Exploits found on the INTERNET

This is live excerpt from our database. Available also using API

Date Name Status
2020-12-14OpenAsset Digital Asset Management Insecure Direct Object ReferencePublished
2020-12-14Jackwebster - session cookie without secure flagPublished
2020-12-14Macally WIFISD2-2A82 2.000.010 Privilege EscalationPublished
2020-12-14System Explorer 7.0.0 Unquoted Service PathPublished
2020-12-14Rukovoditel 2.6.1 Cross Site Request ForgeryPublished
2020-12-12Sharptech Digital Marketing Agency Authentication BypassPublished
2020-12-12Wordpress Plugin Canto 1.3.0 Blind SSRF UnauthenticatedPublished
2020-12-12Advanced Component System ACS 1.0 Path TraversalPublished
2020-12-12Onilne Bus Booking System Project 1.0 Cross Site ScriptingPublished
2020-12-12WordPress DirectoriesPro 1.3.45 Cross Site ScriptingPublished
2020-12-12Ember Enterprises E2in Improper AuthenticationPublished
2020-12-11Cdrpsb cms Arbitrary File DownloadPublished
2020-12-11Bbse_board_pro plugin XSSPublished
2020-12-11Medical Center Portal Management System 1.0 Multiple Stored XSSPublished
2020-12-11RarmaRadio 2.72.5 Denial of Service PoCPublished
2020-12-11Supply Chain Management System Auth Bypass SQL InjectionPublished
2020-12-10Anuko Time Tracker 1.19.23.5311 Password Reset leading to Account TakeoverPublished
2020-12-10FlexDotnetCMS 1.5.8 Arbitrary ASP File UploadPublished
2020-12-10IdeKode Local File Inclusion ExploiterPublished
2020-12-10Hue Ghost CMS Theme for Podcasting 3.x.x rate limitPublished
2020-12-10PARSTECH - YAZILIM & OTOMASYON SSTEMLER Bypass Admin Panel with NoredirectPublished
2020-12-10PARSTECH - Yazlm & Otomasyon Sistemleri Upload Shell Vuln.Published
2020-12-10Kentwood - session cookie without secure flag - XSSPublished
2020-12-10Barcodes Generator 1.0 Cross Site ScriptingPublished
2020-12-10OpenCart 3.0.3.6 Cross Site Request ForgeryPublished
2020-12-10WordPress Popup Builder 3.69.6 Cross Site ScriptingPublished
2020-12-10Library Management System 2.0 SQL InjectionPublished
2020-12-10PDF Complete 3.5.310.2002 Unquoted Service PathPublished
2020-12-10GitLab File Read Remote Code ExecutionPublished
2020-12-10Savsoft Quiz 5 - 'Skype ID' Stored XSSPublished
2020-12-09WebDamn User Registration & Login System with User Panel SQLi Auth BypassPublished
2020-12-09Tibco ObfuscationEngine 5.11 Fixed Key Password DecryptionPublished
2020-12-09Employee Performance Evaluation System 1.0 Insecure Direct Object ReferencePublished
2020-12-09Composr CMS 10.0.34 banners Persistent Cross Site ScriptingPublished
2020-12-09Task Management System 1.0 Cross Site ScriptingPublished




Copyright © 2024 Exploitalert v1 BETA.
About us & Partners This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum