<?xml version='1.0' encoding='UTF-8'?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en"><id>Sploitus</id><title>Sploitus.com Exploits RSS Feed</title><updated>2026-04-06T10:00:02.394300+00:00</updated><author><name>Sploitus.com</name></author><link href="https://sploitus.com" rel="alternate"/><link href="https://sploitus.com/atom" rel="self"/><link href="https://sploitus.com/rss" rel="self"/><generator>Sploitus feed generator</generator><icon>https://sploitus.com/static/images/favicon.ico</icon><logo>https://sploitus.com/static/images/sploitus.png</logo><subtitle>The latest exploits</subtitle><entry><id>0017E92C-99FA-5022-B148-FB6B7DB57523</id><title>Exploit for SQL Injection in Dolibarr exploit</title><updated>2026-04-06T10:00:02.409866+00:00</updated><link href="https://sploitus.com/exploit?id=0017E92C-99FA-5022-B148-FB6B7DB57523&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-03T10:02:42+00:00</published></entry><entry><id>32B15F38-C228-5BA9-BC6C-3CC29F08D5A7</id><title>Exploit for Code Injection in Apache Ranger exploit</title><updated>2026-04-06T10:00:02.409560+00:00</updated><link href="https://sploitus.com/exploit?id=32B15F38-C228-5BA9-BC6C-3CC29F08D5A7&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-03T11:33:41+00:00</published></entry><entry><id>8E7B8DC5-6BEE-5C5C-AF25-4ABCFA375006</id><title>Exploit for Server-Side Request Forgery in Apache Cxf exploit</title><updated>2026-04-06T10:00:02.409224+00:00</updated><link href="https://sploitus.com/exploit?id=8E7B8DC5-6BEE-5C5C-AF25-4ABCFA375006&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-03T14:10:53+00:00</published></entry><entry><id>81CB5F6F-3C3E-5B81-A3F1-3878300CAE13</id><title>Exploit for Missing Authentication for Critical Function in Nginxui Nginx_Ui exploit</title><updated>2026-04-06T10:00:02.408857+00:00</updated><link href="https://sploitus.com/exploit?id=81CB5F6F-3C3E-5B81-A3F1-3878300CAE13&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-03T15:12:04+00:00</published></entry><entry><id>EFBEE2D7-3F69-52DA-ADD2-9D04ED102E95</id><title>Exploit for CVE-2022-30075 exploit</title><updated>2026-04-06T10:00:02.408544+00:00</updated><link href="https://sploitus.com/exploit?id=EFBEE2D7-3F69-52DA-ADD2-9D04ED102E95&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-03T16:48:19+00:00</published></entry><entry><id>54E57984-67BB-5681-9D6E-61E6EB54CEBC</id><title>Exploit for OS Command Injection in Php exploit</title><updated>2026-04-06T10:00:02.408250+00:00</updated><link href="https://sploitus.com/exploit?id=54E57984-67BB-5681-9D6E-61E6EB54CEBC&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-03T17:15:16+00:00</published></entry><entry><id>9EC357D2-B3E8-55F0-9924-62F31D180105</id><title>northbridge-honeypot exploit</title><updated>2026-04-06T10:00:02.407747+00:00</updated><link href="https://sploitus.com/exploit?id=9EC357D2-B3E8-55F0-9924-62F31D180105&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-03T21:54:36+00:00</published></entry><entry><id>CBFD105B-401D-5E28-BE4B-7CEA5C8FCD7A</id><title>redhound-arsenal exploit</title><updated>2026-04-06T10:00:02.407418+00:00</updated><link href="https://sploitus.com/exploit?id=CBFD105B-401D-5E28-BE4B-7CEA5C8FCD7A&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-03T22:50:28+00:00</published></entry><entry><id>FA5008C0-9788-5878-80A4-8AC429DFB043</id><title>Exploit for Deserialization of Untrusted Data in Linuxfoundation Opentelemetry_Instrumentation_For_Java exploit</title><updated>2026-04-06T10:00:02.407078+00:00</updated><link href="https://sploitus.com/exploit?id=FA5008C0-9788-5878-80A4-8AC429DFB043&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-04T11:14:42+00:00</published></entry><entry><id>AAC8C502-E455-5C6C-904F-FD057A49F833</id><title>Exploit for CVE-2026-35570 exploit</title><updated>2026-04-06T10:00:02.406313+00:00</updated><link href="https://sploitus.com/exploit?id=AAC8C502-E455-5C6C-904F-FD057A49F833&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-04T11:15:05+00:00</published></entry><entry><id>F051ED78-D8F8-5405-8F3B-4267EBD7EF5B</id><title>Exploit for Improper Access Control in Apple Ipados exploit</title><updated>2026-04-06T10:00:02.405942+00:00</updated><link href="https://sploitus.com/exploit?id=F051ED78-D8F8-5405-8F3B-4267EBD7EF5B&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-04T16:35:54+00:00</published></entry><entry><id>A11C2E45-C20B-54F8-ACD9-E9C8E9911853</id><title>Exploit for Incorrect Authorization in Canonical Ubuntu_Linux exploit</title><updated>2026-04-06T10:00:02.405666+00:00</updated><link href="https://sploitus.com/exploit?id=A11C2E45-C20B-54F8-ACD9-E9C8E9911853&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-04T19:00:05+00:00</published></entry><entry><id>B1EFAF42-971D-51E8-8CFF-84E124F0E21B</id><title>Exploit for Download of Code Without Integrity Check in Trueconf exploit</title><updated>2026-04-06T10:00:02.405208+00:00</updated><link href="https://sploitus.com/exploit?id=B1EFAF42-971D-51E8-8CFF-84E124F0E21B&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-04T22:39:53+00:00</published></entry><entry><id>5503E402-016F-51EB-9253-38633A81E887</id><title>Exploit for Download of Code Without Integrity Check in Trueconf exploit</title><updated>2026-04-06T10:00:02.404874+00:00</updated><link href="https://sploitus.com/exploit?id=5503E402-016F-51EB-9253-38633A81E887&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-04T22:50:54+00:00</published></entry><entry><id>777F12FB-1BE9-5947-837A-ED429B22F860</id><title>Exploit for Deserialization of Untrusted Data in Facebook React exploit</title><updated>2026-04-06T10:00:02.404081+00:00</updated><link href="https://sploitus.com/exploit?id=777F12FB-1BE9-5947-837A-ED429B22F860&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-04T23:24:29+00:00</published></entry><entry><id>73B7D300-93D1-5809-B9EC-8E581A05C970</id><title>Exploit for CVE-2024-23700 exploit</title><updated>2026-04-06T10:00:02.403698+00:00</updated><link href="https://sploitus.com/exploit?id=73B7D300-93D1-5809-B9EC-8E581A05C970&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-05T07:09:41+00:00</published></entry><entry><id>D1100CFF-3DB0-577C-9AFF-A4DA7D5B1EFA</id><title>wp-hijack exploit</title><updated>2026-04-06T10:00:02.402656+00:00</updated><link href="https://sploitus.com/exploit?id=D1100CFF-3DB0-577C-9AFF-A4DA7D5B1EFA&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-05T07:54:57+00:00</published></entry><entry><id>B6963432-AF84-5250-9964-EA1A567ADCC8</id><title>whitehathackerai exploit</title><updated>2026-04-06T10:00:02.402321+00:00</updated><link href="https://sploitus.com/exploit?id=B6963432-AF84-5250-9964-EA1A567ADCC8&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-05T07:57:27+00:00</published></entry><entry><id>A5EC38C8-004D-5850-BB66-A95E70DB3524</id><title>JWT-PHANTOM exploit</title><updated>2026-04-06T10:00:02.401996+00:00</updated><link href="https://sploitus.com/exploit?id=A5EC38C8-004D-5850-BB66-A95E70DB3524&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-05T08:11:45+00:00</published></entry><entry><id>64FB5156-1098-5F12-81BE-F9A067F6ED51</id><title>GuvenliWebYazilimiGelistirme-CipherNone- exploit</title><updated>2026-04-06T10:00:02.401271+00:00</updated><link href="https://sploitus.com/exploit?id=64FB5156-1098-5F12-81BE-F9A067F6ED51&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-05T13:18:48+00:00</published></entry><entry><id>43758981-1543-55AD-AF4B-E1D0B68CAC77</id><title>Exploit for CVE-2025-1738 exploit</title><updated>2026-04-06T10:00:02.401000+00:00</updated><link href="https://sploitus.com/exploit?id=43758981-1543-55AD-AF4B-E1D0B68CAC77&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-05T17:35:58+00:00</published></entry><entry><id>0C96A29F-98F9-59CC-AC91-C35E0E2FF2E1</id><title>Exploit for CVE-2025-1739 exploit</title><updated>2026-04-06T10:00:02.400713+00:00</updated><link href="https://sploitus.com/exploit?id=0C96A29F-98F9-59CC-AC91-C35E0E2FF2E1&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-05T17:47:09+00:00</published></entry><entry><id>D12EDDF2-D00F-5578-95B2-E84E3172A177</id><title>Exploit for External Control of File Name or Path in Zimaspace Zimaos exploit</title><updated>2026-04-06T10:00:02.400424+00:00</updated><link href="https://sploitus.com/exploit?id=D12EDDF2-D00F-5578-95B2-E84E3172A177&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-05T18:01:16+00:00</published></entry><entry><id>7AE7B121-B287-5FC3-882E-E33709C2E5BA</id><title>Exploit for CVE-2026-23398 exploit</title><updated>2026-04-06T10:00:02.400134+00:00</updated><link href="https://sploitus.com/exploit?id=7AE7B121-B287-5FC3-882E-E33709C2E5BA&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-05T20:48:59+00:00</published></entry><entry><id>760AA541-F884-533C-AC70-03F329FB8556</id><title>Exploit for Cross-site Scripting in Exclusiveaddons Exclusive_Addons_For_Elementor exploit</title><updated>2026-04-06T10:00:02.399864+00:00</updated><link href="https://sploitus.com/exploit?id=760AA541-F884-533C-AC70-03F329FB8556&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-05T22:08:12+00:00</published></entry><entry><id>E9DED387-6829-5927-BF6B-DD0AC872451D</id><title>exploit_skillz exploit</title><updated>2026-04-06T10:00:02.399597+00:00</updated><link href="https://sploitus.com/exploit?id=E9DED387-6829-5927-BF6B-DD0AC872451D&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-05T22:48:09+00:00</published></entry><entry><id>4048E156-ED99-5267-BBF0-320E2C866948</id><title>SmartContract-VulnHunter exploit</title><updated>2026-04-06T10:00:02.399239+00:00</updated><link href="https://sploitus.com/exploit?id=4048E156-ED99-5267-BBF0-320E2C866948&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-06T01:02:44+00:00</published></entry><entry><id>70B99AE5-E0FF-5D65-A8DD-E5F65C4576DB</id><title>Exploit for Out-of-bounds Write in Tp-Link Omada_Sg2005P-Pd_Firmware exploit</title><updated>2026-04-06T10:00:02.398968+00:00</updated><link href="https://sploitus.com/exploit?id=70B99AE5-E0FF-5D65-A8DD-E5F65C4576DB&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-06T05:36:54+00:00</published></entry><entry><id>FCDE742E-50DF-55B4-A295-44F9BB44129B</id><title>github-repo-scanner exploit</title><updated>2026-04-06T10:00:02.398613+00:00</updated><link href="https://sploitus.com/exploit?id=FCDE742E-50DF-55B4-A295-44F9BB44129B&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-06T06:01:33+00:00</published></entry><entry><id>26BA2C0B-BECA-50C7-8F83-D65F03AE133E</id><title>Exploit for Use After Free in Redis exploit</title><updated>2026-04-06T10:00:02.394447+00:00</updated><link href="https://sploitus.com/exploit?id=26BA2C0B-BECA-50C7-8F83-D65F03AE133E&amp;utm_source=rss&amp;utm_medium=rss" rel="alternate"/><published>2026-04-06T08:03:33+00:00</published></entry></feed>