0day.today - Größte Exploit-Datenbank der Welt.
Dinge, die Du wissen solltest:
Wir benutzen eine Hauptdomain DOMAIN_LINK
Wenn Du den Exploit kaufen, oder für einen Service bezahlen möchtest, musst Du Gold kaufen. Wir wollen nicht, dass Du unsere Seite als ein Werkzeug für Aktivitäten wie Hacking verwendest. Illegale Aktionen, die andere Benutzer oder Webseiten betreffen, für die Du keine Zugriffsrechte hast, führen dazu, dass der Account gebannt und alle Daten von diesem unwiderruflich gelöscht werden.
Die Administratoren dieser Seite benutzen nur die offiziellen Kontaktdaten. Achte auf Betrüger!
Wir benutzen eine Hauptdomain DOMAIN_LINK
Wenn Du den Exploit kaufen, oder für einen Service bezahlen möchtest, musst Du Gold kaufen. Wir wollen nicht, dass Du unsere Seite als ein Werkzeug für Aktivitäten wie Hacking verwendest. Illegale Aktionen, die andere Benutzer oder Webseiten betreffen, für die Du keine Zugriffsrechte hast, führen dazu, dass der Account gebannt und alle Daten von diesem unwiderruflich gelöscht werden.
Die Administratoren dieser Seite benutzen nur die offiziellen Kontaktdaten. Achte auf Betrüger!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Lies [ Vereinbarung ]
- Lies [ Senden ] Regeln
- Besuche [ FAQ ] page
- [ Registrieren ] Profil
- Bekommen [ GOLD ]
- Wenn Du möchtest [ Verkaufen ]
- Wenn Du möchtest [ Kaufen ]
- Wenn Du vergessen hast [ Account ]
- Fragen [ [email protected] ]
- Anmeldungsseite
- Registrierungsseite
- Seite für Accountwiederherstellung
- FAQ Seite
- Kontakt
- Regeln für Veröffentlichungen
- Vereinbarungsseite
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Search results for exploits by request: WebKit
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Safari Webkit For iOS 7.1.2 JIT Optimization Bug Exploit
Kommentare:
0
20 426
Security Risk Medium
D
Download
C
CVE-2016-4669
CVE-2018-4162
CVE-2018-4162
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Safari Webkit Proxy Object Type Confusion Exploit
Kommentare:
0
8 408
Security Risk High
D
Download
C
CVE-2017-13861
CVE-2018-4233
CVE-2018-4233
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
6 155
Security Risk Medium
D
Download
C
CVE-2016-4655
CVE-2016-4656
CVE-2016-4657
CVE-2016-4656
CVE-2016-4657
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Sony Playstation 4 (PS4) 4.55 - Jailbreak (WebKit 5.01 / bpf Kernel Loader 4.55) Exploit
Kommentare:
0
4 675
Security Risk Critical
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Specter
Exploits:
8
BusinessLevel:
4
4 194
Security Risk Critical
D
Download
C
CVE-2017-7081
CVE-2017-7087
CVE-2017-7089
CVE-2017-7090
CVE-2017-7091
CVE-2017-7092
CVE-2017-7093
CVE-2017-7094
CVE-2017-7095
CVE-2017-7096
CVE-2017-7098
CVE-2017-7099
CVE-2017-7100
CVE-2017-7102
CVE-2017-7104
CVE-2017-7107
CVE-2017-7109
CVE-2017-7087
CVE-2017-7089
CVE-2017-7090
CVE-2017-7091
CVE-2017-7092
CVE-2017-7093
CVE-2017-7094
CVE-2017-7095
CVE-2017-7096
CVE-2017-7098
CVE-2017-7099
CVE-2017-7100
CVE-2017-7102
CVE-2017-7104
CVE-2017-7107
CVE-2017-7109
Verified by
Kostenlos
You can open this exploit for free
WebKitGTK+ Team
Exploits:
2
BusinessLevel:
3
Android 2.0/2.1/2.2, Webkit Remote Code Execution Exploit 0day
Positiv:
0
Negativ:
0
Kommentare:
0
20 822
Security Risk High
D
Download
-
Verified by
0.001
Open this exploit for 0.001 BTC
Open this exploit for 50 GOLD
squirrel-sploit
Exploits:
2
BusinessLevel:
5
Webkit normalize bug for android 2.2 (CVE-2010-1759)
Kommentare:
0
8 208
Security Risk Unsored
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
MJ Keith
Exploits:
3
BusinessLevel:
7
Apple Safari Webkit libxslt Arbitrary File Creation
Kommentare:
0
5 878
Security Risk Unsored
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Android 2.0 ,2.1, 2.1.1 WebKit Use-After-Free Exploit
Kommentare:
0
7 012
Security Risk Unsored
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
MJ Keith
Exploits:
3
BusinessLevel:
7
6 548
Security Risk Unsored
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
Itzhak Avraham
Exploits:
1
BusinessLevel:
7
unsorted
4 519
Security Risk Unsored
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
Chris Evans
Exploits:
5
BusinessLevel:
8
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
WebKit On iOS PAC / JIT Hardening Bypass Vulnerability
Kommentare:
0
19 369
Security Risk High
D
Download
C
CVE-2020-9910
Verified by
Kostenlos
You can open this exploit for free
saelo
Exploits:
9
BusinessLevel:
6
9 823
Security Risk High
D
Download
C
CVE-2020-3894
Verified by
Kostenlos
You can open this exploit for free
Glazvunov
Exploits:
9
BusinessLevel:
3
4 834
Security Risk High
D
Download
C
CVE-2018-4441
Verified by
Kostenlos
You can open this exploit for free
Specter
Exploits:
8
BusinessLevel:
4
4 358
Security Risk Medium
D
Download
C
CVE-2018-12293
Verified by
Kostenlos
You can open this exploit for free
PeregrineX
Exploits:
1
BusinessLevel:
3
5 418
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Specter
Exploits:
8
BusinessLevel:
4
4 582
Security Risk Critical
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
qwertyoruiop
Exploits:
4
BusinessLevel:
3
3 466
Security Risk High
D
Download
C
CVE-2014-1303
Verified by
Kostenlos
You can open this exploit for free
Ren Kimura
Exploits:
2
BusinessLevel:
3
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Sony Playstation 4 < 7.02 - ValidationMessage::buildBubbleTree() Use-After-Free WebKit Exploit
Kommentare:
0
1 755
Security Risk Critical
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
ChendoChap
Exploits:
1
BusinessLevel:
2
Sony Playstation 4 < 6.72 - ValidationMessage::buildBubbleTree() Use-After-Free WebKit Exploit
Kommentare:
0
1 759
Security Risk Critical
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Synacktiv
Exploits:
3
BusinessLevel:
5
4 509
Security Risk High
D
Download
C
CVE-2018-4386
Verified by
Kostenlos
You can open this exploit for free
TJ Corley
Exploits:
1
BusinessLevel:
2
4 870
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
lokihardt
Exploits:
11
BusinessLevel:
5
4 539
Security Risk Medium
D
Download
C
CVE-2017-2528
Verified by
Kostenlos
You can open this exploit for free
lokihardt
Exploits:
11
BusinessLevel:
5
4 711
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
lokihardt
Exploits:
11
BusinessLevel:
5
Apple WebKit / Safari 10.0.3 (12602.4.8) - Synchronous Page Load Universal Cross-Site Scripting Expl
Kommentare:
0
10 047
Security Risk Medium
D
Download
C
CVE-2017-2480
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
9 963
Security Risk Medium
D
Download
C
CVE-2017-2479
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple Webkit - Universal Cross-Site Scripting by Accessing a Named Property from an Unloaded Window
Kommentare:
0
9 994
Security Risk Medium
D
Download
C
CVE-2017-2367
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple WebKit 10.0.2(12602.3.12.0.1) - disconnectSubframes Universal Cross-Site Scripting Exploit
Kommentare:
0
10 181
Security Risk Medium
D
Download
C
CVE-2017-2445
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple WebKit 10.0.2(12602.3.12.0.1, r210800) - constructJSReadableStreamDefaultReader Type Confusion
Kommentare:
0
10 042
Security Risk Medium
D
Download
C
CVE-2017-2457
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
9 977
Security Risk Medium
D
Download
C
CVE-2017-2442
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
9 940
Security Risk Medium
D
Download
C
CVE-2017-2363
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple WebKit Pop-Up Blocker Bypass Exploit
Kommentare:
0
7 880
Security Risk High
D
Download
C
CVE-2017-2371
Verified by
Kostenlos
You can open this exploit for free
lokihardt
Exploits:
11
BusinessLevel:
5
Apple WebKit Frame::setDocument UXSS Exploit
Kommentare:
0
5 652
Security Risk Medium
D
Download
C
CVE-2017-2365
Verified by
Kostenlos
You can open this exploit for free
lokihardt
Exploits:
11
BusinessLevel:
5
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 886
Security Risk Medium
D
Download
C
CVE-2022-42867
Verified by
Kostenlos
You can open this exploit for free
Maddie Stone
Exploits:
1
BusinessLevel:
1
WebKit HTMLSelectElement Use-After-Free Exploit
Kommentare:
0
5 594
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
WebKit WebCore::FrameLoader::PolicyChecker::checkNavigationPolicy Heap Use-After-Free Vulnerability
Kommentare:
0
8 515
Security Risk Medium
D
Download
C
CVE-2021-30795
Verified by
Kostenlos
You can open this exploit for free
Glazvunov
Exploits:
9
BusinessLevel:
3
15 968
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
16 348
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
WebKit - Universal XSS Using Cached Pages Exploit
Kommentare:
0
17 299
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
WebKit - User-agent Shadow root Leak in WebCore::ReplacementFragment::ReplacementFragment
Kommentare:
0
17 241
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
WebKit - Universal XSS in WebCore::command Exploit
Kommentare:
0
17 183
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
16 805
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Webkit JSC: JIT - Uninitialized Variable Access in ArgumentsEliminationPhase::transform Exploit
Kommentare:
0
12 925
Security Risk Medium
D
Download
C
CVE-2019-8689
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
12 307
Security Risk Medium
D
Download
C
CVE-2019-8690
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
12 338
Security Risk Medium
D
Download
C
CVE-2019-8649
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
WebKitGTK+ - ThreadedCompositor Race Condition Exploit
Kommentare:
0
11 274
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
11 361
Security Risk Medium
D
Download
C
CVE-2019-8558
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
WebKit JavaScriptCore - Out-Of-Bounds Access in FTL JIT due to LICM Moving Array Access Exploit
Kommentare:
0
11 324
Security Risk Medium
D
Download
C
CVE-2019-8518
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
11 273
Security Risk Medium
D
Download
C
CVE-2019-8506
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
12 171
Security Risk Medium
D
Download
C
CVE-2019-8375
Verified by
Kostenlos
You can open this exploit for free
Dhiraj Mishra
Exploits:
27
BusinessLevel:
5
10 901
Security Risk Medium
D
Download
C
CVE-2019-6215
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
6 486
Security Risk Medium
D
Download
C
CVE-2018-4442
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
WebKit JSC AbstractValue::set Use-After-Free Exploit
Kommentare:
0
4 618
Security Risk Medium
D
Download
C
CVE-2018-4443
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56