0day.today - Größte Exploit-Datenbank der Welt.
Dinge, die Du wissen solltest:
Wir benutzen eine Hauptdomain DOMAIN_LINK
Wenn Du den Exploit kaufen, oder für einen Service bezahlen möchtest, musst Du Gold kaufen. Wir wollen nicht, dass Du unsere Seite als ein Werkzeug für Aktivitäten wie Hacking verwendest. Illegale Aktionen, die andere Benutzer oder Webseiten betreffen, für die Du keine Zugriffsrechte hast, führen dazu, dass der Account gebannt und alle Daten von diesem unwiderruflich gelöscht werden.
Die Administratoren dieser Seite benutzen nur die offiziellen Kontaktdaten. Achte auf Betrüger!
Wir benutzen eine Hauptdomain DOMAIN_LINK
Wenn Du den Exploit kaufen, oder für einen Service bezahlen möchtest, musst Du Gold kaufen. Wir wollen nicht, dass Du unsere Seite als ein Werkzeug für Aktivitäten wie Hacking verwendest. Illegale Aktionen, die andere Benutzer oder Webseiten betreffen, für die Du keine Zugriffsrechte hast, führen dazu, dass der Account gebannt und alle Daten von diesem unwiderruflich gelöscht werden.
Die Administratoren dieser Seite benutzen nur die offiziellen Kontaktdaten. Achte auf Betrüger!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Lies [ Vereinbarung ]
- Lies [ Senden ] Regeln
- Besuche [ FAQ ] page
- [ Registrieren ] Profil
- Bekommen [ GOLD ]
- Wenn Du möchtest [ Verkaufen ]
- Wenn Du möchtest [ Kaufen ]
- Wenn Du vergessen hast [ Account ]
- Fragen [ [email protected] ]
- Anmeldungsseite
- Registrierungsseite
- Seite für Accountwiederherstellung
- FAQ Seite
- Kontakt
- Regeln für Veröffentlichungen
- Vereinbarungsseite
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Search results for exploits by request: Apple WebKit
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Apple Safari Webkit libxslt Arbitrary File Creation
Kommentare:
0
5 911
Security Risk Unsored
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
metasploit
Exploits:
1633
BusinessLevel:
92
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Apple WebKit / Safari 10.0.3 (12602.4.8) - Synchronous Page Load Universal Cross-Site Scripting Expl
Kommentare:
0
10 085
Security Risk Medium
D
Download
C
CVE-2017-2480
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
10 000
Security Risk Medium
D
Download
C
CVE-2017-2479
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple Webkit - Universal Cross-Site Scripting by Accessing a Named Property from an Unloaded Window
Kommentare:
0
10 024
Security Risk Medium
D
Download
C
CVE-2017-2367
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple WebKit 10.0.2(12602.3.12.0.1) - disconnectSubframes Universal Cross-Site Scripting Exploit
Kommentare:
0
10 213
Security Risk Medium
D
Download
C
CVE-2017-2445
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple WebKit 10.0.2(12602.3.12.0.1, r210800) - constructJSReadableStreamDefaultReader Type Confusion
Kommentare:
0
10 079
Security Risk Medium
D
Download
C
CVE-2017-2457
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
10 014
Security Risk Medium
D
Download
C
CVE-2017-2442
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
9 977
Security Risk Medium
D
Download
C
CVE-2017-2363
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple WebKit Pop-Up Blocker Bypass Exploit
Kommentare:
0
7 910
Security Risk High
D
Download
C
CVE-2017-2371
Verified by
Kostenlos
You can open this exploit for free
lokihardt
Exploits:
11
BusinessLevel:
5
Apple WebKit Frame::setDocument UXSS Exploit
Kommentare:
0
5 686
Security Risk Medium
D
Download
C
CVE-2017-2365
Verified by
Kostenlos
You can open this exploit for free
lokihardt
Exploits:
11
BusinessLevel:
5
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Apple WebKit / Safari 10.0.3(12602.4.8) - WebCore::FrameView::scheduleRelayout Use-After-Free Exploi
Kommentare:
0
4 803
Security Risk Medium
D
Download
C
CVE-2017-2514
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple Safari 10.0.3(12602.4.8) / WebKit - HTMLObjectElement::updateWidget Universal Cross-Site Scrip
Kommentare:
0
4 728
Security Risk Medium
D
Download
-
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple WebKit / Safari 10.0.3(12602.4.8) - Editor::Command::execute Universal Cross-Site Scripting Ex
Kommentare:
0
4 320
Security Risk Medium
D
Download
C
CVE-2017-2504
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 147
Security Risk High
D
Download
C
CVE-2017-2470
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 715
Security Risk High
D
Download
C
CVE-2017-2468
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 031
Security Risk Medium
D
Download
C
CVE-2017-2469
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple WebKit 10.0.2(12602.3.12.0.1) - Frame::setDocument (1) Universal Cross-Site Scripting Exploit
Kommentare:
0
4 383
Security Risk Medium
D
Download
C
CVE-2017-2364
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 982
Security Risk Medium
D
Download
C
CVE-2017-2454
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple WebKit - RenderLayer Use-After-Free Exploit
Kommentare:
0
4 198
Security Risk Medium
D
Download
C
CVE-2017-2455
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
5 018
Security Risk Medium
D
Download
C
CVE-2017-2459
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 879
Security Risk Medium
D
Download
C
CVE-2017-2460
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 109
Security Risk Medium
D
Download
C
CVE-2017-2466
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple WebKit - table Use-After-Free Exploit
Kommentare:
0
5 062
Security Risk Medium
D
Download
C
CVE-2017-2471
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple WebKit - WebCore::toJS Use-After-Free Exploit
Kommentare:
0
4 732
Security Risk Medium
D
Download
C
CVE-2017-2476
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple WebKit - HTMLKeygenElement Type Confusion Exploit
Kommentare:
0
5 039
Security Risk Medium
D
Download
C
CVE-2017-2369
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
5 684
Security Risk High
D
Download
C
CVE-2017-2362
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 564
Security Risk Medium
D
Download
C
CVE-2017-2373
Verified by
Kostenlos
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
5 329
Security Risk Unsored
D
Download
-
Not verified yet
Kostenlos
You can open this exploit for free
Georgi Guninski
Exploits:
16
BusinessLevel:
11