0day.today - La mayor base de datos de exploits en el mundo.
Things you should know about it:
We use one main domain DOMAIN_LINK
If you want to purchase the exploit or pay for service, you need to buy Gold. We don't want you to use our site as a tool for hacking purposes, so any kind of action that could affect illegaly other users or websites that you don't have right to access will be banned and your account including your data will be destroyed.
Administration of this site uses the official contacts. Beware of impostors!
We use one main domain DOMAIN_LINK
If you want to purchase the exploit or pay for service, you need to buy Gold. We don't want you to use our site as a tool for hacking purposes, so any kind of action that could affect illegaly other users or websites that you don't have right to access will be banned and your account including your data will be destroyed.
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Enviar ] rules
- Visit the [ Preguntas frecuentes ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ [email protected] ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
No puedes contactar por:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Search results for exploits by request: Microsoft Windows
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 686
Security Risk Critical
D
Download
-
Verified by
gratis
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
5 693
Security Risk Critical
D
Download
C
CVE-2022-44666
Verified by
gratis
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
Microsoft Windows RRAS Service MIBEntryGet Overflow Exploit
Comentarios:
0
9 203
Security Risk High
D
Download
C
CVE-2017-8461
Verified by
gratis
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
11 112
Security Risk High
D
Download
C
CVE-2020-1313
Verified by
gratis
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
11 093
Security Risk Medium
D
Download
-
Verified by
gratis
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
Microsoft Windows - (SMBGhost) Remote Code Execution Exploit
Comentarios:
0
12 841
Security Risk Critical
D
Download
C
CVE-2020-0796
Verified by
gratis
You can open this exploit for free
chompie1337
Exploits:
1
BusinessLevel:
2
12 058
Security Risk Critical
D
Download
C
CVE-2020-1113
Verified by
gratis
You can open this exploit for free
Sylvain Heiniger
Exploits:
6
BusinessLevel:
4
Microsoft Windows SMB 3.1.1 Remote Code Execution Exploit
Comentarios:
0
13 505
Security Risk Critical
D
Download
C
CVE-2020-0796
Verified by
gratis
You can open this exploit for free
Ventsislav Varbanovski
Exploits:
2
BusinessLevel:
2
Microsoft Windows 7 (x86) - (BlueKeep) RDP Remote Windows Kernel Use After Free Exploit
Comentarios:
0
14 741
Security Risk Critical
D
Download
C
CVE-2019-0708
Verified by
gratis
You can open this exploit for free
0xeb-bp
Exploits:
1
BusinessLevel:
2
12 446
Security Risk Critical
D
Download
C
CVE-2015-0009
Verified by
gratis
You can open this exploit for free
Thomas Zuk
Exploits:
4
BusinessLevel:
3
12 821
Security Risk Critical
D
Download
C
CVE-2015-0008
Verified by
gratis
You can open this exploit for free
Thomas Zuk
Exploits:
4
BusinessLevel:
3
Microsoft Windows Silent Process Exit Persistence Exploit
Comentarios:
0
13 685
Security Risk Critical
D
Download
-
Verified by
gratis
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
13 766
Security Risk Critical
D
Download
C
CVE-2019-0708
Verified by
gratis
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Microsoft Internet Explorer Windows 10 1809 17763.316 - Scripting Engine Memory Corruption Exploit
Comentarios:
0
8 752
Security Risk High
D
Download
-
Verified by
gratis
You can open this exploit for free
Simon Zuckerbraun
Exploits:
2
BusinessLevel:
3
Microsoft Windows VCF or Contact File - URL Manipulation-Spoof Arbitrary Code Execution Exploit
Comentarios:
0
8 656
Security Risk Critical
D
Download
-
Verified by
gratis
You can open this exploit for free
Eduardo Braun Prado
Exploits:
16
BusinessLevel:
5
Microsoft Windows VCF Remote Code Execution Exploit
Comentarios:
0
12 648
Security Risk Critical
D
Download
-
Verified by
gratis
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
5 829
Security Risk Critical
D
Download
C
CVE-2017-11885
Verified by
gratis
You can open this exploit for free
vportal
Exploits:
8
BusinessLevel:
4
Microsoft Windows SMB MS17-010 EternalRomance / EternalSynergy / EternalChampion Remote Code Executi
Comentarios:
0
7 508
Security Risk Critical
D
Download
C
CVE-2017-0143
CVE-2017-0146
CVE-2017-0147
CVE-2017-0146
CVE-2017-0147
Verified by
gratis
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Microsoft Windows LNK File Code Execution Exploit
Comentarios:
0
6 280
Security Risk Critical
D
Download
C
CVE-2015-0095
CVE-2017-8464
CVE-2017-8464
Verified by
gratis
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
6 801
Security Risk Critical
D
Download
C
CVE-2017-8759
Verified by
gratis
You can open this exploit for free
Voulnet
Exploits:
2
BusinessLevel:
3
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
2 303
Security Risk Critical
D
Download
C
CVE-2024-21338
Verified by
gratis
You can open this exploit for free
E1 Coders
Exploits:
2
BusinessLevel:
0
Microsoft Windows Defender / Trojan.Win32/Powessere.G - Detection Mitigation Bypass Vulnerability
Comentarios:
0
4 809
Security Risk High
D
Download
-
Verified by
gratis
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
4 577
Security Risk High
D
Download
-
Verified by
gratis
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
4 331
Security Risk High
D
Download
-
Verified by
gratis
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
2 362
Security Risk Critical
D
Download
-
Verified by
gratis
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
4 635
Security Risk Medium
D
Download
-
Verified by
gratis
You can open this exploit for free
Moein Shahabi
Exploits:
1
BusinessLevel:
0
Microsoft Windows Defender - Detections Bypass Vulnerability
Comentarios:
0
10 340
Security Risk Critical
D
Download
-
Verified by
gratis
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
9 832
Security Risk High
D
Download
-
Verified by
gratis
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
Microsoft Windows SMB Direct Session Takeover Exploit
Comentarios:
0
10 313
Security Risk Critical
D
Download
-
Verified by
gratis
You can open this exploit for free
usiegl00
Exploits:
1
BusinessLevel:
1
10 316
Security Risk Medium
D
Download
-
Verified by
gratis
You can open this exploit for free
Eduardo Braun Prado
Exploits:
16
BusinessLevel:
5
10 288
Security Risk Low
D
Download
-
Verified by
gratis
You can open this exploit for free
Eduardo Braun Prado
Exploits:
16
BusinessLevel:
5
9 290
Security Risk Medium
D
Download
-
Verified by
gratis
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
Microsoft Windows TokenMagic Privilege Escalation Exploit
Comentarios:
0
8 733
Security Risk Critical
D
Download
-
Verified by
gratis
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Microsoft Windows UAC Privilege Escalation Vulnerability
Comentarios:
0
8 508
Security Risk High
D
Download
-
Verified by
gratis
You can open this exploit for free
Stefan Kanthak
Exploits:
16
BusinessLevel:
4
8 426
Security Risk Medium
D
Download
-
Verified by
gratis
You can open this exploit for free
Marc Nimmerrichte
Exploits:
1
BusinessLevel:
2
8 491
Security Risk High
D
Download
C
CVE-2021-26891
Verified by
gratis
You can open this exploit for free
James Forshaw
Exploits:
6
BusinessLevel:
5
8 685
Security Risk High
D
Download
C
CVE-2020-1054
Verified by
gratis
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Microsoft Windows - Win32k Elevation of Privilege Exploit
Comentarios:
0
8 619
Security Risk High
D
Download
-
Verified by
gratis
You can open this exploit for free
nu11secur1ty
Exploits:
215
BusinessLevel:
13
Microsoft Windows Local Spooler Bypass Vulnerability
Comentarios:
0
8 519
Security Risk High
D
Download
C
CVE-2020-1337
CVE-2020-17001
CVE-2020-17001
Verified by
gratis
You can open this exploit for free
James Forshaw
Exploits:
6
BusinessLevel:
5
9 639
Security Risk High
D
Download
C
CVE-2019-1458
Verified by
gratis
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 070
Security Risk Medium
D
Download
C
CVE-2018-0878
Verified by
gratis
You can open this exploit for free
Nabeel Ahmed
Exploits:
6
BusinessLevel:
4
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Microsoft Windows 11 - (cmd.exe) Denial of Service Exploit
Comentarios:
0
5 509
Security Risk Medium
D
Download
-
Verified by
gratis
You can open this exploit for free
Milad karimi
Exploits:
28
BusinessLevel:
4
Microsoft Windows UTF-8 Buffer Overruns Exploit
Comentarios:
0
5 591
Security Risk Medium
D
Download
-
Verified by
gratis
You can open this exploit for free
Stefan Kanthak
Exploits:
16
BusinessLevel:
4
Microsoft Windows 10 (1903/1909) - SMBGhost SMB3.1.1 SMB2_COMPRESSION_CAPABILITIES Buffer Overflow
Comentarios:
0
14 862
Security Risk Medium
D
Download
C
CVE-2020-0796
Verified by
gratis
You can open this exploit for free
eerykitty
Exploits:
1
BusinessLevel:
2
Microsoft Windows VCF Denial Of Service Exploit
Comentarios:
0
15 174
Security Risk Medium
D
Download
-
Verified by
gratis
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
12 807
Security Risk Medium
D
Download
-
Verified by
gratis
You can open this exploit for free
vportal
Exploits:
8
BusinessLevel:
4
Microsoft Windows cryptoapi - SymCrypt Modular Inverse Algorithm Denial of Service Exploit
Comentarios:
0
13 519
Security Risk Medium
D
Download
-
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
13 523
Security Risk High
D
Download
C
CVE-2019-0708
Verified by
gratis
You can open this exploit for free
RAMELLA Sebastien
Exploits:
1
BusinessLevel:
2
Microsoft Windows Font Cache Service - Insecure Sections Privilege Escalation Exploit
Comentarios:
0
12 858
Security Risk Medium
D
Download
C
CVE-2019-0943
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Microsoft Windows - CmpAddRemoveContainerToCLFSLog Arbitrary File/Directory Creation Exploit
Comentarios:
0
12 713
Security Risk Medium
D
Download
C
CVE-2019-0959
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
14 090
Security Risk High
D
Download
C
CVE-2019-0708
Verified by
gratis
You can open this exploit for free
Spencer
Exploits:
1
BusinessLevel:
3
Microsoft Windows 7/2008 - Win32k Denial of Service Exploit
Comentarios:
0
11 689
Security Risk Medium
D
Download
C
CVE-2019-0808
Verified by
gratis
You can open this exploit for free
ze0r
Exploits:
2
BusinessLevel:
7
Microsoft Windows 10 - RestrictedErrorInfo Unmarshal Section Handle Use-After-Free Exploit
Comentarios:
0
6 951
Security Risk Medium
D
Download
C
CVE-2019-0570
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 350
Security Risk Medium
D
Download
C
CVE-2018-8631
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 725
Security Risk Medium
D
Download
C
CVE-2018-8411
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Microsoft Windows - Double Dereference in NtEnumerateKey Elevation of Privilege Exploit
Comentarios:
0
4 164
Security Risk Medium
D
Download
C
CVE-2018-8410
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 984
Security Risk Medium
D
Download
C
CVE-2018-8449
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 836
Security Risk High
D
Download
-
Verified by
gratis
You can open this exploit for free
Ghaaf
Exploits:
1
BusinessLevel:
6
4 250
Security Risk High
D
Download
C
CVE-2018-8353
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 770
Security Risk Medium
D
Download
-
Verified by
gratis
You can open this exploit for free
vportal
Exploits:
8
BusinessLevel:
4
4 909
Security Risk Medium
D
Download
-
Verified by
gratis
You can open this exploit for free
Victor Portal Gonzalez
Exploits:
1
BusinessLevel:
3