sploitus.com
Open in
urlscan Pro
2606:4700:3037::6815:1e3a
Public Scan
Submitted URL: http://sploitus.com/
Effective URL: https://sploitus.com/
Submission: On December 21 via manual from DE — Scanned from DE
Effective URL: https://sploitus.com/
Submission: On December 21 via manual from DE — Scanned from DE
Form analysis
2 forms found in the DOM<form class="theme-toggle">
<div class="form-group">
<label class="form-switch is-error tooltip" data-tooltip="turn on the dark mode">
<input type="checkbox" checked="" id="theme-toggle"> Dark Mode <i class="form-icon"></i>
</label>
</div>
</form>
<form id="search-form">
<fieldset id="formfield">
<div class="input-group">
<input name="query" id="query" spellcheck="false" autocomplete="off" class="form-input" type="text" required="">
<button class="btn btn-primary input-group-btn">Search</button>
</div>
<label class="form-switch tooltip" data-tooltip="Search JUST the exploit title">
<input type="checkbox" id="is-title">
<i class="form-icon"></i>
<span class="tooltip-content">Title only</span>
</label>
</fieldset>
</form>
Text Content
Dark Mode SPLOITUS Search Title only * Exploits * Tools Sort by default date score EXPLOITS OF THE WEEK Exploit for Vulnerability in Atlassian CompanionExploit for Code Injection in Apache OfbizExploit for Vulnerability in Atlassian CompanionExploit for Files or Directories Accessible to External Parties in Apache StrutsosCommerce 4.13-60075 Shell UploadExploit for CVE-2022-4047Exploit for Insecure Storage of Sensitive Information in Ibm I Access Client SolutionsSlider Revolution < 6.6.19 - Author+ Insecure Deserialization leading to RCEExploit for Path Traversal in Igniterealtime OpenfireRTPEngine mr11.5.1.6 Denial Of Service Share Copy All product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement. Twitter RSS/Atom powered by