0day.today 1337day.com – Dunyanin En Buyuk Exploit Veritabani

Biz sadece bir adet ana domain kullaniyoruz DOMAIN_LINK
Eger exploit satin alacaksaniz ve ya hizmet icin odeme yapacaksaniz, altin almaniz gerekmekte. Biz sitemizi hack amacli kullanmak istemiyoruz, yani her turlu dogru olmayan, kanunsuz ve illegal yapilan eylemler diger hesaplari olumsuz yonde etkileyebilir ve sonrasinda buna yol acan/lar, web sitelerimize ve verilere erisimi tamamen kesilir, banlanir ve hesabini tarafimizca yok edilir.
Sadece bu sitenin yonetimine itibar edin. Sahtelere Dikkat!
- Oku [ anlasma ]
- Oku [ Gonder ] kurallar
- Ziyaret et [ SSS ] page
- [ Uye Ol ] profil
- [ FIYAT ]
- Eger istiyorsaniz [ satmak ]
- Eger istiyorsaniz [ almak ]
- Eger kaybederseniz [ Hesap ]
- Herhangi bir sorunuz [ [email protected] ]
- Yetkili sayfa
- Uyelik sayfasi
- Hesap sayfasini geri yukle
- SSS sayfasi
- Iletisim sayfasi
- Paylasim kurallari
- Anlasma sayfasi
Mail:
Jabber:
Facebook:
Twitter:
Inj3ct0r
Bize ulasabilirsiniz:
Inj3ct0r, en iyi veritabaniyla guvenlik acigi arastirmacilari ve guvenlik uzmanlari icin buyuk bir kaynaktir.
Amacimiz bize sunulan exploitleri toplamak ve cesitli e-mailleri listelemek ve kolay ulasilabilir veritabani icin konsantre olmaya calisiyoruz.
Bu sadece egitim amacli yazilmistir. Tum riskler kullaniciya aittir. Herhangi bir zararda yazar sorumlu tutulamaz. // r0073r
Amacimiz bize sunulan exploitleri toplamak ve cesitli e-mailleri listelemek ve kolay ulasilabilir veritabani icin konsantre olmaya calisiyoruz.
Bu sadece egitim amacli yazilmistir. Tum riskler kullaniciya aittir. Herhangi bir zararda yazar sorumlu tutulamaz. // r0073r
[ remote exploits ]
Remote exploits and vulnerabilities category
A “remote exploit” works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
macOS HelpViewer 10.12.1 – XSS Leads to Arbitrary File Execution and Arbitrary File Read Exploit
Yorumlar:
0
756
Security Risk Critical
D
Download
C
CVE-2017-2361
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
1 445
Security Risk Critical
D
Download
–
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
1 076
Security Risk High
D
Download
C
CVE-2016-1252
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
Android – Inter-Process munmap with User-Controlled Size in android.graphics.Bitmap Vulnerability
Yorumlar:
0
694
Security Risk High
D
Download
C
CVE-2016-6707
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
692
Security Risk High
D
Download
C
CVE-2016-3861
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
506
Security Risk High
D
Download
C
CVE-2016-0998
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
416
Security Risk Medium
D
Download
–
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
Samsung SecEmailUI Script Injection Exploit
Yorumlar:
0
947
Security Risk High
D
Download
C
CVE-2015-7893
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
745
Security Risk High
D
Download
C
CVE-2015-2553
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
1 086
Security Risk High
D
Download
–
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
2 348
Security Risk High
D
Download
C
CVE-2015-3864
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
1 154
Security Risk High
D
Download
C
CVE-2015-1793
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
CUPS 2.0.3 – Multiple Vulnerabilities
Yorumlar:
0
509
Security Risk High
D
Download
C
CVE-2015-1158
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
[ local exploits ]
Local exploits and vulnerabilities category
A “local exploit” requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
22
Security Risk High
D
Download
C
CVE-2017-0100
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
462
Security Risk High
D
Download
–
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
1 063
Security Risk High
D
Download
C
CVE-2017-0358
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
1 155
Security Risk High
D
Download
–
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
OpenSSH 7.4 – UsePrivilegeSeparation Disabled Forwarded Unix Domain Sockets Privilege Escalation Exp
Yorumlar:
0
781
Security Risk High
D
Download
C
CVE-2016-1001
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
MacOS Kernel < 10.12.2 / iOS < 10.2 – Broken Kernel Mach Port Name uref Handling Privileged Po
Yorumlar:
0
667
Security Risk High
D
Download
C
CVE-2016-7637
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
MacOS Kernel < 10.12.2 / iOS < 10.2 – _kernelrpc_mach_port_insert_right_trap Reference Count L
Yorumlar:
0
641
Security Risk High
D
Download
C
CVE-2016-7621
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
Android Mitigation Bypass Vulnerability
Yorumlar:
0
692
Security Risk High
D
Download
C
CVE-2016-6717
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
445
Security Risk High
D
Download
C
CVE-2016-9151
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
461
Security Risk High
D
Download
C
CVE-2016-9151
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
Microsoft Windows – VHDMP ZwDeleteFile Arbitrary File Deletion Privilege Escalation (MS16-138) Explo
Yorumlar:
0
688
Security Risk High
D
Download
C
CVE-2016-7225
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
Microsoft Windows – VHDMP Arbitrary File Creation Privilege Escalation (MS16-138) Exploit
Yorumlar:
0
701
Security Risk High
D
Download
C
CVE-2016-7226
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
Microsoft Windows – VHDMP Arbitrary Physical Disk Cloning Privilege Escalation (MS16-138) Exploit
Yorumlar:
0
651
Security Risk High
D
Download
C
CVE-2016-7224
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
1 150
Security Risk High
D
Download
C
CVE-2016-4625
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
NVIDIA Driver – NvStreamKms Stack Buffer Overflow in PsSetCreateProcessNotifyRoutineEx Callback Priv
Yorumlar:
0
878
Security Risk High
D
Download
C
CVE-2016-8812
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
NVIDIA Driver – UVMLiteController ioctl Handling Unchecked Input/Output Lengths Privilege Escalation
Yorumlar:
0
817
Security Risk High
D
Download
C
CVE-2016-7384
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
932
Security Risk High
D
Download
C
CVE-2016-4625
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
Microsoft Windows 10 10586 (x32/x64) / 8.1 Update 2 – NtLoadKeyEx User Hive Attachment Point Privile
Yorumlar:
0
1 187
Security Risk High
D
Download
C
CVE-2016-3371
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
1 027
Security Risk High
D
Download
C
CVE-2016-3373
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
Samsung Android JACK – Privilege Escalation
Yorumlar:
0
670
Security Risk High
D
Download
–
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
421
Security Risk High
D
Download
C
CVE-2016-1583
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
Linux Kernel (Ubuntu 14.04.3) – ‘perf_event_open()’ Can Race with execve() (Access /etc/
Yorumlar:
0
313
Security Risk High
D
Download
–
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
Linux Kernel 4.4.x (Ubuntu 16.04) – ‘double-fdput()’ in bpf(BPF_PROG_LOAD) Privilege Esc
Yorumlar:
0
290
Security Risk High
D
Download
C
CVE-2016-4557
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
384
Security Risk High
D
Download
–
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
343
Security Risk Critical
D
Download
C
CVE-2016-1757
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
Microsoft Windows 8.1 / 10 (x86) – Secondary Logon Standard Handles Missing Sanitization Privilege E
Yorumlar:
0
285
Security Risk High
D
Download
C
CVE-2016-0099
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
Microsoft Windows – Sandboxed Mount Reparse Point Creation Mitigation Bypass Redux (2) (MS16-008)
Yorumlar:
0
256
Security Risk High
D
Download
C
CVE-2016-0007
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
Microsoft Windows – Sandboxed Mount Reparse Point Creation Mitigation Bypass Redux (1) (MS16-008)
Yorumlar:
0
233
Security Risk High
D
Download
C
CVE-2016-0006
CVE-2016-0007
CVE-2016-0007
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
Truecrypt 7 / VeraCrypt 1.13 – Drive Letter Symbolic Link Creation Privilege Escalation Exploit
Yorumlar:
0
1 002
Security Risk High
D
Download
C
CVE-2015-7358
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
941
Security Risk High
D
Download
C
CVE-2015-5754
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
664
Security Risk Medium
D
Download
C
CVE-2017-2363
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
723
Security Risk High
D
Download
C
CVE-2016-6772
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
204
Security Risk Medium
D
Download
–
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
241
Security Risk Medium
D
Download
C
CVE-2017-2931
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
231
Security Risk Medium
D
Download
C
CVE-2017-2932
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
470
Security Risk Medium
D
Download
C
CVE-2017-2933
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
225
Security Risk Medium
D
Download
C
CVE-2017-2934
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
348
Security Risk Medium
D
Download
C
CVE-2017-2935
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
2 875
Security Risk Medium
D
Download
–
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
Microsoft Office PowerPoint 2010 – MSO!Ordinal5429 Missing Length Check Heap Corruption Exploit
Yorumlar:
0
1 030
Security Risk Medium
D
Download
–
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
991
Security Risk Medium
D
Download
–
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
Microsoft Office PowerPoint 2010 GDI – GDI32!ConvertDxArray Insufficient Bounds Check Exploit
Yorumlar:
0
944
Security Risk Medium
D
Download
–
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
Adobe Flash – MP4 AMF Parsing Overflow Exploit
Yorumlar:
0
2 871
Security Risk Medium
D
Download
C
CVE-2017-2992
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
Adobe Flash – SWF Stack Corruption Exploit
Yorumlar:
0
2 796
Security Risk Medium
D
Download
C
CVE-2017-2988
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
2 806
Security Risk Medium
D
Download
C
CVE-2017-2985
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
2 791
Security Risk Medium
D
Download
C
CVE-2017-2986
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
Microsoft Windows gdi32.dll – EMR_SETDIBITSTODEVICE Heap-Based Out-of-Bounds Reads Exploit
Yorumlar:
0
863
Security Risk Medium
D
Download
–
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
2 470
Security Risk High
D
Download
C
CVE-2017-3807
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
764
Security Risk Medium
D
Download
C
CVE-2017-0312
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
728
Security Risk Medium
D
Download
C
CVE-2017-0313
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
2 754
Security Risk High
D
Download
C
CVE-2016-7288
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
912
Security Risk Medium
D
Download
C
CVE-2017-0411
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
814
Security Risk Medium
D
Download
C
CVE-2017-0412
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
809
Security Risk Medium
D
Download
–
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
804
Security Risk Medium
D
Download
–
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
2 346
Security Risk Medium
D
Download
–
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
1 147
Security Risk Medium
D
Download
–
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
1 657
Security Risk High
D
Download
–
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
1 159
Security Risk Medium
D
Download
–
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
Google Android – cfp_ropp_new_key_reenc and cfp_ropp_new_key RKP Memory Corruption Exploit
Yorumlar:
0
1 128
Security Risk Medium
D
Download
–
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
1 143
Security Risk High
D
Download
–
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
1 146
Security Risk Medium
D
Download
–
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0
1 411
Security Risk Medium
D
Download
C
CVE-2017-2369
Verified by
Ucretsiz
You can open this exploit for free
Google Security Research
Exploit:
370
BusinessLevel:
20
Uyari:
0











