0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
[ macOS ]
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
macOS Kernel 10.12.2 (16C67) - Memory Disclosure Due to Lack of Bounds Checking in AppleIntelCapriCo
Comments:
0
4 363
Security Risk Medium
D
Download
C
CVE-2017-2489
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
macOS Kernel 10.12.2 (16C67) - AppleIntelCapriController::GetLinkConfig Code Execution Due to Lack o
Comments:
0
4 239
Security Risk High
D
Download
C
CVE-2017-2443
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
macOS HelpViewer 10.12.1 - XSS Leads to Arbitrary File Execution and Arbitrary File Read Exploit
Comments:
0
11 132
Security Risk Critical
D
Download
C
CVE-2017-2361
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
macOS 10.11.* / 10.12.* Kernel Code Execution - SIP bypass 0day Exploit
Rate up:
0
Rate down:
0
Comments:
0
12 881
Security Risk Critical
D
Download
V
Contains video proof
Verified by 0day Admin
0.032
Open this exploit for 0.032 BTC
Open this exploit for 3 000 GOLD
macos0day
Exploits:
1
BusinessLevel:
4
5 826
Security Risk High
D
Download
C
CVE-2017-2362
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 336
Security Risk High
D
Download
C
CVE-2016-7633
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
MacOS Kernel 10.12.1 - Writable Privileged IOKit Registry Properties Code Execution Exploit
Comments:
0
4 400
Security Risk High
D
Download
C
CVE-2016-7617
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
MacOS Kernel 10.12.1 - Writable Privileged IOKit Registry Properties Code Execution Exploit
Comments:
0
4 231
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
6 784
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
766
BusinessLevel:
48
6 393
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
766
BusinessLevel:
48
Horos 2.1.0 Cross Site Scripting Vulnerability
Comments:
0
6 538
Security Risk Low
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
766
BusinessLevel:
48
Apple macOS 10.12.1/iOS 10 SecureTransport SSL handshake OCSP MiTM and DoS Vulnerabilities
Comments:
0
5 318
Security Risk High
D
Download
C
CVE-2016-7636
Verified by 0day Admin
free
You can open this exploit for free
Maksymilian Arciemowicz
Exploits:
6
BusinessLevel:
5
5 263
Security Risk Critical
D
Download
V
Contains video proof
Verified by 0day Admin
free
You can open this exploit for free
Filippo Cavallarin
Exploits:
10
BusinessLevel:
7
5 392
Security Risk High
D
Download
C
CVE-2016-4625
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 726
Security Risk High
D
Download
C
CVE-2016-1863
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
5 622
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Maksymilian Arciemowicz
Exploits:
6
BusinessLevel:
5
4 703
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Antonio Z.
Exploits:
2
BusinessLevel:
5
Airmail 3.0.2 - Cross-Site Scripting
Comments:
0
4 047
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
redrain
Exploits:
2
BusinessLevel:
6
Apple Mac OSX - Kernel Exploitable Null Pointer Dereference in nvCommandQueue::GetHandleIndex in GeF
Comments:
0
3 963
Security Risk High
D
Download
C
CVE-2016-1846
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
4 004
Security Risk High
D
Download
C
CVE-2016-1794
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple Mac OSX - Kernel Exploitable Null Pointer Dereference in AppleGraphicsDeviceControl
Comments:
0
4 035
Security Risk High
D
Download
C
CVE-2016-1793
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple Mac OSX - Kernel Exploitable NULL Dereference in IOAccelSharedUserClient2::page_off_resource
Comments:
0
4 042
Security Risk High
D
Download
C
CVE-2016-1813
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple Mac OSX - Kernel Exploitable NULL Dereference in CoreCaptureResponder Due to Unchecked Return
Comments:
0
4 050
Security Risk High
D
Download
C
CVE-2016-1803
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 971
Security Risk High
D
Download
C
CVE-2016-1821
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple Mac OSX - Kernel OOB Read of Object Pointer Due to Insufficient Checks in Raw Cast to enum Typ
Comments:
0
3 938
Security Risk High
D
Download
C
CVE-2016-1823
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 924
Security Risk Medium
D
Download
C
CVE-2016-1819
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
Apple Mac OSX / iOS - Kernel UAF Racing getProperty on IOHDIXController and testNetBootMethod on IOH
Comments:
0
4 188
Security Risk High
D
Download
C
CVE-2016-1807
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 786
Security Risk High
D
Download
C
CVE-2016-1861
Verified by 0day Admin
free
You can open this exploit for free
Google Security Research
Exploits:
1019
BusinessLevel:
56
3 733
Security Risk Medium
D
Download
C
CVE-2016-1848
Verified by 0day Admin
free
You can open this exploit for free
Francis Provencher
Exploits:
54
BusinessLevel:
10
Mach Race OSX - Privilege Escalation
Comments:
0
4 148
Security Risk High
D
Download
C
CVE-2016-1757
Verified by 0day Admin
free
You can open this exploit for free
fG!
Exploits:
1
BusinessLevel:
4