input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: digiSHOP 2.0.2 - SQL Injection
|
This is a webapps exploit for php platform. Description: digiSHOP 2.0.2 - SQL Injection. Author: Silic0n
|
Analyze the security implications of: digiSHOP 2.0.2 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Feindura CMS Groupware - Multiple Local File Inclusion / Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Feindura CMS Groupware - Multiple Local File Inclusion / Cross-Site Scripting Vulnerabilities. Author: Justanotherhacker.com
|
Analyze the security implications of: Feindura CMS Groupware - Multiple Local File Inclusion / Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BS Business Directory - 'articlesdetails.php' SQL Injection
|
This is a webapps exploit for php platform. Description: BS Business Directory - 'articlesdetails.php' SQL Injection. Author: Easy Laster
|
Analyze the security implications of: BS Business Directory - 'articlesdetails.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DM FileManager 3.9.11 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: DM FileManager 3.9.11 - Arbitrary File Upload. Author: eidelweiss
|
Analyze the security implications of: DM FileManager 3.9.11 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CGI Script Center Account Manager 1.0 LITE / PRO - Administrative Password Alteration (2)
|
This is a remote exploit for cgi platform. Description: CGI Script Center Account Manager 1.0 LITE / PRO - Administrative Password Alteration (2). Author: n30
|
Analyze the security implications of: CGI Script Center Account Manager 1.0 LITE / PRO - Administrative Password Alteration (2)
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: EVA-Web 2.1.2 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: EVA-Web 2.1.2 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities. Author: r0t
|
Analyze the security implications of: EVA-Web 2.1.2 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Oracle HTML DB 1.5/1.6 - 'wwv_flow.accept?p_t02' Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: Oracle HTML DB 1.5/1.6 - 'wwv_flow.accept?p_t02' Cross-Site Scripting. Author: Red-Database-Security
|
Analyze the security implications of: Oracle HTML DB 1.5/1.6 - 'wwv_flow.accept?p_t02' Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: G. Wilford man 2.3.10 - Symlink
|
This is a local exploit for linux platform. Description: G. Wilford man 2.3.10 - Symlink. Author: Thomas Fischbacher
|
Analyze the security implications of: G. Wilford man 2.3.10 - Symlink
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: FTLS Guestbook 1.1 - Script Injection
|
This is a webapps exploit for php platform. Description: FTLS Guestbook 1.1 - Script Injection. Author: BrainRawt
|
Analyze the security implications of: FTLS Guestbook 1.1 - Script Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Qualcomm Eudora 5.2.1/6.x - Embedded Hyperlink Buffer Overrun
|
This is a dos exploit for linux platform. Description: Qualcomm Eudora 5.2.1/6.x - Embedded Hyperlink Buffer Overrun. Author: Paul Szabo
|
Analyze the security implications of: Qualcomm Eudora 5.2.1/6.x - Embedded Hyperlink Buffer Overrun
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Fuzzylime CMS 3.01 - 'admindir' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Fuzzylime CMS 3.01 - 'admindir' Remote File Inclusion. Author: irk4z
|
Analyze the security implications of: Fuzzylime CMS 3.01 - 'admindir' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Campsite 3.x - 'article_id' SQL Injection
|
This is a webapps exploit for php platform. Description: Campsite 3.x - 'article_id' SQL Injection. Author: Stefan Esser
|
Analyze the security implications of: Campsite 3.x - 'article_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Irola My-Time 3.5 - SQL Injection
|
This is a webapps exploit for php platform. Description: Irola My-Time 3.5 - SQL Injection. Author: Aria-Security Team
|
Analyze the security implications of: Irola My-Time 3.5 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: UCM6202 1.0.18.13 - Remote Command Injection
|
This is a webapps exploit for hardware platform. Description: UCM6202 1.0.18.13 - Remote Command Injection. Author: Jacob Baines
|
Analyze the security implications of: UCM6202 1.0.18.13 - Remote Command Injection
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component Restaurante - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Joomla! Component Restaurante - Arbitrary File Upload. Author: Cold Zero
|
Analyze the security implications of: Joomla! Component Restaurante - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple Mac OSX Kernel - Use-After-Free Due to Bad Locking in IOAcceleratorFamily2
|
This is a dos exploit for osx platform. Description: Apple Mac OSX Kernel - Use-After-Free Due to Bad Locking in IOAcceleratorFamily2. Author: Google Security Research
|
Analyze the security implications of: Apple Mac OSX Kernel - Use-After-Free Due to Bad Locking in IOAcceleratorFamily2
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: RSA Authentication Manager 8.2.1.4.0-build1394922 / < 8.3 P1 - XML External Entity Injection / Cross-Site Flashing / DOM Cross-Site Scripting
|
This is a webapps exploit for java platform. Description: RSA Authentication Manager 8.2.1.4.0-build1394922 / < 8.3 P1 - XML External Entity Injection / Cross-Site Flashing / DOM Cross-Site Scripting. Author: SEC Consult
|
Analyze the security implications of: RSA Authentication Manager 8.2.1.4.0-build1394922 / < 8.3 P1 - XML External Entity Injection / Cross-Site Flashing / DOM Cross-Site Scripting
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: OpenCMS 6.0/6.2 - Multiple Unauthorized Access Vulnerabilities
|
This is a webapps exploit for jsp platform. Description: OpenCMS 6.0/6.2 - Multiple Unauthorized Access Vulnerabilities. Author: Meder Kydyraliev
|
Analyze the security implications of: OpenCMS 6.0/6.2 - Multiple Unauthorized Access Vulnerabilities
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: EPublisherPro 0.9.7 - 'Moreinfo.asp' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: EPublisherPro 0.9.7 - 'Moreinfo.asp' Cross-Site Scripting. Author: Dj_Eyes
|
Analyze the security implications of: EPublisherPro 0.9.7 - 'Moreinfo.asp' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: MVDSV 0.165 b/0.171 Quake Server - Download Buffer Overrun
|
This is a remote exploit for multiple platform. Description: MVDSV 0.165 b/0.171 Quake Server - Download Buffer Overrun. Author: Oscar Linderholm
|
Analyze the security implications of: MVDSV 0.165 b/0.171 Quake Server - Download Buffer Overrun
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Gallery 1.4.4 - Remote Server-Side Script Execution
|
This is a webapps exploit for php platform. Description: Gallery 1.4.4 - Remote Server-Side Script Execution. Author: aCiDBiTS
|
Analyze the security implications of: Gallery 1.4.4 - Remote Server-Side Script Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DataLife Engine 8.3 - '/engine/inc/help.php?config[langs]' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: DataLife Engine 8.3 - '/engine/inc/help.php?config[langs]' Remote File Inclusion. Author: indoushka
|
Analyze the security implications of: DataLife Engine 8.3 - '/engine/inc/help.php?config[langs]' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Pulse Secure 8.1R15.1/8.2/8.3/9.0 SSL VPN - Arbitrary File Disclosure (Metasploit)
|
This is a webapps exploit for multiple platform. Description: Pulse Secure 8.1R15.1/8.2/8.3/9.0 SSL VPN - Arbitrary File Disclosure (Metasploit). Author: Alyssa Herrera
|
Analyze the security implications of: Pulse Secure 8.1R15.1/8.2/8.3/9.0 SSL VPN - Arbitrary File Disclosure (Metasploit)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Courier Management System 1.0 - 'ref_no' SQL Injection
|
This is a webapps exploit for php platform. Description: Courier Management System 1.0 - 'ref_no' SQL Injection. Author: Zhaiyi
|
Analyze the security implications of: Courier Management System 1.0 - 'ref_no' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component mod_artuploader - 'upload.php' Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Joomla! Component mod_artuploader - 'upload.php' Arbitrary File Upload. Author: Sammy FORGIT
|
Analyze the security implications of: Joomla! Component mod_artuploader - 'upload.php' Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Geeklog 1.3.7 - 'users.php?uid' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Geeklog 1.3.7 - 'users.php?uid' Cross-Site Scripting. Author: snooq
|
Analyze the security implications of: Geeklog 1.3.7 - 'users.php?uid' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Memcached 1.5.5 - 'Memcrashed' Insufficient Control Network Message Volume Denial of Service (2)
|
This is a dos exploit for linux platform. Description: Memcached 1.5.5 - 'Memcrashed' Insufficient Control Network Message Volume Denial of Service (2). Author: Alex Conrey
|
Analyze the security implications of: Memcached 1.5.5 - 'Memcrashed' Insufficient Control Network Message Volume Denial of Service (2)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: E107 Website System 0.7.2 Chatbox Plugin - HTML Injection
|
This is a webapps exploit for php platform. Description: E107 Website System 0.7.2 Chatbox Plugin - HTML Injection. Author: marc & shb
|
Analyze the security implications of: E107 Website System 0.7.2 Chatbox Plugin - HTML Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Chyrp 2.x - 'action' Traversal Local File Inclusion
|
This is a webapps exploit for php platform. Description: Chyrp 2.x - 'action' Traversal Local File Inclusion. Author: Wireghoul
|
Analyze the security implications of: Chyrp 2.x - 'action' Traversal Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Magento 1.2 - '/app/code/core/Mage/Admin/Model/Session.php?login['Username']' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Magento 1.2 - '/app/code/core/Mage/Admin/Model/Session.php?login['Username']' Cross-Site Scripting. Author: Loukas Kalenderidis
|
Analyze the security implications of: Magento 1.2 - '/app/code/core/Mage/Admin/Model/Session.php?login['Username']' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ASP Portal - Multiple Vulnerabilities
|
This is a webapps exploit for asp platform. Description: ASP Portal - Multiple Vulnerabilities. Author: Manuel Lopez
|
Analyze the security implications of: ASP Portal - Multiple Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Linux Kernel 3.1.8 - KVM Local Denial of Service
|
This is a dos exploit for linux platform. Description: Linux Kernel 3.1.8 - KVM Local Denial of Service. Author: Stephan Sattler
|
Analyze the security implications of: Linux Kernel 3.1.8 - KVM Local Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component com_gcalendar 1.1.2 - 'gcid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_gcalendar 1.1.2 - 'gcid' SQL Injection. Author: Yogyacarderlink Crew
|
Analyze the security implications of: Joomla! Component com_gcalendar 1.1.2 - 'gcid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Jamit Job Board 2.4.1 - 'index.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Jamit Job Board 2.4.1 - 'index.php' SQL Injection. Author: r0t3d3Vil
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.