0day.today - наибольшая база данных эксплоитов в мире.
Некоторые вещи, о которых стоит знать:
Мы используем один основной домен 0day.today
Если Вы желаете приобрести эксплоит или заплатить за услуги - Вам необходимо приобрести Золото (Gold). Мы не хотим чтобы Вы использовали наш сайт как инструмент для взломов, поэтому любые действия, которые могут незаконно влиять на других пользователей или на сайты, к которым у Вас нет прав доступа будут запрещены и Ваш профиль со всей вложенной информацией будет уничтожен.
Администрация сайта использует официальные контакты. Опасайтесь обманщиков!
Мы используем один основной домен 0day.today
Если Вы желаете приобрести эксплоит или заплатить за услуги - Вам необходимо приобрести Золото (Gold). Мы не хотим чтобы Вы использовали наш сайт как инструмент для взломов, поэтому любые действия, которые могут незаконно влиять на других пользователей или на сайты, к которым у Вас нет прав доступа будут запрещены и Ваш профиль со всей вложенной информацией будет уничтожен.
Администрация сайта использует официальные контакты. Опасайтесь обманщиков!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Прочитайте [ соглашение ]
- Прочитайте [ Отправить ] правила
- Посетите страницу [ faq ] page
- [ Зарегистрируйте ] профиль
- Получите [ Gold ]
- Если Вы хотите [ продать ]
- Если Вы хотите [ купить ]
- Если Вы потеряли [ Счет ]
- Любые вопросы [ [email protected] ]
- Страница авторизации
- Страница регистрации
- Страница восстановления
- Страница FAQ
- Страница контактов
- Правила публикации
- Страница с соглашением
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Вы можете связаться с нами по:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Search results for exploits by request: Microsoft Windows 7
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Microsoft Windows 7 (x86) - (BlueKeep) RDP Remote Windows Kernel Use After Free Exploit
Комметариев:
0
14 741
Security Risk Critical
D
Download
C
CVE-2019-0708
Verified by
free
You can open this exploit for free
0xeb-bp
Эксплоиты:
1
BusinessLevel:
2
Microsoft Internet Explorer Windows 10 1809 17763.316 - Scripting Engine Memory Corruption Exploit
Комметариев:
0
8 752
Security Risk High
D
Download
-
Verified by
free
You can open this exploit for free
Simon Zuckerbraun
Эксплоиты:
2
BusinessLevel:
3
Microsoft Windows SMB MS17-010 EternalRomance / EternalSynergy / EternalChampion Remote Code Executi
Комметариев:
0
7 508
Security Risk Critical
D
Download
C
CVE-2017-0143
CVE-2017-0146
CVE-2017-0147
CVE-2017-0146
CVE-2017-0147
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1626
BusinessLevel:
92
Microsoft Windows 7/8.1/2008 R2/2012 R2/2016 R2 - EternalBlue SMB Remote Code Execution (MS17-010) E
Комметариев:
0
9 645
Security Risk Critical
D
Download
-
Verified by
free
You can open this exploit for free
sleepya
Эксплоиты:
4
BusinessLevel:
5
Microsoft Windows 8 / 2012 R2 (x64) - EternalBlue SMB Remote Code Execution (MS17-010) Exploit
Комметариев:
0
9 153
Security Risk Critical
D
Download
C
CVE-2017-0144
Verified by
free
You can open this exploit for free
sleepya
Эксплоиты:
4
BusinessLevel:
5
Microsoft Windows 7 / 2008 R2 (x64) - EternalBlue SMB Remote Code Execution (MS17-010) Exploit
Комметариев:
0
8 014
Security Risk Critical
D
Download
C
CVE-2017-0144
Verified by
free
You can open this exploit for free
sleepya
Эксплоиты:
4
BusinessLevel:
5
Microsoft Windows MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption Exploit
Комметариев:
0
8 468
Security Risk High
D
Download
C
CVE-2017-0143
CVE-2017-0144
CVE-2017-0145
CVE-2017-0146
CVE-2017-0147
CVE-2017-0148
CVE-2017-0144
CVE-2017-0145
CVE-2017-0146
CVE-2017-0147
CVE-2017-0148
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1626
BusinessLevel:
92
11 606
Security Risk Critical
D
Download
C
CVE-2017-0143
CVE-2017-0144
CVE-2017-0145
CVE-2017-0146
CVE-2017-0147
CVE-2017-0148
CVE-2017-0144
CVE-2017-0145
CVE-2017-0146
CVE-2017-0147
CVE-2017-0148
Verified by
free
You can open this exploit for free
Juan Sacco
Эксплоиты:
46
BusinessLevel:
12
5 296
Security Risk Critical
D
Download
C
CVE-2008-4250
Verified by
free
You can open this exploit for free
ohnozzy
Эксплоиты:
2
BusinessLevel:
4
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
2 303
Security Risk Critical
D
Download
C
CVE-2024-21338
Verified by
free
You can open this exploit for free
E1 Coders
Эксплоиты:
2
BusinessLevel:
0
5 728
Security Risk High
D
Download
C
CVE-2019-1132
Verified by
free
You can open this exploit for free
ShivamTrivedi
Эксплоиты:
1
BusinessLevel:
2
5 479
Security Risk Critical
D
Download
C
CVE-2019-0841
Verified by
free
You can open this exploit for free
James Forshaw
Эксплоиты:
6
BusinessLevel:
5
Microsoft Windows 10.0.17134.648 HTTP -> SMB NTLM Reflection Leads to Privilege Elevation Exploit
Комметариев:
0
9 763
Security Risk High
D
Download
C
CVE-2019-1019
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
Microsoft Windows 10 (17763.379) - Install DLL Exploit
Комметариев:
0
5 256
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
SandboxEscaper
Эксплоиты:
10
BusinessLevel:
3
Microsoft Windows 10 1809 / 1709 - CSRSS SxSSrv Cached Manifest Privilege Escalation Exploit
Комметариев:
0
9 684
Security Risk High
D
Download
C
CVE-2019-0735
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
4 983
Security Risk High
D
Download
-
Verified by
free
You can open this exploit for free
Tenable NS
Эксплоиты:
3
BusinessLevel:
10
4 748
Security Risk Critical
D
Download
C
CVE-2018-8174
Verified by
free
You can open this exploit for free
smgorelik
Эксплоиты:
5
BusinessLevel:
3
Microsoft Window Manager (Windows 7 x86) - Menu Management Component UAF Privilege Elevation Exploit
Комметариев:
0
3 747
Security Risk High
D
Download
C
CVE-2017-0263
Verified by
free
You can open this exploit for free
xiaodaozhi
Эксплоиты:
3
BusinessLevel:
3
Microsoft Windows Kernel (Windows 7 x86) - Local Privilege Escalation (MS16-039) Exploit
Комметариев:
0
3 912
Security Risk High
D
Download
C
CVE-2016-0165
Verified by
free
You can open this exploit for free
xiaodaozhi
Эксплоиты:
3
BusinessLevel:
3
Microsoft Windows Kernel (Windows 7 x86) - Local Privilege Escalation (MS17-017) Exploit
Комметариев:
0
3 971
Security Risk High
D
Download
C
CVE-2017-0101
Verified by
free
You can open this exploit for free
xiaodaozhi
Эксплоиты:
3
BusinessLevel:
3
Microsoft Windows 10 Creators Update version 1703 - Kernel Local Privilege Escalation Exploit
Комметариев:
0
4 998
Security Risk High
D
Download
-
Verified by
free
You can open this exploit for free
XPN
Эксплоиты:
2
BusinessLevel:
3
Microsoft Windows 7 SP1 x86 - GDI Palette Objects Local Privilege Escalation (MS17-017) Exploit
Комметариев:
0
5 832
Security Risk Critical
D
Download
-
Verified by
free
You can open this exploit for free
Saif
Эксплоиты:
15
BusinessLevel:
11
5 514
Security Risk High
D
Download
C
CVE-2017-0100
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
4 437
Security Risk High
D
Download
C
CVE-2016-3223
Verified by
free
You can open this exploit for free
Nabeel Ahmed
Эксплоиты:
6
BusinessLevel:
4
Microsoft Windows 7 < 10 / 2008 < 2012 (x86/x64) - Secondary Logon Handle Privilege Escalation
Комметариев:
0
4 557
Security Risk High
D
Download
C
CVE-2016-0099
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1626
BusinessLevel:
92
4 065
Security Risk High
D
Download
C
CVE-2016-0051
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1626
BusinessLevel:
92
5 572
Security Risk High
D
Download
C
CVE-2016-0400
Verified by
free
You can open this exploit for free
blomster81
Эксплоиты:
1
BusinessLevel:
4
3 932
Security Risk High
D
Download
C
CVE-2016-0051
Verified by
free
You can open this exploit for free
hex0r
Эксплоиты:
1
BusinessLevel:
4
Microsoft Windows 7 < 10 / Server 2008 < 2012 (x86/x64) - Privilege Escalation (MS16-032) (C#)
Комметариев:
0
4 886
Security Risk High
D
Download
C
CVE-2016-0099
Verified by
free
You can open this exploit for free
fdiskyou
Эксплоиты:
1
BusinessLevel:
4
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Microsoft Windows 7/2008 - Win32k Denial of Service Exploit
Комметариев:
0
11 689
Security Risk Medium
D
Download
C
CVE-2019-0808
Verified by
free
You can open this exploit for free
ze0r
Эксплоиты:
2
BusinessLevel:
7
Microsoft Windows - nt!NtQueryInformationProcess (information class 76, QueryProcessEnergyValues) Ke
Комметариев:
0
3 285
Security Risk Medium
D
Download
C
CVE-2018-0745
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
Microsoft Windows Kernel - IOCTL 0x120007 (NsiGetParameter) nsiproxy/netio Pool Memory Disclosure
Комметариев:
0
4 877
Security Risk High
D
Download
C
CVE-2017-8564
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
Microsoft Windows 7 Kernel - Uninitialized Memory in the Default dacl Descriptor of System Processes
Комметариев:
0
4 561
Security Risk High
D
Download
C
CVE-2017-0258
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
Microsoft Windows 7 Kernel - win32k!xxxClientLpkDrawTextEx Stack Memory Disclosure Exploit
Комметариев:
0
4 386
Security Risk High
D
Download
C
CVE-2017-0245
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
Microsoft Windows 7 Kernel - Pool-Based Out-of-Bounds Reads Due to bind() Implementation Bugs in afd
Комметариев:
0
4 453
Security Risk High
D
Download
C
CVE-2017-0175
CVE-2017-0220
CVE-2017-0220
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
12 166
Security Risk High
D
Download
C
CVE-2017-0143
CVE-2017-0144
CVE-2017-0145
CVE-2017-0146
CVE-2017-0147
CVE-2017-0148
CVE-2017-0144
CVE-2017-0145
CVE-2017-0146
CVE-2017-0147
CVE-2017-0148
Verified by
free
You can open this exploit for free
Sean Dillon
Эксплоиты:
6
BusinessLevel:
5
Microsoft Windows - Uniscribe Font Processing Buffer Overflow in USP10!FillAlternatesList (MS17-011)
Комметариев:
0
4 207
Security Risk Medium
D
Download
C
CVE-2017-0072
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
Microsoft Windows - Uniscribe Font Processing Multiple Heap-Based Out-of-Bounds and Wild Reads (MS17
Комметариев:
0
4 119
Security Risk Medium
D
Download
C
CVE-2017-0083
CVE-2017-0091
CVE-2017-0092
CVE-2017-0111
CVE-2017-0112
CVE-2017-0113
CVE-2017-0114
CVE-2017-0115
CVE-2017-0116
CVE-2017-0117
CVE-2017-0118
CVE-2017-0119
CVE-2017-0120
CVE-2017-0121
CVE-2017-0122
CVE-2017-0123
CVE-2017-0124
CVE-2017-0091
CVE-2017-0092
CVE-2017-0111
CVE-2017-0112
CVE-2017-0113
CVE-2017-0114
CVE-2017-0115
CVE-2017-0116
CVE-2017-0117
CVE-2017-0118
CVE-2017-0119
CVE-2017-0120
CVE-2017-0121
CVE-2017-0122
CVE-2017-0123
CVE-2017-0124
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
Microsoft Windows - LSASS SMB NTLM Exchange Null-Pointer Dereference (MS16-137) Exploit
Комметариев:
0
5 020
Security Risk High
D
Download
C
CVE-2016-7237
Verified by
free
You can open this exploit for free
Laurent Gaffie
Эксплоиты:
23
BusinessLevel:
10
3 526
Security Risk High
D
Download
C
CVE-2016-3220
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
3 535
Security Risk High
D
Download
C
CVE-2016-0171
Verified by
free
You can open this exploit for free
Nils Sommer
Эксплоиты:
9
BusinessLevel:
5
3 459
Security Risk High
D
Download
C
CVE-2016-0173
Verified by
free
You can open this exploit for free
Nils Sommer
Эксплоиты:
9
BusinessLevel:
5
Microsoft Windows devenum.dll!DeviceMoniker::Load() - Heap Corruption Buffer Underflow (MS16-007)
Комметариев:
0
3 989
Security Risk Medium
D
Download
C
CVE-2016-0015
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56