[ authorization ] [ registration ] [ Wiederherstellen ]
Kontaktiere uns
You can contact us by:
0day.today Exploits Market and 0day Exploits Database
Suche:
 
 
 
Kategorie:   Betriebssystem:
 
Price from:   Price to:
 
Author login:   CVE:

Search results for exploits by request: Opera

[ remote exploits ]

Remote exploits and vulnerabilities category


A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
3 671
Security Risk Critical
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
LiquidWorm
Exploits:
732
BusinessLevel:
46
1 833
Security Risk Low
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
LiquidWorm
Exploits:
732
BusinessLevel:
46
3 481
Security Risk High
R
D
Download
C
CVE-2023-34039
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
3 626
Security Risk Critical
R
D
Download
C
CVE-2023-20887
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
9 644
Security Risk Critical
R
D
Download
C
CVE-2020-11857
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
9 580
Security Risk Critical
R
D
Download
C
CVE-2021-22502
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
9 161
Security Risk Critical
R
D
Download
C
CVE-2021-21975
CVE-2021-21983
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
9 094
Security Risk Critical
R
D
Download
C
CVE-2020-11853
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
12 597
Security Risk Critical
R
D
Download
C
CVE-2019-11409
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
7 382
Security Risk High
R
D
Download
C
CVE-2016-4117
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
12 500
Security Risk Critical
R
D
Download
C
CVE-2019-6116
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
7 063
Security Risk Critical
R
D
Download
C
CVE-2017-2536
Verified by
Kostenlos
You can open this exploit for free
saelo
Exploits:
9
BusinessLevel:
6
4 282
Security Risk Critical
R
D
Download
C
CVE-2014-5073
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
4 712
Security Risk Medium
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Jamal Pecou
Exploits:
2
BusinessLevel:
5
5 947
Security Risk High
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Core Security
Exploits:
91
BusinessLevel:
13
5 379
Security Risk Critical
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Pedro Andujar
Exploits:
8
BusinessLevel:
6
14 712
Security Risk High
R
D
Download
-
Verified by
 
0
Open this exploit for 0 BTC
Open this exploit for 25 GOLD
The Black Devils
Exploits:
135
BusinessLevel:
16
4 249
Security Risk High
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
4 209
Security Risk High
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
5 301
Security Risk Unsored
R
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
n/a
Exploits:
233
BusinessLevel:
22

[ local exploits ]

Local exploits and vulnerabilities category


A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
8 675
Security Risk High
R
D
Download
C
CVE-2020-11858
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
5 085
Security Risk High
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
5 951
Security Risk High
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
LiquidWorm
Exploits:
732
BusinessLevel:
46
5 427
Security Risk Medium
R
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
Angel Injection
Exploits:
134
BusinessLevel:
14
4 934
Security Risk Unsored
R
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
PoisonCode
Exploits:
20
BusinessLevel:
11
4 766
Security Risk Unsored
R
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
KedAns-Dz
Exploits:
292
BusinessLevel:
24
4 341
Security Risk Unsored
R
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
indoushka
Exploits:
453
BusinessLevel:
33
4 337
Security Risk Unsored
R
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
Nicolas Krassas
Exploits:
5
BusinessLevel:
7
4 254
Security Risk Unsored
R
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
kcope
Exploits:
36
BusinessLevel:
12
unsorted
3 827
Security Risk Unsored
R
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
Guido Landi
Exploits:
25
BusinessLevel:
9
4 489
Security Risk Unsored
R
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
Charles Stevenson
Exploits:
15
BusinessLevel:
11
4 432
Security Risk Unsored
R
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
Charles Stevenson
Exploits:
15
BusinessLevel:
11
4 381
Security Risk Unsored
R
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
Charles Stevenson
Exploits:
15
BusinessLevel:
11

[ web applications ]

Webapplication (webapps) exploits and vulnerabilities category


This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
3 127
Security Risk Critical
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
LiquidWorm
Exploits:
732
BusinessLevel:
46
3 055
Security Risk Low
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
LiquidWorm
Exploits:
732
BusinessLevel:
46
1 248
Security Risk High
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Arnav Tripathy
Exploits:
8
BusinessLevel:
2
1 235
Security Risk Medium
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Arnav Tripathy
Exploits:
8
BusinessLevel:
2
3 374
Security Risk Medium
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
omurugur
Exploits:
5
BusinessLevel:
3
3 072
Security Risk Medium
R
D
Download
C
CVE-2018-1821
Verified by
Kostenlos
You can open this exploit for free
Mohamed M.Fouad
Exploits:
3
BusinessLevel:
3
3 217
Security Risk Medium
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Kushal Jaisingh
Exploits:
2
BusinessLevel:
4
3 595
Security Risk High
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
bot
Exploits:
154
BusinessLevel:
13
3 751
Security Risk High
R
D
Download
C
CVE-2014-2647
Verified by
Kostenlos
You can open this exploit for free
Matt Schmidt
Exploits:
2
BusinessLevel:
5
4 295
Security Risk Medium
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Jamal Pecou
Exploits:
2
BusinessLevel:
5
5 458
Security Risk Critical
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Bassem
Exploits:
1
BusinessLevel:
6
4 052
Security Risk Critical
R
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
AtT4CKxT3rR0r1ST
Exploits:
125
BusinessLevel:
16

[ dos / poc ]

DOS exploits and vulnerabilities category


PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.

PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
13 900
Security Risk Medium
R
D
Download
C
CVE-2019-9816
Verified by
Kostenlos
You can open this exploit for free
saelo
Exploits:
9
BusinessLevel:
6
11 348
Security Risk Medium
R
D
Download
C
CVE-2019-5788
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 540
Security Risk Medium
R
D
Download
C
CVE-2017-8487
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 108
Security Risk Medium
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 817
Security Risk Medium
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
SkyLined
Exploits:
59
BusinessLevel:
13
3 404
Security Risk Medium
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
5 273
Security Risk High
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
LiquidWorm
Exploits:
732
BusinessLevel:
46
4 646
Security Risk Medium
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Cons0ul
Exploits:
1
BusinessLevel:
6
5 188
Security Risk High
R
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
coolkaveh
Exploits:
32
BusinessLevel:
8
4 354
Security Risk Unsored
R
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
Roberto Suggi Liverani
Exploits:
9
BusinessLevel:
8
4 209
Security Risk Unsored
R
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
pigtail23
Exploits:
3
BusinessLevel:
7
4 128
Security Risk Unsored
R
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
pigtail23
Exploits:
3
BusinessLevel:
7
5 020
Security Risk Unsored
R
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
X-h4ck
Exploits:
17
BusinessLevel:
7
4 800
Security Risk Unsored
R
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
echo
Exploits:
2
BusinessLevel:
7
4 299
Security Risk Unsored
R
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
echo
Exploits:
2
BusinessLevel:
7
4 285
Security Risk Unsored
R
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
C4SS!0 G0M3S
Exploits:
41
BusinessLevel:
9
4 614
Security Risk Unsored
R
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
d0lc3
Exploits:
6
BusinessLevel:
7
4 565
Security Risk Unsored
R
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
n/a
Exploits:
233
BusinessLevel:
22
4 902
Security Risk Unsored
R
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
reza masouri
Exploits:
2
BusinessLevel:
7
5 193
Security Risk Unsored
R
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
PoisonCode
Exploits:
20
BusinessLevel:
11