0day.today - أكبر قاعدة بيانات للثغرات في العالم.
Things you should know about it:
We use one main domain DOMAIN_LINK
If you want to purchase the exploit or pay for service, you need to buy Gold. We don't want you to use our site as a tool for hacking purposes, so any kind of action that could affect illegaly other users or websites that you don't have right to access will be banned and your account including your data will be destroyed.
Administration of this site uses the official contacts. Beware of impostors!
We use one main domain DOMAIN_LINK
If you want to purchase the exploit or pay for service, you need to buy Gold. We don't want you to use our site as a tool for hacking purposes, so any kind of action that could affect illegaly other users or websites that you don't have right to access will be banned and your account including your data will be destroyed.
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ أرسل ] rules
- Visit the [ الأسئلة الشائعة ] page
- [ Register ] profile
- Get [ الذهب ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ [email protected] ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
يمكنكم الاتصال بنا من خلال:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Search results for exploits by request: Google Chrome
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
7 760
Security Risk Critical
D
Download
C
CVE-2019-13720
Verified by
مجاني
You can open this exploit for free
Forrest Orr
الثغرات:
5
BusinessLevel:
2
9 400
Security Risk Critical
D
Download
C
CVE-2021-21220
Verified by
مجاني
You can open this exploit for free
metasploit
الثغرات:
1625
BusinessLevel:
92
9 244
Security Risk Critical
D
Download
C
CVE-2020-6507
Verified by
مجاني
You can open this exploit for free
Tobias Marcotto
الثغرات:
5
BusinessLevel:
2
9 364
Security Risk Critical
D
Download
C
CVE-2020-16040
Verified by
مجاني
You can open this exploit for free
Tobias Marcotto
الثغرات:
5
BusinessLevel:
2
10 974
Security Risk High
D
Download
C
CVE-2020-6418
Verified by
مجاني
You can open this exploit for free
metasploit
الثغرات:
1625
BusinessLevel:
92
Google Chrome 72 / 73 Array.map Corruption Exploit
التعليقات:
0
10 383
Security Risk High
D
Download
C
CVE-2019-5825
Verified by
مجاني
You can open this exploit for free
metasploit
الثغرات:
1625
BusinessLevel:
92
10 195
Security Risk High
D
Download
C
CVE-2018-17463
Verified by
مجاني
You can open this exploit for free
metasploit
الثغرات:
1625
BusinessLevel:
92
Google Chrome 72.0.3626.121 / 74.0.3725.0 - NewFixedDoubleArray Integer Overflow Exploit
التعليقات:
0
9 111
Security Risk High
D
Download
-
Verified by
مجاني
You can open this exploit for free
Glazvunov
الثغرات:
9
BusinessLevel:
3
Google Chrome RCE + Sandbox Escape 0day Exploit
قيّم للأعلى:
0
قيّم للأدنى:
0
التعليقات:
7
21 432
Security Risk Critical
D
Download
-
Verified by
0.085
Open this exploit for 0.085 BTC
Open this exploit for 5 200 الذهب
0day Today Team
الثغرات:
293
BusinessLevel:
31
8 304
Security Risk Critical
D
Download
C
CVE-2016-9651
Verified by
مجاني
You can open this exploit for free
Qihoo360
الثغرات:
1
BusinessLevel:
4
7 300
Security Risk High
D
Download
-
Verified by
مجاني
You can open this exploit for free
halbecaf
الثغرات:
1
BusinessLevel:
4
Google Chrome SpeechRecognitionClient Use-After-Free Remote Code Execution Vulnerability
قيّم للأعلى:
0
قيّم للأدنى:
0
التعليقات:
0
6 812
Security Risk Critical
D
Download
C
CVE-2015-1251
Verified by
0.057
Open this exploit for 0.057 BTC
Open this exploit for 3 500 الذهب
SkyLined
الثغرات:
59
BusinessLevel:
13
Google Chrome 31.0 XSS Auditor Bypass Vulnerability
التعليقات:
0
6 944
Security Risk High
D
Download
-
Verified by
مجاني
You can open this exploit for free
Rafay Baloch
الثغرات:
11
BusinessLevel:
6
Google Chrome (res://mshtml.dll) Remote Exploit
التعليقات:
0
9 898
Security Risk Unsored
D
Download
-
Not verified yet
مجاني
You can open this exploit for free
Caddy-Dz
الثغرات:
63
BusinessLevel:
10
6 823
Security Risk Unsored
D
Download
-
Not verified yet
مجاني
You can open this exploit for free
Jordi Chancel
الثغرات:
3
BusinessLevel:
7
unsorted
5 361
Security Risk Unsored
D
Download
-
Not verified yet
مجاني
You can open this exploit for free
waraxe
الثغرات:
37
BusinessLevel:
10
unsorted
5 288
Security Risk Unsored
