input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Benja CMS 0.1 - '/admin/admin_new_submenu.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Benja CMS 0.1 - '/admin/admin_new_submenu.php' Cross-Site Scripting. Author: CWH Underground
|
Analyze the security implications of: Benja CMS 0.1 - '/admin/admin_new_submenu.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ALSCO CMS - SQL Injection
|
This is a webapps exploit for php platform. Description: ALSCO CMS - SQL Injection. Author: PrinceofHacking
|
Analyze the security implications of: ALSCO CMS - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PHP 5.3.12/5.4.2 - CGI Argument Injection (Metasploit)
|
This is a remote exploit for php platform. Description: PHP 5.3.12/5.4.2 - CGI Argument Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: PHP 5.3.12/5.4.2 - CGI Argument Injection (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple iOS Safari - Bad 'VML' Remote Denial of Service
|
This is a dos exploit for ios platform. Description: Apple iOS Safari - Bad 'VML' Remote Denial of Service. Author: Nishant Das Patnaik
|
Analyze the security implications of: Apple iOS Safari - Bad 'VML' Remote Denial of Service
|
This exploit targets ios systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: ACME micro_httpd - Denial of Service
|
This is a dos exploit for linux platform. Description: ACME micro_httpd - Denial of Service. Author: Yuval tisf Nativ
|
Analyze the security implications of: ACME micro_httpd - Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component com_videogallery - Local File Inclusion / SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_videogallery - Local File Inclusion / SQL Injection. Author: KedAns-Dz
|
Analyze the security implications of: Joomla! Component com_videogallery - Local File Inclusion / SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Jettweb Php Hazır İlan Sitesi Scripti V2 - SQL Injection
|
This is a webapps exploit for php platform. Description: Jettweb Php Hazır İlan Sitesi Scripti V2 - SQL Injection. Author: Ahmet Ümit BAYRAM
|
Analyze the security implications of: Jettweb Php Hazır İlan Sitesi Scripti V2 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Invision Board 1.1.1 - 'ipchat.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Invision Board 1.1.1 - 'ipchat.php' Remote File Inclusion. Author: frog
|
Analyze the security implications of: Invision Board 1.1.1 - 'ipchat.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mozilla Firefox 1.0.7 - Integer Overflow Denial of Service
|
This is a dos exploit for multiple platform. Description: Mozilla Firefox 1.0.7 - Integer Overflow Denial of Service. Author: Georgi Guninski
|
Analyze the security implications of: Mozilla Firefox 1.0.7 - Integer Overflow Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Linksys WRT54GL - 'apply.cgi' Command Execution (Metasploit)
|
This is a remote exploit for hardware platform. Description: Linksys WRT54GL - 'apply.cgi' Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Linksys WRT54GL - 'apply.cgi' Command Execution (Metasploit)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Evince - CBT File Command Injection (Metasploit)
|
This is a local exploit for linux platform. Description: Evince - CBT File Command Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: Evince - CBT File Command Injection (Metasploit)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Hackish 1.1 - 'Blocco.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Hackish 1.1 - 'Blocco.php' Cross-Site Scripting. Author: Matrix86
|
Analyze the security implications of: Hackish 1.1 - 'Blocco.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 8E6 Technologies R3000 - Host Header Internet Filter Security Bypass
|
This is a remote exploit for multiple platform. Description: 8E6 Technologies R3000 - Host Header Internet Filter Security Bypass. Author: nnposter
|
Analyze the security implications of: 8E6 Technologies R3000 - Host Header Internet Filter Security Bypass
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Firefox < 66.0.1 - 'Array.prototype.slice' Buffer Overflow
|
This is a dos exploit for multiple platform. Description: Firefox < 66.0.1 - 'Array.prototype.slice' Buffer Overflow. Author: xuechiyaobai
|
Analyze the security implications of: Firefox < 66.0.1 - 'Array.prototype.slice' Buffer Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ChurchCRM 4.4.5 - SQLi
|
This is a webapps exploit for php platform. Description: ChurchCRM 4.4.5 - SQLi. Author: nu11secur1ty
|
Analyze the security implications of: ChurchCRM 4.4.5 - SQLi
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Activedition - '/activedition/aelogin.asp' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for asp platform. Description: Activedition - '/activedition/aelogin.asp' Multiple Cross-Site Scripting Vulnerabilities. Author: Richard Brain
|
Analyze the security implications of: Activedition - '/activedition/aelogin.asp' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Kipper 2.01 - Cross-Site Scripting / Local File Inclusion / File Disclosure
|
This is a webapps exploit for php platform. Description: Kipper 2.01 - Cross-Site Scripting / Local File Inclusion / File Disclosure. Author: RoMaNcYxHaCkEr
|
Analyze the security implications of: Kipper 2.01 - Cross-Site Scripting / Local File Inclusion / File Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Compface 1.1.5 - '.xbm' Local Buffer Overflow
|
This is a local exploit for linux platform. Description: Compface 1.1.5 - '.xbm' Local Buffer Overflow. Author: His0k4
|
Analyze the security implications of: Compface 1.1.5 - '.xbm' Local Buffer Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: 1st Class Mail Server 4.0 1 - members.tagz Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: 1st Class Mail Server 4.0 1 - members.tagz Cross-Site Scripting. Author: dr_insane
|
Analyze the security implications of: 1st Class Mail Server 4.0 1 - members.tagz Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Bitrix Site Manager 6/7 - Multiple Input Validation Vulnerabilities
|
This is a webapps exploit for php platform. Description: Bitrix Site Manager 6/7 - Multiple Input Validation Vulnerabilities. Author: aGGreSSor
|
Analyze the security implications of: Bitrix Site Manager 6/7 - Multiple Input Validation Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Kayako SupportSuite 3.x - '/visitor/index.php?sessionid' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Kayako SupportSuite 3.x - '/visitor/index.php?sessionid' Cross-Site Scripting. Author: GulfTech Security
|
Analyze the security implications of: Kayako SupportSuite 3.x - '/visitor/index.php?sessionid' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: craftercms 4.x.x - CORS
|
This is a webapps exploit for multiple platform. Description: craftercms 4.x.x - CORS. Author: nu11secur1ty
|
Analyze the security implications of: craftercms 4.x.x - CORS
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: EZ Publish 4.x 'ezjscore' Module - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: EZ Publish 4.x 'ezjscore' Module - Cross-Site Scripting. Author: Yann MICHARD
|
Analyze the security implications of: EZ Publish 4.x 'ezjscore' Module - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Indexu 5.0/5.3 - 'Sendmail.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Indexu 5.0/5.3 - 'Sendmail.php' Multiple Cross-Site Scripting Vulnerabilities. Author: SwEET-DeViL
|
Analyze the security implications of: Indexu 5.0/5.3 - 'Sendmail.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Magic Photo Storage Website - '/include/db_config.php?_config[site_path]' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Magic Photo Storage Website - '/include/db_config.php?_config[site_path]' Remote File Inclusion. Author: IbnuSina
|
Analyze the security implications of: Magic Photo Storage Website - '/include/db_config.php?_config[site_path]' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dell EMC RecoverPoint < 5.1.2 - Remote Root Command Execution
|
This is a remote exploit for linux platform. Description: Dell EMC RecoverPoint < 5.1.2 - Remote Root Command Execution. Author: Paul Taylor
|
Analyze the security implications of: Dell EMC RecoverPoint < 5.1.2 - Remote Root Command Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: BtiTracker 1.4.7 / xbtit 2.0.542 - SQL Injection
|
This is a webapps exploit for php platform. Description: BtiTracker 1.4.7 / xbtit 2.0.542 - SQL Injection. Author: InATeam
|
Analyze the security implications of: BtiTracker 1.4.7 / xbtit 2.0.542 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: RedHat Linux 7.0 Apache - Remote Username Enumeration
|
This is a remote exploit for linux platform. Description: RedHat Linux 7.0 Apache - Remote Username Enumeration. Author: Gabriel A Maggiotti
|
Analyze the security implications of: RedHat Linux 7.0 Apache - Remote Username Enumeration
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Google Chrome Browser 111.0.5563.64 - AXPlatformNodeCocoa Fatal OOM/Crash (macOS)
|
This is a local exploit for macos platform. Description: Google Chrome Browser 111.0.5563.64 - AXPlatformNodeCocoa Fatal OOM/Crash (macOS). Author: LiquidWorm
|
Analyze the security implications of: Google Chrome Browser 111.0.5563.64 - AXPlatformNodeCocoa Fatal OOM/Crash (macOS)
|
This exploit targets macos systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets macos platform
|
What is this exploit about: Adobe Version Cue 1.0/1.0.1 (OSX) - Local Privilege Escalation
|
This is a local exploit for osx platform. Description: Adobe Version Cue 1.0/1.0.1 (OSX) - Local Privilege Escalation. Author: vade79
|
Analyze the security implications of: Adobe Version Cue 1.0/1.0.1 (OSX) - Local Privilege Escalation
|
This exploit targets osx systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Tincat Network Library - Remote Buffer Overflow
|
This is a remote exploit for multiple platform. Description: Tincat Network Library - Remote Buffer Overflow. Author: Luigi Auriemma
|
Analyze the security implications of: Tincat Network Library - Remote Buffer Overflow
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Eleanor CMS - Cross-Site Scripting / Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Eleanor CMS - Cross-Site Scripting / Multiple SQL Injections. Author: High-Tech Bridge SA
|
Analyze the security implications of: Eleanor CMS - Cross-Site Scripting / Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Automic Agent 24.3.0 HF4 - Privilege Escalation
|
This is a remote exploit for multiple platform. Description: Automic Agent 24.3.0 HF4 - Privilege Escalation. Author: Flora Schäfer
|
Analyze the security implications of: Automic Agent 24.3.0 HF4 - Privilege Escalation
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Mozilla 1.x / opera 6/7 - Timed document.write Method Cross Domain Policy
|
This is a remote exploit for multiple platform. Description: Mozilla 1.x / opera 6/7 - Timed document.write Method Cross Domain Policy. Author: meme-boi
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.