0day.today - наибольшая база данных эксплоитов в мире.
![](/img/logo_green.jpg)
Мы используем один основной домен 0day.today
Если Вы желаете приобрести эксплоит или заплатить за услуги - Вам необходимо приобрести Золото (Gold). Мы не хотим чтобы Вы использовали наш сайт как инструмент для взломов, поэтому любые действия, которые могут незаконно влиять на других пользователей или на сайты, к которым у Вас нет прав доступа будут запрещены и Ваш профиль со всей вложенной информацией будет уничтожен.
Администрация сайта использует официальные контакты. Опасайтесь обманщиков!
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
Please, beware of scammers!
- Прочитайте [ соглашение ]
- Прочитайте [ Отправить ] правила
- Посетите страницу [ faq ] page
- [ Зарегистрируйте ] профиль
- Получите [ Gold ]
- Если Вы хотите [ продать ]
- Если Вы хотите [ купить ]
- Если Вы потеряли [ Счет ]
- Любые вопросы [ [email protected] ]
- Страница авторизации
- Страница регистрации
- Страница восстановления
- Страница FAQ
- Страница контактов
- Правила публикации
- Страница с соглашением
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Вы можете связаться с нами по:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Search results for exploits by request: Microsoft
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Microsoft Azure Subdomain Scanner / Enumerator Exploit
Комметариев:
0
3 837
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
RoseSecurity
Эксплоиты:
5
BusinessLevel:
1
Microsoft Office 365 Version 18.2305.1222.0 - Elevation of Privilege / Remote Code Execution
Комметариев:
0
3 892
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2023-33148
![](/img/check.png)
Verified by
free
You can open this exploit for free
nu11secur1ty
Эксплоиты:
215
BusinessLevel:
13
Microsoft Outlook Microsoft 365 MSO (Version 2306 Build 16.0.16529.20100) 32-bit RCE Exploit
Комметариев:
0
3 815
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2023-33131
![](/img/check.png)
Verified by
free
You can open this exploit for free
nu11secur1ty
Эксплоиты:
215
BusinessLevel:
13
Microsoft 365 MSO (Version 2305 Build 16.0.16501.20074) 64-bit Remote Code Execution Vulnerability
Комметариев:
0
3 960
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2023-28285
![](/img/check.png)
Verified by
free
You can open this exploit for free
nu11secur1ty
Эксплоиты:
215
BusinessLevel:
13
Microsoft OneNote (Version 2305 Build 16.0.16501.20074) 64-bit - Spoofing Vulnerability
Комметариев:
0
3 732
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
nu11secur1ty
Эксплоиты:
215
BusinessLevel:
13
4 826
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
hyp3rlinx
Эксплоиты:
253
BusinessLevel:
17
5 049
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2023-28311
![](/img/check.png)
Verified by
free
You can open this exploit for free
nu11secur1ty
Эксплоиты:
215
BusinessLevel:
13
Microsoft Excel 365 MSO (v 2302 Build 16.0.16130.20186) 64-bit - Remote Code Execution Vulnerability
Комметариев:
0
5 046
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2023-23399
![](/img/check.png)
Verified by
free
You can open this exploit for free
nu11secur1ty
Эксплоиты:
215
BusinessLevel:
13
Microsoft Outlook Remote Code Execution 0day Exploit
Вверх:
0
Вниз:
0
Комметариев:
0
20 479
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.129
Open this exploit for 0.129 BTC
Open this exploit for 8 000 Gold
Protocol.8
Эксплоиты:
5
BusinessLevel:
5
5 798
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2022-44666
![](/img/check.png)
Verified by
free
You can open this exploit for free
hyp3rlinx
Эксплоиты:
253
BusinessLevel:
17
9 921
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2021-42321
CVE-2022-23277
CVE-2022-23277
![](/img/check.png)
Verified by
free
You can open this exploit for free
zcgonvh
Эксплоиты:
2
BusinessLevel:
4
Microsoft Office Excel Silent Builder Exploit
Вверх:
0
Вниз:
0
Комметариев:
0
23 324
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.016
Open this exploit for 0.016 BTC
Open this exploit for 1 000 Gold
viper_8080
Эксплоиты:
5
BusinessLevel:
1
Microsoft Office Project Universal Silent Builder Exploit
Вверх:
0
Вниз:
0
Комметариев:
0
12 649
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.037
Open this exploit for 0.037 BTC
Open this exploit for 2 300 Gold
viper_8080
Эксплоиты:
5
BusinessLevel:
1
Microsoft Office Visio VSD Silent Builder Exploit
Вверх:
0
Вниз:
0
Комметариев:
0
11 780
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.04
Open this exploit for 0.04 BTC
Open this exploit for 2 500 Gold
viper_8080
Эксплоиты:
5
BusinessLevel:
1
Microsoft Office Word DOC Silent Arbitrary Code Execution Builder Exploit
Вверх:
0
Вниз:
0
Комметариев:
8
13 368
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.032
Open this exploit for 0.032 BTC
Open this exploit for 2 000 Gold
viper_8080
Эксплоиты:
5
BusinessLevel:
1
Microsoft Office Word MSDTJS Code Execution Exploit
Комметариев:
0
9 742
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2022-30190
![](/img/check.png)
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1633
BusinessLevel:
92
Microsoft Exchange Server Remote Code Execution Exploit
Комметариев:
0
10 074
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2021-42321
![](/img/check.png)
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1633
BusinessLevel:
92
Microsoft Exchange ProxyShell Remote Code Execution Exploit
Комметариев:
0
13 010
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1633
BusinessLevel:
92
Microsoft Exchange Server Unpublished Pre-Authentication Remote Code Execution Exploit
Вверх:
0
Вниз:
0
Комметариев:
0
16 402
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.129
Open this exploit for 0.129 BTC
Open this exploit for 8 000 Gold
liver
Эксплоиты:
1
BusinessLevel:
2
9 515
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2021-31181
![](/img/check.png)
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1633
BusinessLevel:
92
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
3 109
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2024-21338
![](/img/check.png)
Verified by
free
You can open this exploit for free
E1 Coders
Эксплоиты:
2
BusinessLevel:
0
Microsoft Windows Defender / Trojan.Win32/Powessere.G - Detection Mitigation Bypass Vulnerability
Комметариев:
0
5 547
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
hyp3rlinx
Эксплоиты:
253
BusinessLevel:
17
5 309
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
hyp3rlinx
Эксплоиты:
253
BusinessLevel:
17
5 081
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
hyp3rlinx
Эксплоиты:
253
BusinessLevel:
17
2 270
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
Emad Al-Mousa
Эксплоиты:
9
BusinessLevel:
1
2 471
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
hyp3rlinx
Эксплоиты:
253
BusinessLevel:
17
Microsoft Defender Anti-Malware PowerShell API Arbitrary Code Execution Vulnerability
Комметариев:
0
2 918
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
hyp3rlinx
Эксплоиты:
253
BusinessLevel:
17
4 723
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
Moein Shahabi
Эксплоиты:
1
BusinessLevel:
0
Microsoft Error Reporting Local Privilege Elevation Exploit
Комметариев:
0
4 402
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2023-36874
![](/img/check.png)
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1633
BusinessLevel:
92
3 958
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
tmrswrr
Эксплоиты:
53
BusinessLevel:
3
4 182
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2023-24892
![](/img/check.png)
Verified by
free
You can open this exploit for free
nu11secur1ty
Эксплоиты:
215
BusinessLevel:
13
Microsoft Excel Spoofing Vulnerability
Комметариев:
0
4 502
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2023-23398
![](/img/check.png)
Verified by
free
You can open this exploit for free
nu11secur1ty
Эксплоиты:
215
BusinessLevel:
13
Microsoft Exchange Active Directory Topology 15.02.1118.007 - Service MSExchangeADTopology Unquoted
Комметариев:
0
4 389
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
Milad karimi
Эксплоиты:
28
BusinessLevel:
4
Microsoft User Account Control Nuances Vulnerability
Комметариев:
0
4 297
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
Stefan Kanthak
Эксплоиты:
16
BusinessLevel:
5
Microsoft SQL Server 2014 / 2016 / 2017 / 2019 / 2022 Audit Logging Failure Vulnerability
Комметариев:
0
4 448
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
Emad Al-Mousa
Эксплоиты:
9
BusinessLevel:
1
