0day.today - La plus grande base de données de Exploit dans le monde.
![](/img/logo_green.jpg)
Nous utilisons un domaine DOMAIN_LINK
Si vous voulez acheter un exploit ou payer un service vous avez besoins d'Or. Nous ne voulons pas que notre site soit utiliser comme outil de piratage , de sorte que touts types d'actions qui pourrais affecter illegalement d'autres utilisateurs ou sites web ou vous n'avez pas l'autorisation vous serez bannit et votre compte ainsi que vos donnees seront supprimees.
Les administrateur de 0day.today utilises des moyens de contacts officiels. Mefiez-vous des imposteurs!
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
Please, beware of scammers!
- Lire le [ J'accepte ]
- Lire le [ Envoyer ] Regles
- Visiter le [ faq ] page
- [ Enregistrement ] profil
- Obtenir [ GOLD ]
- Si vous voulez [ vendre ]
- Si vous voulez [ acheter ]
- Si vous vous perdez [ Compte ]
- Une questions [ [email protected] ]
- Connexion
- Page d'enregistrement
- Restauration de compte
- Foire aux questions
- Contactez-nous
- Regle de publication
- Page de contrat
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Vous pouvez nous contacter par:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
The minimum length of a search query is 3 symbols
Search results for exploits with selected filters
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Hitachi NAS SMU 14.8.7825 Information Disclosure Vulnerability
Commentaires:
0
4 160
![](/img/risk/critlow_1.gif)
Security Risk Low
D
Download
C
CVE-2023-6538
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Arslan Masood
Exploits:
2
BusinessLevel:
0
Zyxel zysh - Format string Exploit
Commentaires:
0
2 195
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Marco Ivaldi
Exploits:
66
BusinessLevel:
13
TSplus 16.0.2.14 - Remote Access Insecure Files and Folders Permissions Vulnerability
Commentaires:
0
3 618
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2023-31067
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
shinnai
Exploits:
159
BusinessLevel:
17
4 263
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2022-28171
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Thurein Soe
Exploits:
6
BusinessLevel:
1
4 223
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
LiquidWorm
Exploits:
732
BusinessLevel:
46
3 916
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2023-27823
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Anthony Cole
Exploits:
6
BusinessLevel:
4
4 234
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2020-35391
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
@h454nsec
Exploits:
1
BusinessLevel:
1
WIMAX SWC-5100W Firmware V(1.11.0.1 :1.9.9.4) - Authenticated Remote Code Execution Exploit
Commentaires:
0
4 261
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Momen Eldawakhly
Exploits:
18
BusinessLevel:
2
4 353
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2022-45701
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Yerodin Richards
Exploits:
5
BusinessLevel:
1
4 302
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
LiquidWorm
Exploits:
732
BusinessLevel:
46
Dell EMC Networking PC5500 firmware versions 4.1.0.22 and Cisco Sx / SMB - Information Disclosure
Commentaires:
0
4 344
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2020-5330
CVE-2019-15993
CVE-2019-15993
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Ken Pyle
Exploits:
2
BusinessLevel:
2
4 197
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2022-44149
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Yerodin Richards
Exploits:
5
BusinessLevel:
1
TP-Link TL-WR902AC firmware 210730 (V3) - Remote Code Execution (Authenticated) Exploit
Commentaires:
0
4 364
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2022-48194
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Tobias Müller
Exploits:
1
BusinessLevel:
1
4 608
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2022-38108
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
Joomla! 4.2.7 Unauthenticated Information Disclosure Exploit
Commentaires:
0
4 415
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2023-23752
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Alexandre ZANNI
Exploits:
18
BusinessLevel:
3
SugarCRM 12.x Remote Code Execution / Shell Upload Exploit
Commentaires:
0
4 698
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2023-22952
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
CoreDial sipXcom sipXopenfire 21.04 Remote Command Execution / Weak Permissionsundefined Exploit
Commentaires:
0
4 403
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2023-25355
CVE-2023-25356
CVE-2023-25356
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Systems Research Group
Exploits:
1
BusinessLevel:
1
Arris Router Firmware 9.1.103 Remote Code Execution Exploit
Commentaires:
0
4 747
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2022-45701
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Yerodin Richards
Exploits:
5
BusinessLevel:
1
5 503
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2022-44149
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Yerodin Richards
Exploits:
5
BusinessLevel:
1
MSNSwitch Firmware MNT.2408 - Remote Code Exectuion Exploit
Commentaires:
0
5 831
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2022-32429
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Eli Fulkerson
Exploits:
1
BusinessLevel:
1
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Oracle RMAN Missing Auditing Vulnerability
Commentaires:
0
4 149
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2021-2207
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Emad Al-Mousa
Exploits:
9
BusinessLevel:
1
4 063
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2023-31468
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
shinnai
Exploits:
159
BusinessLevel:
17
mRemoteNG v1.77.3.1784-NB - Cleartext Storage of Sensitive Information in Memory Exploit
Commentaires:
0
3 607
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2023-30367
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Maximilian Barz
Exploits:
2
BusinessLevel:
2
MobileTrans 4.0.11 Weak Service Permissions Vulnerability
Commentaires:
0
3 863
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2023-31748
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Thurein Soe
Exploits:
6
BusinessLevel:
1
3 991
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2022-30759
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Giacomo Sighinolfi
Exploits:
1
BusinessLevel:
1
3 957
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2022-31244
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Valerio Casalino
Exploits:
1
BusinessLevel:
1
4 112
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Zer0FauLT
Exploits:
3
BusinessLevel:
1
File Replication Pro 7.5.0 Insecure Permissions / Privilege Escalation Vulnerabilities
Commentaires:
0
4 203
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2023-26918
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Andrea Intilangelo
Exploits:
16
BusinessLevel:
3
NetIQ Performance Endpoint v5.1 - remote root/SYSTEM Exploit
Commentaires:
0
4 180
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Neil Kettle
Exploits:
2
BusinessLevel:
5
3 912
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Damian Semon Jr
Exploits:
1
BusinessLevel:
1
3 987
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Luis Martínez
Exploits:
57
BusinessLevel:
7
4 432
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2023-27010
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Thurein Soe
Exploits:
6
BusinessLevel:
1
5 065
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
mmg
Exploits:
1
BusinessLevel:
1
SOUND4 LinkAndShare Transmitter 1.1.2 Format String Stack Buffer Overflow Vulnerability
Commentaires:
0
5 138
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
LiquidWorm
Exploits:
732
BusinessLevel:
46
CD MP3 Terminator V2.07 Local Seh Exploit
Commentaires:
0
5 899
![](/img/risk/critlow_1.gif)
Security Risk Low
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Achilles
Exploits:
42
BusinessLevel:
8
Ubuntu Server snap-confine must_mkdir_and_open_with_perms() Race Condition Vulnerability
Commentaires:
0
7 124
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2021-44731
CVE-2022-3328
CVE-2022-41973
CVE-2022-41974
CVE-2022-3328
CVE-2022-41973
CVE-2022-41974
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Qualys Security Advisory
Exploits:
8
BusinessLevel:
4
8 191
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
AkuCyberSec
Exploits:
3
BusinessLevel:
1
RedLine.MainPanel Insecure Permissions Vulnerability
Commentaires:
0
9 106
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
malvuln
Exploits:
16
BusinessLevel:
2
8 591
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Luis Martínez
Exploits:
57
BusinessLevel:
7
TeamSpeak 3.5.6 - Insecure File Permissions Vulnerability
Commentaires:
0
8 596
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Aryan Chehreghani
Exploits:
21
BusinessLevel:
3
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
SolarWinds Platform 2024.1 SR1 - Race Condition Expoit
Commentaires:
0
683
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2024-28999
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Elhussain Fathy
Exploits:
1
BusinessLevel:
0
631
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Jerry Thomas
Exploits:
2
BusinessLevel:
0
WordPress Hash Form Plugin Remote Code Execution Exploit
Commentaires:
0
1 032
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2024-5084
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
FleetCart 4.1.1 Information Disclosure Vulnerability
Commentaires:
0
1 295
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2024-5230
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
CraCkEr
Exploits:
93
BusinessLevel:
13
Joomla 4.2.8 Information Disclosure Exploit
Commentaires:
0
1 602
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2023-23752
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
d4t4s3c
Exploits:
1
BusinessLevel:
0
Elber Cleber/3 Broadcast Multi-Purpose Platform 1.0.0 Insecure Direct Object Reference Vulnerability
Commentaires:
0
1 631
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
LiquidWorm
Exploits:
732
BusinessLevel:
46
Elber Cleber/3 Broadcast Multi-Purpose Platform 1.0.0 Authentication Bypass Vulnerability
Commentaires:
0
1 748
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
LiquidWorm
Exploits:
732
BusinessLevel:
46
OpenClinic GA 5.247.01 - Information Disclosure Vulnerability
Commentaires:
0
1 143
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2023-40278
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
bot
Exploits:
154
BusinessLevel:
13
987
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2024-22513
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Dhrumil Mistry
Exploits:
1
BusinessLevel:
0
Gibbon School Platform Authenticated PHP Deserialization Exploit
Commentaires:
0
1 188
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2024-24725
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
h00die-gr3y
Exploits:
5
BusinessLevel:
1
Daily Expense Manager 1.0 - (term) SQL injection Vulnerability
Commentaires:
0
1 031
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Stefan Hesselman
Exploits:
2
BusinessLevel:
1
Wordpress Alemha Watermarker 1.3.1 Plugin - Stored Cross-Site Scripting Vulnerability
Commentaires:
0
705
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Erdemstar
Exploits:
3
BusinessLevel:
0
Dawa pharma 1.0-2022 - Multiple SQL Injection Vulnerabilities
Commentaires:
0
1 011
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
nu11secur1ty
Exploits:
215
BusinessLevel:
13
Lost and Found Information System v1.0 - ( IDOR ) leads to Account Take over Exploit
Commentaires:
0
1 253
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2023-38965
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Or4nG.M4N
Exploits:
21
BusinessLevel:
8
Splunk 9.0.4 - Information Disclosure Vulnerability
Commentaires:
0
1 441
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Parsa Rezaie Khiabanloo
Exploits:
4
BusinessLevel:
1
WyreStorm Apollo VX20 Account Enumeration Vulnerability
Commentaires:
0
1 376
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2024-25734
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
WyreStorm Apollo VX20 Credential Disclosure Vulnerability
Commentaires:
0
1 358
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2024-25735
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
WyreStorm Apollo VX20 Incorrect Access Control Vulnerability
Commentaires:
0
1 344
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2024-25736
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
Form Tools 3.1.1 Cross Site Scripting Vulnerability
Commentaires:
0
1 809
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
tmrswrr
Exploits:
57
BusinessLevel:
3
2 263
![](/img/risk/critlow_1.gif)
Security Risk Low
D
Download
C
CVE-2023-47871
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Arvandy
Exploits:
10
BusinessLevel:
1
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
ARM Mali r44p0 Use-After-Free Exploit
Commentaires:
0
2 608
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2023-5427
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Jann Horn
Exploits:
26
BusinessLevel:
6
6 388
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
LiquidWorm
Exploits:
732
BusinessLevel:
46
XWorm Trojan 2.1 - Null Pointer Derefernce DoS Vulnerability
Commentaires:
0
5 152
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Touhami Kasbaoui
Exploits:
6
BusinessLevel:
2
SuperMailer v11.20 - Buffer overflow DoS Vulnerability
Commentaires:
0
4 844
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Rafael Pedrero
Exploits:
44
BusinessLevel:
5
DupTerminator 1.4.5639.37199 - Denial of Service Exploit
Commentaires:
0
8 580
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Brian Rodriguez
Exploits:
25
BusinessLevel:
3
RarmaRadio 2.72.8 - Denial of Service Exploit
Commentaires:
0
8 594
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Ismael Nava
Exploits:
18
BusinessLevel:
4
RarmaRadio 2.72.5 - Denial of Service Exploit
Commentaires:
0
8 881
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Ismael Nava
Exploits:
18
BusinessLevel:
4
Spiderman2 Game - Buffer Overflow Exploit
Commentaires:
0
11 482
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
HexraiN
Exploits:
4
BusinessLevel:
2
ZOC Terminal 7.25.5 - (Script) Denial of Service Exploit
Commentaires:
0
11 648
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
chuyreds
Exploits:
19
BusinessLevel:
3
11 620
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
chuyreds
Exploits:
19
BusinessLevel:
3
RarmaRadio 2.72.4 - (server) Denial of Service Exploit
Commentaires:
0
12 355
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
chuyreds
Exploits:
19
BusinessLevel:
3
RarmaRadio 2.72.4 - (username) Denial of Service Exploit
Commentaires:
0
11 958
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
chuyreds
Exploits:
19
BusinessLevel:
3
14 878
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
11 109
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
İsmail Taşdelen
Exploits:
80
BusinessLevel:
7
Adobe Acrobat Reader DC - Heap-Based Memory Corruption due to Malformed TTF Font Exploit
Commentaires:
0
17 441
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2019-16451
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Adobe Acrobat Reader DC for Windows - Use of Uninitialized Pointer due to Malformed OTF Font
Commentaires:
0
16 769
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2019-8196
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Adobe Acrobat Reader DC for Windows - Use of Uninitialized Pointer due to Malformed JBIG2Globals Str
Commentaires:
0
16 351
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2019-8195
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Adobe Acrobat Reader DC for Windows - Heap-Based Buffer Overflow due to Malformed JP2 Stream (2)
Commentaires:
0
17 596
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2019-8197
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Windows Kernel - Out-of-Bounds Read in nt!MiRelocateImage While Parsing Malformed PE File Exploit
Commentaires:
0
17 299
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2019-1347
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Windows Kernel - Out-of-Bounds Read in CI!HashKComputeFirstPageHash While Parsing Malformed PE File
Commentaires:
0
16 763
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2019-1346
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
[ shellcode ]
Shellcode category
In computer security, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called "shellcode" because it typically starts a command shell from which the attacker can control the compromised machine, but any piece of code that performs a similar task can be called shellcode. Because the function of a payload is not limited to merely spawning a shell, some have suggested that the name shellcode is insufficient. Shellcode is commonly written in machine code.
Classification:
There are several methods of classifying exploits. The most common is by how the exploit contacts the vulnerable software. A remote exploit works over a network and exploits the security vulnerability without any prior access to the vulnerable system. A local exploit requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with a client application. Exploits against client applications may also require some interaction with the user and thus may be used in combination with the social engineering method. Another classification is by the action against the vulnerable system; unauthorized data access, arbitrary code execution, and denial of service are examples. Many exploits are designed to provide superuser-level access to a computer system. However, it is also possible to use several exploits, first to gain low-level access, then to escalate privileges repeatedly until one reaches root. Normally a single exploit can only take advantage of a specific software vulnerability. Often, when an exploit is published, the vulnerability is fixed through a patch and the exploit becomes obsolete until newer versions of the software become available Shellcodes any types.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Linux/ARM - execve /bin/dash Shellcode (32 bytes)
Commentaires:
0
11 010
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Anurag Srivastava
Exploits:
22
BusinessLevel:
5
Linux/ARM - Bind (0.0.0.0:1337/TCP) Shell (/bin/sh) + Null-Free Shellcode (100 bytes)
Commentaires:
0
10 878
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Anurag Srivastava
Exploits:
22
BusinessLevel:
5
Linux/ARM - Fork Bomb Shellcode (20 bytes)
Commentaires:
0
15 972
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
CJHackerz
Exploits:
1
BusinessLevel:
2
13 227
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Ken Kitahara
Exploits:
23
BusinessLevel:
4
Linux/ARM64 - execve("/bin/sh", NULL, NULL) Shellcode (40 Bytes)
Commentaires:
0
13 029
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Ken Kitahara
Exploits:
23
BusinessLevel:
4
Linux/ARM64 - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (128 bytes)
Commentaires:
0
13 044
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Ken Kitahara
Exploits:
23
BusinessLevel:
4
13 102
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Ken Kitahara
Exploits:
23
BusinessLevel:
4
Linux/ARM64 - Read /etc/passwd Shellcode (120 Bytes)
Commentaires:
0
13 068
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Ken Kitahara
Exploits:
23
BusinessLevel:
4
Linux/ARM64 - Egghunter (PWN!PWN!) + execve("/bin/sh", NULL, NULL) + mprotect() Shellcod
Commentaires:
0
12 937
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Ken Kitahara
Exploits:
23
BusinessLevel:
4
12 791
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Ken Kitahara
Exploits:
23
BusinessLevel:
4
Linux/ARM64 - mmap() + read() stager + execve("/bin/sh", NULL, NULL) Shellcode (60 Bytes
Commentaires:
0
12 727
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Ken Kitahara
Exploits:
23
BusinessLevel:
4
12 821
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Ken Kitahara
Exploits:
23
BusinessLevel:
4
12 805
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Ken Kitahara
Exploits:
23
BusinessLevel:
4
Linux/ARM - Bind (0.0.0.0:4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (92 Bytes)
Commentaires:
0
14 441
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Ken Kitahara
Exploits:
23
BusinessLevel:
4
14 251
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Ken Kitahara
Exploits:
23
BusinessLevel:
4
14 086
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Ken Kitahara
Exploits:
23
BusinessLevel:
4
14 145
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Ken Kitahara
Exploits:
23
BusinessLevel:
4
Linux/ARM - read(0, buf, 0xff) stager + execve("/bin/sh", NULL, NULL) Shellcode 20 Bytes
Commentaires:
0
14 514
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Ken Kitahara
Exploits:
23
BusinessLevel:
4
Linux/ARM - read(0, buf, 0xff) stager + execve("/bin/sh", NULL, NULL) Shellcode 28 Bytes
Commentaires:
0
14 729
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Ken Kitahara
Exploits:
23
BusinessLevel:
4
14 222
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
gratuit
You can open this exploit for free
Ken Kitahara
Exploits:
23
BusinessLevel:
4