Exploits found on the INTERNET

This is live excerpt from our database. Available also using API

Date Name Status
2021-08-06Backdoor.Win32.Zdemon.126 / Unauthenticated Remote Command ExecutionPublished
2021-08-06Trojan-Dropper.Win32.Small.fp / Unauthenticated Open ProxyPublished
2021-08-06Backdoor.Win32.Zdemon.10 / Unauthenticated Remote Command ExecutionPublished
2021-08-03Testa Online Test Management System 3.4.5 - 'q' SQL InjectionPublished
2021-08-03Testa CMS 3.4.3 - 'q' SQL InjectionPublished
2021-08-03Hotel Management System 1.0 Cross Site Scripting / Shell UploadPublished
2021-08-02Neo4j 3.4.18 Remote Code ExecutionPublished
2021-08-01EGain Chat 15.5.5 Cross Site ScriptingPublished
2021-08-01Pi-Hole Remove Commands Linux Privilege EscalationPublished
2021-08-01Panasonic Sanyo CCTV Network Camera 2.03-0x Cross Site Request ForgeryPublished
2021-08-01ObjectPlanet Opinio 7.13 Expression Language InjectionPublished
2021-08-01Relieve Marketing y Web Sql Injection VulnerabilityPublished
2021-07-30Care2x Integrated Hospital Info System 2.7 SQL InjectionPublished
2021-07-30ObjectPlanet Opinio 7.12 Cross Site ScriptingPublished
2021-07-30Longjing Technology BEMS API 1.21 Remote Arbitrary File DownloadPublished
2021-07-30CloverDX 5.9.0 Code Execution / Cross Site Request ForgeryPublished
2021-07-30IntelliChoice eFORCE Software Suite 2.5.9 Username EnumerationPublished
2021-07-30Denver IP Camera SHO-110 Snapshot DisclosurePublished
2021-07-28Backdoor.Win32.WinShell.40 / Unauthenticated Remote Command ExecutionPublished
2021-07-28PHP 7.3.15-3 PHP_SESSION_UPLOAD_PROGRESS Session Data InjectionPublished
2021-07-28WordPress Social Warfare 3.5.2 Remote Code ExecutionPublished
2021-07-28Event Registration System With QR Code 1.0 Shell UploadPublished
2021-07-28Denver Smart Wifi Camera SHC-150 Remote Code ExecutionPublished
2021-07-28TripSpark VEO Transportation SQL InjectionPublished
2021-07-27WordPress Modern Events Calendar Remote Code ExecutionPublished
2021-07-27Customer Relationship Management System CRM 1.0 Sql Injection Authentication BypassPublished
2021-07-27Backdoor.Win32.PsyRat.b / Unauthenticated Remote Command ExecutionPublished
2021-07-27Backdoor.Win32.Mazben.me / Unauthenticated Open ProxyPublished
2021-07-27Backdoor.Win32.Agent.cu / Port Bounce Scan MITMPublished
2021-07-27Backdoor.Win32.Agent.cu / Authentication Bypass RCEPublished
2021-07-27Backdoor.Win32.Hupigon.aaur / Unauthenticated Open ProxyPublished
2021-07-27Backdoor.Win32.PsyRat.b / Remote Denial of ServicePublished
2021-07-27Backdoor.Win32.Agent.cu / Unauthenticated Remote Command ExecutionPublished
2021-07-27Backdoor.Win32.Bifrose.acci / Local Stack Buffer OverflowPublished
2021-07-27Backdoor.Win32.Nbdd.bgz / Remote Stack Buffer OverflowPublished




Copyright © 2024 Exploitalert v1 BETA.
About us & Partners This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum