0day.today - Größte Exploit-Datenbank der Welt.
Dinge, die Du wissen solltest:
Wir benutzen eine Hauptdomain DOMAIN_LINK
Wenn Du den Exploit kaufen, oder für einen Service bezahlen möchtest, musst Du Gold kaufen. Wir wollen nicht, dass Du unsere Seite als ein Werkzeug für Aktivitäten wie Hacking verwendest. Illegale Aktionen, die andere Benutzer oder Webseiten betreffen, für die Du keine Zugriffsrechte hast, führen dazu, dass der Account gebannt und alle Daten von diesem unwiderruflich gelöscht werden.
Die Administratoren dieser Seite benutzen nur die offiziellen Kontaktdaten. Achte auf Betrüger!
Wir benutzen eine Hauptdomain DOMAIN_LINK
Wenn Du den Exploit kaufen, oder für einen Service bezahlen möchtest, musst Du Gold kaufen. Wir wollen nicht, dass Du unsere Seite als ein Werkzeug für Aktivitäten wie Hacking verwendest. Illegale Aktionen, die andere Benutzer oder Webseiten betreffen, für die Du keine Zugriffsrechte hast, führen dazu, dass der Account gebannt und alle Daten von diesem unwiderruflich gelöscht werden.
Die Administratoren dieser Seite benutzen nur die offiziellen Kontaktdaten. Achte auf Betrüger!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Lies [ Vereinbarung ]
- Lies [ Senden ] Regeln
- Besuche [ FAQ ] page
- [ Registrieren ] Profil
- Bekommen [ GOLD ]
- Wenn Du möchtest [ Verkaufen ]
- Wenn Du möchtest [ Kaufen ]
- Wenn Du vergessen hast [ Account ]
- Fragen [ [email protected] ]
- Anmeldungsseite
- Registrierungsseite
- Seite für Accountwiederherstellung
- FAQ Seite
- Kontakt
- Regeln für Veröffentlichungen
- Vereinbarungsseite
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Search results for exploits by request: Nagios
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Nagios XI 5.7.5 Remote Code Execution Exploit
Kommentare:
0
4 693
Security Risk Critical
D
Download
C
CVE-2021-25296
CVE-2021-25297
CVE-2021-25298
CVE-2021-25297
CVE-2021-25298
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Nagios XI Autodiscovery Shell Upload Exploit
Kommentare:
0
7 966
Security Risk Critical
D
Download
C
CVE-2021-37343
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Nagios XI 5.7.3 Remote Code Execution Exploit
Kommentare:
0
8 977
Security Risk Critical
D
Download
C
CVE-2020-5791
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Nagios XI Remote Code Execution Exploit
Kommentare:
0
8 956
Security Risk Critical
D
Download
C
CVE-2020-35578
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Nagios XI getprofile.sh Remote Command Execution Exploit
Kommentare:
0
8 976
Security Risk Critical
D
Download
C
CVE-2019-15949
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
12 239
Security Risk Critical
D
Download
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
10 241
Security Risk Critical
D
Download
C
CVE-2018-15708
CVE-2018-15710
CVE-2018-15710
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Nagios XI Chained Remote Code Execution Exploit
Kommentare:
0
5 205
Security Risk Critical
D
Download
C
CVE-2018-8733
CVE-2018-8734
CVE-2018-8735
CVE-2018-8736
CVE-2018-8734
CVE-2018-8735
CVE-2018-8736
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Nagios 4.2.2 - Arbitrary Code Execution Exploit
Kommentare:
0
5 233
Security Risk Critical
D
Download
C
CVE-2016-9565
Verified by
Kostenlos
You can open this exploit for free
Dawid Golunski
Exploits:
32
BusinessLevel:
9
Nagios XI Chained - Remote Code Execution (Metasploit)
Kommentare:
0
4 714
Security Risk Critical
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
NAGIOS NRPE <=2.15 Plugin Scanner and Remote Execution Exploit
Positiv:
0
Negativ:
0
Kommentare:
1
12 227
Security Risk High
D
Download
-
Not verified yet
0.001
Open this exploit for 0.001 BTC
Open this exploit for 40 GOLD
florinu
Exploits:
3
BusinessLevel:
6
6 024
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Dawid Golunski
Exploits:
32
BusinessLevel:
9
5 865
Security Risk High
D
Download
C
CVE-2013-1362
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
5 392
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
blasty
Exploits:
4
BusinessLevel:
10
5 659
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Nagios 4.2.4 - Privilege Escalation Exploit
Kommentare:
0
4 931
Security Risk High
D
Download
C
CVE-2016-9566
Verified by
Kostenlos
You can open this exploit for free
Dawid Golunski
Exploits:
32
BusinessLevel:
9
Nagios 4.2.2 - Privilege Escalation Exploit
Kommentare:
0
4 826
Security Risk Critical
D
Download
C
CVE-2016-8641
Verified by
Kostenlos
You can open this exploit for free
Vincent Malguy
Exploits:
2
BusinessLevel:
4
5 287
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Dawid Golunski
Exploits:
32
BusinessLevel:
9
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Nagios XI Version 2024R1.01 - SQL Injection Exploit
Kommentare:
0
1 760
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Jarod Jaslow
Exploits:
1
BusinessLevel:
0
3 379
Security Risk Critical
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Zoltan Padanyi
Exploits:
1
BusinessLevel:
1
Nagios XI 5.7.5 Remote Code Execution Exploit
Kommentare:
0
1 366
Security Risk Critical
D
Download
C
CVE-2021-25296
CVE-2021-25297
CVE-2021-25298
CVE-2021-25299
CVE-2021-25297
CVE-2021-25298
CVE-2021-25299
Verified by
Kostenlos
You can open this exploit for free
fs0c-sh
Exploits:
1
BusinessLevel:
2
1 293
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Matthew Aberegg
Exploits:
12
BusinessLevel:
3
1 368
Security Risk Critical
D
Download
C
CVE-2020-35578
Verified by
Kostenlos
You can open this exploit for free
Haboob Team
Exploits:
5
BusinessLevel:
3
1 321
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Emre ÖVÜNÇ
Exploits:
12
BusinessLevel:
4
1 937
Security Risk Critical
D
Download
C
CVE-2020-5791
Verified by
Kostenlos
You can open this exploit for free
Matthew Aberegg
Exploits:
12
BusinessLevel:
3
1 692
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Matthew Aberegg
Exploits:
12
BusinessLevel:
3
1 684
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Matthew Aberegg
Exploits:
12
BusinessLevel:
3
1 662
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Matthew Aberegg
Exploits:
12
BusinessLevel:
3
1 618
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Jinson Varghese Behanan
Exploits:
8
BusinessLevel:
3
2 152
Security Risk Critical
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Basim Alabdullah
Exploits:
4
BusinessLevel:
2
2 724
Security Risk Critical
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Cody Sixteen
Exploits:
13
BusinessLevel:
4
2 676
Security Risk Critical
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Cody Sixteen
Exploits:
13
BusinessLevel:
4
NagiosXL 5.6.11 orderby SQL Injection Vulnerability
Kommentare:
0
2 719
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Cody Sixteen
Exploits:
13
BusinessLevel:
4
Nagios XI 5.6.1 SQL Injection Vulnerability
Kommentare:
0
3 553
Security Risk High
D
Download
C
CVE-2019-12279
Verified by
Kostenlos
You can open this exploit for free
Jameel Nabbo
Exploits:
2
BusinessLevel:
3
3 131
Security Risk Critical
D
Download
C
CVE-2019-9164
CVE-2019-9165
CVE-2019-9166
CVE-2019-9167
CVE-2019-9202
CVE-2019-9203
CVE-2019-9204
CVE-2019-9165
CVE-2019-9166
CVE-2019-9167
CVE-2019-9202
CVE-2019-9203
CVE-2019-9204
Verified by
Kostenlos
You can open this exploit for free
Abdel Adim Oisfi
Exploits:
1
BusinessLevel:
3
5 241
Security Risk Critical
D
Download
C
CVE-2018-15710
CVE-2018-15708
CVE-2018-15708
Verified by
Kostenlos
You can open this exploit for free
Chris Lyne
Exploits:
10
BusinessLevel:
4
3 539
Security Risk Critical
D
Download
C
CVE-2018-8733
CVE-2018-8734
CVE-2018-8735
CVE-2018-8736
CVE-2018-8734
CVE-2018-8735
CVE-2018-8736
Verified by
Kostenlos
You can open this exploit for free
Jared Arave
Exploits:
4
BusinessLevel:
4
4 638
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Nagios Core 4.4.1 - Denial of Service Vulnerability
Kommentare:
0
4 040
Security Risk Medium
D
Download
C
CVE-2018-13441
CVE-2018-13457
CVE-2018-13458
CVE-2018-13457
CVE-2018-13458
Verified by
Kostenlos
You can open this exploit for free
Fakhri Zulkifli
Exploits:
8
BusinessLevel:
3
Nagios Core 3.4.3 Buffer Overflow Vulnerability
Kommentare:
0
5 078
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
temp66
Exploits:
3
BusinessLevel:
6
Nagios Plugin check_ups Local Buffer Overflow PoC
Kommentare:
0
5 381
Security Risk Unsored
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
Stefan Schurtz
Exploits:
21
BusinessLevel:
7