Microsoft Exchange Active Directory Topology 15.0.847.40 - Unquoted Service Path Vulnerability
Комметариев:
0
8 461
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
Antonio Cuomo
Эксплоиты:
8
BusinessLevel:
2
Microsoft Exchange Mailbox Assistants 15.0.847.40 - Unquoted Service Path Vulnerability
Комметариев:
0
8 362
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
Antonio Cuomo
Эксплоиты:
8
BusinessLevel:
2
8 772
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
Johto Robbie
Эксплоиты:
2
BusinessLevel:
4
Microsoft Windows Defender - Detections Bypass Vulnerability
Комметариев:
0
10 429
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
hyp3rlinx
Эксплоиты:
253
BusinessLevel:
17
9 919
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
hyp3rlinx
Эксплоиты:
253
BusinessLevel:
17
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
3 524
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2023-28288
![](/img/check.png)
Verified by
free
You can open this exploit for free
Amirhossein Bahramizadeh
Эксплоиты:
20
BusinessLevel:
2
3 099
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2020-1147
![](/img/check.png)
Verified by
free
You can open this exploit for free
Podalirius
Эксплоиты:
2
BusinessLevel:
2
Microsoft SharePoint Server 16.0.10372.20060 - (GetXmlDataFromDataSource) SSRF Exploit
Комметариев:
0
2 008
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2021-31950
![](/img/check.png)
Verified by
free
You can open this exploit for free
Alex Birnberg
Эксплоиты:
1
BusinessLevel:
2
1 989
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2021-26855
![](/img/check.png)
Verified by
free
You can open this exploit for free
mekhalleh
Эксплоиты:
3
BusinessLevel:
6
1 901
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2021-26855
![](/img/check.png)
Verified by
free
You can open this exploit for free
Gonzalo Villegas
Эксплоиты:
2
BusinessLevel:
2
1 800
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2021-28459
![](/img/check.png)
Verified by
free
You can open this exploit for free
sec-consult
Эксплоиты:
22
BusinessLevel:
7
1 685
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2021-27065
CVE-2021-26855
CVE-2021-26855
![](/img/check.png)
Verified by
free
You can open this exploit for free
testanull
Эксплоиты:
1
BusinessLevel:
2
3 440
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2020-1147
![](/img/check.png)
Verified by
free
You can open this exploit for free
West Shepherd
Эксплоиты:
7
BusinessLevel:
4
Microsoft SharePoint 2013 SP1 - (DestinationFolder) Persistant Cross-Site Scripting Vulnerability
Комметариев:
0
4 677
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2019-1262
![](/img/check.png)
Verified by
free
You can open this exploit for free
Davide Cioccia
Эксплоиты:
1
BusinessLevel:
2
4 508
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
Todor Donev
Эксплоиты:
108
BusinessLevel:
12
Microsoft SQL Server Management Studio 17.9 - XML External Entity Injection Vulnerability
Комметариев:
0
8 048
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2018-8533
![](/img/check.png)
Verified by
free
You can open this exploit for free
hyp3rlinx
Эксплоиты:
253
BusinessLevel:
17
Microsoft SQL Server Management Studio 17.9 - .xel XML External Entity Injection Vulnerability
Комметариев:
0
7 994
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2018-8527
![](/img/check.png)
Verified by
free
You can open this exploit for free
hyp3rlinx
Эксплоиты:
253
BusinessLevel:
17
Microsoft SQL Server Management Studio 17.9 - .xmla XML External Entity Injection Vulnerability
Комметариев:
0
7 951
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2018-8532
![](/img/check.png)
Verified by
free
You can open this exploit for free
hyp3rlinx
Эксплоиты:
253
BusinessLevel:
17
Microsoft Sharepoint 14.x Cross Site Scripting Vulnerability
Комметариев:
0
4 248
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
Mostafa Gharzi
Эксплоиты:
5
BusinessLevel:
4
4 098
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2018-0878
![](/img/check.png)
Verified by
free
You can open this exploit for free
Nabeel Ahmed
Эксплоиты:
6
BusinessLevel:
4
Microsoft MSN Explorer Remote Code Execution 0day
Вверх:
2
Вниз:
1
Комметариев:
2
16 036
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.001
Open this exploit for 0.001 BTC
Open this exploit for 55 Gold
Asesino04
Эксплоиты:
11
BusinessLevel:
7
Microsoft SharePoint Server 2007 XSS Vulnerability
Комметариев:
0
5 897
![](/img/risk/critlow_0.gif)
Security Risk Unsored
D
Download
-
![](/img/warning.png)
Not verified yet
free
You can open this exploit for free
n/a
Эксплоиты:
233
BusinessLevel:
22
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Microsoft Windows 11 - (cmd.exe) Denial of Service Exploit
Комметариев:
0
5 613
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
Milad karimi
Эксплоиты:
28
BusinessLevel:
4
Microsoft Windows UTF-8 Buffer Overruns Exploit
Комметариев:
0
5 682
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
Stefan Kanthak
Эксплоиты:
16
BusinessLevel:
5
Microsoft Windows 10 (1903/1909) - SMBGhost SMB3.1.1 SMB2_COMPRESSION_CAPABILITIES Buffer Overflow
Комметариев:
0
14 948
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2020-0796
![](/img/check.png)
Verified by
free
You can open this exploit for free
eerykitty
Эксплоиты:
1
BusinessLevel:
2
Microsoft Windows VCF Denial Of Service Exploit
Комметариев:
0
15 263
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
hyp3rlinx
Эксплоиты:
253
BusinessLevel:
17
12 903
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
vportal
Эксплоиты:
8
BusinessLevel:
4
12 489
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
ZwX
Эксплоиты:
91
BusinessLevel:
9
Microsoft Edge 44.18362.449.0 - Denial Of Service Exploit
Комметариев:
0
12 118
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
Abdelhamid Naceri
Эксплоиты:
4
BusinessLevel:
3
Microsoft Windows cryptoapi - SymCrypt Modular Inverse Algorithm Denial of Service Exploit
Комметариев:
0
13 600
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
Microsoft DirectWrite - Out-of-Bounds Read in sfac_GetSbitBitmap While Processing TTF Fonts Exploit
Комметариев:
0
13 544
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2019-1244
![](/img/check.png)
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
Microsoft DirectWrite - Invalid Read in SplicePixel While Processing OTF Fonts Exploit
Комметариев:
0
13 510
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2019-1245
![](/img/check.png)
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
13 607
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2019-0708
![](/img/check.png)
Verified by
free
You can open this exploit for free
RAMELLA Sebastien
Эксплоиты:
1
BusinessLevel:
3
Microsoft Font Subsetting - DLL Heap Corruption in ComputeFormat4CmapData Vulnerability
Комметариев:
0
12 708
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
Microsoft Windows Font Cache Service - Insecure Sections Privilege Escalation Exploit
Комметариев:
0
12 939
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2019-0943
![](/img/check.png)
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
Microsoft Windows - CmpAddRemoveContainerToCLFSLog Arbitrary File/Directory Creation Exploit
Комметариев:
0
12 803
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2019-0959
![](/img/check.png)
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
14 177
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2019-0708
![](/img/check.png)
Verified by
free
You can open this exploit for free
Spencer
Эксплоиты:
1
BusinessLevel:
3
11 350
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
César Adrián Coronado Llanos
Эксплоиты:
1
BusinessLevel:
3
Microsoft Windows 7/2008 - Win32k Denial of Service Exploit
Комметариев:
0
11 774
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2019-0808
![](/img/check.png)
Verified by
free
You can open this exploit for free
ze0r
Эксплоиты:
2
BusinessLevel:
7
Microsoft Edge - Flash click2play Bypass with CObjectElement::FinalCreateObject Exploit
Комметариев:
0
11 717
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2019-0612
![](/img/check.png)
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
Microsoft VBScript - VbsErase Memory Corruption Exploit
Комметариев:
0
11 599
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2019-0667
![](/img/check.png)
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
11 746
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2019-0768
![](/img/check.png)
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56