0day.today - Il più grande database di exploit nel mondo.
Cose che dovresti sapere du questo:
Utilizziamo un dominio principale DOMAIN_LINK
Se vuoi acquistare l'exploit o ottenerlo, devi comprare i Gold. Non vogliamo che utilizzi i tool di hacking per atttività illecite sul nostro sito web, quindi ogni azione può avere effetti illegali su utenti e sul nostro sito web verrai bannato. ed il tuo account con i tuoi dati verranno distrutti.
L'amministrazione del sito usa contatti ufficiali. Attenzione agli istruttori!
Utilizziamo un dominio principale DOMAIN_LINK
Se vuoi acquistare l'exploit o ottenerlo, devi comprare i Gold. Non vogliamo che utilizzi i tool di hacking per atttività illecite sul nostro sito web, quindi ogni azione può avere effetti illegali su utenti e sul nostro sito web verrai bannato. ed il tuo account con i tuoi dati verranno distrutti.
L'amministrazione del sito usa contatti ufficiali. Attenzione agli istruttori!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Leggere il [ accordo ]
- Leggere il [ Submit ] regole
- Visita il [ faq ] page
- [ Registrati ] profilo
- ottieni [ Oro ]
- Se vuoi [ vendere ]
- Se vuoi [ comprare ]
- se hai perso [ Account ]
- Qualsiasi domanda [ [email protected] ]
- Autorizzazione della Pagina
- Registrazione della pagina
- Ripristina l'account della pagina
- FAQ pagina
- Pagina dei contatti
- Regole di pubblicazione
- Pagina degli accordi
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Ci puoi contattare tramite:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Search results for exploits by request: Symantec
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 092
Security Risk Critical
D
Download
C
CVE-2015-4852
Verified by
FREE
You can open this exploit for free
Nikhil Sreekumar
Exploits:
1
BusinessLevel:
3
4 894
Security Risk Critical
D
Download
C
CVE-2017-8895
Verified by
FREE
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
6 438
Security Risk Critical
D
Download
C
CVE-2017-6326
Verified by
FREE
You can open this exploit for free
Mehmet Ince
Exploits:
26
BusinessLevel:
7
4 258
Security Risk Critical
D
Download
C
CVE-2015-1486
CVE-2015-1487
CVE-2015-1489
CVE-2015-1487
CVE-2015-1489
Verified by
FREE
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
4 106
Security Risk High
D
Download
C
CVE-2015-1486
CVE-2015-1487
CVE-2015-1488
CVE-2015-1489
CVE-2015-1490
CVE-2015-1491
CVE-2015-1487
CVE-2015-1488
CVE-2015-1489
CVE-2015-1490
CVE-2015-1491
Verified by
FREE
You can open this exploit for free
Code White
Exploits:
2
BusinessLevel:
5
4 317
Security Risk Critical
D
Download
C
CVE-2014-7285
Verified by
FREE
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
4 522
Security Risk High
D
Download
-
Verified by
FREE
You can open this exploit for free
Vantage Point
Exploits:
1
BusinessLevel:
5
5 028
Security Risk High
D
Download
C
CVE-2014-7289
CVE-2014-9224
CVE-2014-9225
CVE-2014-9226
CVE-2014-9224
CVE-2014-9225
CVE-2014-9226
Verified by
FREE
You can open this exploit for free
SEC Consult
Exploits:
48
BusinessLevel:
10
4 635
Security Risk High
D
Download
C
CVE-2014-1649
Verified by
FREE
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
5 083
Security Risk High
D
Download
C
CVE-2013-5014
CVE-2013-5015
CVE-2013-5015
Verified by
FREE
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
5 130
Security Risk High
D
Download
C
CVE-2013-5014
CVE-2013-5015
CVE-2013-5015
Verified by
FREE
You can open this exploit for free
Chris Graham
Exploits:
3
BusinessLevel:
5
Symantec Altiris DS SQL Injection Exploit
Commenti:
0
5 419
Security Risk High
D
Download
C
CVE-2008-2286
Verified by
FREE
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
4 665
Security Risk High
D
Download
-
Verified by
FREE
You can open this exploit for free
rgod
Exploits:
255
BusinessLevel:
22
4 839
Security Risk High
D
Download
-
Not verified yet
FREE
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
4 247
Security Risk Unsored
D
Download
-
Not verified yet
FREE
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
4 857
Security Risk High
D
Download
-
Not verified yet
FREE
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
5 179
Security Risk High
D
Download
-
Not verified yet
FREE
You can open this exploit for free
muts
Exploits:
43
BusinessLevel:
12
5 571
Security Risk Medium
D
Download
-
Not verified yet
FREE
You can open this exploit for free
muts
Exploits:
43
BusinessLevel:
12
5 664
Security Risk High
D
Download
-
Not verified yet
FREE
You can open this exploit for free
S2 Crew
Exploits:
14
BusinessLevel:
8
Symantec Web Gateway 5.0.2.8 Command Execution
Commenti:
0
4 780
Security Risk High
D
Download
-
Not verified yet
FREE
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
3 117
Security Risk High
D
Download
-
Verified by
FREE
You can open this exploit for free
Kyriakos Economou
Exploits:
4
BusinessLevel:
5
5 989
Security Risk Medium
D
Download
C
CVE-2017-6331
Verified by
FREE
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
3 805
Security Risk Critical
D
Download
C
CVE-2014-7286
Verified by
FREE
You can open this exploit for free
Parvez Anwar
Exploits:
16
BusinessLevel:
5
4 946
Security Risk High
D
Download
C
CVE-2014-3434
Verified by
FREE
You can open this exploit for free
ryujin & sickness
Exploits:
1
BusinessLevel:
5
Symantec Altiris DS SQL Injection Vulnerability
Commenti:
0
5 086
Security Risk High
D
Download
Verified by
FREE
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
5 446
Security Risk Medium
D
Download
-
Not verified yet
FREE
You can open this exploit for free
MJ0011
Exploits:
11
BusinessLevel:
8
4 681
Security Risk High
D
Download
-
Not verified yet
FREE
You can open this exploit for free
Edward Torkington
Exploits:
2
BusinessLevel:
6
unsorted
4 146
Security Risk Unsored
D
Download
-
Not verified yet
FREE
You can open this exploit for free
Sh2kerr
Exploits:
15
BusinessLevel:
9
unsorted
4 057
Security Risk Unsored
D
Download
-
Not verified yet
FREE
You can open this exploit for free
Alex Hernandez
Exploits:
5
BusinessLevel:
9
4 894
Security Risk Unsored
D
Download
-
Not verified yet
FREE
You can open this exploit for free
Zohiartze Herce
Exploits:
1
BusinessLevel:
8
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
3 915
Security Risk Medium
D
Download
C
CVE-2023-23956
Verified by
FREE
You can open this exploit for free
Harshit Joshi
Exploits:
1
BusinessLevel:
1
3 623
Security Risk Medium
D
Download
C
CVE-2022-25630
Verified by
FREE
You can open this exploit for free
omurugur
Exploits:
5
BusinessLevel:
3
2 552
Security Risk Critical
D
Download
-
Verified by
FREE
You can open this exploit for free
Cody Sixteen
Exploits:
13
BusinessLevel:
4
Symantec Advanced Secure Gateway (ASG) / ProxySG - Unrestricted File Upload Vulnerability
Commenti:
0
3 914
Security Risk Medium
D
Download
C
CVE-2016-10258
Verified by
FREE
You can open this exploit for free
Pankaj Kumar Thakur
Exploits:
3
BusinessLevel:
2
3 260
Security Risk Medium
D
Download
C
CVE-2019-9701
Verified by
FREE
You can open this exploit for free
Chapman Schleiss
Exploits:
2
BusinessLevel:
3
4 359
Security Risk Medium
D
Download
C
CVE-2017-6328
Verified by
FREE
You can open this exploit for free
Dhiraj Mishra
Exploits:
27
BusinessLevel:
5
4 572
Security Risk Critical
D
Download
C
CVE-2017-6327
Verified by
FREE
You can open this exploit for free
Philip Pettersson
Exploits:
3
BusinessLevel:
4
4 452
Security Risk High
D
Download
C
CVE-2016-5313
Verified by
FREE
You can open this exploit for free
EgiX
Exploits:
129
BusinessLevel:
15
4 779
Security Risk High
D
Download
C
CVE-2016-5312
Verified by
FREE
You can open this exploit for free
R-73eN
Exploits:
22
BusinessLevel:
6
3 546
Security Risk High
D
Download
C
CVE-2016-3652
CVE-2016-3653
CVE-2016-5304
CVE-2016-3653
CVE-2016-5304
Verified by
FREE
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
4 052
Security Risk High
D
Download
C
CVE-2016-2203
Verified by
FREE
You can open this exploit for free
Fakhir Karim Reda
Exploits:
1
BusinessLevel:
4
4 887
Security Risk Critical
D
Download
C
CVE-2014-7285
Verified by
FREE
You can open this exploit for free
EgiX
Exploits:
129
BusinessLevel:
15
5 053
Security Risk Medium
D
Download
C
CVE-2014-3439
Verified by
FREE
You can open this exploit for free
SEC Consult
Exploits:
48
BusinessLevel:
10
5 126
Security Risk High
D
Download
C
CVE-2013-1616
Verified by
FREE
You can open this exploit for free
SEC Consult
Exploits:
48
BusinessLevel:
10
4 578
Security Risk High
D
Download
-
Verified by
FREE
You can open this exploit for free
Ben Williams
Exploits:
3
BusinessLevel:
6
4 218
Security Risk Low
D
Download
-
Verified by
FREE
You can open this exploit for free
Ben Williams
Exploits:
3
BusinessLevel:
6
4 419
Security Risk High
D
Download
-
Not verified yet
FREE
You can open this exploit for free
@_Kc57
Exploits:
3
BusinessLevel:
6
4 238
Security Risk High
D
Download
-
Not verified yet
FREE
You can open this exploit for free
@_Kc57
Exploits:
3
BusinessLevel:
6
4 731
Security Risk Medium
D
Download
-
Not verified yet
FREE
You can open this exploit for free
@_Kc57
Exploits:
3
BusinessLevel:
6
4 895
Security Risk Medium
D
Download
-
Not verified yet
FREE
You can open this exploit for free
muts
Exploits:
43
BusinessLevel:
12
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
5 187
Security Risk Medium
D
Download
-
Verified by
FREE
You can open this exploit for free
Luis Martínez
Exploits:
57
BusinessLevel:
7
Symantec rar Decomposer Engine (Multiple Products) - Out-of-Bounds Read / Out-of-Bounds Write
Commenti:
0
3 996
Security Risk Medium
D
Download
C
CVE-2016-5309
CVE-2016-5310
CVE-2016-5310
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
2 845
Security Risk Medium
D
Download
C
CVE-2016-2207
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
2 830
Security Risk Medium
D
Download
C
CVE-2016-2210
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
2 873
Security Risk Medium
D
Download
C
CVE-2016-3644
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
2 807
Security Risk Medium
D
Download
C
CVE-2016-3645
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Symantec AntiVirus - Missing Bounds Checks in dec2zip ALPkOldFormatDecompressor::UnShrink
Commenti:
0
2 840
Security Risk Medium
D
Download
C
CVE-2016-3646
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 359
Security Risk High
D
Download
C
CVE-2016-2209
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
2 795
Security Risk High
D
Download
C
CVE-2016-2208
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 025
Security Risk Medium
D
Download
-
Verified by
FREE
You can open this exploit for free
John Page
Exploits:
19
BusinessLevel:
5
5 373
Security Risk High
D
Download
C
CVE-2013-1612
Not verified yet
FREE
You can open this exploit for free
st3n
Exploits:
6
BusinessLevel:
6
4 603
Security Risk Medium
D
Download
-
Not verified yet
FREE
You can open this exploit for free
41.w4r10r
Exploits:
12
BusinessLevel:
8
4 415
Security Risk Unsored
D
Download
-
Not verified yet
FREE
You can open this exploit for free
Stefan LE BERRE
Exploits:
2
BusinessLevel:
7
4 905
Security Risk Unsored
D
Download
-
Not verified yet
FREE
You can open this exploit for free
houseofdabus
Exploits:
10
BusinessLevel:
11