0day.today - Größte Exploit-Datenbank der Welt.
![](/img/logo_green.jpg)
Wir benutzen eine Hauptdomain DOMAIN_LINK
Wenn Du den Exploit kaufen, oder für einen Service bezahlen möchtest, musst Du Gold kaufen. Wir wollen nicht, dass Du unsere Seite als ein Werkzeug für Aktivitäten wie Hacking verwendest. Illegale Aktionen, die andere Benutzer oder Webseiten betreffen, für die Du keine Zugriffsrechte hast, führen dazu, dass der Account gebannt und alle Daten von diesem unwiderruflich gelöscht werden.
Die Administratoren dieser Seite benutzen nur die offiziellen Kontaktdaten. Achte auf Betrüger!
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
Please, beware of scammers!
- Lies [ Vereinbarung ]
- Lies [ Senden ] Regeln
- Besuche [ FAQ ] page
- [ Registrieren ] Profil
- Bekommen [ GOLD ]
- Wenn Du möchtest [ Verkaufen ]
- Wenn Du möchtest [ Kaufen ]
- Wenn Du vergessen hast [ Account ]
- Fragen [ [email protected] ]
- Anmeldungsseite
- Registrierungsseite
- Seite für Accountwiederherstellung
- FAQ Seite
- Kontakt
- Regeln für Veröffentlichungen
- Vereinbarungsseite
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Search results for exploits by request: Internet
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 538
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Akil Gundogan
Exploits:
4
BusinessLevel:
1
Microsoft Internet Explorer Windows 10 1809 17763.316 - Scripting Engine Memory Corruption Exploit
Kommentare:
0
8 801
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Simon Zuckerbraun
Exploits:
2
BusinessLevel:
3
5 159
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2017-17859
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
James Lee
Exploits:
1
BusinessLevel:
3
Samsung Internet Browser - SOP Bypass Exploit
Kommentare:
0
6 035
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2017-17692
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Dhiraj Mishra
Exploits:
27
BusinessLevel:
5
Samsung Internet Browser - SOP Bypass Exploit
Kommentare:
0
9 790
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Dhiraj Mishra
Exploits:
27
BusinessLevel:
5
9 707
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2017-0037
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Mohamed Hamdy
Exploits:
1
BusinessLevel:
4
Internet Information Services (IIS) 6.0 WebDAV - ScStoragePathFromUrl Buffer Overflow Exploit
Kommentare:
0
6 388
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2017-7269
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Zhiniang Peng
Exploits:
1
BusinessLevel:
4
4 076
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Fady Mohammed Osman
Exploits:
6
BusinessLevel:
5
4 354
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Tracy Turben
Exploits:
4
BusinessLevel:
5
Internet Explorer 8-11, IIS, CScript.exe/WScript.exe VBScript - CRegExp..Execute Use of Uninitialize
Kommentare:
0
5 264
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2014-6363
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
SkyLined
Exploits:
59
BusinessLevel:
13
Microsoft Internet Explorer 9/10/11 - CDOMStringDataList::InitFromString Out-of-Bounds Read (MS15-11
Kommentare:
0
4 985
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2015-6086
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Ashfaq Ansari
Exploits:
1
BusinessLevel:
4
4 192
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2015-6152
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Moritz Jodeit
Exploits:
3
BusinessLevel:
5
Microsoft Internet Explorer CStyleAttrArray Use-After-Free Remote Code Execution Vulnerability
Positiv:
0
Negativ:
0
Kommentare:
2
7 803
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2015-2452
![](/img/check.png)
Verified by
![](/img/btc.png)
0.038
Open this exploit for 0.038 BTC
Open this exploit for 2 200 GOLD
0day Today Team
Exploits:
293
BusinessLevel:
31
4 795
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2015-2444
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Moritz Jodeit
Exploits:
3
BusinessLevel:
5
Microsoft Internet Explorer CAttrArray Use-After-Free Remote Code Execution Exploit 0day
Positiv:
0
Negativ:
0
Kommentare:
4
6 728
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.056
Open this exploit for 0.056 BTC
Open this exploit for 3 200 GOLD
AbdulAziz Hariri
Exploits:
2
BusinessLevel:
5
Microsoft Internet Explorer CTreePos Use-After-Free Remote Code Execution Exploit 0day
Positiv:
0
Negativ:
0
Kommentare:
3
6 684
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.061
Open this exploit for 0.061 BTC
Open this exploit for 3 500 GOLD
AbdulAziz Hariri
Exploits:
2
BusinessLevel:
5
4 563
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2014-6332
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Mohammad Reza Espargham
Exploits:
20
BusinessLevel:
6
Microsoft Internet Explorer CInputContext Use-After-Free Remote Code Execution Vulnerability
Positiv:
0
Negativ:
0
Kommentare:
0
7 265
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2015-1626
![](/img/check.png)
Verified by
![](/img/btc.png)
0.052
Open this exploit for 0.052 BTC
Open this exploit for 3 000 GOLD
ca0nguyen
Exploits:
2
BusinessLevel:
5
Microsoft Internet Explorer CMarkup Use-After-Free Remote Code Execution Vulnerability
Positiv:
0
Negativ:
0
Kommentare:
0
6 867
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2015-1623
![](/img/check.png)
Verified by
![](/img/btc.png)
0.054
Open this exploit for 0.054 BTC
Open this exploit for 3 100 GOLD
0day Today Team
Exploits:
293
BusinessLevel:
31
Microsoft Internet Explorer CTreeNode Use-After-Free Remote Code Execution Vulnerability
Positiv:
0
Negativ:
0
Kommentare:
0
5 776
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2015-0100
![](/img/check.png)
Verified by
![](/img/btc.png)
0.056
Open this exploit for 0.056 BTC
Open this exploit for 3 200 GOLD
ca0nguyen
Exploits:
2
BusinessLevel:
5
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
8 087
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Saud Alenazi
Exploits:
32
BusinessLevel:
3
10 248
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
9 900
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
8 505
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2013-3893
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
SlidingWindow
Exploits:
10
BusinessLevel:
4
Microsoft Internet Explorer 8/11 and WPAD service (Jscript.dll) - Use-After-Free Exploit
Kommentare:
0
8 509
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2020-0674
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Forrest Orr
Exploits:
5
BusinessLevel:
2
8 515
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2021-26419
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Ivan Fratric
Exploits:
2
BusinessLevel:
2
8 617
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2020-0674
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Forrest Orr
Exploits:
5
BusinessLevel:
2
Microsoft Internet Explorer 11 - Use-After-Free Exploit
Kommentare:
0
8 557
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2020-0674
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
maxpl0it
Exploits:
1
BusinessLevel:
2
Internet Explorer 11 - Use-After-Free Exploit
Kommentare:
0
9 955
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2020-0674
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Simon Zuckerbraun
Exploits:
2
BusinessLevel:
3
9 442
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Yorick Koster
Exploits:
36
BusinessLevel:
8
6 673
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Eduardo Braun Prado
Exploits:
16
BusinessLevel:
5
Microsoft Internet Explorer 11 - Sandbox Escape Exploit
Kommentare:
0
5 017
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
SandboxEscaper
Exploits:
10
BusinessLevel:
3
Microsoft Internet Explorer 11 XML Injection Exploit
Kommentare:
0
9 163
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
6 064
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
LiquidWorm
Exploits:
732
BusinessLevel:
46
4 598
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2015-2419
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
checkpoint
Exploits:
1
BusinessLevel:
3
4 777
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2018-8174
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
smgorelik
Exploits:
5
BusinessLevel:
3
4 851
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
mr_me
Exploits:
109
BusinessLevel:
13
4 599
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
f3ci
Exploits:
4
BusinessLevel:
4
Microsoft Internet Explorer 11 (Windows 10) - VBScript Memory Corruption Proof-of-Concept Exploit (M
Kommentare:
0
4 739
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Brian Pak
Exploits:
2
BusinessLevel:
4
3 712
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Rakan Alotaibi
Exploits:
1
BusinessLevel:
4
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
5 233
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2021-46387
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Momen Eldawakhly
Exploits:
18
BusinessLevel:
2
3 656
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Kevin Joensen
Exploits:
1
BusinessLevel:
2
5 361
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Byakuya
Exploits:
9
BusinessLevel:
6
4 925
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Diego_Asencio
Exploits:
3
BusinessLevel:
6
InternetSol - SQL Injection Vulnerability
Kommentare:
0
3 648
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/warning.png)
Not verified yet
Kostenlos
You can open this exploit for free
Taurus Omar
Exploits:
138
BusinessLevel:
13
5 145
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/warning.png)
Not verified yet
Kostenlos
You can open this exploit for free
KedAns-Dz
Exploits:
292
BusinessLevel:
24
4 473
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/warning.png)
Not verified yet
Kostenlos
You can open this exploit for free
KedAns-Dz
Exploits:
292
BusinessLevel:
24
Acorn Internet Services - SQL Injection Vulnerability
Kommentare:
0
4 903
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/warning.png)
Not verified yet
Kostenlos
You can open this exploit for free
D0m12
Exploits:
17
BusinessLevel:
7
WordPress (Optimal Internet) Xss Vulnerability
Kommentare:
0
4 770
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/warning.png)
Not verified yet
Kostenlos
You can open this exploit for free
Angel Injection
Exploits:
134
BusinessLevel:
14
Cyclope Internet Filtering Proxy 4.0 - Stored XSS Vuln
Kommentare:
0
4 062
![](/img/risk/critlow_0.gif)
Security Risk Unsored
D
Download
-
![](/img/warning.png)
Not verified yet
Kostenlos
You can open this exploit for free
loneferret
Exploits:
50
BusinessLevel:
10
4 875
![](/img/risk/critlow_0.gif)
Security Risk Unsored
D
Download
-
![](/img/warning.png)
Not verified yet
Kostenlos
You can open this exploit for free
Netrondoank
Exploits:
4
BusinessLevel:
7
Entrack Internet admin Auth Bypass
Kommentare:
0
5 702
![](/img/risk/critlow_0.gif)
Security Risk Unsored
D
Download
-
![](/img/warning.png)
Not verified yet
Kostenlos
You can open this exploit for free
Angel Injection
Exploits:
134
BusinessLevel:
14
3 912
![](/img/risk/critlow_0.gif)
Security Risk Unsored
D
Download
-
![](/img/warning.png)
Not verified yet
Kostenlos
You can open this exploit for free
p0pc0rn
Exploits:
28
BusinessLevel:
8
unsorted
3 573
![](/img/risk/critlow_0.gif)
Security Risk Unsored
D
Download
-
![](/img/warning.png)
Not verified yet
Kostenlos
You can open this exploit for free
KnocKout
Exploits:
99
BusinessLevel:
13
unsorted
3 240
![](/img/risk/critlow_0.gif)
Security Risk Unsored
D
Download
-
![](/img/warning.png)
Not verified yet
Kostenlos
You can open this exploit for free
t0pP8uZz
Exploits:
97
BusinessLevel:
13
Internet PhotoShow (page) Remote File Inclusion Exploit
Kommentare:
0
unsorted
3 384
![](/img/risk/critlow_0.gif)
Security Risk Unsored
D
Download
-
![](/img/warning.png)
Not verified yet
Kostenlos
You can open this exploit for free
Hessam-x
Exploits:
15
BusinessLevel:
10
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Internet Download Manager 6.38.12 - Scheduler Downloads Scheduler Buffer Overflow Exploit
Kommentare:
0
8 754
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Vincent Wolterman
Exploits:
2
BusinessLevel:
2
Internet Explorer - Use-After-Free in JScript Arguments During toJSON Callback Exploit
Kommentare:
0
16 788
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2019-1429
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
12 701
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Emilio Revelo
Exploits:
1
BusinessLevel:
2
11 763
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2019-0768
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
8 504
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
3 167
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2018-0891
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 562
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2018-0866
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 543
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
SecuriTeam
Exploits:
20
BusinessLevel:
5
3 826
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2017-11793
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 933
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2017-11810
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
5 086
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2017-15882
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Yakov Shafranovich
Exploits:
7
BusinessLevel:
4
Microsoft Internet Explorer 11.0.9600.18617 - CMarkup::DestroySplayTree Memory Corruption Exploit
Kommentare:
0
5 285
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2017-8594
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Microsoft Internet Explorer 11.1066.14393.0 - VBScript Arithmetic Functions Type Confusion Exploit
Kommentare:
0
5 052
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 473
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Marcin Ressel
Exploits:
11
BusinessLevel:
8
Microsoft Internet Explorer 11.576.14393.0 - CStyleSheetArray::BuildListOfMatchedRules Memory Corrup
Kommentare:
0
5 475
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2017-0202
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Microsoft Internet Explorer - textarea.defaultValue Memory Disclosure (MS17-006) Exploit
Kommentare:
0
4 433
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2017-0059
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Microsoft Edge / Internet Explorer HandleColumnBreakOnColumnSpanningElement Type Confusion Exploit
Kommentare:
0
5 746
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2017-0037
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
ifratric
Exploits:
1
BusinessLevel:
4
Microsoft Internet Explorer 11 MSHTML - CSpliceTreeEngine::RemoveSplice Use-After-Free (MS14-035)
Kommentare:
0
4 552
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2014-1785
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
SkyLined
Exploits:
59
BusinessLevel:
13
Microsoft Internet Explorer 9 IEFRAME - CMarkup::RemovePointerPos Use-After-Free (MS13-055) Exploi
Kommentare:
0
4 885
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2013-3143
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
SkyLined
Exploits:
59
BusinessLevel:
13
Microsoft Internet Explorer 9 MSHTML - CMarkup::ReloadInCompatView Use-After-Free Exploit
Kommentare:
0
4 671
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
SkyLined
Exploits:
59
BusinessLevel:
13