0day.today - La mayor base de datos de exploits en el mundo.
Things you should know about it:
We use one main domain DOMAIN_LINK
If you want to purchase the exploit or pay for service, you need to buy Gold. We don't want you to use our site as a tool for hacking purposes, so any kind of action that could affect illegaly other users or websites that you don't have right to access will be banned and your account including your data will be destroyed.
Administration of this site uses the official contacts. Beware of impostors!
We use one main domain DOMAIN_LINK
If you want to purchase the exploit or pay for service, you need to buy Gold. We don't want you to use our site as a tool for hacking purposes, so any kind of action that could affect illegaly other users or websites that you don't have right to access will be banned and your account including your data will be destroyed.
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Enviar ] rules
- Visit the [ Preguntas frecuentes ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ [email protected] ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
No puedes contactar por:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Search results for exploits by request: WebKit
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Safari Webkit For iOS 7.1.2 JIT Optimization Bug Exploit
Comentarios:
0
20 427
Security Risk Medium
D
Download
C
CVE-2016-4669
CVE-2018-4162
CVE-2018-4162
Verified by
gratis
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Safari Webkit Proxy Object Type Confusion Exploit
Comentarios:
0
8 408
Security Risk High
D
Download
C
CVE-2017-13861
CVE-2018-4233
CVE-2018-4233
Verified by
gratis
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
WebKit not_number defineProperties Use-After-Free Exploit
Comentarios:
0
6 155
Security Risk Medium
D
Download
C
CVE-2016-4655
CVE-2016-4656
CVE-2016-4657
CVE-2016-4656
CVE-2016-4657
Verified by
gratis
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Sony Playstation 4 (PS4) 4.55 - Jailbreak (WebKit 5.01 / bpf Kernel Loader 4.55) Exploit
Comentarios:
0
4 675
Security Risk Critical
D
Download
-
Verified by
gratis
You can open this exploit for free
Specter
Exploits:
8
BusinessLevel:
4
4 194
Security Risk Critical
D
Download
C
CVE-2017-7081
CVE-2017-7087
CVE-2017-7089
CVE-2017-7090
CVE-2017-7091
CVE-2017-7092
CVE-2017-7093
CVE-2017-7094
CVE-2017-7095
CVE-2017-7096
CVE-2017-7098
CVE-2017-7099
CVE-2017-7100
CVE-2017-7102
CVE-2017-7104
CVE-2017-7107
CVE-2017-7109
CVE-2017-7087
CVE-2017-7089
CVE-2017-7090
CVE-2017-7091
CVE-2017-7092
CVE-2017-7093
CVE-2017-7094
CVE-2017-7095
CVE-2017-7096
CVE-2017-7098
CVE-2017-7099
CVE-2017-7100
CVE-2017-7102
CVE-2017-7104
CVE-2017-7107
CVE-2017-7109
Verified by
gratis
You can open this exploit for free
WebKitGTK+ Team
Exploits:
2
BusinessLevel:
3
Android 2.0/2.1/2.2, Webkit Remote Code Execution Exploit 0day
calificar alto:
0
calificar bajo:
0
Comentarios:
0
20 822
Security Risk High
D
Download
-
Verified by
0.001
Open this exploit for 0.001 BTC
Open this exploit for 50 GOLD
squirrel-sploit
Exploits:
2
BusinessLevel:
5
Webkit normalize bug for android 2.2 (CVE-2010-1759)
Comentarios:
0
8 208
Security Risk Unsored
D
Download
-
Not verified yet
gratis
You can open this exploit for free
MJ Keith
Exploits:
3
BusinessLevel:
7
Apple Safari Webkit libxslt Arbitrary File Creation
Comentarios:
0
5 878
Security Risk Unsored
D
Download
-
Not verified yet
gratis
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Android 2.0 ,2.1, 2.1.1 WebKit Use-After-Free Exploit
Comentarios:
0
7 012
Security Risk Unsored
D
Download
-
Not verified yet
gratis
You can open this exploit for free
MJ Keith
Exploits:
3
BusinessLevel:
7
6 548
Security Risk Unsored
D
Download
-
Not verified yet
gratis
You can open this exploit for free
Itzhak Avraham
Exploits:
1
BusinessLevel:
7
unsorted
4 519
Security Risk Unsored
D
Download
-
Not verified yet
gratis
You can open this exploit for free
Chris Evans
Exploits:
5
BusinessLevel:
8
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
WebKit On iOS PAC / JIT Hardening Bypass Vulnerability
Comentarios:
0
19 369
Security Risk High
D
Download
C
CVE-2020-9910
Verified by
gratis
You can open this exploit for free
saelo
Exploits:
9
BusinessLevel:
6
9 823
Security Risk High
D
Download
C
CVE-2020-3894
Verified by
gratis
You can open this exploit for free
Glazvunov
Exploits:
9
BusinessLevel:
3
4 834
Security Risk High
D
Download
C
CVE-2018-4441
Verified by
gratis
You can open this exploit for free
Specter
Exploits:
8
BusinessLevel:
4
4 358
Security Risk Medium
D
Download
C
CVE-2018-12293
Verified by
gratis
You can open this exploit for free
PeregrineX
Exploits:
1
BusinessLevel:
3
5 418
Security Risk Medium
D
Download
-
Verified by
gratis
You can open this exploit for free
Specter
Exploits:
8
BusinessLevel:
4
4 582
Security Risk Critical
D
Download
-
Verified by
gratis
You can open this exploit for free
qwertyoruiop
Exploits:
4
BusinessLevel:
3
3 466
Security Risk High
D
Download
C
CVE-2014-1303
Verified by
gratis
You can open this exploit for free
Ren Kimura
Exploits:
2
BusinessLevel:
3
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Sony Playstation 4 < 7.02 - ValidationMessage::buildBubbleTree() Use-After-Free WebKit Exploit
Comentarios:
0
1 755
Security Risk Critical
D
Download
-
Verified by
gratis
You can open this exploit for free
ChendoChap
Exploits:
1
BusinessLevel:
2
Sony Playstation 4 < 6.72 - ValidationMessage::buildBubbleTree() Use-After-Free WebKit Exploit
Comentarios:
0
1 759
Security Risk Critical
D
Download
-
Verified by
gratis
You can open this exploit for free
Synacktiv
Exploits:
3
BusinessLevel:
5
4 509
Security Risk High
D
Download
C
CVE-2018-4386
Verified by
gratis
You can open this exploit for free
TJ Corley
Exploits:
1
BusinessLevel:
2
4 870
Security Risk Medium
D
Download
-
Verified by
gratis
You can open this exploit for free
lokihardt
Exploits:
11
BusinessLevel:
5
4 539
Security Risk Medium
D
Download
C
CVE-2017-2528
Verified by
gratis
You can open this exploit for free
lokihardt
Exploits:
11
BusinessLevel:
5
4 711
Security Risk Medium
D
Download
-
Verified by
gratis
You can open this exploit for free
lokihardt
Exploits:
11
BusinessLevel:
5
Apple WebKit / Safari 10.0.3 (12602.4.8) - Synchronous Page Load Universal Cross-Site Scripting Expl
Comentarios:
0
10 047
Security Risk Medium
D
Download
C
CVE-2017-2480
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
9 963
Security Risk Medium
D
Download
C
CVE-2017-2479
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple Webkit - Universal Cross-Site Scripting by Accessing a Named Property from an Unloaded Window
Comentarios:
0
9 994
Security Risk Medium
D
Download
C
CVE-2017-2367
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple WebKit 10.0.2(12602.3.12.0.1) - disconnectSubframes Universal Cross-Site Scripting Exploit
Comentarios:
0
10 181
Security Risk Medium
D
Download
C
CVE-2017-2445
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple WebKit 10.0.2(12602.3.12.0.1, r210800) - constructJSReadableStreamDefaultReader Type Confusion
Comentarios:
0
10 042
Security Risk Medium
D
Download
C
CVE-2017-2457
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
9 977
Security Risk Medium
D
Download
C
CVE-2017-2442
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
9 940
Security Risk Medium
D
Download
C
CVE-2017-2363
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple WebKit Pop-Up Blocker Bypass Exploit
Comentarios:
0
7 880
Security Risk High
D
Download
C
CVE-2017-2371
Verified by
gratis
You can open this exploit for free
lokihardt
Exploits:
11
BusinessLevel:
5
Apple WebKit Frame::setDocument UXSS Exploit
Comentarios:
0
5 652
Security Risk Medium
D
Download
C
CVE-2017-2365
Verified by
gratis
You can open this exploit for free
lokihardt
Exploits:
11
BusinessLevel:
5
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 886
Security Risk Medium
D
Download
C
CVE-2022-42867
Verified by
gratis
You can open this exploit for free
Maddie Stone
Exploits:
1
BusinessLevel:
1
WebKit HTMLSelectElement Use-After-Free Exploit
Comentarios:
0
5 594
Security Risk Medium
D
Download
-
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
WebKit WebCore::FrameLoader::PolicyChecker::checkNavigationPolicy Heap Use-After-Free Vulnerability
Comentarios:
0
8 515
Security Risk Medium
D
Download
C
CVE-2021-30795
Verified by
gratis
You can open this exploit for free
Glazvunov
Exploits:
9
BusinessLevel:
3
WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive Exploit
Comentarios:
0
15 968
Security Risk Medium
D
Download
-
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
16 348
Security Risk Medium
D
Download
-
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
WebKit - Universal XSS Using Cached Pages Exploit
Comentarios:
0
17 299
Security Risk Medium
D
Download
-
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
WebKit - User-agent Shadow root Leak in WebCore::ReplacementFragment::ReplacementFragment
Comentarios:
0
17 241
Security Risk Medium
D
Download
-
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
WebKit - Universal XSS in WebCore::command Exploit
Comentarios:
0
17 183
Security Risk Medium
D
Download
-
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
16 805
Security Risk Medium
D
Download
-
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Webkit JSC: JIT - Uninitialized Variable Access in ArgumentsEliminationPhase::transform Exploit
Comentarios:
0
12 925
Security Risk Medium
D
Download
C
CVE-2019-8689
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
12 307
Security Risk Medium
D
Download
C
CVE-2019-8690
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
12 338
Security Risk Medium
D
Download
C
CVE-2019-8649
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
WebKitGTK+ - ThreadedCompositor Race Condition Exploit
Comentarios:
0
11 274
Security Risk Medium
D
Download
-
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
11 361
Security Risk Medium
D
Download
C
CVE-2019-8558
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
WebKit JavaScriptCore - Out-Of-Bounds Access in FTL JIT due to LICM Moving Array Access Exploit
Comentarios:
0
11 324
Security Risk Medium
D
Download
C
CVE-2019-8518
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
11 273
Security Risk Medium
D
Download
C
CVE-2019-8506
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
12 171
Security Risk Medium
D
Download
C
CVE-2019-8375
Verified by
gratis
You can open this exploit for free
Dhiraj Mishra
Exploits:
27
BusinessLevel:
5
WebKit JSC reifyStaticProperty Attribute Flag Issue Exploit
Comentarios:
0
10 901
Security Risk Medium
D
Download
C
CVE-2019-6215
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
6 486
Security Risk Medium
D
Download
C
CVE-2018-4442
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
WebKit JSC AbstractValue::set Use-After-Free Exploit
Comentarios:
0
4 618
Security Risk Medium
D
Download
C
CVE-2018-4443
Verified by
gratis
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56