0day.today - Il più grande database di exploit nel mondo.
Cose che dovresti sapere du questo:
Utilizziamo un dominio principale DOMAIN_LINK
Se vuoi acquistare l'exploit o ottenerlo, devi comprare i Gold. Non vogliamo che utilizzi i tool di hacking per atttività illecite sul nostro sito web, quindi ogni azione può avere effetti illegali su utenti e sul nostro sito web verrai bannato. ed il tuo account con i tuoi dati verranno distrutti.
L'amministrazione del sito usa contatti ufficiali. Attenzione agli istruttori!
Utilizziamo un dominio principale DOMAIN_LINK
Se vuoi acquistare l'exploit o ottenerlo, devi comprare i Gold. Non vogliamo che utilizzi i tool di hacking per atttività illecite sul nostro sito web, quindi ogni azione può avere effetti illegali su utenti e sul nostro sito web verrai bannato. ed il tuo account con i tuoi dati verranno distrutti.
L'amministrazione del sito usa contatti ufficiali. Attenzione agli istruttori!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Leggere il [ accordo ]
- Leggere il [ Submit ] regole
- Visita il [ faq ] page
- [ Registrati ] profilo
- ottieni [ Oro ]
- Se vuoi [ vendere ]
- Se vuoi [ comprare ]
- se hai perso [ Account ]
- Qualsiasi domanda [ [email protected] ]
- Autorizzazione della Pagina
- Registrazione della pagina
- Ripristina l'account della pagina
- FAQ pagina
- Pagina dei contatti
- Regole di pubblicazione
- Pagina degli accordi
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Ci puoi contattare tramite:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Search results for exploits by request: WebKit
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
20 428
Security Risk Medium
D
Download
C
CVE-2016-4669
CVE-2018-4162
CVE-2018-4162
Verified by
FREE
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
8 408
Security Risk High
D
Download
C
CVE-2017-13861
CVE-2018-4233
CVE-2018-4233
Verified by
FREE
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
6 155
Security Risk Medium
D
Download
C
CVE-2016-4655
CVE-2016-4656
CVE-2016-4657
CVE-2016-4656
CVE-2016-4657
Verified by
FREE
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
Sony Playstation 4 (PS4) 4.55 - Jailbreak (WebKit 5.01 / bpf Kernel Loader 4.55) Exploit
Commenti:
0
4 675
Security Risk Critical
D
Download
-
Verified by
FREE
You can open this exploit for free
Specter
Exploits:
8
BusinessLevel:
4
4 194
Security Risk Critical
D
Download
C
CVE-2017-7081
CVE-2017-7087
CVE-2017-7089
CVE-2017-7090
CVE-2017-7091
CVE-2017-7092
CVE-2017-7093
CVE-2017-7094
CVE-2017-7095
CVE-2017-7096
CVE-2017-7098
CVE-2017-7099
CVE-2017-7100
CVE-2017-7102
CVE-2017-7104
CVE-2017-7107
CVE-2017-7109
CVE-2017-7087
CVE-2017-7089
CVE-2017-7090
CVE-2017-7091
CVE-2017-7092
CVE-2017-7093
CVE-2017-7094
CVE-2017-7095
CVE-2017-7096
CVE-2017-7098
CVE-2017-7099
CVE-2017-7100
CVE-2017-7102
CVE-2017-7104
CVE-2017-7107
CVE-2017-7109
Verified by
FREE
You can open this exploit for free
WebKitGTK+ Team
Exploits:
2
BusinessLevel:
3
Android 2.0/2.1/2.2, Webkit Remote Code Execution Exploit 0day
Vota sù:
0
Vota giù:
0
Commenti:
0
20 822
Security Risk High
D
Download
-
Verified by
0.001
Open this exploit for 0.001 BTC
Open this exploit for 50 Oro
squirrel-sploit
Exploits:
2
BusinessLevel:
5
8 208
Security Risk Unsored
D
Download
-
Not verified yet
FREE
You can open this exploit for free
MJ Keith
Exploits:
3
BusinessLevel:
7
5 878
Security Risk Unsored
D
Download
-
Not verified yet
FREE
You can open this exploit for free
metasploit
Exploits:
1626
BusinessLevel:
92
7 012
Security Risk Unsored
D
Download
-
Not verified yet
FREE
You can open this exploit for free
MJ Keith
Exploits:
3
BusinessLevel:
7
6 548
Security Risk Unsored
D
Download
-
Not verified yet
FREE
You can open this exploit for free
Itzhak Avraham
Exploits:
1
BusinessLevel:
7
unsorted
4 519
Security Risk Unsored
D
Download
-
Not verified yet
FREE
You can open this exploit for free
Chris Evans
Exploits:
5
BusinessLevel:
8
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
19 369
Security Risk High
D
Download
C
CVE-2020-9910
Verified by
FREE
You can open this exploit for free
saelo
Exploits:
9
BusinessLevel:
6
9 823
Security Risk High
D
Download
C
CVE-2020-3894
Verified by
FREE
You can open this exploit for free
Glazvunov
Exploits:
9
BusinessLevel:
3
4 834
Security Risk High
D
Download
C
CVE-2018-4441
Verified by
FREE
You can open this exploit for free
Specter
Exploits:
8
BusinessLevel:
4
4 358
Security Risk Medium
D
Download
C
CVE-2018-12293
Verified by
FREE
You can open this exploit for free
PeregrineX
Exploits:
1
BusinessLevel:
3
5 418
Security Risk Medium
D
Download
-
Verified by
FREE
You can open this exploit for free
Specter
Exploits:
8
BusinessLevel:
4
4 582
Security Risk Critical
D
Download
-
Verified by
FREE
You can open this exploit for free
qwertyoruiop
Exploits:
4
BusinessLevel:
3
3 466
Security Risk High
D
Download
C
CVE-2014-1303
Verified by
FREE
You can open this exploit for free
Ren Kimura
Exploits:
2
BusinessLevel:
3
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Sony Playstation 4 < 7.02 - ValidationMessage::buildBubbleTree() Use-After-Free WebKit Exploit
Commenti:
0
1 755
Security Risk Critical
D
Download
-
Verified by
FREE
