input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Blogator-script 0.95 - 'incl_page' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Blogator-script 0.95 - 'incl_page' Remote File Inclusion. Author: JIKO
|
Analyze the security implications of: Blogator-script 0.95 - 'incl_page' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Graugon PHP Article Publisher Pro 1.5 - Insecure Cookie Handling
|
This is a webapps exploit for php platform. Description: Graugon PHP Article Publisher Pro 1.5 - Insecure Cookie Handling. Author: ZoRLu
|
Analyze the security implications of: Graugon PHP Article Publisher Pro 1.5 - Insecure Cookie Handling
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Document Management Template - 'hash' SQL Injection
|
This is a webapps exploit for php platform. Description: Document Management Template - 'hash' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Document Management Template - 'hash' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Visale 1.0 - 'pbpgst.cgi?keyval' Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: Visale 1.0 - 'pbpgst.cgi?keyval' Cross-Site Scripting. Author: r0t
|
Analyze the security implications of: Visale 1.0 - 'pbpgst.cgi?keyval' Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Joomla! Component com_joomnik - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_joomnik - SQL Injection. Author: SOLVER
|
Analyze the security implications of: Joomla! Component com_joomnik - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: InstantCoder 1.0 iOS - Multiple Vulnerabilities
|
This is a webapps exploit for ios platform. Description: InstantCoder 1.0 iOS - Multiple Vulnerabilities. Author: Vulnerability-Lab
|
Analyze the security implications of: InstantCoder 1.0 iOS - Multiple Vulnerabilities
|
This exploit targets ios systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: Gnew 2013.1 - Multiple Vulnerabilities (1)
|
This is a webapps exploit for php platform. Description: Gnew 2013.1 - Multiple Vulnerabilities (1). Author: LiquidWorm
|
Analyze the security implications of: Gnew 2013.1 - Multiple Vulnerabilities (1)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IMG2ASCII - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: IMG2ASCII - Cross-Site Scripting. Author: indoushka
|
Analyze the security implications of: IMG2ASCII - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Madness Pro 1.14 - Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Madness Pro 1.14 - Persistent Cross-Site Scripting. Author: bwall
|
Analyze the security implications of: Madness Pro 1.14 - Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Invision Power Board (IP.Board) 2.1 - 'admin.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Invision Power Board (IP.Board) 2.1 - 'admin.php' Multiple Cross-Site Scripting Vulnerabilities. Author: benjilenoob
|
Analyze the security implications of: Invision Power Board (IP.Board) 2.1 - 'admin.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Gallarific 1.1 - '/gallery.php' Arbitrary Delete/Edit Category
|
This is a webapps exploit for php platform. Description: Gallarific 1.1 - '/gallery.php' Arbitrary Delete/Edit Category. Author: ilker Kandemir
|
Analyze the security implications of: Gallarific 1.1 - '/gallery.php' Arbitrary Delete/Edit Category
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IPTBB 0.5.6 - Arbitrary Add Admin
|
This is a webapps exploit for php platform. Description: IPTBB 0.5.6 - Arbitrary Add Admin. Author: CWH Underground
|
Analyze the security implications of: IPTBB 0.5.6 - Arbitrary Add Admin
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Invision Power Board (IP.Board) < 1.3.1 - Design Error
|
This is a webapps exploit for php platform. Description: Invision Power Board (IP.Board) < 1.3.1 - Design Error. Author: GulfTech Security
|
Analyze the security implications of: Invision Power Board (IP.Board) < 1.3.1 - Design Error
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FileRun 2019.05.21 - Reflected Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: FileRun 2019.05.21 - Reflected Cross-Site Scripting. Author: Emre ÖVÜNÇ
|
Analyze the security implications of: FileRun 2019.05.21 - Reflected Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! 3.4.6 - Remote Code Execution (Metasploit)
|
This is a webapps exploit for php platform. Description: Joomla! 3.4.6 - Remote Code Execution (Metasploit). Author: Alessandro Groppo
|
Analyze the security implications of: Joomla! 3.4.6 - Remote Code Execution (Metasploit)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LFCMS 3.7.0 - Cross-Site Request Forgery (Add Admin)
|
This is a webapps exploit for php platform. Description: LFCMS 3.7.0 - Cross-Site Request Forgery (Add Admin). Author: bay0net
|
Analyze the security implications of: LFCMS 3.7.0 - Cross-Site Request Forgery (Add Admin)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AiCart 2.0 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: AiCart 2.0 - Multiple Vulnerabilities. Author: takeshix
|
Analyze the security implications of: AiCart 2.0 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: NeoSys Neon Webmail for Java 5.06/5.07 - 'updatemail' Servlet Arbitrary Mail Message Manipulation
|
This is a webapps exploit for jsp platform. Description: NeoSys Neon Webmail for Java 5.06/5.07 - 'updatemail' Servlet Arbitrary Mail Message Manipulation. Author: Tan Chew Keong
|
Analyze the security implications of: NeoSys Neon Webmail for Java 5.06/5.07 - 'updatemail' Servlet Arbitrary Mail Message Manipulation
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: reSIProcate 1.10.2 - Heap Overflow
|
This is a dos exploit for multiple platform. Description: reSIProcate 1.10.2 - Heap Overflow. Author: Joachim De Zutter
|
Analyze the security implications of: reSIProcate 1.10.2 - Heap Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Kaqoo Auction - 'install_root' Multiple Remote File Inclusions
|
This is a webapps exploit for php platform. Description: Kaqoo Auction - 'install_root' Multiple Remote File Inclusions. Author: ThE dE@Th
|
Analyze the security implications of: Kaqoo Auction - 'install_root' Multiple Remote File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Bigware Shop 2.0 - 'pollid' SQL Injection
|
This is a webapps exploit for php platform. Description: Bigware Shop 2.0 - 'pollid' SQL Injection. Author: D4m14n
|
Analyze the security implications of: Bigware Shop 2.0 - 'pollid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CentOS Web Panel 0.9.8.740 - Cross-Site Request Forgery / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: CentOS Web Panel 0.9.8.740 - Cross-Site Request Forgery / Cross-Site Scripting. Author: InfinitumIT
|
Analyze the security implications of: CentOS Web Panel 0.9.8.740 - Cross-Site Request Forgery / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PortWise SSL VPN 4.6 - 'reloadFrame' Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: PortWise SSL VPN 4.6 - 'reloadFrame' Cross-Site Scripting. Author: George Christopoulos
|
Analyze the security implications of: PortWise SSL VPN 4.6 - 'reloadFrame' Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component JProject Manager 1.0 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component JProject Manager 1.0 - Local File Inclusion. Author: AntiSecurity
|
Analyze the security implications of: Joomla! Component JProject Manager 1.0 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Opera 7.10 - Permanent Denial of Service
|
This is a dos exploit for multiple platform. Description: Opera 7.10 - Permanent Denial of Service. Author: David F. Madrid
|
Analyze the security implications of: Opera 7.10 - Permanent Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Intex Router N-150 - Cross-Site Request Forgery (Add Admin)
|
This is a webapps exploit for hardware platform. Description: Intex Router N-150 - Cross-Site Request Forgery (Add Admin). Author: Samrat Das
|
Analyze the security implications of: Intex Router N-150 - Cross-Site Request Forgery (Add Admin)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: UPS Web/SNMP-Manager CS121 - Authentication Bypass
|
This is a remote exploit for multiple platform. Description: UPS Web/SNMP-Manager CS121 - Authentication Bypass. Author: jkmac
|
Analyze the security implications of: UPS Web/SNMP-Manager CS121 - Authentication Bypass
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: IBM DB2 - 'db2start' Command Line Argument Local Overflow
|
This is a dos exploit for linux platform. Description: IBM DB2 - 'db2start' Command Line Argument Local Overflow. Author: SNOSoft
|
Analyze the security implications of: IBM DB2 - 'db2start' Command Line Argument Local Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: CyberPanel 2.3.6 - Remote Code Execution (RCE)
|
This is a webapps exploit for multiple platform. Description: CyberPanel 2.3.6 - Remote Code Execution (RCE). Author: Luka Petrovic (refr4g)
|
Analyze the security implications of: CyberPanel 2.3.6 - Remote Code Execution (RCE)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Mambo Open Source 4.0.14 Server - SQL Injection
|
This is a webapps exploit for php platform. Description: Mambo Open Source 4.0.14 Server - SQL Injection. Author: Chintan Trivedi
|
Analyze the security implications of: Mambo Open Source 4.0.14 Server - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Symantec Gateway Security 5400 Series 2.0 - Error Page Cross-Site Scripting
|
This is a remote exploit for hardware platform. Description: Symantec Gateway Security 5400 Series 2.0 - Error Page Cross-Site Scripting. Author: Soby
|
Analyze the security implications of: Symantec Gateway Security 5400 Series 2.0 - Error Page Cross-Site Scripting
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Fhimage 1.2.1 - Remote Index Change
|
This is a webapps exploit for php platform. Description: Fhimage 1.2.1 - Remote Index Change. Author: Osirys
|
Analyze the security implications of: Fhimage 1.2.1 - Remote Index Change
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: makit Newsposter Script 3.0 - SQL Injection
|
This is a webapps exploit for asp platform. Description: makit Newsposter Script 3.0 - SQL Injection. Author: ajann
|
Analyze the security implications of: makit Newsposter Script 3.0 - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: InnovaStudio WYSIWYG Editor 5.4 - Unrestricted File Upload / Directory Traversal
|
This is a webapps exploit for asp platform. Description: InnovaStudio WYSIWYG Editor 5.4 - Unrestricted File Upload / Directory Traversal. Author: Zer0FauLT
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.