[ authorization ] [ registration ] [ Restaurer ]
Contactez nous
Vous pouvez nous contacter par:
0day.today   marche d
Rechercher:
 
 
 
Catégorie:   Plateforme:
 
Price from:   Price to:
 
Author login:   CVE:

Search results for exploits by request: corruption

[ remote exploits ]

Remote exploits and vulnerabilities category


A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
2 386
Security Risk Medium
R
D
Download
-
Verified by
gratuit
You can open this exploit for free
LiquidWorm
Exploits:
731
BusinessLevel:
46
8 415
Security Risk High
R
D
Download
C
CVE-2022-22630
Verified by
gratuit
You can open this exploit for free
Jeremy Brown
Exploits:
60
BusinessLevel:
11
11 698
Security Risk Critical
R
D
Download
-
Verified by
 
0.026
Open this exploit for 0.026 BTC
Open this exploit for 1 600 GOLD
0day Today Team
Exploits:
293
BusinessLevel:
31
10 423
Security Risk High
R
D
Download
C
CVE-2019-5825
Verified by
gratuit
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
8 796
Security Risk High
R
D
Download
-
Verified by
gratuit
You can open this exploit for free
Simon Zuckerbraun
Exploits:
2
BusinessLevel:
3
15 083
Security Risk High
R
D
Download
C
CVE-2017-15944
Verified by
gratuit
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
4 229
Security Risk Critical
R
D
Download
C
CVE-2017-7081
CVE-2017-7087
CVE-2017-7089
CVE-2017-7090
CVE-2017-7091
CVE-2017-7092
CVE-2017-7093
CVE-2017-7094
CVE-2017-7095
CVE-2017-7096
CVE-2017-7098
CVE-2017-7099
CVE-2017-7100
CVE-2017-7102
CVE-2017-7104
CVE-2017-7107
CVE-2017-7109
Verified by
gratuit
You can open this exploit for free
WebKitGTK+ Team
Exploits:
2
BusinessLevel:
3
4 742
Security Risk High
R
D
Download
C
CVE-2017-10002
Verified by
gratuit
You can open this exploit for free
Qualys
Exploits:
2
BusinessLevel:
4
8 503
Security Risk High
R
D
Download
C
CVE-2017-0143
CVE-2017-0144
CVE-2017-0145
CVE-2017-0146
CVE-2017-0147
CVE-2017-0148
Verified by
gratuit
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
5 727
Security Risk High
R
D
Download
-
Verified by
gratuit
You can open this exploit for free
Maksymilian Arciemowicz
Exploits:
6
BusinessLevel:
5
4 263
Security Risk High
R
D
Download
C
CVE-2015-3105
Verified by
gratuit
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
4 567
Security Risk High
R
D
Download
-
Verified by
gratuit
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
4 828
Security Risk High
R
D
Download
-
Not verified yet
gratuit
You can open this exploit for free
Rick Flores
Exploits:
3
BusinessLevel:
6
4 710
Security Risk High
R
D
Download
-
Verified by
gratuit
You can open this exploit for free
CharafAnons
Exploits:
2
BusinessLevel:
6
14 708
Security Risk High
R
D
Download
-
Verified by
 
0
Open this exploit for 0 BTC
Open this exploit for 25 GOLD
The Black Devils
Exploits:
135
BusinessLevel:
16
4 739
Security Risk High
R
D
Download
-
Not verified yet
gratuit
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
4 301
Security Risk High
R
D
Download
-
Not verified yet
gratuit
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
6 495
Security Risk Critical
R
D
Download
-
Not verified yet
gratuit
You can open this exploit for free
Tavis Ormandy
Exploits:
35
BusinessLevel:
11
5 408
Security Risk Unsored
R
D
Download
-
Not verified yet
gratuit
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
5 298
Security Risk Unsored
R
D
Download
-
Not verified yet
gratuit
You can open this exploit for free
n/a
Exploits:
233
BusinessLevel:
22

[ local exploits ]

Local exploits and vulnerabilities category


A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
8 888
Security Risk Medium
R
D
Download
C
CVE-2022-26364
Verified by
gratuit
You can open this exploit for free
Jann Horn
Exploits:
26
BusinessLevel:
6
8 508
Security Risk Medium
R
D
Download
C
CVE-2021-26419
Verified by
gratuit
You can open this exploit for free
Ivan Fratric
Exploits:
2
BusinessLevel:
2
9 778
Security Risk Medium
R
D
Download
-
Verified by
gratuit
You can open this exploit for free
Cody Winkler
Exploits:
3
BusinessLevel:
2
6 633
Security Risk Medium
R
D
Download
C
CVE-2018-16864
CVE-2018-16865
CVE-2018-16866
Verified by
gratuit
You can open this exploit for free
Qualys Corporation
Exploits:
21
BusinessLevel:
6
5 436
Security Risk High
R
D
Download
C
CVE-2018-4300
CVE-2018-4301
Verified by
gratuit
You can open this exploit for free
Eric Sesterhenn
Exploits:
10
BusinessLevel:
6
3 475
Security Risk High
R
D
Download
C
CVE-2017-9281
CVE-2017-9282
CVE-2017-9283
Verified by
gratuit
You can open this exploit for free
Wolfgang Ettlinger
Exploits:
9
BusinessLevel:
4
4 734
Security Risk Medium
R
D
Download
-
Verified by
gratuit
You can open this exploit for free
Brian Pak
Exploits:
2
BusinessLevel:
4
4 749
Security Risk High
R
D
Download
-
Verified by
gratuit
You can open this exploit for free
Avinash Thapa
Exploits:
7
BusinessLevel:
5
4 643
Security Risk High
R
D
Download
-
Verified by
gratuit
You can open this exploit for free
Francis Provencher
Exploits:
54
BusinessLevel:
10
4 388
Security Risk Medium
R
D
Download
-
Verified by
gratuit
You can open this exploit for free
sajith
Exploits:
15
BusinessLevel:
6
6 405
Security Risk Medium
R
D
Download
-
Verified by
gratuit
You can open this exploit for free
feliam
Exploits:
1
BusinessLevel:
6
5 622
Security Risk High
R
D
Download
-
Verified by
gratuit
You can open this exploit for free
Julien Ahrens
Exploits:
66
BusinessLevel:
9

Windows Service Pack 2 (explorer.exe) Memory Corruption

Noter plus:
1
Noter moins:
0
Commentaires:
0
14 423
Security Risk Critical
R
D
Download
-
Verified by
 
0
Open this exploit for 0 BTC
Open this exploit for 30 GOLD
The Black Devils
Exploits:
135
BusinessLevel:
16
5 832
Security Risk High
R
D
Download
-
Verified by
gratuit
You can open this exploit for free
KedAns-Dz
Exploits:
292
BusinessLevel:
24
7 350
Security Risk Critical
R
D
Download
-
Not verified yet
gratuit
You can open this exploit for free
Core Security
Exploits:
91
BusinessLevel:
13
5 561
Security Risk Medium
R
D
Download
-
Not verified yet
gratuit
You can open this exploit for free
Dark-Puzzle
Exploits:
32
BusinessLevel:
8
4 576
Security Risk Critical
R
D
Download
-
Not verified yet
gratuit
You can open this exploit for free
Ayrbyte
Exploits:
20
BusinessLevel:
7
4 578
Security Risk Critical
R
D
Download
-
Not verified yet
gratuit
You can open this exploit for free
Ayrbyte
Exploits:
20
BusinessLevel:
7
5 697
Security Risk Critical
R
D
Download
-
Not verified yet
gratuit
You can open this exploit for free
Dan Fosco
Exploits:
15
BusinessLevel:
7
4 150
Security Risk Critical
R
D
Download
-
Not verified yet
gratuit
You can open this exploit for free
LiquidWorm
Exploits:
731
BusinessLevel:
46

[ web applications ]

Webapplication (webapps) exploits and vulnerabilities category


This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
7 610
Security Risk Medium
R
D
Download
C
CVE-2021-40540
Verified by
gratuit
You can open this exploit for free
Jeremy Brown
Exploits:
60
BusinessLevel:
11
2 736
Security Risk Medium
R
D
Download
-
Verified by
gratuit
You can open this exploit for free
Qian Chen
Exploits:
5
BusinessLevel:
2
8 613
Security Risk Critical
R
D
Download
C
CVE-2017-14086
Verified by
gratuit
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
3 984
Security Risk High
R
D
Download
-
Verified by
gratuit
You can open this exploit for free
David Tomaschik
Exploits:
4
BusinessLevel:
4
3 636
Security Risk Medium
R
D
Download
C
CVE-2015-7986
Verified by
gratuit
You can open this exploit for free
ERPScan
Exploits:
9
BusinessLevel:
4
unsorted
3 099
Security Risk Unsored
R
D
Download
-
Not verified yet
gratuit
You can open this exploit for free
StAkeR
Exploits:
93
BusinessLevel:
13
unsorted
3 089
Security Risk Unsored
R
D
Download
-
Not verified yet
gratuit
You can open this exploit for free
Nine:Situations:Group
Exploits:
39
BusinessLevel:
10

[ dos / poc ]

DOS exploits and vulnerabilities category


PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.

PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
7 025
Security Risk Medium
R
D
Download
C
CVE-2022-31212
CVE-2022-31213
Verified by
gratuit
You can open this exploit for free
Tim Weber
Exploits:
28
BusinessLevel:
10
7 371
Security Risk Medium
R
D
Download
C
CVE-2022-21820
Verified by
gratuit
You can open this exploit for free
Jeremy Brown
Exploits:
60
BusinessLevel:
11
7 009
Security Risk Medium
R
D
Download
-
Verified by
gratuit
You can open this exploit for free
Jeremy Brown
Exploits:
60
BusinessLevel:
11
8 537
Security Risk Medium
R
D
Download
C
CVE-2021-27804
Verified by
gratuit
You can open this exploit for free
van Hauser
Exploits:
1
BusinessLevel:
2
9 024
Security Risk Medium
R
D
Download
-
Verified by
gratuit
You can open this exploit for free
Qian Chen
Exploits:
5
BusinessLevel:
2
11 132
Security Risk High
R
D
Download
-
Verified by
gratuit
You can open this exploit for free
Marcin Ressel
Exploits:
11
BusinessLevel:
8
11 472
Security Risk Medium
R
D
Download
-
Verified by
gratuit
You can open this exploit for free
Cem Onat Karagun
Exploits:
1
BusinessLevel:
2
14 866
Security Risk Medium
R
D
Download
-
Verified by
gratuit
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
27 811
Security Risk Medium
R
D
Download
C
CVE-2020-0009
Verified by
gratuit
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
17 435
Security Risk Medium
R
D
Download
C
CVE-2019-16451
Verified by
gratuit
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
12 547
Security Risk Medium
R
D
Download
-
Verified by
gratuit
You can open this exploit for free
Bug Reporter
Exploits:
1
BusinessLevel:
2
12 545
Security Risk Medium
R
D
Download
-
Verified by
gratuit
You can open this exploit for free
Sem Voigtlander
Exploits:
1
BusinessLevel:
2
16 097
Security Risk Medium
R
D
Download
C
CVE-2019-1364
Verified by
gratuit
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
12 317
Security Risk Medium
R
D
Download
C
CVE-2019-8660
Verified by
gratuit
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
12 717
Security Risk Medium
R
D
Download
-
Verified by
gratuit
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
12 829
Security Risk Medium
R
D
Download
C
CVE-2019-7286
Verified by
gratuit
You can open this exploit for free
ZecOps
Exploits:
1
BusinessLevel:
3
11 625
Security Risk Medium
R
D
Download
C
CVE-2019-2698
Verified by
gratuit
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
11 510
Security Risk Medium
R
D
Download
C
CVE-2019-2697
Verified by
gratuit
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
11 606
Security Risk Medium
R
D
Download
C
CVE-2019-0667
Verified by
gratuit
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
11 621
Security Risk Medium
R
D
Download
C
CVE-2019-6224
Verified by
gratuit
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56