0day.today - Größte Exploit-Datenbank der Welt.
![](/img/logo_green.jpg)
Wir benutzen eine Hauptdomain DOMAIN_LINK
Wenn Du den Exploit kaufen, oder für einen Service bezahlen möchtest, musst Du Gold kaufen. Wir wollen nicht, dass Du unsere Seite als ein Werkzeug für Aktivitäten wie Hacking verwendest. Illegale Aktionen, die andere Benutzer oder Webseiten betreffen, für die Du keine Zugriffsrechte hast, führen dazu, dass der Account gebannt und alle Daten von diesem unwiderruflich gelöscht werden.
Die Administratoren dieser Seite benutzen nur die offiziellen Kontaktdaten. Achte auf Betrüger!
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
Please, beware of scammers!
- Lies [ Vereinbarung ]
- Lies [ Senden ] Regeln
- Besuche [ FAQ ] page
- [ Registrieren ] Profil
- Bekommen [ GOLD ]
- Wenn Du möchtest [ Verkaufen ]
- Wenn Du möchtest [ Kaufen ]
- Wenn Du vergessen hast [ Account ]
- Fragen [ [email protected] ]
- Anmeldungsseite
- Registrierungsseite
- Seite für Accountwiederherstellung
- FAQ Seite
- Kontakt
- Regeln für Veröffentlichungen
- Vereinbarungsseite
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Search results for exploits by request: Webkit
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Safari Webkit For iOS 7.1.2 JIT Optimization Bug Exploit
Kommentare:
0
20 487
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2016-4669
CVE-2018-4162
CVE-2018-4162
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
Safari Webkit Proxy Object Type Confusion Exploit
Kommentare:
0
8 441
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2017-13861
CVE-2018-4233
CVE-2018-4233
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
6 186
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2016-4655
CVE-2016-4656
CVE-2016-4657
CVE-2016-4656
CVE-2016-4657
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
Sony Playstation 4 (PS4) 4.55 - Jailbreak (WebKit 5.01 / bpf Kernel Loader 4.55) Exploit
Kommentare:
0
4 709
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Specter
Exploits:
8
BusinessLevel:
4
4 230
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
C
CVE-2017-7081
CVE-2017-7087
CVE-2017-7089
CVE-2017-7090
CVE-2017-7091
CVE-2017-7092
CVE-2017-7093
CVE-2017-7094
CVE-2017-7095
CVE-2017-7096
CVE-2017-7098
CVE-2017-7099
CVE-2017-7100
CVE-2017-7102
CVE-2017-7104
CVE-2017-7107
CVE-2017-7109
CVE-2017-7087
CVE-2017-7089
CVE-2017-7090
CVE-2017-7091
CVE-2017-7092
CVE-2017-7093
CVE-2017-7094
CVE-2017-7095
CVE-2017-7096
CVE-2017-7098
CVE-2017-7099
CVE-2017-7100
CVE-2017-7102
CVE-2017-7104
CVE-2017-7107
CVE-2017-7109
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
WebKitGTK+ Team
Exploits:
2
BusinessLevel:
3
Android 2.0/2.1/2.2, Webkit Remote Code Execution Exploit 0day
Positiv:
0
Negativ:
0
Kommentare:
0
20 899
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
-
![](/img/check.png)
Verified by
![](/img/btc.png)
0.001
Open this exploit for 0.001 BTC
Open this exploit for 50 GOLD
squirrel-sploit
Exploits:
2
BusinessLevel:
6
Webkit normalize bug for android 2.2 (CVE-2010-1759)
Kommentare:
0
8 239
![](/img/risk/critlow_0.gif)
Security Risk Unsored
D
Download
-
![](/img/warning.png)
Not verified yet
Kostenlos
You can open this exploit for free
MJ Keith
Exploits:
3
BusinessLevel:
7
Apple Safari Webkit libxslt Arbitrary File Creation
Kommentare:
0
5 912
![](/img/risk/critlow_0.gif)
Security Risk Unsored
D
Download
-
![](/img/warning.png)
Not verified yet
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
Android 2.0 ,2.1, 2.1.1 WebKit Use-After-Free Exploit
Kommentare:
0
7 040
![](/img/risk/critlow_0.gif)
Security Risk Unsored
D
Download
-
![](/img/warning.png)
Not verified yet
Kostenlos
You can open this exploit for free
MJ Keith
Exploits:
3
BusinessLevel:
7
6 577
![](/img/risk/critlow_0.gif)
Security Risk Unsored
D
Download
-
![](/img/warning.png)
Not verified yet
Kostenlos
You can open this exploit for free
Itzhak Avraham
Exploits:
1
BusinessLevel:
7
unsorted
4 552
![](/img/risk/critlow_0.gif)
Security Risk Unsored
D
Download
-
![](/img/warning.png)
Not verified yet
Kostenlos
You can open this exploit for free
Chris Evans
Exploits:
5
BusinessLevel:
8
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
WebKit On iOS PAC / JIT Hardening Bypass Vulnerability
Kommentare:
0
19 489
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2020-9910
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
saelo
Exploits:
9
BusinessLevel:
6
9 859
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2020-3894
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Glazvunov
Exploits:
9
BusinessLevel:
3
4 867
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2018-4441
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Specter
Exploits:
8
BusinessLevel:
4
4 391
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2018-12293
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
PeregrineX
Exploits:
1
BusinessLevel:
3
5 457
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Specter
Exploits:
8
BusinessLevel:
4
4 617
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
qwertyoruiop
Exploits:
4
BusinessLevel:
3
3 497
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2014-1303
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Ren Kimura
Exploits:
2
BusinessLevel:
3
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Sony Playstation 4 < 7.02 - ValidationMessage::buildBubbleTree() Use-After-Free WebKit Exploit
Kommentare:
0
1 783
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
ChendoChap
Exploits:
1
BusinessLevel:
2
Sony Playstation 4 < 6.72 - ValidationMessage::buildBubbleTree() Use-After-Free WebKit Exploit
Kommentare:
0
1 791
![](/img/risk/critlow_4.gif)
Security Risk Critical
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Synacktiv
Exploits:
3
BusinessLevel:
5
4 540
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2018-4386
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
TJ Corley
Exploits:
1
BusinessLevel:
2
4 899
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
lokihardt
Exploits:
11
BusinessLevel:
5
4 568
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2017-2528
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
lokihardt
Exploits:
11
BusinessLevel:
5
4 743
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
lokihardt
Exploits:
11
BusinessLevel:
5
Apple WebKit / Safari 10.0.3 (12602.4.8) - Synchronous Page Load Universal Cross-Site Scripting Expl
Kommentare:
0
10 089
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2017-2480
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
10 002
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2017-2479
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple Webkit - Universal Cross-Site Scripting by Accessing a Named Property from an Unloaded Window
Kommentare:
0
10 026
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2017-2367
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple WebKit 10.0.2(12602.3.12.0.1) - disconnectSubframes Universal Cross-Site Scripting Exploit
Kommentare:
0
10 213
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2017-2445
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple WebKit 10.0.2(12602.3.12.0.1, r210800) - constructJSReadableStreamDefaultReader Type Confusion
Kommentare:
0
10 082
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2017-2457
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
10 015
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2017-2442
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
9 980
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2017-2363
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple WebKit Pop-Up Blocker Bypass Exploit
Kommentare:
0
7 910
![](/img/risk/critlow_3.gif)
Security Risk High
D
Download
C
CVE-2017-2371
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
lokihardt
Exploits:
11
BusinessLevel:
5
Apple WebKit Frame::setDocument UXSS Exploit
Kommentare:
0
5 690
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2017-2365
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
lokihardt
Exploits:
11
BusinessLevel:
5
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 994
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2022-42867
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Maddie Stone
Exploits:
1
BusinessLevel:
1
WebKit HTMLSelectElement Use-After-Free Exploit
Kommentare:
0
5 696
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
WebKit WebCore::FrameLoader::PolicyChecker::checkNavigationPolicy Heap Use-After-Free Vulnerability
Kommentare:
0
8 622
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2021-30795
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Glazvunov
Exploits:
9
BusinessLevel:
3
16 073
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
16 448
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
WebKit - Universal XSS Using Cached Pages Exploit
Kommentare:
0
17 415
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
WebKit - User-agent Shadow root Leak in WebCore::ReplacementFragment::ReplacementFragment
Kommentare:
0
17 336
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
WebKit - Universal XSS in WebCore::command Exploit
Kommentare:
0
17 276
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
16 905
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Webkit JSC: JIT - Uninitialized Variable Access in ArgumentsEliminationPhase::transform Exploit
Kommentare:
0
13 019
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2019-8689
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
12 401
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2019-8690
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
12 434
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2019-8649
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
WebKitGTK+ - ThreadedCompositor Race Condition Exploit
Kommentare:
0
11 373
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
-
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
11 456
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2019-8558
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
WebKit JavaScriptCore - Out-Of-Bounds Access in FTL JIT due to LICM Moving Array Access Exploit
Kommentare:
0
11 419
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2019-8518
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
11 366
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2019-8506
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
12 266
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2019-8375
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Dhiraj Mishra
Exploits:
27
BusinessLevel:
5
10 992
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2019-6215
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
6 518
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2018-4442
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
WebKit JSC AbstractValue::set Use-After-Free Exploit
Kommentare:
0
4 673
![](/img/risk/critlow_2.gif)
Security Risk Medium
D
Download
C
CVE-2018-4443
![](/img/check.png)
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56