0day.today - Größte Exploit-Datenbank der Welt.
Dinge, die Du wissen solltest:
Wir benutzen eine Hauptdomain DOMAIN_LINK
Wenn Du den Exploit kaufen, oder für einen Service bezahlen möchtest, musst Du Gold kaufen. Wir wollen nicht, dass Du unsere Seite als ein Werkzeug für Aktivitäten wie Hacking verwendest. Illegale Aktionen, die andere Benutzer oder Webseiten betreffen, für die Du keine Zugriffsrechte hast, führen dazu, dass der Account gebannt und alle Daten von diesem unwiderruflich gelöscht werden.
Die Administratoren dieser Seite benutzen nur die offiziellen Kontaktdaten. Achte auf Betrüger!
Wir benutzen eine Hauptdomain DOMAIN_LINK
Wenn Du den Exploit kaufen, oder für einen Service bezahlen möchtest, musst Du Gold kaufen. Wir wollen nicht, dass Du unsere Seite als ein Werkzeug für Aktivitäten wie Hacking verwendest. Illegale Aktionen, die andere Benutzer oder Webseiten betreffen, für die Du keine Zugriffsrechte hast, führen dazu, dass der Account gebannt und alle Daten von diesem unwiderruflich gelöscht werden.
Die Administratoren dieser Seite benutzen nur die offiziellen Kontaktdaten. Achte auf Betrüger!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Lies [ Vereinbarung ]
- Lies [ Senden ] Regeln
- Besuche [ FAQ ] page
- [ Registrieren ] Profil
- Bekommen [ GOLD ]
- Wenn Du möchtest [ Verkaufen ]
- Wenn Du möchtest [ Kaufen ]
- Wenn Du vergessen hast [ Account ]
- Fragen [ [email protected] ]
- Anmeldungsseite
- Registrierungsseite
- Seite für Accountwiederherstellung
- FAQ Seite
- Kontakt
- Regeln für Veröffentlichungen
- Vereinbarungsseite
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Search results for exploits by request: Microsoft Windows
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 686
Security Risk Critical
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
5 692
Security Risk Critical
D
Download
C
CVE-2022-44666
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
9 203
Security Risk High
D
Download
C
CVE-2017-8461
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
11 112
Security Risk High
D
Download
C
CVE-2020-1313
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
11 093
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
12 840
Security Risk Critical
D
Download
C
CVE-2020-0796
Verified by
Kostenlos
You can open this exploit for free
chompie1337
Exploits:
1
BusinessLevel:
2
12 058
Security Risk Critical
D
Download
C
CVE-2020-1113
Verified by
Kostenlos
You can open this exploit for free
Sylvain Heiniger
Exploits:
6
BusinessLevel:
4
13 505
Security Risk Critical
D
Download
C
CVE-2020-0796
Verified by
Kostenlos
You can open this exploit for free
Ventsislav Varbanovski
Exploits:
2
BusinessLevel:
2
Microsoft Windows 7 (x86) - (BlueKeep) RDP Remote Windows Kernel Use After Free Exploit
Kommentare:
0
14 740
Security Risk Critical
D
Download
C
CVE-2019-0708
Verified by
Kostenlos
You can open this exploit for free
0xeb-bp
Exploits:
1
BusinessLevel:
2
12 446
Security Risk Critical
D
Download
C
CVE-2015-0009
Verified by
Kostenlos
You can open this exploit for free
Thomas Zuk
Exploits:
4
BusinessLevel:
3
12 821
Security Risk Critical
D
Download
C
CVE-2015-0008
Verified by
Kostenlos
You can open this exploit for free
Thomas Zuk
Exploits:
4
BusinessLevel:
3
13 685
Security Risk Critical
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
13 766
Security Risk Critical
D
Download
C
CVE-2019-0708
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Microsoft Internet Explorer Windows 10 1809 17763.316 - Scripting Engine Memory Corruption Exploit
Kommentare:
0
8 752
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Simon Zuckerbraun
Exploits:
2
BusinessLevel:
3
Microsoft Windows VCF or Contact File - URL Manipulation-Spoof Arbitrary Code Execution Exploit
Kommentare:
0
8 656
Security Risk Critical
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Eduardo Braun Prado
Exploits:
16
BusinessLevel:
5
Microsoft Windows VCF Remote Code Execution Exploit
Kommentare:
0
12 648
Security Risk Critical
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
5 829
Security Risk Critical
D
Download
C
CVE-2017-11885
Verified by
Kostenlos
You can open this exploit for free
vportal
Exploits:
8
BusinessLevel:
4
Microsoft Windows SMB MS17-010 EternalRomance / EternalSynergy / EternalChampion Remote Code Executi
Kommentare:
0
7 508
Security Risk Critical
D
Download
C
CVE-2017-0143
CVE-2017-0146
CVE-2017-0147
CVE-2017-0146
CVE-2017-0147
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Microsoft Windows LNK File Code Execution Exploit
Kommentare:
0
6 280
Security Risk Critical
D
Download
C
CVE-2015-0095
CVE-2017-8464
CVE-2017-8464
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
6 801
Security Risk Critical
D
Download
C
CVE-2017-8759
Verified by
Kostenlos
You can open this exploit for free
Voulnet
Exploits:
2
BusinessLevel:
3
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
2 303
Security Risk Critical
D
Download
C
CVE-2024-21338
Verified by
Kostenlos
You can open this exploit for free
E1 Coders
Exploits:
2
BusinessLevel:
0
Microsoft Windows Defender / Trojan.Win32/Powessere.G - Detection Mitigation Bypass Vulnerability
Kommentare:
0
4 809
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
4 577
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
4 331
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
2 362
Security Risk Critical
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
4 635
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Moein Shahabi
Exploits:
1
BusinessLevel:
0
10 340
Security Risk Critical
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
9 832
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
Microsoft Windows SMB Direct Session Takeover Exploit
Kommentare:
0
10 313
Security Risk Critical
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
usiegl00
Exploits:
1
BusinessLevel:
1
10 316
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Eduardo Braun Prado
Exploits:
16
BusinessLevel:
5
10 287
Security Risk Low
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Eduardo Braun Prado
Exploits:
16
BusinessLevel:
5
9 290
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
8 733
Security Risk Critical
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Microsoft Windows UAC Privilege Escalation Vulnerability
Kommentare:
0
8 508
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Stefan Kanthak
Exploits:
16
BusinessLevel:
4
8 426
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Marc Nimmerrichte
Exploits:
1
BusinessLevel:
2
8 491
Security Risk High
D
Download
C
CVE-2021-26891
Verified by
Kostenlos
You can open this exploit for free
James Forshaw
Exploits:
6
BusinessLevel:
5
8 685
Security Risk High
D
Download
C
CVE-2020-1054
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
8 619
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
nu11secur1ty
Exploits:
215
BusinessLevel:
13
Microsoft Windows Local Spooler Bypass Vulnerability
Kommentare:
0
8 519
Security Risk High
D
Download
C
CVE-2020-1337
CVE-2020-17001
CVE-2020-17001
Verified by
Kostenlos
You can open this exploit for free
James Forshaw
Exploits:
6
BusinessLevel:
5
9 639
Security Risk High
D
Download
C
CVE-2019-1458
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 070
Security Risk Medium
D
Download
C
CVE-2018-0878
Verified by
Kostenlos
You can open this exploit for free
Nabeel Ahmed
Exploits:
6
BusinessLevel:
4
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
5 509
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Milad karimi
Exploits:
28
BusinessLevel:
4
Microsoft Windows UTF-8 Buffer Overruns Exploit
Kommentare:
0
5 591
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Stefan Kanthak
Exploits:
16
BusinessLevel:
4
Microsoft Windows 10 (1903/1909) - SMBGhost SMB3.1.1 SMB2_COMPRESSION_CAPABILITIES Buffer Overflow
Kommentare:
0
14 862
Security Risk Medium
D
Download
C
CVE-2020-0796
Verified by
Kostenlos
You can open this exploit for free
eerykitty
Exploits:
1
BusinessLevel:
2
Microsoft Windows VCF Denial Of Service Exploit
Kommentare:
0
15 173
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
12 807
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
vportal
Exploits:
8
BusinessLevel:
4
Microsoft Windows cryptoapi - SymCrypt Modular Inverse Algorithm Denial of Service Exploit
Kommentare:
0
13 519
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
13 523
Security Risk High
D
Download
C
CVE-2019-0708
Verified by
Kostenlos
You can open this exploit for free
RAMELLA Sebastien
Exploits:
1
BusinessLevel:
2
12 858
Security Risk Medium
D
Download
C
CVE-2019-0943
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Microsoft Windows - CmpAddRemoveContainerToCLFSLog Arbitrary File/Directory Creation Exploit
Kommentare:
0
12 713
Security Risk Medium
D
Download
C
CVE-2019-0959
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
14 090
Security Risk High
D
Download
C
CVE-2019-0708
Verified by
Kostenlos
You can open this exploit for free
Spencer
Exploits:
1
BusinessLevel:
3
11 689
Security Risk Medium
D
Download
C
CVE-2019-0808
Verified by
Kostenlos
You can open this exploit for free
ze0r
Exploits:
2
BusinessLevel:
7
Microsoft Windows 10 - RestrictedErrorInfo Unmarshal Section Handle Use-After-Free Exploit
Kommentare:
0
6 951
Security Risk Medium
D
Download
C
CVE-2019-0570
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 350
Security Risk Medium
D
Download
C
CVE-2018-8631
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 725
Security Risk Medium
D
Download
C
CVE-2018-8411
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Microsoft Windows - Double Dereference in NtEnumerateKey Elevation of Privilege Exploit
Kommentare:
0
4 164
Security Risk Medium
D
Download
C
CVE-2018-8410
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 984
Security Risk Medium
D
Download
C
CVE-2018-8449
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 836
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Ghaaf
Exploits:
1
BusinessLevel:
6
4 250
Security Risk High
D
Download
C
CVE-2018-8353
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 770
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
vportal
Exploits:
8
BusinessLevel:
4
4 909
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Victor Portal Gonzalez
Exploits:
1
BusinessLevel:
3