0day.today - Größte Exploit-Datenbank der Welt.
Dinge, die Du wissen solltest:
Wir benutzen eine Hauptdomain DOMAIN_LINK
Wenn Du den Exploit kaufen, oder für einen Service bezahlen möchtest, musst Du Gold kaufen. Wir wollen nicht, dass Du unsere Seite als ein Werkzeug für Aktivitäten wie Hacking verwendest. Illegale Aktionen, die andere Benutzer oder Webseiten betreffen, für die Du keine Zugriffsrechte hast, führen dazu, dass der Account gebannt und alle Daten von diesem unwiderruflich gelöscht werden.
Die Administratoren dieser Seite benutzen nur die offiziellen Kontaktdaten. Achte auf Betrüger!
Wir benutzen eine Hauptdomain DOMAIN_LINK
Wenn Du den Exploit kaufen, oder für einen Service bezahlen möchtest, musst Du Gold kaufen. Wir wollen nicht, dass Du unsere Seite als ein Werkzeug für Aktivitäten wie Hacking verwendest. Illegale Aktionen, die andere Benutzer oder Webseiten betreffen, für die Du keine Zugriffsrechte hast, führen dazu, dass der Account gebannt und alle Daten von diesem unwiderruflich gelöscht werden.
Die Administratoren dieser Seite benutzen nur die offiziellen Kontaktdaten. Achte auf Betrüger!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Lies [ Vereinbarung ]
- Lies [ Senden ] Regeln
- Besuche [ FAQ ] page
- [ Registrieren ] Profil
- Bekommen [ GOLD ]
- Wenn Du möchtest [ Verkaufen ]
- Wenn Du möchtest [ Kaufen ]
- Wenn Du vergessen hast [ Account ]
- Fragen [ [email protected] ]
- Anmeldungsseite
- Registrierungsseite
- Seite für Accountwiederherstellung
- FAQ Seite
- Kontakt
- Regeln für Veröffentlichungen
- Vereinbarungsseite
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
[ Autor: metacom ]
Autor
BL
9
Exploits
56
Leser
0
Reg date
12-11-2012
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
PDF Shaper Buffer Overflow Exploit
Kommentare:
0
3 987
Security Risk Critical
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
WebDrive 12.2 (Build # 4172) - Buffer OverFlow PoC
Kommentare:
0
3 324
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
SkinCrafter3_vs2005 ActiveX Exploit
Kommentare:
0
3 709
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
SkinCrafter3_vs2008 ActiveX Exploit
Kommentare:
0
3 638
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
SkinCrafter3_vs2010 ActiveX Exploit
Kommentare:
0
3 676
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
Internet Haut Debit Mobile Buffer Overflow Vulnerability
Kommentare:
0
4 137
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
ALLMediaServer version 0.95 SEH Overflow Exploit
Kommentare:
0
5 742
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
MediaCoder .M3U Buffer Overflow Vulnerability
Kommentare:
0
4 808
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
ALLMediaServer 0.94 Buffer Overflow Exploit
Kommentare:
0
4 376
Security Risk High
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
ALLMediaServer 0.94 SEH Overflow Exploit
Kommentare:
0
4 513
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Xinfire TV Player 6.0.1.2 Buffer Overflow Exploit
Kommentare:
0
8 068
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
Xinfire DVD Player 5.5.0.0 Buffer Overflow Exploit
Kommentare:
0
8 065
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
ChiefPDF Software 2.0 - Buffer Overflow Exploit
Kommentare:
0
3 637
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
Tango DropBox 3.1.5 Active-X Heap Spray Vulnerability
Kommentare:
0
3 681
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
Tango FTP 1.0 Active-X Heap Spray Vulnerability
Kommentare:
0
3 514
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
3 425
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
3 441
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
T-Mobile Internet Manager SEH Buffer Overflow Exploit
Kommentare:
0
3 883
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
Congstar Internet-Manager SEH Buffer Overflow Exploit
Kommentare:
0
3 885
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
i-FTP Buffer Overflow SEH Exploit
Kommentare:
0
3 994
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
Free WMA MP3 Converter 1.8 SEH Buffer Overflow Exploit
Kommentare:
0
4 405
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
BlazeDVD Pro v7.0 - (.plf) Buffer Overflow (SEH) Exploit
Kommentare:
0
5 359
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
5 075
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
AoA Audio Extractor Basic ActiveX
Kommentare:
0
4 352
Security Risk Medium
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
AoA MP4 Converter ActiveX
Kommentare:
0
4 241
Security Risk Medium
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
AoA DVD Creator ActiveX
Kommentare:
0
4 397
Security Risk Medium
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
KMPlayer 3.8.0.117 - Buffer Overflow Exploit
Kommentare:
0
4 493
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
KMPlayer 3.8.0.117 Buffer Overflow
Kommentare:
0
3 991
Security Risk Medium
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
GoldMP4Player Buffer Overflow (SEH)
Kommentare:
0
4 014
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
Steinberg MyMp3PRO v5.0 Buffer Overflow
Kommentare:
0
4 163
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
Steinberg MyMp3PRO v5.0 SEH Buffer Overflow
Kommentare:
0
4 014
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
Steinberg MyMp3PRO v5.0 DEP Bypass with ROP
Kommentare:
0
4 030
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
VideoSpirit Pro 1.90 Seh Buffer Overflow Vulnerability
Kommentare:
0
4 056
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
VideoSpirit Lite 1.77 Seh Buffer Overflow Vulnerability
Kommentare:
0
3 854
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
Watermark Master Buffer Overflow (SEH) Vulnerability
Kommentare:
0
4 199
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
VideoCharge Studio SEH Buffer Overflow Vulnerability
Kommentare:
0
4 375
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
4 316
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
Internet Haut Debit Mobile Buffer Overflow SEH
Kommentare:
0
5 137
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
MediaCoder 0.8.23.5530 SEH Buffer Overflow Vulnerability
Kommentare:
0
5 102
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
Mediacoder .lst SEH Buffer Overflow Vulnerability
Kommentare:
0
4 863
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
3 242
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
i.Mage Local Crash Proof of Concept Exploit
Kommentare:
0
4 096
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
i.Hex Local Crash Proof of Concept Exploit
Kommentare:
0
4 075
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
ALLPlayer Local Buffer Overflow PoC UNICODE
Kommentare:
0
4 966
Security Risk Low
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
AVS Media Player (.ac3) Denial of Service
Kommentare:
0
4 295
Security Risk Low
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
4 981
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
4 518
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
AudioCoder Buffer Overflow Exploit (SEH)
Kommentare:
0
4 781
Security Risk High
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
Elecard MPEG Player 5.8 Local PoC
Kommentare:
0
4 035
Security Risk Low
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
MediaMonkey Player v.4.0.7 Local Denial of Service
Kommentare:
0
4 273
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
Easy DVD Player V3.5.1 (libav) libavcodec_plugin.dll DOS
Kommentare:
0
4 567
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
BlazeDVD Free Edition 6.1.1.6 Buffer Overflow
Kommentare:
0
4 673
Security Risk High
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
BlazeVideo HDTV Standard v.6.6.0.2 SEH Buffer Overflow
Kommentare:
0
4 336
Security Risk High
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
4 449
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
FoxPlayer v2.9.0 Denial of Service Vulnerability
Kommentare:
0
3 793
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9
A-PDF All to MP3 Converter v.2.3.0 buffer overflow
Kommentare:
0
4 530
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metacom
Exploits:
56
BusinessLevel:
9