[ authorization ] [ registration ] [ Wiederherstellen ]
Kontaktiere uns
You can contact us by:
0day.today Exploits Market and 0day Exploits Database
Suche:
 
 
 
Kategorie:   Betriebssystem:
 
Price from:   Price to:
 
Author login:   CVE:

Search results for exploits by request: Nagios

[ remote exploits ]

Remote exploits and vulnerabilities category


A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 693
Security Risk Critical
R
D
Download
C
CVE-2021-25296
CVE-2021-25297
CVE-2021-25298
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
7 964
Security Risk Critical
R
D
Download
C
CVE-2021-37343
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
8 977
Security Risk Critical
R
D
Download
C
CVE-2020-5791
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
8 956
Security Risk Critical
R
D
Download
C
CVE-2020-35578
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
8 976
Security Risk Critical
R
D
Download
C
CVE-2019-15949
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
12 238
Security Risk Critical
R
D
Download
C
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
10 241
Security Risk Critical
R
D
Download
C
CVE-2018-15708
CVE-2018-15710
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
5 205
Security Risk Critical
R
D
Download
C
CVE-2018-8733
CVE-2018-8734
CVE-2018-8735
CVE-2018-8736
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
5 233
Security Risk Critical
R
D
Download
C
CVE-2016-9565
Verified by
Kostenlos
You can open this exploit for free
Dawid Golunski
Exploits:
32
BusinessLevel:
9
4 714
Security Risk Critical
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
12 227
Security Risk High
R
D
Download
-
Not verified yet
 
0.001
Open this exploit for 0.001 BTC
Open this exploit for 40 GOLD
florinu
Exploits:
3
BusinessLevel:
6
6 024
Security Risk High
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Dawid Golunski
Exploits:
32
BusinessLevel:
9
5 865
Security Risk High
R
D
Download
C
CVE-2013-1362
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
5 392
Security Risk High
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
blasty
Exploits:
4
BusinessLevel:
10
5 659
Security Risk High
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92

[ local exploits ]

Local exploits and vulnerabilities category


A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 931
Security Risk High
R
D
Download
C
CVE-2016-9566
Verified by
Kostenlos
You can open this exploit for free
Dawid Golunski
Exploits:
32
BusinessLevel:
9
4 826
Security Risk Critical
R
D
Download
C
CVE-2016-8641
Verified by
Kostenlos
You can open this exploit for free
Vincent Malguy
Exploits:
2
BusinessLevel:
4
5 287
Security Risk High
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Dawid Golunski
Exploits:
32
BusinessLevel:
9

[ web applications ]

Webapplication (webapps) exploits and vulnerabilities category


This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
1 760
Security Risk High
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Jarod Jaslow
Exploits:
1
BusinessLevel:
0
3 378
Security Risk Critical
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Zoltan Padanyi
Exploits:
1
BusinessLevel:
1
1 366
Security Risk Critical
R
D
Download
C
CVE-2021-25296
CVE-2021-25297
CVE-2021-25298
CVE-2021-25299
Verified by
Kostenlos
You can open this exploit for free
fs0c-sh
Exploits:
1
BusinessLevel:
2
1 291
Security Risk High
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Matthew Aberegg
Exploits:
12
BusinessLevel:
3
1 366
Security Risk Critical
R
D
Download
C
CVE-2020-35578
Verified by
Kostenlos
You can open this exploit for free
Haboob Team
Exploits:
5
BusinessLevel:
3
1 321
Security Risk High
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Emre ÖVÜNÇ
Exploits:
12
BusinessLevel:
4
1 937
Security Risk Critical
R
D
Download
C
CVE-2020-5791
Verified by
Kostenlos
You can open this exploit for free
Matthew Aberegg
Exploits:
12
BusinessLevel:
3
1 690
Security Risk High
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Matthew Aberegg
Exploits:
12
BusinessLevel:
3
1 683
Security Risk High
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Matthew Aberegg
Exploits:
12
BusinessLevel:
3
1 662
Security Risk High
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Matthew Aberegg
Exploits:
12
BusinessLevel:
3
1 616
Security Risk High
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Jinson Varghese Behanan
Exploits:
8
BusinessLevel:
3
2 149
Security Risk Critical
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Basim Alabdullah
Exploits:
4
BusinessLevel:
2
2 724
Security Risk Critical
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Cody Sixteen
Exploits:
13
BusinessLevel:
4
2 676
Security Risk Critical
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Cody Sixteen
Exploits:
13
BusinessLevel:
4
2 719
Security Risk High
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Cody Sixteen
Exploits:
13
BusinessLevel:
4
3 553
Security Risk High
R
D
Download
C
CVE-2019-12279
Verified by
Kostenlos
You can open this exploit for free
Jameel Nabbo
Exploits:
2
BusinessLevel:
3
3 131
Security Risk Critical
R
D
Download
C
CVE-2019-9164
CVE-2019-9165
CVE-2019-9166
CVE-2019-9167
CVE-2019-9202
CVE-2019-9203
CVE-2019-9204
Verified by
Kostenlos
You can open this exploit for free
Abdel Adim Oisfi
Exploits:
1
BusinessLevel:
3
5 241
Security Risk Critical
R
D
Download
C
CVE-2018-15710
CVE-2018-15708
Verified by
Kostenlos
You can open this exploit for free
Chris Lyne
Exploits:
10
BusinessLevel:
4
3 539
Security Risk Critical
R
D
Download
C
CVE-2018-8733
CVE-2018-8734
CVE-2018-8735
CVE-2018-8736
Verified by
Kostenlos
You can open this exploit for free
Jared Arave
Exploits:
4
BusinessLevel:
4
4 638
Security Risk Medium
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17

[ dos / poc ]

DOS exploits and vulnerabilities category


PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.

PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 040
Security Risk Medium
R
D
Download
C
CVE-2018-13441
CVE-2018-13457
CVE-2018-13458
Verified by
Kostenlos
You can open this exploit for free
Fakhri Zulkifli
Exploits:
8
BusinessLevel:
3
5 078
Security Risk High
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
temp66
Exploits:
3
BusinessLevel:
6
5 381
Security Risk Unsored
R
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
Stefan Schurtz
Exploits:
21
BusinessLevel:
7