0day.today - наибольшая база данных эксплоитов в мире.
Некоторые вещи, о которых стоит знать:
Мы используем один основной домен 0day.today
Если Вы желаете приобрести эксплоит или заплатить за услуги - Вам необходимо приобрести Золото (Gold). Мы не хотим чтобы Вы использовали наш сайт как инструмент для взломов, поэтому любые действия, которые могут незаконно влиять на других пользователей или на сайты, к которым у Вас нет прав доступа будут запрещены и Ваш профиль со всей вложенной информацией будет уничтожен.
Администрация сайта использует официальные контакты. Опасайтесь обманщиков!
Мы используем один основной домен 0day.today
Если Вы желаете приобрести эксплоит или заплатить за услуги - Вам необходимо приобрести Золото (Gold). Мы не хотим чтобы Вы использовали наш сайт как инструмент для взломов, поэтому любые действия, которые могут незаконно влиять на других пользователей или на сайты, к которым у Вас нет прав доступа будут запрещены и Ваш профиль со всей вложенной информацией будет уничтожен.
Администрация сайта использует официальные контакты. Опасайтесь обманщиков!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Прочитайте [ соглашение ]
- Прочитайте [ Отправить ] правила
- Посетите страницу [ faq ] page
- [ Зарегистрируйте ] профиль
- Получите [ Gold ]
- Если Вы хотите [ продать ]
- Если Вы хотите [ купить ]
- Если Вы потеряли [ Счет ]
- Любые вопросы [ [email protected] ]
- Страница авторизации
- Страница регистрации
- Страница восстановления
- Страница FAQ
- Страница контактов
- Правила публикации
- Страница с соглашением
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Вы можете связаться с нами по:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Search results for exploits by request: WebKit
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Safari Webkit For iOS 7.1.2 JIT Optimization Bug Exploit
Комметариев:
0
20 427
Security Risk Medium
D
Download
C
CVE-2016-4669
CVE-2018-4162
CVE-2018-4162
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1626
BusinessLevel:
92
Safari Webkit Proxy Object Type Confusion Exploit
Комметариев:
0
8 408
Security Risk High
D
Download
C
CVE-2017-13861
CVE-2018-4233
CVE-2018-4233
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1626
BusinessLevel:
92
WebKit not_number defineProperties Use-After-Free Exploit
Комметариев:
0
6 155
Security Risk Medium
D
Download
C
CVE-2016-4655
CVE-2016-4656
CVE-2016-4657
CVE-2016-4656
CVE-2016-4657
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1626
BusinessLevel:
92
Sony Playstation 4 (PS4) 4.55 - Jailbreak (WebKit 5.01 / bpf Kernel Loader 4.55) Exploit
Комметариев:
0
4 675
Security Risk Critical
D
Download
-
Verified by
free
You can open this exploit for free
Specter
Эксплоиты:
8
BusinessLevel:
4
4 194
Security Risk Critical
D
Download
C
CVE-2017-7081
CVE-2017-7087
CVE-2017-7089
CVE-2017-7090
CVE-2017-7091
CVE-2017-7092
CVE-2017-7093
CVE-2017-7094
CVE-2017-7095
CVE-2017-7096
CVE-2017-7098
CVE-2017-7099
CVE-2017-7100
CVE-2017-7102
CVE-2017-7104
CVE-2017-7107
CVE-2017-7109
CVE-2017-7087
CVE-2017-7089
CVE-2017-7090
CVE-2017-7091
CVE-2017-7092
CVE-2017-7093
CVE-2017-7094
CVE-2017-7095
CVE-2017-7096
CVE-2017-7098
CVE-2017-7099
CVE-2017-7100
CVE-2017-7102
CVE-2017-7104
CVE-2017-7107
CVE-2017-7109
Verified by
free
You can open this exploit for free
WebKitGTK+ Team
Эксплоиты:
2
BusinessLevel:
3
Android 2.0/2.1/2.2, Webkit Remote Code Execution Exploit 0day
Вверх:
0
Вниз:
0
Комметариев:
0
20 822
Security Risk High
D
Download
-
Verified by
0.001
Open this exploit for 0.001 BTC
Open this exploit for 50 Gold
squirrel-sploit
Эксплоиты:
2
BusinessLevel:
5
Webkit normalize bug for android 2.2 (CVE-2010-1759)
Комметариев:
0
8 208
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
MJ Keith
Эксплоиты:
3
BusinessLevel:
7
Apple Safari Webkit libxslt Arbitrary File Creation
Комметариев:
0
5 878
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
metasploit
Эксплоиты:
1626
BusinessLevel:
92
Android 2.0 ,2.1, 2.1.1 WebKit Use-After-Free Exploit
Комметариев:
0
7 012
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
MJ Keith
Эксплоиты:
3
BusinessLevel:
7
6 548
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
Itzhak Avraham
Эксплоиты:
1
BusinessLevel:
7
unsorted
4 519
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
Chris Evans
Эксплоиты:
5
BusinessLevel:
8
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
WebKit On iOS PAC / JIT Hardening Bypass Vulnerability
Комметариев:
0
19 369
Security Risk High
D
Download
C
CVE-2020-9910
Verified by
free
You can open this exploit for free
saelo
Эксплоиты:
9
BusinessLevel:
6
9 823
Security Risk High
D
Download
C
CVE-2020-3894
Verified by
free
You can open this exploit for free
Glazvunov
Эксплоиты:
9
BusinessLevel:
3
4 834
Security Risk High
D
Download
C
CVE-2018-4441
Verified by
free
You can open this exploit for free
Specter
Эксплоиты:
8
BusinessLevel:
4
4 358
Security Risk Medium
D
Download
C
CVE-2018-12293
Verified by
free
You can open this exploit for free
PeregrineX
Эксплоиты:
1
BusinessLevel:
3
5 418
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Specter
Эксплоиты:
8
BusinessLevel:
4
4 582
Security Risk Critical
D
Download
-
Verified by
free
You can open this exploit for free
qwertyoruiop
Эксплоиты:
4
BusinessLevel:
3
3 466
Security Risk High
D
Download
C
CVE-2014-1303
Verified by
free
You can open this exploit for free
Ren Kimura
Эксплоиты:
2
BusinessLevel:
3
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Sony Playstation 4 < 7.02 - ValidationMessage::buildBubbleTree() Use-After-Free WebKit Exploit
Комметариев:
0
1 755
Security Risk Critical
D
Download
-
Verified by
free
You can open this exploit for free
ChendoChap
Эксплоиты:
1
BusinessLevel:
2
Sony Playstation 4 < 6.72 - ValidationMessage::buildBubbleTree() Use-After-Free WebKit Exploit
Комметариев:
0
1 759
Security Risk Critical
D
Download
-
Verified by
free
You can open this exploit for free
Synacktiv
Эксплоиты:
3
BusinessLevel:
5
4 509
Security Risk High
D
Download
C
CVE-2018-4386
Verified by
free
You can open this exploit for free
TJ Corley
Эксплоиты:
1
BusinessLevel:
2
4 870
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
lokihardt
Эксплоиты:
11
BusinessLevel:
5
4 539
Security Risk Medium
D
Download
C
CVE-2017-2528
Verified by
free
You can open this exploit for free
lokihardt
Эксплоиты:
11
BusinessLevel:
5
4 711
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
lokihardt
Эксплоиты:
11
BusinessLevel:
5
Apple WebKit / Safari 10.0.3 (12602.4.8) - Synchronous Page Load Universal Cross-Site Scripting Expl
Комметариев:
0
10 047
Security Risk Medium
D
Download
C
CVE-2017-2480
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
9 963
Security Risk Medium
D
Download
C
CVE-2017-2479
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
Apple Webkit - Universal Cross-Site Scripting by Accessing a Named Property from an Unloaded Window
Комметариев:
0
9 994
Security Risk Medium
D
Download
C
CVE-2017-2367
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
Apple WebKit 10.0.2(12602.3.12.0.1) - disconnectSubframes Universal Cross-Site Scripting Exploit
Комметариев:
0
10 181
Security Risk Medium
D
Download
C
CVE-2017-2445
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
Apple WebKit 10.0.2(12602.3.12.0.1, r210800) - constructJSReadableStreamDefaultReader Type Confusion
Комметариев:
0
10 042
Security Risk Medium
D
Download
C
CVE-2017-2457
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
9 977
Security Risk Medium
D
Download
C
CVE-2017-2442
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
9 940
Security Risk Medium
D
Download
C
CVE-2017-2363
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
Apple WebKit Pop-Up Blocker Bypass Exploit
Комметариев:
0
7 880
Security Risk High
D
Download
C
CVE-2017-2371
Verified by
free
You can open this exploit for free
lokihardt
Эксплоиты:
11
BusinessLevel:
5
Apple WebKit Frame::setDocument UXSS Exploit
Комметариев:
0
5 652
Security Risk Medium
D
Download
C
CVE-2017-2365
Verified by
free
You can open this exploit for free
lokihardt
Эксплоиты:
11
BusinessLevel:
5
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 886
Security Risk Medium
D
Download
C
CVE-2022-42867
Verified by
free
You can open this exploit for free
Maddie Stone
Эксплоиты:
1
BusinessLevel:
1
WebKit HTMLSelectElement Use-After-Free Exploit
Комметариев:
0
5 594
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
WebKit WebCore::FrameLoader::PolicyChecker::checkNavigationPolicy Heap Use-After-Free Vulnerability
Комметариев:
0
8 515
Security Risk Medium
D
Download
C
CVE-2021-30795
Verified by
free
You can open this exploit for free
Glazvunov
Эксплоиты:
9
BusinessLevel:
3
WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive Exploit
Комметариев:
0
15 968
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
16 348
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
WebKit - Universal XSS Using Cached Pages Exploit
Комметариев:
0
17 299
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
WebKit - User-agent Shadow root Leak in WebCore::ReplacementFragment::ReplacementFragment
Комметариев:
0
17 241
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
WebKit - Universal XSS in WebCore::command Exploit
Комметариев:
0
17 183
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
16 805
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
Webkit JSC: JIT - Uninitialized Variable Access in ArgumentsEliminationPhase::transform Exploit
Комметариев:
0
12 925
Security Risk Medium
D
Download
C
CVE-2019-8689
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
12 307
Security Risk Medium
D
Download
C
CVE-2019-8690
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
12 338
Security Risk Medium
D
Download
C
CVE-2019-8649
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
WebKitGTK+ - ThreadedCompositor Race Condition Exploit
Комметариев:
0
11 274
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
11 361
Security Risk Medium
D
Download
C
CVE-2019-8558
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
WebKit JavaScriptCore - Out-Of-Bounds Access in FTL JIT due to LICM Moving Array Access Exploit
Комметариев:
0
11 324
Security Risk Medium
D
Download
C
CVE-2019-8518
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
11 273
Security Risk Medium
D
Download
C
CVE-2019-8506
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
12 171
Security Risk Medium
D
Download
C
CVE-2019-8375
Verified by
free
You can open this exploit for free
Dhiraj Mishra
Эксплоиты:
27
BusinessLevel:
5
WebKit JSC reifyStaticProperty Attribute Flag Issue Exploit
Комметариев:
0
10 901
Security Risk Medium
D
Download
C
CVE-2019-6215
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
6 486
Security Risk Medium
D
Download
C
CVE-2018-4442
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
WebKit JSC AbstractValue::set Use-After-Free Exploit
Комметариев:
0
4 618
Security Risk Medium
D
Download
C
CVE-2018-4443
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56