0day.today - Il più grande database di exploit nel mondo.
![](/img/logo_green.jpg)
Utilizziamo un dominio principale DOMAIN_LINK
Se vuoi acquistare l'exploit o ottenerlo, devi comprare i Gold. Non vogliamo che utilizzi i tool di hacking per atttività illecite sul nostro sito web, quindi ogni azione può avere effetti illegali su utenti e sul nostro sito web verrai bannato. ed il tuo account con i tuoi dati verranno distrutti.
L'amministrazione del sito usa contatti ufficiali. Attenzione agli istruttori!
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
Please, beware of scammers!
- Leggere il [ accordo ]
- Leggere il [ Submit ] regole
- Visita il [ faq ] page
- [ Registrati ] profilo
- ottieni [ Oro ]
- Se vuoi [ vendere ]
- Se vuoi [ comprare ]
- se hai perso [ Account ]
- Qualsiasi domanda [ [email protected] ]
- Autorizzazione della Pagina
- Registrazione della pagina
- Ripristina l'account della pagina
- FAQ pagina
- Pagina dei contatti
- Regole di pubblicazione
- Pagina degli accordi
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Ci puoi contattare tramite:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 058
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
FREE
You can open this exploit for free
James Fitts
Exploits:
38
BusinessLevel:
9
4 386
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
FREE
You can open this exploit for free
James Fitts
Exploits:
38
BusinessLevel:
9
3 592
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2017-5177
![](/img/check.png)
Verified by
FREE
You can open this exploit for free
James Fitts
Exploits:
38
BusinessLevel:
9
3 546
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
FREE
You can open this exploit for free
James Fitts
Exploits:
38
BusinessLevel:
9
3 991
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2015-7901
![](/img/check.png)
Verified by
FREE
You can open this exploit for free
James Fitts
Exploits:
38
BusinessLevel:
9
Fatek Automation PLC WinProladder 3.11 Build 14701 - Stack-Based Buffer Overflow Exploit
Commenti:
0
3 735
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2016-8377
![](/img/check.png)
Verified by
FREE
You can open this exploit for free
James Fitts
Exploits:
38
BusinessLevel:
9
4 292
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2013-6810
![](/img/check.png)
Verified by
FREE
You can open this exploit for free
James Fitts
Exploits:
38
BusinessLevel:
9
4 129
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2013-6810
![](/img/check.png)
Verified by
FREE
You can open this exploit for free
James Fitts
Exploits:
38
BusinessLevel:
9
3 816
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2005-2842
![](/img/check.png)
Verified by
FREE
You can open this exploit for free
James Fitts
Exploits:
38
BusinessLevel:
9
3 928
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
FREE
You can open this exploit for free
James Fitts
Exploits:
38
BusinessLevel:
9
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
3 654
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2014-0780
![](/img/check.png)
Verified by
FREE
You can open this exploit for free
James Fitts
Exploits:
38
BusinessLevel:
9
3 320
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2011-3487
![](/img/check.png)
Verified by
FREE
You can open this exploit for free
James Fitts
Exploits:
38
BusinessLevel:
9
3 390
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2011-3487
![](/img/check.png)
Verified by
FREE
You can open this exploit for free
Luigi Auriemma
Exploits:
115
BusinessLevel:
16
3 431
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
FREE
You can open this exploit for free
James Fitts
Exploits:
38
BusinessLevel:
9
3 264
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
FREE
You can open this exploit for free
Ihsan Sencan
Exploits:
899
BusinessLevel:
49
ICDutchAuction 1.2 - SQL Injection Vulnerability
Commenti:
0
3 240
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
FREE
You can open this exploit for free
Ihsan Sencan
Exploits:
899
BusinessLevel:
49
ICAutosales 2.2 - SQL Injection Vulnerability
Commenti:
0
3 226
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
FREE
You can open this exploit for free
Ihsan Sencan
Exploits:
899
BusinessLevel:
49
3 216
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
FREE
You can open this exploit for free
Ihsan Sencan
Exploits:
899
BusinessLevel:
49
2 841
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
FREE
You can open this exploit for free
Ihsan Sencan
Exploits:
899
BusinessLevel:
49
ICClassifieds 1.1 - SQL Injection Vulnerability
Commenti:
0
3 011
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
FREE
You can open this exploit for free
Ihsan Sencan
Exploits:
899
BusinessLevel:
49