sploitus.com Open in urlscan Pro
2606:4700:3037::6815:1e3a  Public Scan

Submitted URL: http://sploitus.com/
Effective URL: https://sploitus.com/
Submission: On February 29 via manual from US — Scanned from DE

Form analysis 2 forms found in the DOM

<form class="theme-toggle">
  <div class="form-group">
    <label class="form-switch is-error tooltip" data-tooltip="turn on the dark mode">
      <input type="checkbox" checked="" id="theme-toggle"> Dark Mode <i class="form-icon"></i>
    </label>
  </div>
</form>

<form id="search-form">
  <fieldset id="formfield">
    <div class="input-group">
      <input name="query" id="query" spellcheck="false" autocomplete="off" class="form-input" type="text" required="">
      <button class="btn btn-primary input-group-btn">Search</button>
    </div>
    <label class="form-switch tooltip" data-tooltip="Search JUST the exploit title">
      <input type="checkbox" id="is-title">
      <i class="form-icon"></i>
      <span class="tooltip-content">Title only</span>
    </label>
  </fieldset>
</form>

Text Content

Dark Mode

SPLOITUS


Search
Title only
 * Exploits
 * Tools

Sort by default date score


EXPLOITS OF THE WEEK

Exploit for CVE-2024-25600Exploit for OS Command Injection in Apache
SparkExploit for Vulnerability in MetabaseExploit for CVE-2024-22532QNAP QTS /
QuTS Hero Unauthenticated Remote Code Execution ExploitSitePad 1.8.2 Cross Site
ScriptingFreeIPA 4.10.1 Denial Of Service / Information DisclosureCMS Made
Simple 2.2.19 Server-Side Template InjectionExploit for Vulnerability in
MicrosoftDotclear 2.29 Cross Site Scripting


Share
Copy

All product names, logos, and brands are property of their respective owners.
All company, product and service names used in this website are for
identification purposes only. Use of these names, logos, and brands does not
imply endorsement.
Twitter RSS/Atom
powered by