You can open this exploit for free
ChendoChap
Exploits:
1
BusinessLevel:
2
Sony Playstation 4 < 6.72 - ValidationMessage::buildBubbleTree() Use-After-Free WebKit Exploit
Commenti:
0
1 759
Security Risk Critical
D
Download
-
Verified by
FREE
You can open this exploit for free
Synacktiv
Exploits:
3
BusinessLevel:
5
4 509
Security Risk High
D
Download
C
CVE-2018-4386
Verified by
FREE
You can open this exploit for free
TJ Corley
Exploits:
1
BusinessLevel:
2
4 870
Security Risk Medium
D
Download
-
Verified by
FREE
You can open this exploit for free
lokihardt
Exploits:
11
BusinessLevel:
5
4 539
Security Risk Medium
D
Download
C
CVE-2017-2528
Verified by
FREE
You can open this exploit for free
lokihardt
Exploits:
11
BusinessLevel:
5
4 711
Security Risk Medium
D
Download
-
Verified by
FREE
You can open this exploit for free
lokihardt
Exploits:
11
BusinessLevel:
5
Apple WebKit / Safari 10.0.3 (12602.4.8) - Synchronous Page Load Universal Cross-Site Scripting Expl
Commenti:
0
10 047
Security Risk Medium
D
Download
C
CVE-2017-2480
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
9 963
Security Risk Medium
D
Download
C
CVE-2017-2479
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple Webkit - Universal Cross-Site Scripting by Accessing a Named Property from an Unloaded Window
Commenti:
0
9 994
Security Risk Medium
D
Download
C
CVE-2017-2367
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple WebKit 10.0.2(12602.3.12.0.1) - disconnectSubframes Universal Cross-Site Scripting Exploit
Commenti:
0
10 181
Security Risk Medium
D
Download
C
CVE-2017-2445
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple WebKit 10.0.2(12602.3.12.0.1, r210800) - constructJSReadableStreamDefaultReader Type Confusion
Commenti:
0
10 042
Security Risk Medium
D
Download
C
CVE-2017-2457
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
9 977
Security Risk Medium
D
Download
C
CVE-2017-2442
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
9 940
Security Risk Medium
D
Download
C
CVE-2017-2363
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple WebKit Pop-Up Blocker Bypass Exploit
Commenti:
0
7 880
Security Risk High
D
Download
C
CVE-2017-2371
Verified by
FREE
You can open this exploit for free
lokihardt
Exploits:
11
BusinessLevel:
5
Apple WebKit Frame::setDocument UXSS Exploit
Commenti:
0
5 652
Security Risk Medium
D
Download
C
CVE-2017-2365
Verified by
FREE
You can open this exploit for free
lokihardt
Exploits:
11
BusinessLevel:
5
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
4 886
Security Risk Medium
D
Download
C
CVE-2022-42867
Verified by
FREE
You can open this exploit for free
Maddie Stone
Exploits:
1
BusinessLevel:
1
WebKit HTMLSelectElement Use-After-Free Exploit
Commenti:
0
5 594
Security Risk Medium
D
Download
-
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
WebKit WebCore::FrameLoader::PolicyChecker::checkNavigationPolicy Heap Use-After-Free Vulnerability
Commenti:
0
8 515
Security Risk Medium
D
Download
C
CVE-2021-30795
Verified by
FREE
You can open this exploit for free
Glazvunov
Exploits:
9
BusinessLevel:
3
15 968
Security Risk Medium
D
Download
-
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
16 348
Security Risk Medium
D
Download
-
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
17 299
Security Risk Medium
D
Download
-
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
WebKit - User-agent Shadow root Leak in WebCore::ReplacementFragment::ReplacementFragment
Commenti:
0
17 241
Security Risk Medium
D
Download
-
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
17 183
Security Risk Medium
D
Download
-
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
16 805
Security Risk Medium
D
Download
-
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Webkit JSC: JIT - Uninitialized Variable Access in ArgumentsEliminationPhase::transform Exploit
Commenti:
0
12 925
Security Risk Medium
D
Download
C
CVE-2019-8689
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
12 307
Security Risk Medium
D
Download
C
CVE-2019-8690
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
12 338
Security Risk Medium
D
Download
C
CVE-2019-8649
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
11 274
Security Risk Medium
D
Download
-
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
11 361
Security Risk Medium
D
Download
C
CVE-2019-8558
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
WebKit JavaScriptCore - Out-Of-Bounds Access in FTL JIT due to LICM Moving Array Access Exploit
Commenti:
0
11 324
Security Risk Medium
D
Download
C
CVE-2019-8518
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
11 273
Security Risk Medium
D
Download
C
CVE-2019-8506
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
12 171
Security Risk Medium
D
Download
C
CVE-2019-8375
Verified by
FREE
You can open this exploit for free
Dhiraj Mishra
Exploits:
27
BusinessLevel:
5
10 902
Security Risk Medium
D
Download
C
CVE-2019-6215
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
6 486
Security Risk Medium
D
Download
C
CVE-2018-4442
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 618
Security Risk Medium
D
Download
C
CVE-2018-4443
Verified by
FREE
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56