input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: EZWebAlbum - Remote File Disclosure
|
This is a webapps exploit for php platform. Description: EZWebAlbum - Remote File Disclosure. Author: Ghost Hacker
|
Analyze the security implications of: EZWebAlbum - Remote File Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WWWThread 5.0.8 Pro - 'showflat.pl' Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: WWWThread 5.0.8 Pro - 'showflat.pl' Cross-Site Scripting. Author: Aliaksandr Hartsuyeu
|
Analyze the security implications of: WWWThread 5.0.8 Pro - 'showflat.pl' Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: ndCMS - SQL Injection
|
This is a webapps exploit for asp platform. Description: ndCMS - SQL Injection. Author: Abysssec
|
Analyze the security implications of: ndCMS - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: webconnect 6.4.4 < 6.5 - Directory Traversal / Denial of Service
|
This is a dos exploit for multiple platform. Description: webconnect 6.4.4 < 6.5 - Directory Traversal / Denial of Service. Author: karak0rsan
|
Analyze the security implications of: webconnect 6.4.4 < 6.5 - Directory Traversal / Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ImpressPages CMS 3.8 - Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: ImpressPages CMS 3.8 - Persistent Cross-Site Scripting. Author: sajith
|
Analyze the security implications of: ImpressPages CMS 3.8 - Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Flock Browser 3.0.0 - Malformed Bookmark HTML Injection
|
This is a remote exploit for multiple platform. Description: Flock Browser 3.0.0 - Malformed Bookmark HTML Injection. Author: Lostmon
|
Analyze the security implications of: Flock Browser 3.0.0 - Malformed Bookmark HTML Injection
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Thomson SpeedTouch 716 - 'URL' Cross-Site Scripting
|
This is a remote exploit for hardware platform. Description: Thomson SpeedTouch 716 - 'URL' Cross-Site Scripting. Author: Remco Verhoef
|
Analyze the security implications of: Thomson SpeedTouch 716 - 'URL' Cross-Site Scripting
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component Com_Agora 3.0.0 RC1 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Joomla! Component Com_Agora 3.0.0 RC1 - Arbitrary File Upload. Author: ByALBAYX
|
Analyze the security implications of: Joomla! Component Com_Agora 3.0.0 RC1 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Bematech Printer MP-4200 - Denial of Service
|
This is a dos exploit for hardware platform. Description: Bematech Printer MP-4200 - Denial of Service. Author: Jonatas Fil
|
Analyze the security implications of: Bematech Printer MP-4200 - Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: HTMLEditBox 2.2 - 'config.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: HTMLEditBox 2.2 - 'config.php' Remote File Inclusion. Author: alijsb
|
Analyze the security implications of: HTMLEditBox 2.2 - 'config.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: EZContents 2.0.3 - 'toprated.php?GLOBALS[language_home]' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: EZContents 2.0.3 - 'toprated.php?GLOBALS[language_home]' Remote File Inclusion. Author: DarkFig
|
Analyze the security implications of: EZContents 2.0.3 - 'toprated.php?GLOBALS[language_home]' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Entrepreneur Matrimonial Script - Authentication Bypass
|
This is a webapps exploit for php platform. Description: Entrepreneur Matrimonial Script - Authentication Bypass. Author: Ihsan Sencan
|
Analyze the security implications of: Entrepreneur Matrimonial Script - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GetSolutions GetIntranet 2.2 - Multiple Remote Input Validation Vulnerabilities
|
This is a webapps exploit for asp platform. Description: GetSolutions GetIntranet 2.2 - Multiple Remote Input Validation Vulnerabilities. Author: Criolabs
|
Analyze the security implications of: GetSolutions GetIntranet 2.2 - Multiple Remote Input Validation Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Drupal < 7.58 / < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution
|
This is a webapps exploit for php platform. Description: Drupal < 7.58 / < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution. Author: Hans Topo & g0tmi1k
|
Analyze the security implications of: Drupal < 7.58 / < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Sepcity Lawyer Portal - SQL Injection
|
This is a webapps exploit for asp platform. Description: Sepcity Lawyer Portal - SQL Injection. Author: Osmanizim
|
Analyze the security implications of: Sepcity Lawyer Portal - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Blizzard Entertainment StarCraft Brood War 1.15.1 - Minimap Preview Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: Blizzard Entertainment StarCraft Brood War 1.15.1 - Minimap Preview Remote Denial of Service. Author: Gynvael Coldwind
|
Analyze the security implications of: Blizzard Entertainment StarCraft Brood War 1.15.1 - Minimap Preview Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: PineApp Mail-SeCure - 'ldapsyncnow.php' Arbitrary Command Execution (Metasploit)
|
This is a remote exploit for php platform. Description: PineApp Mail-SeCure - 'ldapsyncnow.php' Arbitrary Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: PineApp Mail-SeCure - 'ldapsyncnow.php' Arbitrary Command Execution (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dokeos 1.8.4 - '/main/admin/session_list.php?cmessage' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Dokeos 1.8.4 - '/main/admin/session_list.php?cmessage' Cross-Site Scripting. Author: Alexandr Polyakov
