Exploits found on the INTERNET

This is live excerpt from our database. Available also using API

Edit Date Name Status
2020-05-04Transinfo Solutions Cross Site Scripting XSSPublished
2020-05-03Web Designed by studio03 sql InjectionPublished
2020-05-03Skynyx Technologies Private Limited Improper AuthenticationPublished
2020-05-03Mystic Media Webinitiate Improper Authentication Backdoor AccessPublished
2020-05-03FlashGet 1.9.6 0day Remote Buffer OverflowPublished
2020-05-02Online Scheduling System v1.0 - Authentication BypassPublished
2020-05-02Web Designed by Valiant SQL InjectionPublished
2020-05-02Zen Load Balancer 3.10.1 Directory Traversal MetasploitPublished
2020-05-02Apache OFBiz 17.12.03 Cross Site Request ForgeryPublished
2020-05-02Online Scheduling System v1.0 - Persistent Cross-Site ScriptingPublished
2020-05-01FlatPress version 1.1 - Cross Site Request ForgeryPublished
2020-05-01Netis E1+ 1.2.32533 Backdoor Account rootPublished
2020-05-01Edimax EW-7438RPn Information Disclosure WiFi PasswordPublished
2020-05-01School ERP Pro 1.0 SQL InjectionPublished
2020-04-30Gigamon GigaVUE 5.5.01.11 Directory Traversal / File UploadPublished
2020-04-30Apache Shiro 1.2.4 Remote Code ExecutionPublished
2020-04-30Druva inSync Windows Client 6.5.2 Privilege EscalationPublished
2020-04-30NVIDIA Update Service Daemon 1.0.21 Unquoted Service PathPublished
2020-04-30School ERP Pro 1.0 Remote Code ExecutionPublished
2020-04-28JQuery html Cross Site ScriptingPublished
2020-04-28PhpCollab 2.7.2 - Arbitrary File UploadPublished
2020-04-28Govt. Majid Memorial City College - SQL InjectionPublished
2020-04-28PlaySMS Unauthenticated Remote Code Execution Shell UploadPublished
2020-04-28Project Open CMS 5.0.3 Cross Site Scripting / SQL InjectionPublished
2020-04-28Easy Transfer 1.7 Cross Site Scripting / Directory TraversalPublished
2020-04-28Internet Download Manager 6.37.11.1 Buffer OverflowPublished




Copyright © 2020 Exploitalert v1 BETA.
About us & Partners This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy