Exploits found on the INTERNET

This is live excerpt from our database. Available also using API

Edit Date Name Status
2022-03-17BuilderTorCTPHPRAT.b Cross Site ScriptingPublished
2022-03-16Apache APISIX 2.12.1 Remote Code Execution RCEPublished
2022-03-16Tiny File Manager 2.4.6 Shell UploadPublished
2022-03-16Tesquito. - Bypass Admin PanelPublished
2022-03-14Automatic Question Paper Generator System 1.0 - Cross-site scripting storedPublished
2022-03-14Montenegro Shipping Lines, Inc. - SQL Injection VulnerabilityPublished
2022-03-14VIVE Runtime Service ViveAgentService Unquoted Service PathPublished
2022-03-13Dirty Pipe Local Privilege EscalationPublished
2022-03-13Employee Performance Evaluation System 1.0 SQL InjectionPublished
2022-03-13College Website Management System 1.0 - SQL InjectionPublished
2022-03-13RedLine.MainPanel - cracked.exe / Insecure PermissionsPublished
2022-03-13Hades RAT - Web Panel / Insecure Credential StoragePublished
2022-03-13Hades RAT - Web Panel / Information DisclosurePublished
2022-03-13Hades RAT - Web Panel / Remote Persistent XSSPublished
2022-03-12Seowon SLR-120 Router - Remote Code Execution UnauthenticatedPublished
2022-03-12FLEX 1085 Web 1.6.0 - HTML InjectionPublished
2022-03-12Siemens S7-1200 Unauthenticated Start/Stop CommandPublished
2022-03-12DEOS AG OPEN 710/810 Cross Site ScriptingPublished
2022-03-12Audio Conversion Wizard 2.01 Buffer OverflowPublished
2022-03-12Cobian Backup 0.9 Unquoted Service PathPublished
2022-03-12Wondershare Dr.Fone 12.0.18 Unquoted Service PathPublished
2022-03-12Vietnext - Sql Injection VulnerabilityPublished
2022-03-12Linux Kernel 5.8 < 5.16.11 Local Privilege Escalation DirtyPipePublished
2022-03-12Foxit PDF Reader 11.0 Unquoted Service PathPublished
2022-03-12Apache APISIX Remote Code ExecutionPublished
2022-03-12Attendance And Payroll System 1.0 Remote Code ExecutionPublished
2022-03-12Spring Cloud Gateway 3.1.0 Remote Code ExecutionPublished
2022-03-12Cloudflare WARP 1.4 Unquoted Service PathPublished
2022-03-12Loki RAT Relapse / SQL InjectionPublished




Copyright © 2022 Exploitalert v1 BETA.
About us & Partners This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy