By entering this site you need to consent to the use of cookies and their functional use according to this privacy policy. Cookies help us to provide the functional services of the website. Kindly read the below message of use and consent to the use.
The following cookies are stored and shared when accessing this website:
- Internal cookies for the MediaWiki site. This is used for user authentication and article modifications.
- Third-party cookies from Google providing services for Google AdSense and Google Analytics
We will never use data collected outside of the above scope.
This page lists vulnerabilities / exploits for Nintendo Switch applications and applets
+
This page lists vulnerabilities / exploits for Nintendo Switch applications and applets.
+
== Browser userspace ==
== Browser userspace ==
{| class="wikitable" border="1"
{| class="wikitable" border="1"
Line 9:
Line 10:
! Discovered by
! Discovered by
|-
|-
−
| CVE-2016-4657
+
| CVE-2016-4657
−
| WebKit exploit discovered around August 2016. Most notably used in the iOS 9.3.X exploit. A simple PoC can be seen [https://github.com/LiveOverflow/lo_nintendoswitch/blob/master/poc1.html here]. First known use on the Switch includes [https://twitter.com/qwertyoruiopz Qwertyoruiop] using a version of his iOS 9.3 hack without iOS specific instructions
+
| WebKit vuln discovered around August 2016. Most notably used in the iOS 9.3.X exploit. A simple PoC can be found [https://github.com/LiveOverflow/lo_nintendoswitch/blob/master/poc1.html here]. This was later exploited by [https://twitter.com/qwertyoruiopz Qwertyoruiop] using an adjusted version of his iOS 9.3 webkit exploit (others exploited this prior to then).