input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: philboard 0.5 - 'W1L3D4_foruma_yeni_konu_ac.asp?forumid' SQL Injection
|
This is a webapps exploit for asp platform. Description: philboard 0.5 - 'W1L3D4_foruma_yeni_konu_ac.asp?forumid' SQL Injection. Author: U238
|
Analyze the security implications of: philboard 0.5 - 'W1L3D4_foruma_yeni_konu_ac.asp?forumid' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: FUDForum 3.1.0 - 'author' Reflected XSS
|
This is a webapps exploit for php platform. Description: FUDForum 3.1.0 - 'author' Reflected XSS. Author: Piyush Patil
|
Analyze the security implications of: FUDForum 3.1.0 - 'author' Reflected XSS
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DCForum 1-6 DCBoard Script - 'Page' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: DCForum 1-6 DCBoard Script - 'Page' Cross-Site Scripting. Author: r0t3d3Vil
|
Analyze the security implications of: DCForum 1-6 DCBoard Script - 'Page' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AzDGDatingLite 2.1.1 - 'index.php?language' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: AzDGDatingLite 2.1.1 - 'index.php?language' Cross-Site Scripting. Author: Janek Vind
|
Analyze the security implications of: AzDGDatingLite 2.1.1 - 'index.php?language' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Easywall 0.3.1 - Authenticated Remote Command Execution
|
This is a webapps exploit for multiple platform. Description: Easywall 0.3.1 - Authenticated Remote Command Execution. Author: Melvin Mejia
|
Analyze the security implications of: Easywall 0.3.1 - Authenticated Remote Command Execution
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CPAINT 1.3/2.0.2 - 'TYPE.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: CPAINT 1.3/2.0.2 - 'TYPE.php' Cross-Site Scripting. Author: GulfTech Security
|
Analyze the security implications of: CPAINT 1.3/2.0.2 - 'TYPE.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Avaya IP Office Manager TFTP Server 8.1 - Directory Traversal
|
This is a remote exploit for hardware platform. Description: Avaya IP Office Manager TFTP Server 8.1 - Directory Traversal. Author: SecPod Research
|
Analyze the security implications of: Avaya IP Office Manager TFTP Server 8.1 - Directory Traversal
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Contus Job Portal - 'Category' SQL Injection
|
This is a webapps exploit for java platform. Description: Contus Job Portal - 'Category' SQL Injection. Author: Lazmania61
|
Analyze the security implications of: Contus Job Portal - 'Category' SQL Injection
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: JiRos Link Manager 1.0 - 'viewlinks.asp?categoryId' SQL Injection
|
This is a webapps exploit for asp platform. Description: JiRos Link Manager 1.0 - 'viewlinks.asp?categoryId' SQL Injection. Author: laurent gaffie
|
Analyze the security implications of: JiRos Link Manager 1.0 - 'viewlinks.asp?categoryId' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: IBM DB2 - Universal Database for Linux 6.1/Windows NT 6.1 Known Default Password
|
This is a remote exploit for multiple platform. Description: IBM DB2 - Universal Database for Linux 6.1/Windows NT 6.1 Known Default Password. Author: benjurry
|
Analyze the security implications of: IBM DB2 - Universal Database for Linux 6.1/Windows NT 6.1 Known Default Password
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Host Directory PRO 2.1.0 - Remote Database Backup
|
This is a webapps exploit for php platform. Description: Host Directory PRO 2.1.0 - Remote Database Backup. Author: ZoRLu
|
Analyze the security implications of: Host Directory PRO 2.1.0 - Remote Database Backup
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: B2C Booking Centre Systems - SQL Injection
|
This is a webapps exploit for php platform. Description: B2C Booking Centre Systems - SQL Injection. Author: Salvatore Fresta
|
Analyze the security implications of: B2C Booking Centre Systems - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Easysitenetwork Jokes Complete Website - 'id' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Easysitenetwork Jokes Complete Website - 'id' Cross-Site Scripting. Author: indoushka
|
Analyze the security implications of: Easysitenetwork Jokes Complete Website - 'id' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Bugzilla 4.2 - Tabular Reports Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: Bugzilla 4.2 - Tabular Reports Cross-Site Scripting. Author: Mateusz Goik
|
Analyze the security implications of: Bugzilla 4.2 - Tabular Reports Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Akiva WebBoard 8.x - SQL Injection
|
This is a webapps exploit for php platform. Description: Akiva WebBoard 8.x - SQL Injection. Author: Alexander Fuchs
|
Analyze the security implications of: Akiva WebBoard 8.x - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FreeBSD Kernel (FreeBSD 10.2 x64) - 'sendmsg' Kernel Heap Overflow (PoC)
|
This is a dos exploit for freebsd_x86-64 platform. Description: FreeBSD Kernel (FreeBSD 10.2 x64) - 'sendmsg' Kernel Heap Overflow (PoC). Author: CTurt
|
Analyze the security implications of: FreeBSD Kernel (FreeBSD 10.2 x64) - 'sendmsg' Kernel Heap Overflow (PoC)
|
This exploit targets freebsd_x86-64 systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets freebsd_x86-64 platform
|
What is this exploit about: Joomla! Component JomWALL 4.0 - 'wuid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component JomWALL 4.0 - 'wuid' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component JomWALL 4.0 - 'wuid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AvailScript Photo Album - 'pics.php' Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: AvailScript Photo Album - 'pics.php' Multiple Vulnerabilities. Author: sl4xUz
|
Analyze the security implications of: AvailScript Photo Album - 'pics.php' Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Gallery MX 2.0.0 - Blind SQL Injection
|
This is a webapps exploit for asp platform. Description: Gallery MX 2.0.0 - Blind SQL Injection. Author: R3d-D3V!L
|
Analyze the security implications of: Gallery MX 2.0.0 - Blind SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: WebKit - 'WebCore::FormSubmission::create' Use-After-Free
|
This is a dos exploit for multiple platform. Description: WebKit - 'WebCore::FormSubmission::create' Use-After-Free. Author: Google Security Research
|
Analyze the security implications of: WebKit - 'WebCore::FormSubmission::create' Use-After-Free
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: HLDS WebMod 0.48 - Multiple Remote Vulnerabilities
|
This is a remote exploit for multiple platform. Description: HLDS WebMod 0.48 - Multiple Remote Vulnerabilities. Author: Luigi Auriemma
|
Analyze the security implications of: HLDS WebMod 0.48 - Multiple Remote Vulnerabilities
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Habari 0.6.5 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Habari 0.6.5 - Multiple Cross-Site Scripting Vulnerabilities. Author: High-Tech Bridge SA
|
Analyze the security implications of: Habari 0.6.5 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CompactCMS 1.4.0 - 'tiny_mce' Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: CompactCMS 1.4.0 - 'tiny_mce' Arbitrary File Upload. Author: ITSecTeam
|
Analyze the security implications of: CompactCMS 1.4.0 - 'tiny_mce' Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BbZL.php - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: BbZL.php - Remote File Inclusion. Author: Number 7
|
Analyze the security implications of: BbZL.php - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CMS MAXSITE 1.10 - 'category' SQL Injection
|
This is a webapps exploit for php platform. Description: CMS MAXSITE 1.10 - 'category' SQL Injection. Author: Tesz
|
Analyze the security implications of: CMS MAXSITE 1.10 - 'category' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DreamBox DM800 1.5rc1 - File Disclosure
|
This is a remote exploit for hardware platform. Description: DreamBox DM800 1.5rc1 - File Disclosure. Author: Todor Donev
|
Analyze the security implications of: DreamBox DM800 1.5rc1 - File Disclosure
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: allinta CMS 2.3.2 - 'search.asp?searchQuery' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: allinta CMS 2.3.2 - 'search.asp?searchQuery' Cross-Site Scripting. Author: r0t3d3Vil
|
Analyze the security implications of: allinta CMS 2.3.2 - 'search.asp?searchQuery' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: FlySpray 0.9.7 - 'install-0.9.7.php' Remote Command Execution
|
This is a webapps exploit for php platform. Description: FlySpray 0.9.7 - 'install-0.9.7.php' Remote Command Execution. Author: rgod
|
Analyze the security implications of: FlySpray 0.9.7 - 'install-0.9.7.php' Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: JBoss Seam 2 - Arbitrary File Upload / Execution (Metasploit)
|
This is a remote exploit for jsp platform. Description: JBoss Seam 2 - Arbitrary File Upload / Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: JBoss Seam 2 - Arbitrary File Upload / Execution (Metasploit)
|
This exploit targets jsp systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: bubbling library 1.32 - 'uri' Remote File Disclosure
|
This is a webapps exploit for php platform. Description: bubbling library 1.32 - 'uri' Remote File Disclosure. Author: Stack
|
Analyze the security implications of: bubbling library 1.32 - 'uri' Remote File Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AIOCP 1.3.x - 'cp_contact_us.php' SQL Injection
|
This is a webapps exploit for php platform. Description: AIOCP 1.3.x - 'cp_contact_us.php' SQL Injection. Author: laurent gaffie
|
Analyze the security implications of: AIOCP 1.3.x - 'cp_contact_us.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_aclsfgpl - 'index.php' Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Joomla! Component com_aclsfgpl - 'index.php' Arbitrary File Upload. Author: TUNISIAN CYBER
|
Analyze the security implications of: Joomla! Component com_aclsfgpl - 'index.php' Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: macOS 18.7.0 Kernel - Local Privilege Escalation
|
This is a local exploit for macos platform. Description: macOS 18.7.0 Kernel - Local Privilege Escalation. Author: A2nkF
|
Analyze the security implications of: macOS 18.7.0 Kernel - Local Privilege Escalation
|
This exploit targets macos systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets macos platform
|
What is this exploit about: ISPConfig - (Authenticated) Arbitrary PHP Code Execution (Metasploit)
|
This is a remote exploit for php platform. Description: ISPConfig - (Authenticated) Arbitrary PHP Code Execution (Metasploit). Author: Metasploit
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.