D
Download
-
Not verified yet
مجاني
You can open this exploit for free
Nine:Situations:Group
الثغرات:
39
BusinessLevel:
10
unsorted
5 068
Security Risk Unsored
D
Download
-
Not verified yet
مجاني
You can open this exploit for free
SVRT
الثغرات:
1
BusinessLevel:
8
unsorted
5 330
Security Risk Unsored
D
Download
-
Not verified yet
مجاني
You can open this exploit for free
nerex
الثغرات:
1
BusinessLevel:
8
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
5 085
Security Risk Critical
D
Download
-
Verified by
مجاني
You can open this exploit for free
Rafay Baloch
الثغرات:
11
BusinessLevel:
6
3 817
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Rafay Baloch
الثغرات:
11
BusinessLevel:
6
Google Chrome Password Disclosure Vulnerability
التعليقات:
0
6 222
Security Risk High
D
Download
-
Verified by
مجاني
You can open this exploit for free
John Martinelli
الثغرات:
4
BusinessLevel:
9
5 713
Security Risk High
D
Download
-
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
Google Chrome + Fedora 25 / Ubuntu 16.04 - tracker-extract / gnome-video-thumbnailer + totem Drive-B
التعليقات:
0
5 059
Security Risk High
D
Download
-
Verified by
مجاني
You can open this exploit for free
Chris Evans
الثغرات:
5
BusinessLevel:
8
5 781
Security Risk Unsored
D
Download
-
Not verified yet
مجاني
You can open this exploit for free
PoisonCode
الثغرات:
20
BusinessLevel:
11
5 758
Security Risk Unsored
D
Download
-
Not verified yet
مجاني
You can open this exploit for free
PoisonCode
الثغرات:
20
BusinessLevel:
11
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Google Chrome 103.0.5060.53 Autofill Assistant Universal Cross Site Scripting Vulnerability
التعليقات:
0
4 520
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Glazvunov
الثغرات:
9
BusinessLevel:
3
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
5 746
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
LiquidWorm
الثغرات:
730
BusinessLevel:
46
8 767
Security Risk High
D
Download
C
CVE-2020-16040
Verified by
مجاني
You can open this exploit for free
metasploit
الثغرات:
1625
BusinessLevel:
92
11 361
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Cem Onat Karagun
الثغرات:
1
BusinessLevel:
2
12 604
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
12 473
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
13 720
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Glazvunov
الثغرات:
9
BusinessLevel:
3
Google Chrome V8 - Turbofan JSCallReducer::ReduceArrayIndexOfIncludes Out-of-Bounds Read/Write
التعليقات:
0
11 914
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
Google Chrome 73.0.3683.103 V8 JavaScript Engine - Out-of-Memory in Invalid Table Size DoS
التعليقات:
0
14 474
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Bogdan Kurinnoy
الثغرات:
6
BusinessLevel:
3
Google Chrome 72.0.3626.96 / 74.0.3702.0 - JSPromise::TriggerPromiseReactions Type Confusion
التعليقات:
0
11 561
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
Google Chrome 73.0.3683.39 / Chromium 74.0.3712.0 - ReadableStream Internal Object Leak Type Confusi
التعليقات:
0
11 485
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
11 447
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
11 232
Security Risk Medium
D
Download
C
CVE-2019-5788
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
11 050
Security Risk Medium
D
Download
C
CVE-2019-5789
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
10 916
Security Risk Medium
D
Download
C
CVE-2019-5796
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
10 868
Security Risk Medium
D
Download
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
11 157
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
Google Chrome < M72 - RenderFrameHostImpl::CreateMediaStreamDispatcherHost Use-After-Free
التعليقات:
0
10 935
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
Google Chrome < M72 - Use-After-Free in RenderProcessHostImpl Binding for P2PSocketDispatcherHost
التعليقات:
0
10 917
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
10 872
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
Google Chrome V8 JavaScript Engine 71.0.3578.98 - Out-of-Memory in Invalid Array Length
التعليقات:
0
9 902
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Bogdan Kurinnoy
الثغرات:
6
BusinessLevel:
3