0day.today - أكبر قاعدة بيانات للثغرات في العالم.
Things you should know about it:
We use one main domain DOMAIN_LINK
If you want to purchase the exploit or pay for service, you need to buy Gold. We don't want you to use our site as a tool for hacking purposes, so any kind of action that could affect illegaly other users or websites that you don't have right to access will be banned and your account including your data will be destroyed.
Administration of this site uses the official contacts. Beware of impostors!
We use one main domain DOMAIN_LINK
If you want to purchase the exploit or pay for service, you need to buy Gold. We don't want you to use our site as a tool for hacking purposes, so any kind of action that could affect illegaly other users or websites that you don't have right to access will be banned and your account including your data will be destroyed.
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ أرسل ] rules
- Visit the [ الأسئلة الشائعة ] page
- [ Register ] profile
- Get [ الذهب ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ [email protected] ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
يمكنكم الاتصال بنا من خلال:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
المؤلف
BL
5
الثغرات
42
القراء
0
Reg date
12-08-2018
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 100
Security Risk High
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
Faleemi Desktop Software 1.8.2 - SavePath for ScreenShots Buffer Overflow (SEH) Exploit
التعليقات:
0
3 897
Security Risk High
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
2 840
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
3 060
Security Risk Medium
D
Download
C
CVE-2019-11028
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
2 828
Security Risk Medium
D
Download
C
CVE-2014-10079
CVE-2014-10078
CVE-2014-10078
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
pfSense 2.4.4-p1 (HAProxy Package 0.59_14) - Persistent Cross-Site Scripting Vulnerability
التعليقات:
0
3 116
Security Risk High
D
Download
C
CVE-2019-8953
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
2 660
Security Risk Low
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
3 689
Security Risk Low
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Canarytokens 2019-03-01 - Detection Bypass Exploit
التعليقات:
0
10 902
Security Risk Medium
D
Download
C
CVE-2019-9768
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
MixPad v4.40 - Unicode Buffer Overflow Exploit
التعليقات:
0
3 351
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
LanSpy 2.0.1.159 - Local Buffer Overflow Exploit
التعليقات:
0
3 733
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
Textpad 8.1.2 - Denial Of Service Exploit
التعليقات:
0
3 211
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
CrossFont 7.5 - Denial of Service Exploit
التعليقات:
0
3 451
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
TransMac 12.2 - Denial of Service Exploit
التعليقات:
0
3 446
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
Faleemi Plus 1.0.2 - Denial of Service Exploit
التعليقات:
0
3 638
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
3 633
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
3 522
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
PDF Explorer 1.5.66.2 - Denial of Service Exploit
التعليقات:
0
3 453
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
iCash 7.6.5 - Denial of Service Exploit
التعليقات:
0
2 866
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
PicaJet FX 2.6.5 - Denial of Service Exploit
التعليقات:
0
2 894
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
RoboImport 1.2.0.72 - Denial of Service Exploit
التعليقات:
0
2 850
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
PixGPS 1.1.8 - Denial of Service Exploit
التعليقات:
0
2 760
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
3 067
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
3 509
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
Zenmap Nmap 7.70 - Denial of Service Exploit
التعليقات:
0
3 873
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
Easy PhotoResQ 1.0 - Denial Of Service Exploit
التعليقات:
0
4 026
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
Drive Power Manager 1.10 - Denial Of Service Exploit
التعليقات:
0
3 830
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
HD Tune Pro 5.70 - Denial of Service Exploit
التعليقات:
0
3 794
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
Fathom 2.4 - Denial Of Service Exploit
التعليقات:
0
3 542
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
Immunity Debugger 1.85 - Denial of Service
التعليقات:
0
3 701
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
StyleWriter 4 1.0 - Denial of Service Exploit
التعليقات:
0
3 307
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
Softdisk 3.0.3 - Denial Of Service Exploit
التعليقات:
0
3 192
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
Easyboot 6.6.0 - Denial Of Service Exploit
التعليقات:
0
3 640
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
Textpad 7.6.4 - Denial Of Service Exploit
التعليقات:
0
3 426
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
Project64 2.3.2 - Denial Of Service Exploit
التعليقات:
0
3 895
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
Prime95 29.4b7 - Denial Of Service Exploit
التعليقات:
0
3 486
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
Restorator 1793 - Denial of Service Exploit
التعليقات:
0
3 603
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5
3 667
Security Risk Medium
D
Download
-
Verified by
مجاني
You can open this exploit for free
Gionathan Reale
الثغرات:
42
BusinessLevel:
5