Exploits found on the INTERNET

This is live excerpt from our database. Available also using API

Edit Date Name Status
2020-05-17Netlink XPON 1GE WiFi V2801RGW Remote Command ExecutionPublished
2020-05-17E-Commerce System 1.0 Unauthenticated Remote Code ExecutionPublished
2020-05-17Cellebrite UFED 7.5.0.845 Desktop Escape / Privilege EscalationPublished
2020-05-17School ERP Ultimate 2018 - 'fid' SQL InjectionPublished
2020-05-17Cloud Secure v1.0.7 Denial of Service ExploitPublished
2020-05-14Sellacious eCommerce Shop Cross Site ScriptingPublished
2020-05-14YesWiki cercopitheque 2020.04.18.1 id SQL InjectionPublished
2020-05-13TylerTech Eagle 2018.3.11 Remote Code ExecutionPublished
2020-05-13Netsweeper WebAdmin unixlogin.php Python Code InjectionPublished
2020-05-13SaltStack Salt Master/Minion Unauthenticated Remote Code ExecutionPublished
2020-05-13MikroTik RouterOS Denial Of Service / Memory CorruptionPublished
2020-05-13Phase Botnet Blind SQL InjectionPublished
2020-05-13Cisco Digital Network Architecture Center 1.3.1.4 Cross Site ScriptingPublished
2020-05-12Joomla Component prayercenter 'id' SQL Injection VulnerabilityPublished
2020-05-12ManageEngine DataSecurity Plus Path Traversal / Code ExecutionPublished
2020-05-12Complaint Management System 1.0 SQL InjectionPublished
2020-05-12Reliable Services Improper Access ControlPublished
2020-05-12Sysax Multi Server - BoFPublished
2020-05-11Native Sparrow Improper Access ControlPublished
2020-05-11MediaCosmo CMS Improper Access ControlPublished
2020-05-11CpCommerce 1.2.8 'id_document' Blind SQL InjectionPublished
2020-05-11ManageEngine DataSecurity Plus Authentication BypassPublished
2020-05-11Tiny MySQL Cross Site ScriptingPublished
2020-05-11ThinkTrek Solutions Improper Access ControlPublished
2020-05-11Saudi Indian Football Forum Siffjeddah Authentication Bypass Shell UploadPublished
2020-05-11Pi-hole 4.4 Remote Code Execution / Privilege EscalationPublished
2020-05-11Linux 5.6 IORING_OP_MADVISE Race ConditionPublished
2020-05-11Any Flv Player v2.5.1 Denial of Service ExploitPublished




Copyright © 2023 Exploitalert v1 BETA.
About us & Partners This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy