0day.today - La mayor base de datos de exploits en el mundo.
Things you should know about it:
We use one main domain DOMAIN_LINK
If you want to purchase the exploit or pay for service, you need to buy Gold. We don't want you to use our site as a tool for hacking purposes, so any kind of action that could affect illegaly other users or websites that you don't have right to access will be banned and your account including your data will be destroyed.
Administration of this site uses the official contacts. Beware of impostors!
We use one main domain DOMAIN_LINK
If you want to purchase the exploit or pay for service, you need to buy Gold. We don't want you to use our site as a tool for hacking purposes, so any kind of action that could affect illegaly other users or websites that you don't have right to access will be banned and your account including your data will be destroyed.
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Enviar ] rules
- Visit the [ Preguntas frecuentes ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ [email protected] ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
No puedes contactar por:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Search results for exploits by request: Symantec
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 092
Security Risk Critical
D
Download
C
CVE-2015-4852
Verified by
gratis
You can open this exploit for free
Nikhil Sreekumar
Exploits:
1
BusinessLevel:
3
4 895
Security Risk Critical
D
Download
C
CVE-2017-8895
Verified by
gratis
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
6 438
Security Risk Critical
D
Download
C
CVE-2017-6326
Verified by
gratis
You can open this exploit for free
Mehmet Ince
Exploits:
26
BusinessLevel:
7
4 258
Security Risk Critical
D
Download
C
CVE-2015-1486
CVE-2015-1487
CVE-2015-1489
CVE-2015-1487
CVE-2015-1489
Verified by
gratis
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Symantec Endpoint Protection Multiple Vulnerabilities
Comentarios:
0
4 106
Security Risk High
D
Download
C
CVE-2015-1486
CVE-2015-1487
CVE-2015-1488
CVE-2015-1489
CVE-2015-1490
CVE-2015-1491
CVE-2015-1487
CVE-2015-1488
CVE-2015-1489
CVE-2015-1490
CVE-2015-1491
Verified by
gratis
You can open this exploit for free
Code White
Exploits:
2
BusinessLevel:
5
Symantec Web Gateway 5 restore.php Command Injection Exploit
Comentarios:
0
4 317
Security Risk Critical
D
Download
C
CVE-2014-7285
Verified by
gratis
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
4 522
Security Risk High
D
Download
-
Verified by
gratis
You can open this exploit for free
Vantage Point
Exploits:
1
BusinessLevel:
5
Symantec Data Center Security - Multiple Vulnerabilities
Comentarios:
0
5 029
Security Risk High
D
Download
C
CVE-2014-7289
CVE-2014-9224
CVE-2014-9225
CVE-2014-9226
CVE-2014-9224
CVE-2014-9225
CVE-2014-9226
Verified by
gratis
You can open this exploit for free
SEC Consult
Exploits:
48
BusinessLevel:
10
Symantec Workspace Streaming Arbitrary File Upload Exploit
Comentarios:
0
4 635
Security Risk High
D
Download
C
CVE-2014-1649
Verified by
gratis
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
5 084
Security Risk High
D
Download
C
CVE-2013-5014
CVE-2013-5015
CVE-2013-5015
Verified by
gratis
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
5 130
Security Risk High
D
Download
C
CVE-2013-5014
CVE-2013-5015
CVE-2013-5015
Verified by
gratis
You can open this exploit for free
Chris Graham
Exploits:
3
BusinessLevel:
5
Symantec Altiris DS SQL Injection Exploit
Comentarios:
0
5 419
Security Risk High
D
Download
C
CVE-2008-2286
Verified by
gratis
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Symantec Workspace Streaming 7.5.0.493 Rmote Code Execution
Comentarios:
0
4 665
Security Risk High
D
Download
-
Verified by
gratis
You can open this exploit for free
rgod
Exploits:
255
BusinessLevel:
22
Symantec Messaging Gateway 9.5 Default SSH Password
Comentarios:
0
4 840
Security Risk High
D
Download
-
Not verified yet
gratis
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Symantec Messaging Gateway 9.5/9.5.1 SSH Default Password Security Bypass Vulnerability
Comentarios:
0
4 247
Security Risk Unsored
D
Download
-
Not verified yet
gratis
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
4 857
Security Risk High
D
Download
-
Not verified yet
gratis
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Symantec Web Gateway 5.0.3.18 pbcontrol.php ROOT RCE Exploit
Comentarios:
0
5 179
Security Risk High
D
Download
-
Not verified yet
gratis
You can open this exploit for free
muts
Exploits:
43
BusinessLevel:
12
Symantec Web Gateway 5.0.3.18 LFI Remote ROOT RCE Exploit
Comentarios:
0
5 571
Security Risk Medium
D
Download
-
Not verified yet
gratis
You can open this exploit for free
muts
Exploits:
43
BusinessLevel:
12
5 664
Security Risk High
D
Download
-
Not verified yet
gratis
You can open this exploit for free
S2 Crew
Exploits:
14
BusinessLevel:
8
Symantec Web Gateway 5.0.2.8 Command Execution
Comentarios:
0
4 780
Security Risk High
D
Download
-
Not verified yet
gratis
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
3 117
Security Risk High
D
Download
-
Verified by
gratis
You can open this exploit for free
Kyriakos Economou
Exploits:
4
BusinessLevel:
5
5 989
Security Risk Medium
D
Download
C
CVE-2017-6331
Verified by
gratis
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
3 805
Security Risk Critical
D
Download
C
CVE-2014-7286
Verified by
gratis
You can open this exploit for free
Parvez Anwar
Exploits:
16
BusinessLevel:
5
4 946
Security Risk High
D
Download
C
CVE-2014-3434
Verified by
gratis
You can open this exploit for free
ryujin & sickness
Exploits:
1
BusinessLevel:
5
Symantec Altiris DS SQL Injection Vulnerability
Comentarios:
0
5 086
Security Risk High
D
Download
Verified by
gratis
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
5 446
Security Risk Medium
D
Download
-
Not verified yet
gratis
You can open this exploit for free
MJ0011
Exploits:
11
BusinessLevel:
8
4 681
Security Risk High
D
Download
-
Not verified yet
gratis
You can open this exploit for free
Edward Torkington
Exploits:
2
BusinessLevel:
6
Symantec Antivirus Client Proxy 10 Buffer Overflow
Comentarios:
0
unsorted
4 149
Security Risk Unsored
D
Download
-
Not verified yet
gratis
You can open this exploit for free
Sh2kerr
Exploits:
15
BusinessLevel:
9
unsorted
4 057
Security Risk Unsored
D
Download
-
Not verified yet
gratis
You can open this exploit for free
Alex Hernandez
Exploits:
5
BusinessLevel:
9
4 894
Security Risk Unsored
D
Download
-
Not verified yet
gratis
You can open this exploit for free
Zohiartze Herce
Exploits:
1
BusinessLevel:
8
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
3 915
Security Risk Medium
D
Download
C
CVE-2023-23956
Verified by
gratis
You can open this exploit for free
Harshit Joshi
Exploits:
1
BusinessLevel:
1
3 623
Security Risk Medium
D
Download
C
CVE-2022-25630
Verified by
gratis
You can open this exploit for free
omurugur
Exploits:
5
BusinessLevel:
3
Symantec Web Gateway 5.0.2.8 Remote Code Execution Exploit
Comentarios:
0
2 552
Security Risk Critical
D
Download
-
Verified by
gratis
You can open this exploit for free
Cody Sixteen
Exploits:
13
BusinessLevel:
4
Symantec Advanced Secure Gateway (ASG) / ProxySG - Unrestricted File Upload Vulnerability
Comentarios:
0
3 914
Security Risk Medium
D
Download
C
CVE-2016-10258
Verified by
gratis
You can open this exploit for free
Pankaj Kumar Thakur
Exploits:
3
BusinessLevel:
2
Symantec DLP 15.5 MP1 - Cross-Site Scripting Vulnerability
Comentarios:
0
3 260
Security Risk Medium
D
Download
C
CVE-2019-9701
Verified by
gratis
You can open this exploit for free
Chapman Schleiss
Exploits:
2
BusinessLevel:
3
4 359
Security Risk Medium
D
Download
C
CVE-2017-6328
Verified by
gratis
You can open this exploit for free
Dhiraj Mishra
Exploits:
27
BusinessLevel:
5
4 572
Security Risk Critical
D
Download
C
CVE-2017-6327
Verified by
gratis
You can open this exploit for free
Philip Pettersson
Exploits:
3
BusinessLevel:
4
4 452
Security Risk High
D
Download
C
CVE-2016-5313
Verified by
gratis
You can open this exploit for free
EgiX
Exploits:
129
BusinessLevel:
15
Symantec Messaging Gateway 10.6.1 - Directory Traversal
Comentarios:
0
4 779
Security Risk High
D
Download
C
CVE-2016-5312
Verified by
gratis
You can open this exploit for free
R-73eN
Exploits:
22
BusinessLevel:
6
3 546
Security Risk High
D
Download
C
CVE-2016-3652
CVE-2016-3653
CVE-2016-5304
CVE-2016-3653
CVE-2016-5304
Verified by
gratis
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
4 052
Security Risk High
D
Download
C
CVE-2016-2203
Verified by
gratis
You can open this exploit for free
Fakhir Karim Reda
Exploits:
1
BusinessLevel:
4
4 887
Security Risk Critical
D
Download
C
CVE-2014-7285
Verified by
gratis
You can open this exploit for free
EgiX
Exploits:
129
BusinessLevel:
15
5 053
Security Risk Medium
D
Download
C
CVE-2014-3439
Verified by
gratis
You can open this exploit for free
SEC Consult
Exploits:
48
BusinessLevel:
10
Symantec Web Gateway 5.1.0 - Multiple Vulnerabilities
Comentarios:
0
5 126
Security Risk High
D
Download
C
CVE-2013-1616
Verified by
gratis
You can open this exploit for free
SEC Consult
Exploits:
48
BusinessLevel:
10
Symantec Messaging Gateway 9.5.3-3 Arbitrary File Download
Comentarios:
0
4 578
Security Risk High
D
Download
-
Verified by
gratis
You can open this exploit for free
Ben Williams
Exploits:
3
BusinessLevel:
6
Symantec Messaging Gateway 9.5.3-3 CSRF Vulnerability
Comentarios:
0
4 218
Security Risk Low
D
Download
-
Verified by
gratis
You can open this exploit for free
Ben Williams
Exploits:
3
BusinessLevel:
6
4 419
Security Risk High
D
Download
-
Not verified yet
gratis
You can open this exploit for free
@_Kc57
Exploits:
3
BusinessLevel:
6
Symantec Web Gateway <= 5.0.3.18 Arbitrary Password Change
Comentarios:
0
4 238
Security Risk High
D
Download
-
Not verified yet
gratis
You can open this exploit for free
@_Kc57
Exploits:
3
BusinessLevel:
6
Symantec Web Gateway 5.0.3.18 (deptUploads_data.php) Blind SQL Injection Vulnerability
Comentarios:
0
4 731
Security Risk Medium
D
Download
-
Not verified yet
gratis
You can open this exploit for free
@_Kc57
Exploits:
3
BusinessLevel:
6
4 895
Security Risk Medium
D
Download
-
Not verified yet
gratis
You can open this exploit for free
muts
Exploits:
43
BusinessLevel:
12
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
5 187
Security Risk Medium
D
Download
-
Verified by
gratis
You can open this exploit for free
Luis Martínez
Exploits:
57
BusinessLevel:
7
Symantec rar Decomposer Engine (Multiple Products) - Out-of-Bounds Read / Out-of-Bounds Write
Comentarios:
0
3 996
Security Risk Medium
D
Download
C
CVE-2016-5309
CVE-2016-5310
CVE-2016-5310
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
2 845
Security Risk Medium
D
Download
C
CVE-2016-2207
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
2 830
Security Risk Medium
D
Download
C
CVE-2016-2210
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Symantec AntiVirus - Heap Overflow Modifying MIME Messages
Comentarios:
0
2 873
Security Risk Medium
D
Download
C
CVE-2016-3644
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Symantec AntiVirus - Integer Overflow in TNEF Decoder
Comentarios:
0
2 807
Security Risk Medium
D
Download
C
CVE-2016-3645
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Symantec AntiVirus - Missing Bounds Checks in dec2zip ALPkOldFormatDecompressor::UnShrink
Comentarios:
0
2 840
Security Risk Medium
D
Download
C
CVE-2016-3646
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 359
Security Risk High
D
Download
C
CVE-2016-2209
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
2 795
Security Risk High
D
Download
C
CVE-2016-2208
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 026
Security Risk Medium
D
Download
-
Verified by
gratis
You can open this exploit for free
John Page
Exploits:
19
BusinessLevel:
5
5 373
Security Risk High
D
Download
C
CVE-2013-1612
Not verified yet
gratis
You can open this exploit for free
st3n
Exploits:
6
BusinessLevel:
6
4 603
Security Risk Medium
D
Download
-
Not verified yet
gratis
You can open this exploit for free
41.w4r10r
Exploits:
12
BusinessLevel:
8
4 415
Security Risk Unsored
D
Download
-
Not verified yet
gratis
You can open this exploit for free
Stefan LE BERRE
Exploits:
2
BusinessLevel:
7
Symantec Multiple Firewall DNS Response Denial of Service
Comentarios:
0
4 905
Security Risk Unsored
D
Download
-
Not verified yet
gratis
You can open this exploit for free
houseofdabus
Exploits:
10
BusinessLevel:
11