0day.today - Il più grande database di exploit nel mondo.
Cose che dovresti sapere du questo:
Utilizziamo un dominio principale DOMAIN_LINK
Se vuoi acquistare l'exploit o ottenerlo, devi comprare i Gold. Non vogliamo che utilizzi i tool di hacking per atttività illecite sul nostro sito web, quindi ogni azione può avere effetti illegali su utenti e sul nostro sito web verrai bannato. ed il tuo account con i tuoi dati verranno distrutti.
L'amministrazione del sito usa contatti ufficiali. Attenzione agli istruttori!
Utilizziamo un dominio principale DOMAIN_LINK
Se vuoi acquistare l'exploit o ottenerlo, devi comprare i Gold. Non vogliamo che utilizzi i tool di hacking per atttività illecite sul nostro sito web, quindi ogni azione può avere effetti illegali su utenti e sul nostro sito web verrai bannato. ed il tuo account con i tuoi dati verranno distrutti.
L'amministrazione del sito usa contatti ufficiali. Attenzione agli istruttori!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Leggere il [ accordo ]
- Leggere il [ Submit ] regole
- Visita il [ faq ] page
- [ Registrati ] profilo
- ottieni [ Oro ]
- Se vuoi [ vendere ]
- Se vuoi [ comprare ]
- se hai perso [ Account ]
- Qualsiasi domanda [ [email protected] ]
- Autorizzazione della Pagina
- Registrazione della pagina
- Ripristina l'account della pagina
- FAQ pagina
- Pagina dei contatti
- Regole di pubblicazione
- Pagina degli accordi
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Ci puoi contattare tramite:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Search results for exploits by request: Nagios
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Nagios XI 5.7.5 Remote Code Execution Exploit
Commenti:
0
4 693
Security Risk Critical
D
Download
C
CVE-2021-25296
CVE-2021-25297
CVE-2021-25298
CVE-2021-25297
CVE-2021-25298
Verified by
FREE
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Nagios XI Autodiscovery Shell Upload Exploit
Commenti:
0
7 964
Security Risk Critical
D
Download
C
CVE-2021-37343
Verified by
FREE
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Nagios XI 5.7.3 Remote Code Execution Exploit
Commenti:
0
8 977
Security Risk Critical
D
Download
C
CVE-2020-5791
Verified by
FREE
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Nagios XI Remote Code Execution Exploit
Commenti:
0
8 956
Security Risk Critical
D
Download
C
CVE-2020-35578
Verified by
FREE
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
8 976
Security Risk Critical
D
Download
C
CVE-2019-15949
Verified by
FREE
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
12 238
Security Risk Critical
D
Download
Verified by
FREE
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
10 241
Security Risk Critical
D
Download
C
CVE-2018-15708
CVE-2018-15710
CVE-2018-15710
Verified by
FREE
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Nagios XI Chained Remote Code Execution Exploit
Commenti:
0
5 205
Security Risk Critical
D
Download
C
CVE-2018-8733
CVE-2018-8734
CVE-2018-8735
CVE-2018-8736
CVE-2018-8734
CVE-2018-8735
CVE-2018-8736
Verified by
FREE
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Nagios 4.2.2 - Arbitrary Code Execution Exploit
Commenti:
0
5 233
Security Risk Critical
D
Download
C
CVE-2016-9565
Verified by
FREE
You can open this exploit for free
Dawid Golunski
Exploits:
32
BusinessLevel:
9
4 714
Security Risk Critical
D
Download
-
Verified by
FREE
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
NAGIOS NRPE <=2.15 Plugin Scanner and Remote Execution Exploit
Vota sù:
0
Vota giù:
0
Commenti:
1
12 227
Security Risk High
D
Download
-
Not verified yet
0.001
Open this exploit for 0.001 BTC
Open this exploit for 40 Oro
florinu
Exploits:
3
BusinessLevel:
6
6 024
Security Risk High
D
Download
-
Verified by
FREE
You can open this exploit for free
Dawid Golunski
Exploits:
32
BusinessLevel:
9
5 865
Security Risk High
D
Download
C
CVE-2013-1362
Verified by
FREE
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
5 392
Security Risk High
D
Download
-
Verified by
FREE
You can open this exploit for free
blasty
Exploits:
4
BusinessLevel:
10
5 659
Security Risk High
D
Download
-
Verified by
FREE
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Nagios 4.2.4 - Privilege Escalation Exploit
Commenti:
0
4 931
Security Risk High
D
Download
C
CVE-2016-9566
Verified by
FREE
You can open this exploit for free
Dawid Golunski
Exploits:
32
BusinessLevel:
9
Nagios 4.2.2 - Privilege Escalation Exploit
Commenti:
0
4 826
Security Risk Critical
D
Download
C
CVE-2016-8641
Verified by
FREE
You can open this exploit for free
Vincent Malguy
Exploits:
2
BusinessLevel:
4
5 287
Security Risk High
D
Download
-
Verified by
FREE
You can open this exploit for free
Dawid Golunski
Exploits:
32
BusinessLevel:
9
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
1 760
Security Risk High
D
Download
-
Verified by
FREE
You can open this exploit for free
Jarod Jaslow
Exploits:
1
BusinessLevel:
0
3 377
Security Risk Critical
D
Download
-
Verified by
FREE
You can open this exploit for free
Zoltan Padanyi
Exploits:
1
BusinessLevel:
1
Nagios XI 5.7.5 Remote Code Execution Exploit
Commenti:
0
1 366
Security Risk Critical
D
Download
C
CVE-2021-25296
CVE-2021-25297
CVE-2021-25298
CVE-2021-25299
CVE-2021-25297
CVE-2021-25298
CVE-2021-25299
Verified by
FREE
You can open this exploit for free
fs0c-sh
Exploits:
1
BusinessLevel:
2
1 291
Security Risk High
D
Download
-
Verified by
FREE
You can open this exploit for free
Matthew Aberegg
Exploits:
12
BusinessLevel:
3
1 366
Security Risk Critical
D
Download
C
CVE-2020-35578
Verified by
FREE
You can open this exploit for free
Haboob Team
Exploits:
5
BusinessLevel:
3
1 321
Security Risk High
D
Download
-
Verified by
FREE
You can open this exploit for free
Emre ÖVÜNÇ
Exploits:
12
BusinessLevel:
4
1 937
Security Risk Critical
D
Download
C
CVE-2020-5791
Verified by
FREE
You can open this exploit for free
Matthew Aberegg
Exploits:
12
BusinessLevel:
3
1 690
Security Risk High
D
Download
-
Verified by
FREE
You can open this exploit for free
Matthew Aberegg
Exploits:
12
BusinessLevel:
3
1 683
Security Risk High
D
Download
-
Verified by
FREE
You can open this exploit for free
Matthew Aberegg
Exploits:
12
BusinessLevel:
3
1 662
Security Risk High
D
Download
-
Verified by
FREE
You can open this exploit for free
Matthew Aberegg
Exploits:
12
BusinessLevel:
3
1 613
Security Risk High
D
Download
-
Verified by
FREE
You can open this exploit for free
Jinson Varghese Behanan
Exploits:
8
BusinessLevel:
3
2 149
Security Risk Critical
D
Download
-
Verified by
FREE
You can open this exploit for free
Basim Alabdullah
Exploits:
4
BusinessLevel:
2
2 724
Security Risk Critical
D
Download
-
Verified by
FREE
You can open this exploit for free
Cody Sixteen
Exploits:
13
BusinessLevel:
4
2 676
Security Risk Critical
D
Download
-
Verified by
FREE
You can open this exploit for free
Cody Sixteen
Exploits:
13
BusinessLevel:
4
2 719
Security Risk High
D
Download
-
Verified by
FREE
You can open this exploit for free
Cody Sixteen
Exploits:
13
BusinessLevel:
4
Nagios XI 5.6.1 SQL Injection Vulnerability
Commenti:
0
3 553
Security Risk High
D
Download
C
CVE-2019-12279
Verified by
FREE
You can open this exploit for free
Jameel Nabbo
Exploits:
2
BusinessLevel:
3
3 131
Security Risk Critical
D
Download
C
CVE-2019-9164
CVE-2019-9165
CVE-2019-9166
CVE-2019-9167
CVE-2019-9202
CVE-2019-9203
CVE-2019-9204
CVE-2019-9165
CVE-2019-9166
CVE-2019-9167
CVE-2019-9202
CVE-2019-9203
CVE-2019-9204
Verified by
FREE
You can open this exploit for free
Abdel Adim Oisfi
Exploits:
1
BusinessLevel:
3
5 241
Security Risk Critical
D
Download
C
CVE-2018-15710
CVE-2018-15708
CVE-2018-15708
Verified by
FREE
You can open this exploit for free
Chris Lyne
Exploits:
10
BusinessLevel:
4
3 539
Security Risk Critical
D
Download
C
CVE-2018-8733
CVE-2018-8734
CVE-2018-8735
CVE-2018-8736
CVE-2018-8734
CVE-2018-8735
CVE-2018-8736
Verified by
FREE
You can open this exploit for free
Jared Arave
Exploits:
4
BusinessLevel:
4
4 638
Security Risk Medium
D
Download
-
Verified by
FREE
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 040
Security Risk Medium
D
Download
C
CVE-2018-13441
CVE-2018-13457
CVE-2018-13458
CVE-2018-13457
CVE-2018-13458
Verified by
FREE
You can open this exploit for free
Fakhri Zulkifli
Exploits:
8
BusinessLevel:
3
Nagios Core 3.4.3 Buffer Overflow Vulnerability
Commenti:
0
5 078
Security Risk High
D
Download
-
Verified by
FREE
You can open this exploit for free
temp66
Exploits:
3
BusinessLevel:
6
5 381
Security Risk Unsored
D
Download
-
Not verified yet
FREE
You can open this exploit for free
Stefan Schurtz
Exploits:
21
BusinessLevel:
7