Exploits found on the INTERNET

This is live excerpt from our database. Available also using API

Edit Date Name Status
2020-05-09Sentrifugo CMS 3.2 Cross Site ScriptingPublished
2020-05-09LANCOM WLAN Controller Cross Site ScriptingPublished
2020-05-09Draytek VigorAP Cross Site ScriptingPublished
2020-05-09Online Clothing Store 1.0 Arbitrary File UploadPublished
2020-05-09Create-Project Manager 1.07 Cross Site Scripting / HTML InjectionPublished
2020-05-09OpenZ ERP 3.6.60 Cross Site ScriptingPublished
2020-05-09TipTopLand CMS - Local File Inclusion VulnerabilityPublished
2020-05-09Great Web Solutions Pvt Ltd Improper AuthenticationPublished
2020-05-09WebTareas 2.0p8 Cross Site ScriptingPublished
2020-05-08I-doit Open Source CMDB 1.14.1 Arbitrary File DeletionPublished
2020-05-08Car Park Management System 1.0 SQL InjectionPublished
2020-05-08School File Management System 1.0 SQL InjectionPublished
2020-05-06ThietkeWebX Quatangtraitim VietNext Unauthorized File Upload Improper AuthenticationPublished
2020-05-06Suvega Digital Media Pvt Ltd Improper AuthenticationPublished
2020-05-06Du Hoc Ioc Vietnamese System Improper AuthenticationPublished
2020-05-06ChemInv 1.0 Authenticated Persistent Cross-Site ScriptingPublished
2020-05-06IBM Data Risk Manager 2.0.3 Default PasswordPublished
2020-05-06TP-LINK Cloud Cameras NCXXX SetEncryptKey Command InjectionPublished
2020-05-06PhreeBooks ERP 5.2.5 Remote Command ExecutionPublished
2020-05-06IBM Data Risk Manager 2.0.3 Remote Code ExecutionPublished
2020-05-06ATutor LMS 2.2.4 Weak Password Reset HashPublished
2020-05-05Johncaruso PHP Photo Gallery Remote File Inculsion Vulnerability [ RFI ]Published
2020-05-05WordPress Themes begin-its-1 Remote File InclusionPublished
2020-05-05TP-LINK Cloud Cameras NCXXX Bonjour Command InjectionPublished
2020-05-05TP-LINK Cloud Cameras NCXXX Hardcoded Encryption KeyPublished
2020-05-05Veeam ONE Agent .NET DeserializationPublished




Copyright © 2020 Exploitalert v1 BETA.
About us & Partners This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy