0day.today - наибольшая база данных эксплоитов в мире.
![](/img/logo_green.jpg)
Мы используем один основной домен 0day.today
Если Вы желаете приобрести эксплоит или заплатить за услуги - Вам необходимо приобрести Золото (Gold). Мы не хотим чтобы Вы использовали наш сайт как инструмент для взломов, поэтому любые действия, которые могут незаконно влиять на других пользователей или на сайты, к которым у Вас нет прав доступа будут запрещены и Ваш профиль со всей вложенной информацией будет уничтожен.
Администрация сайта использует официальные контакты. Опасайтесь обманщиков!
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
Please, beware of scammers!
- Прочитайте [ соглашение ]
- Прочитайте [ Отправить ] правила
- Посетите страницу [ faq ] page
- [ Зарегистрируйте ] профиль
- Получите [ Gold ]
- Если Вы хотите [ продать ]
- Если Вы хотите [ купить ]
- Если Вы потеряли [ Счет ]
- Любые вопросы [ [email protected] ]
- Страница авторизации
- Страница регистрации
- Страница восстановления
- Страница FAQ
- Страница контактов
- Правила публикации
- Страница с соглашением
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Вы можете связаться с нами по:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Netis MW5360 Remote Command Execution Exploit
Комметариев:
0
609
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2024-22729
![](/img/check.png)
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1633
BusinessLevel:
92
784
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2024-1800
CVE-2024-4358
CVE-2024-4358
![](/img/check.png)
Verified by
free
You can open this exploit for free
Soroush Dalili
Эксплоиты:
15
BusinessLevel:
10
673
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1633
BusinessLevel:
92
Cacti Import Packages Remote Code Execution Exploit
Комметариев:
0
625
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2024-25641
![](/img/check.png)
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1633
BusinessLevel:
92
VSCode ipynb Remote Code Execution Exploit
Комметариев:
0
693
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2022-41034
![](/img/check.png)
Verified by
free
You can open this exploit for free
Zemnmez
Эксплоиты:
1
BusinessLevel:
0
903
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2021-38283
![](/img/check.png)
Verified by
free
You can open this exploit for free
ub3rsick
Эксплоиты:
2
BusinessLevel:
0
Flowmon Unauthenticated Command Injection Exploit
Комметариев:
0
873
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2024-2389
![](/img/check.png)
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1633
BusinessLevel:
92
changedetection 0.45.20 Remote Code Execution Exploit
Комметариев:
0
725
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2024-32651
![](/img/check.png)
Verified by
free
You can open this exploit for free
Zach Crosman
Эксплоиты:
1
BusinessLevel:
0
ElkArte Forum 1.1.9 Remote Code Execution Vulnerability
Комметариев:
0
1 489
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
tmrswrr
Эксплоиты:
53
BusinessLevel:
3
1 822
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2024-30850
CVE-2024-31839
CVE-2024-31839
![](/img/check.png)
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1633
BusinessLevel:
92
Zope 5.9 Command Injection Vulnerability
Комметариев:
0
1 926
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2024-33828
![](/img/check.png)
Verified by
free
You can open this exploit for free
Ilyase Dehy
Эксплоиты:
1
BusinessLevel:
0
CrushFTP < 11.1.0 - Directory Traversal Exploit
Комметариев:
0
1 951
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
Abdualhadi khalifa
Эксплоиты:
5
BusinessLevel:
0
Kemp LoadMaster Unauthenticated Command Injection Exploit
Комметариев:
0
2 629
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2024-1212
![](/img/check.png)
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1633
BusinessLevel:
92
Apache Solr Backup/Restore API Remote Code Execution Exploit
Комметариев:
0
2 944
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2023-50386
![](/img/check.png)
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1633
BusinessLevel:
92
2 413
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
kai6u
Эксплоиты:
2
BusinessLevel:
0
FortiNet FortiClient EMS 7.2.2 / 7.0.10 SQL Injection / Remote Code Execution Exploit
Комметариев:
0
2 965
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2023-48788
![](/img/check.png)
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1633
BusinessLevel:
92
Visual Studio Code Execution Exploit
Комметариев:
0
3 141
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1633
BusinessLevel:
92
Gambio Online Webshop 4.9.2.0 Remote Code Execution Exploit
Комметариев:
0
2 035
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2024-23759
![](/img/check.png)
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1633
BusinessLevel:
92
2 204
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2024-3400
![](/img/check.png)
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1633
BusinessLevel:
92
Palo Alto PAN-OS < v11.1.2-h3 - Command Injection and Arbitrary File Creation Exploit
Комметариев:
0
2 302
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2024-3400
![](/img/check.png)
Verified by
free
You can open this exploit for free
Kr0ff
Эксплоиты:
4
BusinessLevel:
2
pgAdmin 8.3 Remote Code Execution Exploit
Комметариев:
0
2 647
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2024-2044
![](/img/check.png)
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1633
BusinessLevel:
92
CrushFTP Remote Code Execution Exploit
Комметариев:
0
2 752
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2023-43177
![](/img/check.png)
Verified by
free
You can open this exploit for free
Ryan Emmons
Эксплоиты:
1
BusinessLevel:
0
MinIO < 2024-01-31T20-20-33Z - Privilege Escalation Exploit
Комметариев:
0
2 221
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2024-24747
![](/img/check.png)
Verified by
free
You can open this exploit for free
Jenson Zhao
Эксплоиты:
3
BusinessLevel:
1
CHAOS RAT 5.0.1 Remote Command Execution Exploit
Комметариев:
0
2 524
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2024-30850
CVE-2024-31839
CVE-2024-31839
![](/img/check.png)
Verified by
free
You can open this exploit for free
chebuya
Эксплоиты:
1
BusinessLevel:
0
2 543
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
LiquidWorm
Эксплоиты:
731
BusinessLevel:
46
GL.iNet MT6000 4.5.5 - Arbitrary File Download Exploit
Комметариев:
0
2 584
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2024-27356
![](/img/check.png)
Verified by
free
You can open this exploit for free
Bandar Alharbi
Эксплоиты:
1
BusinessLevel:
0
TeamCity Agent XML-RPC Command Execution Exploit
Комметариев:
0
2 536
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
Dylan Pindur
Эксплоиты:
3
BusinessLevel:
3
2 595
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2022-26318
![](/img/check.png)
Verified by
free
You can open this exploit for free
Dylan Pindur
Эксплоиты:
3
BusinessLevel:
3
4 136
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
free
You can open this exploit for free
E1 Coders
Эксплоиты:
2
BusinessLevel:
0