|
Analyze the security implications of: Dokeos 1.8.4 - '/main/admin/session_list.php?cmessage' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Clever Copy 2.0 - 'results.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Clever Copy 2.0 - 'results.php' Cross-Site Scripting. Author: Lostmon
|
Analyze the security implications of: Clever Copy 2.0 - 'results.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BMC Remedy Knowledge Management 7.5.00 - Default Account / Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for jsp platform. Description: BMC Remedy Knowledge Management 7.5.00 - Default Account / Multiple Cross-Site Scripting Vulnerabilities. Author: Richard Brain
|
Analyze the security implications of: BMC Remedy Knowledge Management 7.5.00 - Default Account / Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: SquidGuard 1.x - NULL URL Character Unauthorized Access
|
This is a remote exploit for linux platform. Description: SquidGuard 1.x - NULL URL Character Unauthorized Access. Author: Petko Popadiyski
|
Analyze the security implications of: SquidGuard 1.x - NULL URL Character Unauthorized Access
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Just Dial Marketplace 1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: Just Dial Marketplace 1.0 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Just Dial Marketplace 1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: sash 3.7 - Local Buffer Overflow
|
This is a local exploit for linux platform. Description: sash 3.7 - Local Buffer Overflow. Author: lammat
|
Analyze the security implications of: sash 3.7 - Local Buffer Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: IBM Tivoli Access Manager for E-Business - '/ibm/wpm/rule?method' Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: IBM Tivoli Access Manager for E-Business - '/ibm/wpm/rule?method' Cross-Site Scripting. Author: IBM
|
Analyze the security implications of: IBM Tivoli Access Manager for E-Business - '/ibm/wpm/rule?method' Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: F5 BIG-IP SSL Virtual Server - 'Ticketbleed' Memory Disclosure
|
This is a remote exploit for hardware platform. Description: F5 BIG-IP SSL Virtual Server - 'Ticketbleed' Memory Disclosure. Author: Ege Balci
|
Analyze the security implications of: F5 BIG-IP SSL Virtual Server - 'Ticketbleed' Memory Disclosure
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: XAMPP Linux 1.6 - 'iart.php?text' Cross-Site Scripting
|
This is a remote exploit for linux platform. Description: XAMPP Linux 1.6 - 'iart.php?text' Cross-Site Scripting. Author: Khashayar Fereidani
|
Analyze the security implications of: XAMPP Linux 1.6 - 'iart.php?text' Cross-Site Scripting
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Texas Rankem - 'tournament_id' SQL Injection
|
This is a webapps exploit for asp platform. Description: Texas Rankem - 'tournament_id' SQL Injection. Author: Aria-Security Team
|
Analyze the security implications of: Texas Rankem - 'tournament_id' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: JV2 Folder Gallery 3.1.1 - 'popup_slideshow.php' Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: JV2 Folder Gallery 3.1.1 - 'popup_slideshow.php' Multiple Vulnerabilities. Author: eidelweiss
|
Analyze the security implications of: JV2 Folder Gallery 3.1.1 - 'popup_slideshow.php' Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LxCenter Kloxo 6.1.10 - Multiple HTML Injection Vulnerabilities
|
This is a webapps exploit for java platform. Description: LxCenter Kloxo 6.1.10 - Multiple HTML Injection Vulnerabilities. Author: anonymous
|
Analyze the security implications of: LxCenter Kloxo 6.1.10 - Multiple HTML Injection Vulnerabilities
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Miele Professional PG 8528 - Directory Traversal
|
This is a remote exploit for hardware platform. Description: Miele Professional PG 8528 - Directory Traversal. Author: Jens Regel
|
Analyze the security implications of: Miele Professional PG 8528 - Directory Traversal
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Ruby 1.9 - Safe Level Multiple Function Restriction Bypass
|
This is a remote exploit for multiple platform. Description: Ruby 1.9 - Safe Level Multiple Function Restriction Bypass. Author: Keita Yamaguchi
|
Analyze the security implications of: Ruby 1.9 - Safe Level Multiple Function Restriction Bypass
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CatDV 9.2 - RMI Authentication Bypass
|
This is a remote exploit for java platform. Description: CatDV 9.2 - RMI Authentication Bypass. Author: Christopher Ellis
|
Analyze the security implications of: CatDV 9.2 - RMI Authentication Bypass
|
This exploit targets java systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Jaws 0.5.2 - '/include/JawsDB.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Jaws 0.5.2 - '/include/JawsDB.php' Remote File Inclusion. Author: Drago84
|
Analyze the security implications of: Jaws 0.5.2 - '/include/JawsDB.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Asset Manager - Arbitrary File Upload
|
This is a webapps exploit for asp platform. Description: Asset Manager - Arbitrary File Upload. Author: Ra3cH
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.