input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Benja CMS 0.1 - '/admin/admin_new_submenu.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Benja CMS 0.1 - '/admin/admin_new_submenu.php' Cross-Site Scripting. Author: CWH Underground |
Analyze the security implications of: Benja CMS 0.1 - '/admin/admin_new_submenu.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ALSCO CMS - SQL Injection | This is a webapps exploit for php platform. Description: ALSCO CMS - SQL Injection. Author: PrinceofHacking |
Analyze the security implications of: ALSCO CMS - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 5.3.12/5.4.2 - CGI Argument Injection (Metasploit) | This is a remote exploit for php platform. Description: PHP 5.3.12/5.4.2 - CGI Argument Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: PHP 5.3.12/5.4.2 - CGI Argument Injection (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple iOS Safari - Bad 'VML' Remote Denial of Service | This is a dos exploit for ios platform. Description: Apple iOS Safari - Bad 'VML' Remote Denial of Service. Author: Nishant Das Patnaik |
Analyze the security implications of: Apple iOS Safari - Bad 'VML' Remote Denial of Service | This exploit targets ios systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: ACME micro_httpd - Denial of Service | This is a dos exploit for linux platform. Description: ACME micro_httpd - Denial of Service. Author: Yuval tisf Nativ |
Analyze the security implications of: ACME micro_httpd - Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_videogallery - Local File Inclusion / SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_videogallery - Local File Inclusion / SQL Injection. Author: KedAns-Dz |
Analyze the security implications of: Joomla! Component com_videogallery - Local File Inclusion / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jettweb Php Hazır İlan Sitesi Scripti V2 - SQL Injection | This is a webapps exploit for php platform. Description: Jettweb Php Hazır İlan Sitesi Scripti V2 - SQL Injection. Author: Ahmet Ümit BAYRAM |
Analyze the security implications of: Jettweb Php Hazır İlan Sitesi Scripti V2 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Invision Board 1.1.1 - 'ipchat.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Invision Board 1.1.1 - 'ipchat.php' Remote File Inclusion. Author: frog |
Analyze the security implications of: Invision Board 1.1.1 - 'ipchat.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mozilla Firefox 1.0.7 - Integer Overflow Denial of Service | This is a dos exploit for multiple platform. Description: Mozilla Firefox 1.0.7 - Integer Overflow Denial of Service. Author: Georgi Guninski |
Analyze the security implications of: Mozilla Firefox 1.0.7 - Integer Overflow Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Linksys WRT54GL - 'apply.cgi' Command Execution (Metasploit) | This is a remote exploit for hardware platform. Description: Linksys WRT54GL - 'apply.cgi' Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Linksys WRT54GL - 'apply.cgi' Command Execution (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Evince - CBT File Command Injection (Metasploit) | This is a local exploit for linux platform. Description: Evince - CBT File Command Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Evince - CBT File Command Injection (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Hackish 1.1 - 'Blocco.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Hackish 1.1 - 'Blocco.php' Cross-Site Scripting. Author: Matrix86 |
Analyze the security implications of: Hackish 1.1 - 'Blocco.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 8E6 Technologies R3000 - Host Header Internet Filter Security Bypass | This is a remote exploit for multiple platform. Description: 8E6 Technologies R3000 - Host Header Internet Filter Security Bypass. Author: nnposter |
Analyze the security implications of: 8E6 Technologies R3000 - Host Header Internet Filter Security Bypass | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Firefox < 66.0.1 - 'Array.prototype.slice' Buffer Overflow | This is a dos exploit for multiple platform. Description: Firefox < 66.0.1 - 'Array.prototype.slice' Buffer Overflow. Author: xuechiyaobai |
Analyze the security implications of: Firefox < 66.0.1 - 'Array.prototype.slice' Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ChurchCRM 4.4.5 - SQLi | This is a webapps exploit for php platform. Description: ChurchCRM 4.4.5 - SQLi. Author: nu11secur1ty |
Analyze the security implications of: ChurchCRM 4.4.5 - SQLi | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Activedition - '/activedition/aelogin.asp' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for asp platform. Description: Activedition - '/activedition/aelogin.asp' Multiple Cross-Site Scripting Vulnerabilities. Author: Richard Brain |
Analyze the security implications of: Activedition - '/activedition/aelogin.asp' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Kipper 2.01 - Cross-Site Scripting / Local File Inclusion / File Disclosure | This is a webapps exploit for php platform. Description: Kipper 2.01 - Cross-Site Scripting / Local File Inclusion / File Disclosure. Author: RoMaNcYxHaCkEr |
Analyze the security implications of: Kipper 2.01 - Cross-Site Scripting / Local File Inclusion / File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Compface 1.1.5 - '.xbm' Local Buffer Overflow | This is a local exploit for linux platform. Description: Compface 1.1.5 - '.xbm' Local Buffer Overflow. Author: His0k4 |
Analyze the security implications of: Compface 1.1.5 - '.xbm' Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: 1st Class Mail Server 4.0 1 - members.tagz Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: 1st Class Mail Server 4.0 1 - members.tagz Cross-Site Scripting. Author: dr_insane |
Analyze the security implications of: 1st Class Mail Server 4.0 1 - members.tagz Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Bitrix Site Manager 6/7 - Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: Bitrix Site Manager 6/7 - Multiple Input Validation Vulnerabilities. Author: aGGreSSor |
Analyze the security implications of: Bitrix Site Manager 6/7 - Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Kayako SupportSuite 3.x - '/visitor/index.php?sessionid' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Kayako SupportSuite 3.x - '/visitor/index.php?sessionid' Cross-Site Scripting. Author: GulfTech Security |
Analyze the security implications of: Kayako SupportSuite 3.x - '/visitor/index.php?sessionid' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: craftercms 4.x.x - CORS | This is a webapps exploit for multiple platform. Description: craftercms 4.x.x - CORS. Author: nu11secur1ty |
Analyze the security implications of: craftercms 4.x.x - CORS | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: EZ Publish 4.x 'ezjscore' Module - Cross-Site Scripting | This is a webapps exploit for php platform. Description: EZ Publish 4.x 'ezjscore' Module - Cross-Site Scripting. Author: Yann MICHARD |
Analyze the security implications of: EZ Publish 4.x 'ezjscore' Module - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Indexu 5.0/5.3 - 'Sendmail.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Indexu 5.0/5.3 - 'Sendmail.php' Multiple Cross-Site Scripting Vulnerabilities. Author: SwEET-DeViL |
Analyze the security implications of: Indexu 5.0/5.3 - 'Sendmail.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Magic Photo Storage Website - '/include/db_config.php?_config[site_path]' Remote File Inclusion | This is a webapps exploit for php platform. Description: Magic Photo Storage Website - '/include/db_config.php?_config[site_path]' Remote File Inclusion. Author: IbnuSina |
Analyze the security implications of: Magic Photo Storage Website - '/include/db_config.php?_config[site_path]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dell EMC RecoverPoint < 5.1.2 - Remote Root Command Execution | This is a remote exploit for linux platform. Description: Dell EMC RecoverPoint < 5.1.2 - Remote Root Command Execution. Author: Paul Taylor |
Analyze the security implications of: Dell EMC RecoverPoint < 5.1.2 - Remote Root Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: BtiTracker 1.4.7 / xbtit 2.0.542 - SQL Injection | This is a webapps exploit for php platform. Description: BtiTracker 1.4.7 / xbtit 2.0.542 - SQL Injection. Author: InATeam |
Analyze the security implications of: BtiTracker 1.4.7 / xbtit 2.0.542 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RedHat Linux 7.0 Apache - Remote Username Enumeration | This is a remote exploit for linux platform. Description: RedHat Linux 7.0 Apache - Remote Username Enumeration. Author: Gabriel A Maggiotti |
Analyze the security implications of: RedHat Linux 7.0 Apache - Remote Username Enumeration | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Google Chrome Browser 111.0.5563.64 - AXPlatformNodeCocoa Fatal OOM/Crash (macOS) | This is a local exploit for macos platform. Description: Google Chrome Browser 111.0.5563.64 - AXPlatformNodeCocoa Fatal OOM/Crash (macOS). Author: LiquidWorm |
Analyze the security implications of: Google Chrome Browser 111.0.5563.64 - AXPlatformNodeCocoa Fatal OOM/Crash (macOS) | This exploit targets macos systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Adobe Version Cue 1.0/1.0.1 (OSX) - Local Privilege Escalation | This is a local exploit for osx platform. Description: Adobe Version Cue 1.0/1.0.1 (OSX) - Local Privilege Escalation. Author: vade79 |
Analyze the security implications of: Adobe Version Cue 1.0/1.0.1 (OSX) - Local Privilege Escalation | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Tincat Network Library - Remote Buffer Overflow | This is a remote exploit for multiple platform. Description: Tincat Network Library - Remote Buffer Overflow. Author: Luigi Auriemma |
Analyze the security implications of: Tincat Network Library - Remote Buffer Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Eleanor CMS - Cross-Site Scripting / Multiple SQL Injections | This is a webapps exploit for php platform. Description: Eleanor CMS - Cross-Site Scripting / Multiple SQL Injections. Author: High-Tech Bridge SA |
Analyze the security implications of: Eleanor CMS - Cross-Site Scripting / Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Automic Agent 24.3.0 HF4 - Privilege Escalation | This is a remote exploit for multiple platform. Description: Automic Agent 24.3.0 HF4 - Privilege Escalation. Author: Flora Schäfer |
Analyze the security implications of: Automic Agent 24.3.0 HF4 - Privilege Escalation | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mozilla 1.x / opera 6/7 - Timed document.write Method Cross Domain Policy | This is a remote exploit for multiple platform. Description: Mozilla 1.x / opera 6/7 - Timed document.write Method Cross Domain Policy. Author: meme-boi |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.