0day.today - Il più grande database di exploit nel mondo.
Cose che dovresti sapere du questo:
Utilizziamo un dominio principale DOMAIN_LINK
Se vuoi acquistare l'exploit o ottenerlo, devi comprare i Gold. Non vogliamo che utilizzi i tool di hacking per atttività illecite sul nostro sito web, quindi ogni azione può avere effetti illegali su utenti e sul nostro sito web verrai bannato. ed il tuo account con i tuoi dati verranno distrutti.
L'amministrazione del sito usa contatti ufficiali. Attenzione agli istruttori!
Utilizziamo un dominio principale DOMAIN_LINK
Se vuoi acquistare l'exploit o ottenerlo, devi comprare i Gold. Non vogliamo che utilizzi i tool di hacking per atttività illecite sul nostro sito web, quindi ogni azione può avere effetti illegali su utenti e sul nostro sito web verrai bannato. ed il tuo account con i tuoi dati verranno distrutti.
L'amministrazione del sito usa contatti ufficiali. Attenzione agli istruttori!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Leggere il [ accordo ]
- Leggere il [ Submit ] regole
- Visita il [ faq ] page
- [ Registrati ] profilo
- ottieni [ Oro ]
- Se vuoi [ vendere ]
- Se vuoi [ comprare ]
- se hai perso [ Account ]
- Qualsiasi domanda [ [email protected] ]
- Autorizzazione della Pagina
- Registrazione della pagina
- Ripristina l'account della pagina
- FAQ pagina
- Pagina dei contatti
- Regole di pubblicazione
- Pagina degli accordi
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Ci puoi contattare tramite:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 406
Security Risk Critical
D
Download
C
CVE-2017-15944
Verified by
FREE
You can open this exploit for free
Philip Pettersson
Exploits:
3
BusinessLevel:
5
Zivif PR115-204-P-RS 2.3.4.2103 Bypass / Command Injection / Hardcoded Password Vulnerabilities
Commenti:
0
4 054
Security Risk Critical
D
Download
C
CVE-2017-17105
CVE-2017-17106
CVE-2017-17107
CVE-2017-17106
CVE-2017-17107
Verified by
FREE
You can open this exploit for free
Silas Cutler
Exploits:
1
BusinessLevel:
3
3 793
Security Risk High
D
Download
C
CVE-2017-14016
Verified by
FREE
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
3 774
Security Risk High
D
Download
-
Verified by
FREE
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
Microsoft Office DDE Payload Delivery Exploit
Commenti:
0
5 334
Security Risk High
D
Download
-
Verified by
FREE
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 049
Security Risk High
D
Download
C
CVE-2017-14380
Verified by
FREE
You can open this exploit for free
bot
Exploits:
154
BusinessLevel:
13
4 304
Security Risk High
D
Download
C
CVE-2017-14184
Verified by
FREE
You can open this exploit for free
SEC Consult
Exploits:
48
BusinessLevel:
10
6 717
Security Risk High
D
Download
C
CVE-2017-10004
CVE-2017-10004
CVE-2017-10004
Verified by
FREE
You can open this exploit for free
Qualys Corporation
Exploits:
21
BusinessLevel:
6
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 840
Security Risk Critical
D
Download
-
Verified by
FREE
You can open this exploit for free
SecuriTeam
Exploits:
20
BusinessLevel:
5
4 955
Security Risk High
D
Download
C
CVE-2017-17672
Verified by
FREE
You can open this exploit for free
SecuriTeam
Exploits:
20
BusinessLevel:
5
8 753
Security Risk Medium
D
Download
-
Verified by
FREE
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
3 987
Security Risk Medium
D
Download
C
CVE-2017-16787
Verified by
FREE
You can open this exploit for free
Jakub Palaczynski
Exploits:
17
BusinessLevel:
6
Meinberg LANTIME Web Configuration Utility 6.16.008 - Arbitrary File Read Vulnerability (2)
Commenti:
0
4 017
Security Risk High
D
Download
C
CVE-2017-16788
Verified by
FREE
You can open this exploit for free
Jakub Palaczynski
Exploits:
17
BusinessLevel:
6
4 035
Security Risk High
D
Download
C
CVE-2017-16787
Verified by
FREE
You can open this exploit for free
Jakub Palaczynski
Exploits:
17
BusinessLevel:
6
3 209
Security Risk High
D
Download
C
CVE-2017-10682
Verified by
FREE
You can open this exploit for free
akityo
Exploits:
1
BusinessLevel:
4
2 912
Security Risk High
D
Download
C
CVE-2017-17645
Verified by
FREE
You can open this exploit for free
Ihsan Sencan
Exploits:
899
BusinessLevel:
49
FS Lynda Clone 1.0 - SQL Injection Vulnerability
Commenti:
0
3 216
Security Risk High
D
Download
C
CVE-2017-17643
Verified by
FREE
You can open this exploit for free
Ihsan Sencan
Exploits:
899
BusinessLevel:
49
2 687
Security Risk High
D
Download
C
CVE-2017-17651
Verified by
FREE
You can open this exploit for free
Ihsan Sencan
Exploits:
899
BusinessLevel:
49