Search the Community

Showing results for tags 'chrome'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start








Found 25 results

  1. Chrome V8 has an issue where JSCallReducer::ReduceArrayIndexOfIncludes in turbofan fails to insert Map checks. View the full article
  2. This exploit takes advantage of a use after free vulnerability in Google Chrome 72.0.3626.119 running on Windows 7 x86. The FileReader.readAsArrayBuffer function can return multiple references to the same ArrayBuffer object, which can be freed and overwritten with sprayed objects. The dangling ArrayBuffer reference can be used to access the sprayed objects, allowing arbitrary memory access from Javascript. This is used to write and execute shellcode in a WebAssembly object. The shellcode is executed within the Chrome sandbox, so you must explicitly disable the sandbox for the payload to be successful. View the full article
  3. itsMe

    Chrome Password Stealer

    Hacking Chrome Saved Passwords Version info: V3.2.3 (released 21st January 2019) Features: 1. Grabs Google Chrome saved passwords 2. Sends these passwords to the attacker via * Email OR, * HTTP directly to the attacker computer 3. Option of having a fake Error Message appear 4. Custom Icon Quick usage: My recommendation for using it is quite simple. Create a gmail account. Allow insecure apps. Run the and follow instructions. Then you can send the generated server.exe to the victim Instructions (More detailed): [HIDE][Hidden Content]]
  4. Chrome suffers from an integer overflow vulnerability in NewFixedDoubleArray. View the full article
  5. Google Chrome version 73.0.3683.103 V8 JavaScript Engine out-of-memory in invalid table size denial of service proof of concept exploit. View the full article
  6. Chrome suffers from a use-after-free vulnerability in FileChooserImpl. View the full article
  7. Chrome version 73.0.3683.86 stable exploit for chromium issue 941743, tested on Windows 10 x64, which leverages a flaw in the V8 javascript engine. View the full article
  8. Chrome suffers from an internal object leak vulnerability in ReadableStream. View the full article
  9. Chrome suffers from a type confusion vulnerability in JSPromise::TriggerPromiseReactions. View the full article
  10. Chrome suffers from a type confusion vulnerability in V8TrustedTypePolicyOptions::ToImpl. View the full article
  11. There's a race condition in the destruction of the BindingState for bindings to the StoragePartitionService in Chrome. It looks like the root cause of the issue is that since we can get two concurrent calls to callbacks returned from mojo::BindingSet::GetBadMessageCallback() from the same BindingSet, which results in a data race destroying the same BindingState. View the full article
  12. Chrome suffers from a use-after-free vulnerability in MidiManagerWin. View the full article
  13. Chrome suffers from a use-after-free vulnerability in FileSystemOperationRunner. View the full article
  14. There appears to be a race condition in the destruction of the ExtensionsGuestViewMessageFilter if the ProcessIdToFilterMap is modified concurrently in Chrome. View the full article
  15. Chrome suffers from multiple use-after-free vulnerabilities in the PaymentRequest service. View the full article
  16. Chrome suffers from a use-after-free vulnerability in FileWriterImpl. View the full article
  17. Chrome suffers from a use-after-free vulnerability in the RenderProcessHostImpl binding for P2PSocketDispatcherHost. View the full article
  18. Chrome suffers from a use-after-free vulnerability in RenderFrameHostImpl::CreateMediaStreamDispatcherHost. View the full article
  19. How to use Edit Cookies Chrome Extensions in Android Mobile If you want to run cookies of Netflix, amazon prime, ahref etc paid premiums account in your android mobile Here is a way for you. Many people do not know this that why I posting this simple way to do That [Hidden Content]
  20. Google Chrome V8 JavaScript Engine version 71.0.3578.98 suffers from a denial of service vulnerability. View the full article
  21. Google Chrome version 70.0.3538.77 stable suffers from cross site scripting and man-in-the-middle vulnerabilities. View the full article
  22. Chrome OS suffers from a /sbin/crash_reporter symlink traversal vulnerability. View the full article
  23. There is a variety of RPC communication channels between the Chrome OS host system and the crosvm guest. This bug report focuses on communication on TCP port 8889, which is used by the "garcon" service. garcon uses gRPC, which is an RPC protocol that sends protobufs over plaintext HTTP/2. (Other system components communicate with the VM over gRPC-over-vsock, but garcon uses gRPC-over-TCP.) For some command types, the TCP connection is initiated by the host; for others, it is initiated by the guest. Both guest and host are listening on [::]:8889; however, the iptables rules of the host prevent an outside host from simply connecting to those sockets. However, apps running on the host are not affected by such restrictions. View the full article
  24. Download: [hide][Hidden Content]] Password: