3
13 852
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
strider
Эксплоиты:
11
BusinessLevel:
3
12 423
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
zbt
Эксплоиты:
4
BusinessLevel:
7
12 118
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
antrhacks
Эксплоиты:
10
BusinessLevel:
8
15 007
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
Touhid M.Shaikh
Эксплоиты:
27
BusinessLevel:
5
10 872
Security Risk High
R
D
Download
-
Verified by
free
You can open this exploit for free
kyzer
Эксплоиты:
6
BusinessLevel:
5
16 348
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
RubberDuck
Эксплоиты:
3
BusinessLevel:
7
12 869
Security Risk Medium
R
D
Download
-
Verified by
free
You can open this exploit for free
nitr0us
Эксплоиты:
15
BusinessLevel:
10
12 144
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
John Babio
Эксплоиты:
5
BusinessLevel:
7
13 815
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
KedAns-Dz
Эксплоиты:
292
BusinessLevel:
24
11 419
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
RubberDuck
Эксплоиты:
3
BusinessLevel:
7
4 948
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
Celil Ünüver
Эксплоиты:
4
BusinessLevel:
7
5 372
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
gunslinger_
Эксплоиты:
53
BusinessLevel:
10
5 196
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
gunslinger_
Эксплоиты:
53
BusinessLevel:
10
4 853
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
gunslinger_
Эксплоиты:
53
BusinessLevel:
10
4 721
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
gunslinger_
Эксплоиты:
53
BusinessLevel:
10
4 672
Security Risk Unsored
R
D
Download
-
Not verified yet
free
You can open this exploit for free
gunslinger_
Эксплоиты:
53
BusinessLevel:
10