0day.today - Größte Exploit-Datenbank der Welt.
Dinge, die Du wissen solltest:
Wir benutzen eine Hauptdomain DOMAIN_LINK
Wenn Du den Exploit kaufen, oder für einen Service bezahlen möchtest, musst Du Gold kaufen. Wir wollen nicht, dass Du unsere Seite als ein Werkzeug für Aktivitäten wie Hacking verwendest. Illegale Aktionen, die andere Benutzer oder Webseiten betreffen, für die Du keine Zugriffsrechte hast, führen dazu, dass der Account gebannt und alle Daten von diesem unwiderruflich gelöscht werden.
Die Administratoren dieser Seite benutzen nur die offiziellen Kontaktdaten. Achte auf Betrüger!
Wir benutzen eine Hauptdomain DOMAIN_LINK
Wenn Du den Exploit kaufen, oder für einen Service bezahlen möchtest, musst Du Gold kaufen. Wir wollen nicht, dass Du unsere Seite als ein Werkzeug für Aktivitäten wie Hacking verwendest. Illegale Aktionen, die andere Benutzer oder Webseiten betreffen, für die Du keine Zugriffsrechte hast, führen dazu, dass der Account gebannt und alle Daten von diesem unwiderruflich gelöscht werden.
Die Administratoren dieser Seite benutzen nur die offiziellen Kontaktdaten. Achte auf Betrüger!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Lies [ Vereinbarung ]
- Lies [ Senden ] Regeln
- Besuche [ FAQ ] page
- [ Registrieren ] Profil
- Bekommen [ GOLD ]
- Wenn Du möchtest [ Verkaufen ]
- Wenn Du möchtest [ Kaufen ]
- Wenn Du vergessen hast [ Account ]
- Fragen [ [email protected] ]
- Anmeldungsseite
- Registrierungsseite
- Seite für Accountwiederherstellung
- FAQ Seite
- Kontakt
- Regeln für Veröffentlichungen
- Vereinbarungsseite
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Search results for exploits by request: Microsoft Windows
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 851
Security Risk Critical
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
5 823
Security Risk Critical
D
Download
C
CVE-2022-44666
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
9 316
Security Risk High
D
Download
C
CVE-2017-8461
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
11 201
Security Risk High
D
Download
C
CVE-2020-1313
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
11 178
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
12 902
Security Risk Critical
D
Download
C
CVE-2020-0796
Verified by
Kostenlos
You can open this exploit for free
chompie1337
Exploits:
1
BusinessLevel:
2
12 108
Security Risk Critical
D
Download
C
CVE-2020-1113
Verified by
Kostenlos
You can open this exploit for free
Sylvain Heiniger
Exploits:
6
BusinessLevel:
4
13 583
Security Risk Critical
D
Download
C
CVE-2020-0796
Verified by
Kostenlos
You can open this exploit for free
Ventsislav Varbanovski
Exploits:
2
BusinessLevel:
2
Microsoft Windows 7 (x86) - (BlueKeep) RDP Remote Windows Kernel Use After Free Exploit
Kommentare:
0
14 824
Security Risk Critical
D
Download
C
CVE-2019-0708
Verified by
Kostenlos
You can open this exploit for free
0xeb-bp
Exploits:
1
BusinessLevel:
2
12 491
Security Risk Critical
D
Download
C
CVE-2015-0009
Verified by
Kostenlos
You can open this exploit for free
Thomas Zuk
Exploits:
4
BusinessLevel:
3
12 885
Security Risk Critical
D
Download
C
CVE-2015-0008
Verified by
Kostenlos
You can open this exploit for free
Thomas Zuk
Exploits:
4
BusinessLevel:
3
13 729
Security Risk Critical
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
13 826
Security Risk Critical
D
Download
C
CVE-2019-0708
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
Microsoft Internet Explorer Windows 10 1809 17763.316 - Scripting Engine Memory Corruption Exploit
Kommentare:
0
8 796
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Simon Zuckerbraun
Exploits:
2
BusinessLevel:
3
Microsoft Windows VCF or Contact File - URL Manipulation-Spoof Arbitrary Code Execution Exploit
Kommentare:
0
8 686
Security Risk Critical
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Eduardo Braun Prado
Exploits:
16
BusinessLevel:
5
Microsoft Windows VCF Remote Code Execution Exploit
Kommentare:
0
12 678
Security Risk Critical
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
5 868
Security Risk Critical
D
Download
C
CVE-2017-11885
Verified by
Kostenlos
You can open this exploit for free
vportal
Exploits:
8
BusinessLevel:
4
Microsoft Windows SMB MS17-010 EternalRomance / EternalSynergy / EternalChampion Remote Code Executi
Kommentare:
0
7 586
Security Risk Critical
D
Download
C
CVE-2017-0143
CVE-2017-0146
CVE-2017-0147
CVE-2017-0146
CVE-2017-0147
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
Microsoft Windows LNK File Code Execution Exploit
Kommentare:
0
6 320
Security Risk Critical
D
Download
C
CVE-2015-0095
CVE-2017-8464
CVE-2017-8464
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
6 851
Security Risk Critical
D
Download
C
CVE-2017-8759
Verified by
Kostenlos
You can open this exploit for free
Voulnet
Exploits:
2
BusinessLevel:
4
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
3 141
Security Risk Critical
D
Download
C
CVE-2024-21338
Verified by
Kostenlos
You can open this exploit for free
E1 Coders
Exploits:
2
BusinessLevel:
0
Microsoft Windows Defender / Trojan.Win32/Powessere.G - Detection Mitigation Bypass Vulnerability
Kommentare:
0
5 600
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
5 345
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
5 121
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
2 495
Security Risk Critical
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
4 747
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Moein Shahabi
Exploits:
1
BusinessLevel:
0
10 456
Security Risk Critical
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
9 932
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
Microsoft Windows SMB Direct Session Takeover Exploit
Kommentare:
0
10 477
Security Risk Critical
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
usiegl00
Exploits:
1
BusinessLevel:
1
10 422
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Eduardo Braun Prado
Exploits:
16
BusinessLevel:
5
10 406
Security Risk Low
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Eduardo Braun Prado
Exploits:
16
BusinessLevel:
5
9 399
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
8 843
Security Risk Critical
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
Microsoft Windows UAC Privilege Escalation Vulnerability
Kommentare:
0
8 633
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Stefan Kanthak
Exploits:
16
BusinessLevel:
5
8 532
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Marc Nimmerrichte
Exploits:
1
BusinessLevel:
2
8 594
Security Risk High
D
Download
C
CVE-2021-26891
Verified by
Kostenlos
You can open this exploit for free
James Forshaw
Exploits:
6
BusinessLevel:
5
8 784
Security Risk High
D
Download
C
CVE-2020-1054
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
8 719
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
nu11secur1ty
Exploits:
215
BusinessLevel:
13
Microsoft Windows Local Spooler Bypass Vulnerability
Kommentare:
0
8 622
Security Risk High
D
Download
C
CVE-2020-1337
CVE-2020-17001
CVE-2020-17001
Verified by
Kostenlos
You can open this exploit for free
James Forshaw
Exploits:
6
BusinessLevel:
5
9 749
Security Risk High
D
Download
C
CVE-2019-1458
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 099
Security Risk Medium
D
Download
C
CVE-2018-0878
Verified by
Kostenlos
You can open this exploit for free
Nabeel Ahmed
Exploits:
6
BusinessLevel:
4
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
5 629
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Milad karimi
Exploits:
28
BusinessLevel:
4
Microsoft Windows UTF-8 Buffer Overruns Exploit
Kommentare:
0
5 706
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Stefan Kanthak
Exploits:
16
BusinessLevel:
5
Microsoft Windows 10 (1903/1909) - SMBGhost SMB3.1.1 SMB2_COMPRESSION_CAPABILITIES Buffer Overflow
Kommentare:
0
14 969
Security Risk Medium
D
Download
C
CVE-2020-0796
Verified by
Kostenlos
You can open this exploit for free
eerykitty
Exploits:
1
BusinessLevel:
2
Microsoft Windows VCF Denial Of Service Exploit
Kommentare:
0
15 278
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
12 923
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
vportal
Exploits:
8
BusinessLevel:
4
Microsoft Windows cryptoapi - SymCrypt Modular Inverse Algorithm Denial of Service Exploit
Kommentare:
0
13 618
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
13 631
Security Risk High
D
Download
C
CVE-2019-0708
Verified by
Kostenlos
You can open this exploit for free
RAMELLA Sebastien
Exploits:
1
BusinessLevel:
3
12 962
Security Risk Medium
D
Download
C
CVE-2019-0943
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Microsoft Windows - CmpAddRemoveContainerToCLFSLog Arbitrary File/Directory Creation Exploit
Kommentare:
0
12 825
Security Risk Medium
D
Download
C
CVE-2019-0959
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
14 190
Security Risk High
D
Download
C
CVE-2019-0708
Verified by
Kostenlos
You can open this exploit for free
Spencer
Exploits:
1
BusinessLevel:
3
11 790
Security Risk Medium
D
Download
C
CVE-2019-0808
Verified by
Kostenlos
You can open this exploit for free
ze0r
Exploits:
2
BusinessLevel:
7
Microsoft Windows 10 - RestrictedErrorInfo Unmarshal Section Handle Use-After-Free Exploit
Kommentare:
0
6 992
Security Risk Medium
D
Download
C
CVE-2019-0570
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 382
Security Risk Medium
D
Download
C
CVE-2018-8631
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 760
Security Risk Medium
D
Download
C
CVE-2018-8411
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Microsoft Windows - Double Dereference in NtEnumerateKey Elevation of Privilege Exploit
Kommentare:
0
4 206
Security Risk Medium
D
Download
C
CVE-2018-8410
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 037
Security Risk Medium
D
Download
C
CVE-2018-8449
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 884
Security Risk High
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Ghaaf
Exploits:
1
BusinessLevel:
6
4 297
Security Risk High
D
Download
C
CVE-2018-8353
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 817
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
vportal
Exploits:
8
BusinessLevel:
4
4 947
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Victor Portal Gonzalez
Exploits:
1
BusinessLevel:
3