[ authorization ] [ registration ] [ استعادة ]
اتصل بنا
يمكنكم الاتصال بنا من خلال:
0day.today Exploits Market and 0day Exploits Database
البحث:
 
 
 
الصنف:   المنصة:
 
Price from:   Price to:
 
Author login:   CVE:

Search results for exploits by request: Microsoft Windows 10

[ remote exploits ]

Remote exploits and vulnerabilities category


A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
8 752
Security Risk High
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Simon Zuckerbraun
الثغرات:
2
BusinessLevel:
3
7 508
Security Risk Critical
R
D
Download
C
CVE-2017-0143
CVE-2017-0146
CVE-2017-0147
Verified by
مجاني
You can open this exploit for free
metasploit
الثغرات:
1626
BusinessLevel:
92
9 645
Security Risk Critical
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
sleepya
الثغرات:
4
BusinessLevel:
5
9 153
Security Risk Critical
R
D
Download
C
CVE-2017-0144
Verified by
مجاني
You can open this exploit for free
sleepya
الثغرات:
4
BusinessLevel:
5
8 014
Security Risk Critical
R
D
Download
C
CVE-2017-0144
Verified by
مجاني
You can open this exploit for free
sleepya
الثغرات:
4
BusinessLevel:
5
8 468
Security Risk High
R
D
Download
C
CVE-2017-0143
CVE-2017-0144
CVE-2017-0145
CVE-2017-0146
CVE-2017-0147
CVE-2017-0148
Verified by
مجاني
You can open this exploit for free
metasploit
الثغرات:
1626
BusinessLevel:
92
11 606
Security Risk Critical
R
D
Download
C
CVE-2017-0143
CVE-2017-0144
CVE-2017-0145
CVE-2017-0146
CVE-2017-0147
CVE-2017-0148
Verified by
مجاني
You can open this exploit for free
Juan Sacco
الثغرات:
46
BusinessLevel:
12
12 949
Security Risk High
R
D
Download
C
CVE-2017-0290
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
6 114
Security Risk Critical
R
D
Download
C
CVE-2016-7200
CVE-2016-7201
Verified by
مجاني
You can open this exploit for free
Brian Pak
الثغرات:
2
BusinessLevel:
4
5 346
Security Risk Critical
R
D
Download
C
CVE-2015-2509
Verified by
مجاني
You can open this exploit for free
metasploit
الثغرات:
1626
BusinessLevel:
92

[ local exploits ]

Local exploits and vulnerabilities category


A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
2 304
Security Risk Critical
R
D
Download
C
CVE-2024-21338
Verified by
مجاني
You can open this exploit for free
E1 Coders
الثغرات:
2
BusinessLevel:
0
9 903
Security Risk Critical
R
D
Download
C
CVE-2020-0796
Verified by
مجاني
You can open this exploit for free
Daniel García Gutiérrez
الثغرات:
1
BusinessLevel:
2
8 479
Security Risk High
R
D
Download
C
CVE-2018-8413
Verified by
مجاني
You can open this exploit for free
Eduardo Braun Prado
الثغرات:
16
BusinessLevel:
5
9 297
Security Risk High
R
D
Download
C
CVE-2019-1215
Verified by
مجاني
You can open this exploit for free
bluefrostsec
الثغرات:
1
BusinessLevel:
2
7 862
Security Risk High
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Nassim Asrir
الثغرات:
28
BusinessLevel:
5
6 575
Security Risk High
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
valen
الثغرات:
3
BusinessLevel:
2
5 982
Security Risk Critical
R
D
Download
C
CVE-2019-1405
CVE-2019-1322
Verified by
مجاني
You can open this exploit for free
TomahawkAPT69
الثغرات:
1
BusinessLevel:
2
5 174
Security Risk Critical
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Abdelhamid Naceri
الثغرات:
4
BusinessLevel:
3
10 167
Security Risk High
R
D
Download
C
CVE-2019-1089
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
5 479
Security Risk Critical
R
D
Download
C
CVE-2019-0841
Verified by
مجاني
You can open this exploit for free
James Forshaw
الثغرات:
6
BusinessLevel:
5
9 763
Security Risk High
R
D
Download
C
CVE-2019-1019
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
5 256
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
SandboxEscaper
الثغرات:
10
BusinessLevel:
3
9 738
Security Risk High
R
D
Download
C
CVE-2019-0881
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
10 017
Security Risk High
R
D
Download
C
CVE-2019-0836
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
9 720
Security Risk High
R
D
Download
C
CVE-2019-0805
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
9 629
Security Risk High
R
D
Download
C
CVE-2019-0796
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
9 608
Security Risk High
R
D
Download
C
CVE-2019-0731
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
9 604
Security Risk High
R
D
Download
C
CVE-2019-0730
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
9 684
Security Risk High
R
D
Download
C
CVE-2019-0735
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
9 499
Security Risk High
R
D
Download
C
CVE-2019-0732
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56

[ dos / poc ]

DOS exploits and vulnerabilities category


PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.

PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
14 864
Security Risk Medium
R
D
Download
C
CVE-2020-0796
Verified by
مجاني
You can open this exploit for free
eerykitty
الثغرات:
1
BusinessLevel:
2
12 808
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
vportal
الثغرات:
8
BusinessLevel:
4
6 951
Security Risk Medium
R
D
Download
C
CVE-2019-0570
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
5 975
Security Risk Medium
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Nassim Asrir
الثغرات:
28
BusinessLevel:
5
5 538
Security Risk High
R
D
Download
-
Verified by
مجاني
You can open this exploit for free
Matthias Deeg
الثغرات:
27
BusinessLevel:
6
3 824
Security Risk Medium
R
D
Download
C
CVE-2017-11831
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
4 212
Security Risk High
R
D
Download
C
CVE-2017-11823
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
4 970
Security Risk Medium
R
D
Download
C
CVE-2017-0283
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
4 941
Security Risk Medium
R
D
Download
C
CVE-2017-0284
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
4 914
Security Risk Medium
R
D
Download
C
CVE-2017-0285
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
4 753
Security Risk Medium
R
D
Download
C
CVE-2017-0282
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
4 897
Security Risk Medium
R
D
Download
C
CVE-2017-0286
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
4 605
Security Risk Medium
R
D
Download
C
CVE-2017-0287
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
4 770
Security Risk Medium
R
D
Download
C
CVE-2017-0289
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
4 665
Security Risk Medium
R
D
Download
C
CVE-2017-0288
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
5 176
Security Risk High
R
D
Download
C
CVE-2017-0259
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
12 166
Security Risk High
R
D
Download
C
CVE-2017-0143
CVE-2017-0144
CVE-2017-0145
CVE-2017-0146
CVE-2017-0147
CVE-2017-0148
Verified by
مجاني
You can open this exploit for free
Sean Dillon
الثغرات:
6
BusinessLevel:
5
4 485
Security Risk Medium
R
D
Download
C
CVE-2017-0085
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
4 310
Security Risk Medium
R
D
Download
C
CVE-2017-0108
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
4 477
Security Risk Medium
R
D
Download
C
CVE-2017-0084
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56