Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/singularseclab/Browser_Exploits
A collection of browser exploitation codes from Singular Security Lab.
https://github.com/singularseclab/Browser_Exploits
Last synced: 21 days ago
JSON representation
A collection of browser exploitation codes from Singular Security Lab.
- Host: GitHub
- URL: https://github.com/singularseclab/Browser_Exploits
- Owner: singularseclab
- Created: 2021-04-26T06:25:31.000Z (over 3 years ago)
- Default Branch: master
- Last Pushed: 2023-04-04T04:16:07.000Z (over 1 year ago)
- Last Synced: 2024-08-05T17:38:04.997Z (4 months ago)
- Language: JavaScript
- Size: 4.81 MB
- Stars: 177
- Watchers: 15
- Forks: 32
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - singularseclab/Browser_Exploits - A collection of browser exploitation codes from Singular Security Lab. (JavaScript)
README
# Browser Exploits
A collection of browser exploitation codes from Singular Security Lab.
* [CVE-2022-1310](./CVE-2022-1310)
* Target: **V8**
* Version: 8.3.110.13
* Arch: X86-64
* Credit: Brendon Tiszka(Bug collision)
* [Webkit Bug 216378](./WebKit-Bug-216378)
* Target: **JavaScriptCore**
* Version: Safari-609.2.9.1.2
* Arch: X86-64
* Credit: Unknown(Bug collision)
* [CVE-2020-16040 & CVE-2020-16041](./CVE-2020-1604[0|1]/)
* Target: **Samsung Browser Fullchain**
* Version: 13.2.3.2(Chromium: 83.0.4103.106)
* Arch: ARM
* Credit-16040: Lucas Pinheiro, Microsoft Browser Vulnerability Research
* Credit-16041: Sergei Glazunov and Mark Brand of Google Project Zero
* [CVE-2020-6512](./CVE-2020-6512/)
* Target: **V8**
* Version: 8.3.110.13
* Arch: X86-64
* Credit: nocma, leogan, cheneyxu of WeChat Open Platform Security Team