0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Search results for exploits by request: Microsoft COM
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
5 185
Security Risk Critical
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
Microsoft Wireless Display Adapter 2 Command Injection / Broken Access Control Vulnerability
Comments:
0
5 453
Security Risk High
D
Download
C
CVE-2018-8306
Verified by 0day Admin
free
You can open this exploit for free
Tobias Glemser
Exploits:
2
BusinessLevel:
6
6 514
Security Risk Critical
D
Download
C
CVE-2017-0298
Verified by 0day Admin
free
You can open this exploit for free
James Forshaw
Exploits:
6
BusinessLevel:
5
Microsoft Internet Explorer Insert Command Use-After-Free Remote Code Execution Vulnerability
Rate up:
0
Rate down:
0
Comments:
0
5 528
Security Risk Critical
D
Download
C
CVE-2014-6375
Verified by 0day Admin
0.027
Open this exploit for 0.027 BTC
Open this exploit for 2 500 GOLD
sky
Exploits:
3
BusinessLevel:
6
7 253
Security Risk High
D
Download
C
CVE-1999-0504
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
6 527
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
6 032
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
5 595
Security Risk High
D
Download
-
Not verified yet
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
5 992
Security Risk High
D
Download
-
Not verified yet
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
4 470
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
n/a
Exploits:
233
BusinessLevel:
22
5 265
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
Abysssec
Exploits:
66
BusinessLevel:
11
unsorted
3 267
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
shinnai
Exploits:
159
BusinessLevel:
17
unsorted
3 317
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
shinnai
Exploits:
159
BusinessLevel:
17
unsorted
3 219
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
shinnai
Exploits:
159
BusinessLevel:
17
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Microsoft ACL Shortcomings Vulnerability
Comments:
0
8 662
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Stefan Kanthak
Exploits:
16
BusinessLevel:
5
10 300
Security Risk Critical
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1671
BusinessLevel:
95
6 121
Security Risk Critical
D
Download
C
CVE-2019-1405
CVE-2019-1322
CVE-2019-1322
Verified by 0day Admin
free
You can open this exploit for free
TomahawkAPT69
Exploits:
1
BusinessLevel:
3
9 961
Security Risk Critical
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
hyp3rlinx
Exploits:
253
BusinessLevel:
17
9 144
Security Risk High
D
Download
C
CVE-2019-0552
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 089
Security Risk Critical
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Fabien Dromas
Exploits:
1
BusinessLevel:
3
4 646
Security Risk High
D
Download
C
CVE-2018-0824
Verified by 0day Admin
free
You can open this exploit for free
Code White
Exploits:
2
BusinessLevel:
5
Microsoft Window Manager (Windows 7 x86) - Menu Management Component UAF Privilege Elevation Exploit
Comments:
0
3 871
Security Risk High
D
Download
C
CVE-2017-0263
Verified by 0day Admin
free
You can open this exploit for free
xiaodaozhi
Exploits:
3
BusinessLevel:
3
4 547
Security Risk Critical
D
Download
C
CVE-2017-8570
Verified by 0day Admin
free
You can open this exploit for free
Rich Warren
Exploits:
1
BusinessLevel:
3
5 196
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Microsoft Windows - COM Aggregate Marshaler/IRemUnknown2 Type Confusion Privilege Escalation Exploit
Comments:
0
5 375
Security Risk High
D
Download
C
CVE-2017-0213
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
5 632
Security Risk High
D
Download
C
CVE-2017-0100
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 840
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
St0rn
Exploits:
7
BusinessLevel:
5
8 394
Security Risk High
D
Download
-
Not verified yet
free
You can open this exploit for free
KedAns-Dz
Exploits:
292
BusinessLevel:
25
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Microsoft Windows 10 (1903/1909) - SMBGhost SMB3.1.1 SMB2_COMPRESSION_CAPABILITIES Buffer Overflow
Comments:
0
15 125
Security Risk Medium
D
Download
C
CVE-2020-0796
Verified by 0day Admin
free
You can open this exploit for free
eerykitty
Exploits:
1
BusinessLevel:
2
12 846
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 760
Security Risk Medium
D
Download
C
CVE-2018-8355
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 213
Security Risk Medium
D
Download
C
CVE-2018-0966
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
2 797
Security Risk Medium
D
Download
C
CVE-2018-0934
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
2 707
Security Risk Medium
D
Download
C
CVE-2018-0933
CVE-2018-0934
CVE-2018-0934
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 420
Security Risk Medium
D
Download
C
CVE-2017-11890
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Microsoft Windows win32kbase!NtQueryCompositionInputQueueAndTransform Kernel Stack Memory Disclosure
Comments:
0
3 793
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Microsoft Windows Kernel - nt!NtSetIoCompletion / nt!NtRemoveIoCompletion Pool Memory Disclosure
Comments:
0
3 833
Security Risk High
D
Download
C
CVE-2017-8708
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Microsoft Windows Kernel - win32k!NtQueryCompositionSurfaceBinding Stack Memory Disclosure Exploit
Comments:
0
3 753
Security Risk High
D
Download
C
CVE-2017-8678
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Microsoft Internet Explorer 9 MSHTML - CMarkup::ReloadInCompatView Use-After-Free Exploit
Comments:
0
4 764
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
SkyLined
Exploits:
59
BusinessLevel:
13
Microsoft Internet Explorer 11 iertutil LCIEGetTypedComponentFromThread Use-After-Free Exploit
Comments:
0
3 935
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
SkyLined
Exploits:
59
BusinessLevel:
13
Microsoft Internet Explorer 9-11 MSHTML - PROPERTYDESC::HandleStyleComponentProperty Out-of-Bound
Comments:
0
4 167
Security Risk Medium
D
Download
C
CVE-2016-3324
Verified by 0day Admin
free
You can open this exploit for free
SkyLined
Exploits:
59
BusinessLevel:
13
Microsoft GDI+ - DecodeCompressedRLEBitmap Invalid Pointer Arithmetic Out-of-Bounds Write (MS16-097)
Comments:
0
3 141
Security Risk High
D
Download
C
CVE-2016-3301
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Microsoft Windows - gdi32.dll Multiple Issues in the EMF COMMENT_MULTIFORMATS Record Handling (MS16-
Comments:
0
2 678
Security Risk High
D
Download
C
CVE-2016-0169
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 464
Security Risk Medium
D
Download
C
CVE-2016-0016
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Microsoft Internet Explorer 11.0.9600.18124 EdUtil::GetCommonAncestorElement - Denial of Service
Comments:
0
3 766
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Marcin Ressel
Exploits:
11
BusinessLevel:
8
4 294
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
Abysssec
Exploits:
66
BusinessLevel:
11
4 706
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
indoushka
Exploits:
453
BusinessLevel:
33
Microsoft HTML Help Compiler (hhc.exe) BOF POC
Comments:
0
unsorted
3 833
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
s4squatch
Exploits:
14
BusinessLevel:
8