Exploits found on the INTERNET

This is live excerpt from our database. Available also using API

Edit Date Name Status
2022-06-05Product Show Room Site 1.0 Cross Site ScriptingPublished
2022-06-04Zyxel USG FLEX 5.21 Command InjectionPublished
2022-06-04NVIDIA Data Center GPU Manager Remote Memory CorruptionPublished
2022-06-04Telesquare SDT-CW3B1 1.1.0 Command InjectionPublished
2022-06-01Microsoft Office MSDT Follina Proof Of ConceptPublished
2022-06-01Fast Food Ordering System 1.0 SQL InjectionPublished
2022-06-01Avantune Genialcloud ProJ 10 - Reflected XSS Cross-Site ScriptingPublished
2022-05-31Ingredient Stock Management System v1.0 - Account Takeover UnauthenticatedPublished
2022-05-31Ingredient Stock Management System v1.0 - 'id' Blind SQL InjectionPublished
2022-05-31TikTok Social Media Platform Open Redirection VulnerabilityPublished
2022-05-31WordPress User Meta Lite / Pro 2.4.3 Path TraversalPublished
2022-05-31Schneider Electric C-Bus Automation Controller 5500SHAC 1.10 Remote RootPublished
2022-05-31MyBB Admin Control Remote Code ExecutionPublished
2022-05-31Fast Food Ordering System 1.0 Cross Site ScriptingPublished
2022-05-29Tigase XMPP Server Stanza SmugglingPublished
2022-05-29QdPM 9.1 Remote Code Execution RCE Authenticated v2Published
2022-05-29WordPress Plugin stafflist 3.1.2 SQLi AuthenticatedPublished
2022-05-29Wondershare Dr.Fone 12.0.7 Privilege Escalation ElevationServicePublished
2022-05-29Khodrochi.ir CMS - Iranian Car Services Platform - XSSPublished
2022-05-25Online Fire Reporting System 1.0 SQL InjectionPublished
2022-05-25Print Spooler Remote DLL InjectionPublished
2022-05-24M1k1os Blog v.10 Remote Code Execution RCE AuthenticatedPublished
2022-05-24Magento eCommerce CE v2.3.5-p2 Blind SQLiPublished
2022-05-22ITop < 2.7.6 - Authenticated Remote command executionPublished
2022-05-22PHPIPAM 1.4.4 Cross Site Request Forgery / Cross Site ScriptingPublished
2022-05-22SAP Application Server ABAP / ABAP Platform Code Injection / SQL Injection / Missing AuthorizationPublished

Copyright © 2022 Exploitalert v1 BETA.
About us & Partners This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy