0day.today - أكبر قاعدة بيانات للثغرات في العالم.
![](/img/logo_green.jpg)
We use one main domain DOMAIN_LINK
If you want to purchase the exploit or pay for service, you need to buy Gold. We don't want you to use our site as a tool for hacking purposes, so any kind of action that could affect illegaly other users or websites that you don't have right to access will be banned and your account including your data will be destroyed.
Administration of this site uses the official contacts. Beware of impostors!
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ أرسل ] rules
- Visit the [ الأسئلة الشائعة ] page
- [ Register ] profile
- Get [ الذهب ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ [email protected] ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
يمكنكم الاتصال بنا من خلال:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Search results for exploits by request: Trend Micro
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
10 698
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2020-8604
CVE-2020-8605
CVE-2020-8606
CVE-2020-8605
CVE-2020-8606
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
metasploit
الثغرات:
1633
BusinessLevel:
92
13 003
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
hyp3rlinx
الثغرات:
253
BusinessLevel:
17
6 149
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
Matthew Bergin
الثغرات:
43
BusinessLevel:
9
5 258
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
mr_me
الثغرات:
109
BusinessLevel:
13
Trend Micro Smart Protection Server 3.2 XSS / Access Control / Disclosure Vulnerabilities
التعليقات:
0
3 767
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2017-11398
CVE-2017-14094
CVE-2017-14095
CVE-2017-14096
CVE-2017-14097
CVE-2017-14094
CVE-2017-14095
CVE-2017-14096
CVE-2017-14097
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
CoreLabs
الثغرات:
4
BusinessLevel:
8
4 397
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
James Fitts
الثغرات:
38
BusinessLevel:
9
Trend Micro Threat Discovery Appliance 2.6.1062r1 Session Generation Authentication Bypass Exploit
التعليقات:
0
6 404
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2016-8584
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
mr_me
الثغرات:
109
BusinessLevel:
13
Trend Micro Threat Discovery Appliance 2.6.1062r1 dlp_policy_upload.cgi Information Disclosure Explo
التعليقات:
0
6 397
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2016-7547
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
mr_me
الثغرات:
109
BusinessLevel:
13
Trend Micro Threat Discovery Appliance 2.6.1062r1 logoff.cgi Directory Traversal Exploit
التعليقات:
0
6 257
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2016-7552
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
mr_me
الثغرات:
109
BusinessLevel:
13
Trend Micro Threat Discovery Appliance 2.6.1062r1 admin_sys_time.cgi Remote Code Execution Exploit
التعليقات:
0
6 118
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
mr_me
الثغرات:
109
BusinessLevel:
13
Trend Micro Threat Discovery Appliance 2.6.1062r1 detected_potential_files.cgi Remote Code Execution
التعليقات:
0
6 229
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2016-8586
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
mr_me
الثغرات:
109
BusinessLevel:
13
Trend Micro Threat Discovery Appliance 2.6.1062r1 dlp_policy_upload.cgi Remote Code Execution Exploi
التعليقات:
0
6 070
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2016-8587
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
mr_me
الثغرات:
109
BusinessLevel:
13
Trend Micro Threat Discovery Appliance 2.6.1062r1 hotfix_upload.cgi Remote Code Execution Exploit
التعليقات:
0
6 018
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2016-8588
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
mr_me
الثغرات:
109
BusinessLevel:
13
Trend Micro Threat Discovery Appliance 2.6.1062r1 log_query_dae.cgi Remote Code Execution Exploit
التعليقات:
0
6 026
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2016-8589
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
mr_me
الثغرات:
109
BusinessLevel:
13
Trend Micro Threat Discovery Appliance 2.6.1062r1 log_query_dlp.cgi Remote Code Execution Exploit
التعليقات:
0
5 963
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2016-8590
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
mr_me
الثغرات:
109
BusinessLevel:
13
Trend Micro Threat Discovery Appliance 2.6.1062r1 log_query.cgi Remote Code Execution Exploit
التعليقات:
0
6 067
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2016-8591
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
mr_me
الثغرات:
109
BusinessLevel:
13
Trend Micro Threat Discovery Appliance 2.6.1062r1 log_query_system.cgi Remote Code Execution Exploit
التعليقات:
0
5 998
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2016-8592
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
mr_me
الثغرات:
109
BusinessLevel:
13
5 932
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2016-8593
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
mr_me
الثغرات:
109
BusinessLevel:
13
5 269
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
Matt Bergin
الثغرات:
3
BusinessLevel:
4
4 957
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
Matt Bergin
الثغرات:
3
BusinessLevel:
4
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Trend Micro OfficeScan Client 10.0 - ACL Service Local Privilege Escalation Vulnerability
التعليقات:
0
3 873
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
msd0pe
الثغرات:
5
BusinessLevel:
1
11 008
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2019-20357
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
hyp3rlinx
الثغرات:
253
BusinessLevel:
17
9 905
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2019-19697
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
hyp3rlinx
الثغرات:
253
BusinessLevel:
17
6 337
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
Peter Lapp
الثغرات:
10
BusinessLevel:
5
9 957
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
hyp3rlinx
الثغرات:
253
BusinessLevel:
17
9 081
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2018-10507
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
hyp3rlinx
الثغرات:
253
BusinessLevel:
17
5 330
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
hyp3rlinx
الثغرات:
253
BusinessLevel:
17
4 159
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2014-9641
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
Parvez Anwar
الثغرات:
16
BusinessLevel:
6
4 928
![](/img/risk/critlow_0.gif)
Security Risk Unsored
D
Download
-
![](/img/warning.png)
Not verified yet
مجاني
You can open this exploit for free
Nikita Tarakanov
الثغرات:
3
BusinessLevel:
7
unsorted
3 960
![](/img/risk/critlow_0.gif)
Security Risk Unsored
D
Download
-
![](/img/warning.png)
Not verified yet
مجاني
You can open this exploit for free
b1@ckeYe
الثغرات:
1
BusinessLevel:
8
4 420
![](/img/risk/critlow_0.gif)
Security Risk Unsored
D
Download
-
![](/img/warning.png)
Not verified yet
مجاني
You can open this exploit for free
Sebastian Wolfgarten
الثغرات:
4
BusinessLevel:
9
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
1 401
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2020-8461
CVE-2020-8462
CVE-2020-8463
CVE-2020-8464
CVE-2020-8465
CVE-2020-8466
CVE-2020-8462
CVE-2020-8463
CVE-2020-8464
CVE-2020-8465
CVE-2020-8466
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
Wolfgang Ettlinger
الثغرات:
9
BusinessLevel:
4
1 959
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2020-27016
CVE-2020-27017
CVE-2020-27018
CVE-2020-27019
CVE-2020-27693
CVE-2020-27694
CVE-2020-27017
CVE-2020-27018
CVE-2020-27019
CVE-2020-27693
CVE-2020-27694
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
Wolfgang Ettlinger
الثغرات:
9
BusinessLevel:
4
Trend Micro Web Security Virtual Appliance 6.5 SP2 Patch 4 Build 1901 Remote Code Execution Exploit
التعليقات:
0
2 377
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2020-8605
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
Mehmet Ince
الثغرات:
26
BusinessLevel:
7
4 650
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2018-6219
CVE-2018-6220
CVE-2018-6221
CVE-2018-6222
CVE-2018-6223
CVE-2018-6224
CVE-2018-6225
CVE-2018-6226
CVE-2018-6227
CVE-2018-6228
CVE-2018-6229
CVE-2018-6230
CVE-2018-6220
CVE-2018-6221
CVE-2018-6222
CVE-2018-6223
CVE-2018-6224
CVE-2018-6225
CVE-2018-6226
CVE-2018-6227
CVE-2018-6228
CVE-2018-6229
CVE-2018-6230
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
Core Security
الثغرات:
91
BusinessLevel:
13
3 695
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
Leonardo Duarte
الثغرات:
1
BusinessLevel:
3
Trend Micro InterScan Messaging Security (Virtual Appliance) - Remote Code Execution Exploit
التعليقات:
0
4 105
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
Mehmet Ince
الثغرات:
26
BusinessLevel:
7
9 689
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
metasploit
الثغرات:
1633
BusinessLevel:
92
Trend Micro OfficeScan 11.0/XG (12.0) - Code Execution / Memory Corruption Vulnerability
التعليقات:
0
8 613
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2017-14086
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
hyp3rlinx
الثغرات:
253
BusinessLevel:
17
8 578
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2017-14083
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
hyp3rlinx
الثغرات:
253
BusinessLevel:
17
8 461
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2017-14087
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
hyp3rlinx
الثغرات:
253
BusinessLevel:
17
8 542
![](/img/risk/critlow_1.gif)
Security Risk Low
D
Download
-
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
hyp3rlinx
الثغرات:
253
BusinessLevel:
17
8 443
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2017-14083
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
hyp3rlinx
الثغرات:
253
BusinessLevel:
17
Trend Micro Deep Security version 6.5 - XML External Entity Injection / Local Privilege Escalation /
التعليقات:
0
4 364
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
SecuriTeam
الثغرات:
20
BusinessLevel:
5
4 095
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2017-9032
CVE-2017-9033
CVE-2017-9034
CVE-2017-9035
CVE-2017-9036
CVE-2017-9037
CVE-2017-9033
CVE-2017-9034
CVE-2017-9035
CVE-2017-9036
CVE-2017-9037
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
Leandro Barragan
الثغرات:
1
BusinessLevel:
4
Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 SP2 - Multiple Vulnerabilities
التعليقات:
0
4 392
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2017-6338
CVE-2017-6339
CVE-2017-6340
CVE-2017-6339
CVE-2017-6340
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
SlidingWindow
الثغرات:
10
BusinessLevel:
4
Trend Micro InterScan Messaging Security (Virtual Appliance) Remote Code Execution Exploit
التعليقات:
0
4 185
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
Mehmet Ince
الثغرات:
26
BusinessLevel:
7
Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 - Multiple Vulnerabilities
التعليقات:
0
4 517
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2016-9269
CVE-2016-9316
CVE-2016-9315
CVE-2016-9314
CVE-2016-9316
CVE-2016-9315
CVE-2016-9314
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
SlidingWindow
الثغرات:
10
BusinessLevel:
4
Trend Micro Deep Discovery 3.7 / 3.8 SP1 (3.81) / 3.8 SP2 (3.82) - hotfix_upload.cgi Filename Remote
التعليقات:
0
3 743
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2016-5840
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
korpritzombie
الثغرات:
1
BusinessLevel:
4
9 140
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
Google Security Research
الثغرات:
1019
BusinessLevel:
56
3 532
![](/img/risk/critlow_1.gif)
Security Risk Low
D
Download
-
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
hyp3rlinx
الثغرات:
253
BusinessLevel:
17
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
13 685
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
Saud Alenazi
الثغرات:
32
BusinessLevel:
3
Trend Micro Virtual Mobile Infrastructure 5.5.1336 - Server address Denial of Service Exploit
التعليقات:
0
4 113
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
Luis Martínez
الثغرات:
57
BusinessLevel:
7
4 603
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
Luis Martínez
الثغرات:
57
BusinessLevel:
7
8 586
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2017-14089
![](/img/check.png)
Verified by
مجاني
You can open this exploit for free
hyp3rlinx
الثغرات:
253
BusinessLevel:
17
4 309
![](/img/risk/critlow_0.gif)
Security Risk Unsored
D
Download
-
![](/img/warning.png)
Not verified yet
مجاني
You can open this exploit for free
Damian Put
الثغرات:
5
BusinessLevel:
9