sploitus.com
Open in
urlscan Pro
172.67.172.46
Public Scan
URL:
https://sploitus.com/
Submission: On January 05 via manual from PL — Scanned from PL
Submission: On January 05 via manual from PL — Scanned from PL
Form analysis
2 forms found in the DOM<form class="theme-toggle">
<div class="form-group">
<label class="form-switch is-error tooltip" data-tooltip="turn on the dark mode">
<input type="checkbox" checked="" id="theme-toggle"> Dark Mode <i class="form-icon"></i>
</label>
</div>
</form>
<form id="search-form">
<fieldset id="formfield">
<div class="input-group">
<input name="query" id="query" spellcheck="false" autocomplete="off" class="form-input" type="text" required="">
<button class="btn btn-primary input-group-btn">Search</button>
</div>
<label class="form-switch tooltip" data-tooltip="Search JUST the exploit title">
<input type="checkbox" id="is-title">
<i class="form-icon"></i>
<span class="tooltip-content">Title only</span>
</label>
</fieldset>
</form>
Text Content
Dark Mode SPLOITUS Search Title only * Exploits * Tools Sort by default date score EXPLOITS OF THE WEEK Exploit for PHP External Variable Modification in Juniper JunosExploit for Server-Side Request Forgery in Apache OfbizExploit for Out-of-bounds Write in HutoolExploit for Authentication Bypass Using an Alternate Path or Channel in Jetbrains TeamcityExploit for Expression Language Injection in Atlassian Confluence Data CenterExploit for Server-Side Request Forgery in Rbaskets Request BasketsExploit for Out-of-bounds Write in HutoolExploit for Files or Directories Accessible to External Parties in Apache StrutsExploit for Exposed IOCTL with Insufficient Access Control in Dell Dbutil 2 3.SysApache OFBiz 18.12.09 Remote Code Execution Share Copy All product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement. Twitter RSS/Atom powered by