Exploits found on the INTERNET

This is live excerpt from our database. Available also using API

Edit Date Name Status
2021-03-30IRC-Worm.Win32.Jane.a / Authentication Bypass MITM Port Bounce ScanPublished
2021-03-30Openlitespeed 1.7.9 Notes Stored Cross-Site ScriptingPublished
2021-03-29Budget Management System 1.0 Cross Site ScriptingPublished
2021-03-29Health Center Patient Record Management System 1.0 Cross Site ScriptingPublished
2021-03-29Equipment Inventory System 1.0 Cross Site ScriptingPublished
2021-03-29Project Expense Monitoring System 1.0 SQL InjectionPublished
2021-03-29Novel Boutique House-plus 3.5.1 Arbitrary File DownloadPublished
2021-03-27Obra soft Sql Injection VulnerabilityPublished
2021-03-27Genexis Platinum-4410 P4410-V2-1.31A Cross Site ScriptingPublished
2021-03-27Regis Inventory And Monitoring System 1.0 Cross Site ScriptingPublished
2021-03-27SAP Solution Manager 7.2 Remote Command ExecutionPublished
2021-03-27Backdoor.Win32.Delf.zs / Unauthenticated Remote Command ExecutionPublished
2021-03-26Moodle Atto Editor Cross Site ScriptingPublished
2021-03-26Moodle 3.10.3 Calendar Cross Site ScriptingPublished
2021-03-26Backdoor.Win32.Kwak.12 / Authentication BypassPublished
2021-03-26Backdoor.Win32.Kwak.12 / Remote Denial of ServicePublished
2021-03-26Backdoor.Win32.Kwak.12 / Port Bounce ScanPublished
2021-03-26Backdoor.Win32.Kwak.12 / Remote Command ExecutionPublished
2021-03-26Development Kamel KCFinder 1.7 Shell UploadPublished
2021-03-24ELAN Touchpad Unquoted Service PathPublished
2021-03-24Codiad 2.8.4 Remote Code Execution AuthenticatedPublished
2021-03-24WoWonder Social Network Platform 3.1 event_id SQL InjectionPublished
2021-03-24WORM.WIN32.DETNAT.C / Insecure PermissionsPublished
2021-03-24TROJAN-DROPPER.WIN32.DYCLER.YHB / Insecure PermissionsPublished
2021-03-24VIRUS.WIN32.SALITY.GEN / Insecure PermissionsPublished
2021-03-24Winpakpro 4.8 ScheduleService Unquoted Service PathPublished
2021-03-24WordPress GiveWP 2.9.7 Cross Site ScriptingPublished
2021-03-24Microsoft Exchange ProxyLogon Remote Code ExecutionPublished
2021-03-24Intel RST User Interface / Driver Privilege EscalationPublished
2021-03-24Elodea Event Collector 4.9.3 Unquoted Service PathPublished
2021-03-23Copyrights Samad Elmakchi - Admin Login BypassPublished
2021-03-23Controlled Admin Access WordPress Plugin < = 1.4.0 - Improper Access Control & Privilege EscaPublished
2021-03-23OSAS Traverse Extension 11 travextensionhostsvc Unquoted Service PathPublished

Copyright © 2021 Exploitalert v1 BETA.
About us & Partners This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy