sploitus.com Open in urlscan Pro
2606:4700:3037::6815:1e3a  Public Scan

Submitted URL: http://sploitus.com/
Effective URL: https://sploitus.com/
Submission: On December 21 via manual from DE — Scanned from DE

Form analysis 2 forms found in the DOM

<form class="theme-toggle">
  <div class="form-group">
    <label class="form-switch is-error tooltip" data-tooltip="turn on the dark mode">
      <input type="checkbox" checked="" id="theme-toggle"> Dark Mode <i class="form-icon"></i>
    </label>
  </div>
</form>

<form id="search-form">
  <fieldset id="formfield">
    <div class="input-group">
      <input name="query" id="query" spellcheck="false" autocomplete="off" class="form-input" type="text" required="">
      <button class="btn btn-primary input-group-btn">Search</button>
    </div>
    <label class="form-switch tooltip" data-tooltip="Search JUST the exploit title">
      <input type="checkbox" id="is-title">
      <i class="form-icon"></i>
      <span class="tooltip-content">Title only</span>
    </label>
  </fieldset>
</form>

Text Content

Dark Mode

SPLOITUS


Search
Title only
 * Exploits
 * Tools

Sort by default date score


EXPLOITS OF THE WEEK

Exploit for Vulnerability in Atlassian CompanionExploit for Code Injection in
Apache OfbizExploit for Vulnerability in Atlassian CompanionExploit for Files or
Directories Accessible to External Parties in Apache StrutsosCommerce 4.13-60075
Shell UploadExploit for CVE-2022-4047Exploit for Insecure Storage of Sensitive
Information in Ibm I Access Client SolutionsSlider Revolution < 6.6.19 - Author+
Insecure Deserialization leading to RCEExploit for Path Traversal in
Igniterealtime OpenfireRTPEngine mr11.5.1.6 Denial Of Service


Share
Copy

All product names, logos, and brands are property of their respective owners.
All company, product and service names used in this website are for
identification purposes only. Use of these names, logos, and brands does not
imply endorsement.
Twitter RSS/Atom
powered by