Exploits found on the INTERNET

This is live excerpt from our database. Available also using API

Edit Date Name Status
2019-11-05Microsoft Office365 Integrity Validation / Remote Code ExecutionPublished
2019-11-05Launch Manager 6.1.7600.16385 Unquoted Service PathPublished
2019-11-05DevelopWay - DW CMS v1.0.1 SQLiPublished
2019-11-04Dejcom Technology IRANIAN CMS SQL injectionPublished
2019-11-04Soloweb Kcfinder arbitary file uploadPublished
2019-11-04Nostromo Directory Traversal Remote Command Execution MetasploitPublished
2019-11-04The East Kurdistan Free and Democratic Society Website XSS InjectionPublished
2019-11-03OwnCloud 10.3.0 Stable Cross Site Request ForgeryPublished
2019-11-03Micro Focus HPE Data Protector SUID Privilege EscalationPublished
2019-11-03Zyxel NBG-418N v2 Modem CSRF Exploit & PoC UPDATEPublished
2019-11-03OpenVPN Private Tunnel 2.8.4 Unquoted Service PathPublished
2019-11-03Apache Solr 8.2.0 Remote Code ExecutionPublished
2019-11-01Nostromo 1.9.6 Directory Traversal / Remote Command ExecutionPublished
2019-11-01MikroTik RouterOS 6.45.6 DNS Cache PoisoningPublished
2019-11-01WordPress Google Review Slider 6.1 SQL InjectionPublished
2019-11-01WMV To AVI MPEG DVD WMV Converter 4.6.1217 Buffer OverflowPublished
2019-10-30Craft CMS Rate Limiting / Brute ForcePublished
2019-10-30ISeeQ Hybrid DVR WH-H4 1.03R / 2.0.0.P get_jpeg Stream DisclosurePublished
2019-10-30Citrix StoreFront Server 7.15 XML InjectionPublished
2019-10-29Intelbras Router WRN150 1.0.18 Cross Site Request ForgeryPublished
2019-10-29Waldronmatt FullCalendar-BS4-PHP-MySQL-JSON 1.21 Cross Site ScriptingPublished
2019-10-29Waldronmatt FullCalendar-BS4-PHP-MySQL-JSON 1.21 SQL InjectionPublished
2019-10-29Infosysta Jira 1.6.13_J8 Push Notification Authentication BypassPublished
2019-10-29Infosysta Jira 1.6.13_J8 Project List Authentication BypassPublished
2019-10-29Infosysta Jira 1.6.13_J8 User Name DisclosurePublished




Copyright © 2019 Exploitalert v1 BETA.
About us & Partners This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy