input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Digital Interchange Calendar - SQL Injection
|
This is a webapps exploit for asp platform. Description: Digital Interchange Calendar - SQL Injection. Author: L0rd CrusAd3r
|
Analyze the security implications of: Digital Interchange Calendar - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: GrayCMS 1.1 - 'error.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: GrayCMS 1.1 - 'error.php' Remote File Inclusion. Author: Kold
|
Analyze the security implications of: GrayCMS 1.1 - 'error.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ZYCOO IP Phone System - Remote Command Execution
|
This is a webapps exploit for cgi platform. Description: ZYCOO IP Phone System - Remote Command Execution. Author: 0x4148
|
Analyze the security implications of: ZYCOO IP Phone System - Remote Command Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Lemon CMS 1.10 - 'browser.php' Local File Inclusion
|
This is a webapps exploit for php platform. Description: Lemon CMS 1.10 - 'browser.php' Local File Inclusion. Author: Ciph3r
|
Analyze the security implications of: Lemon CMS 1.10 - 'browser.php' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Klog Server 2.4.1 - Unauthenticated Command Injection (Metasploit)
|
This is a webapps exploit for php platform. Description: Klog Server 2.4.1 - Unauthenticated Command Injection (Metasploit). Author: Metin Yunus Kandemir
|
Analyze the security implications of: Klog Server 2.4.1 - Unauthenticated Command Injection (Metasploit)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Computrols CBAS-Web 19.0.0 - 'username' Reflected Cross-Site Scripting
|
This is a webapps exploit for hardware platform. Description: Computrols CBAS-Web 19.0.0 - 'username' Reflected Cross-Site Scripting. Author: LiquidWorm
|
Analyze the security implications of: Computrols CBAS-Web 19.0.0 - 'username' Reflected Cross-Site Scripting
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Watson Management Console 4.11.2.G - Directory Traversal
|
This is a webapps exploit for hardware platform. Description: Watson Management Console 4.11.2.G - Directory Traversal. Author: Dhruv Shah
|
Analyze the security implications of: Watson Management Console 4.11.2.G - Directory Traversal
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Lucee 5.4.2.17 - Authenticated Reflected XSS
|
This is a webapps exploit for multiple platform. Description: Lucee 5.4.2.17 - Authenticated Reflected XSS. Author: Yehia Elghaly
|
Analyze the security implications of: Lucee 5.4.2.17 - Authenticated Reflected XSS
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Multiple Vendor 'librpc.dll' Signedness Error - Remote Code Execution
|
This is a dos exploit for multiple platform. Description: Multiple Vendor 'librpc.dll' Signedness Error - Remote Code Execution. Author: ZSploit.com
|
Analyze the security implications of: Multiple Vendor 'librpc.dll' Signedness Error - Remote Code Execution
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Laravel Pulse 1.3.1 - Arbitrary Code Injection
|
This is a webapps exploit for php platform. Description: Laravel Pulse 1.3.1 - Arbitrary Code Injection. Author: Mohammed Idrees Banyamer
|
Analyze the security implications of: Laravel Pulse 1.3.1 - Arbitrary Code Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: jPORTAL 2.3.1 & UserPatch - 'forum.php' Remote Code Execution
|
This is a webapps exploit for php platform. Description: jPORTAL 2.3.1 & UserPatch - 'forum.php' Remote Code Execution. Author: irk4z
|
Analyze the security implications of: jPORTAL 2.3.1 & UserPatch - 'forum.php' Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Restaurant Listing with Online Ordering - SQL Injection
|
This is a webapps exploit for asp platform. Description: Restaurant Listing with Online Ordering - SQL Injection. Author: L0rd CrusAd3r
|
Analyze the security implications of: Restaurant Listing with Online Ordering - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: MetaCart E-Shop V-8 - 'StrCatalog_NAME' SQL Injection
|
This is a webapps exploit for asp platform. Description: MetaCart E-Shop V-8 - 'StrCatalog_NAME' SQL Injection. Author: Dcrab
|
Analyze the security implications of: MetaCart E-Shop V-8 - 'StrCatalog_NAME' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: BandSite CMS 1.1 - 'mp3_content.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: BandSite CMS 1.1 - 'mp3_content.php' Cross-Site Scripting. Author: HACKERS PAL
|
Analyze the security implications of: BandSite CMS 1.1 - 'mp3_content.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Banex PHP MySQL Banner Exchange 2.21 - 'members.php?cfg_root' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Banex PHP MySQL Banner Exchange 2.21 - 'members.php?cfg_root' Remote File Inclusion. Author: SirDarckCat
|
Analyze the security implications of: Banex PHP MySQL Banner Exchange 2.21 - 'members.php?cfg_root' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: VM Turbo Operations Manager 4.5x - Directory Traversal
|
This is a webapps exploit for cgi platform. Description: VM Turbo Operations Manager 4.5x - Directory Traversal. Author: Jamal Pecou
|
Analyze the security implications of: VM Turbo Operations Manager 4.5x - Directory Traversal
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Jax PHP Scripts 1.0/1.34/2.14/3.31 - formmailer.log User Sent Mail Disclosure
|
This is a webapps exploit for php platform. Description: Jax PHP Scripts 1.0/1.34/2.14/3.31 - formmailer.log User Sent Mail Disclosure. Author: Lostmon
|
Analyze the security implications of: Jax PHP Scripts 1.0/1.34/2.14/3.31 - formmailer.log User Sent Mail Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component onisMusic 2 - 'tag' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component onisMusic 2 - 'tag' SQL Injection. Author: Persian Hack Team
|
Analyze the security implications of: Joomla! Component onisMusic 2 - 'tag' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Operator Shell (OSH) 1.7-14 - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: Operator Shell (OSH) 1.7-14 - Local Privilege Escalation. Author: Charles Stevenson
|
Analyze the security implications of: Operator Shell (OSH) 1.7-14 - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Visual Tools DVR3.0.6.16_ vx series 4.2.19.2 - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: Visual Tools DVR3.0.6.16_ vx series 4.2.19.2 - Multiple Vulnerabilities. Author: Andrea Fabrizi
|
Analyze the security implications of: Visual Tools DVR3.0.6.16_ vx series 4.2.19.2 - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: PHP 5.3.2 - 'xml_utf8_decode()' UTF-8 Input Validation
|
This is a remote exploit for php platform. Description: PHP 5.3.2 - 'xml_utf8_decode()' UTF-8 Input Validation. Author: root@80sec.com
|
Analyze the security implications of: PHP 5.3.2 - 'xml_utf8_decode()' UTF-8 Input Validation
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Food Ordering Script 1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: Food Ordering Script 1.0 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Food Ordering Script 1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CMS Ortus 1.13 - SQL Injection
|
This is a webapps exploit for php platform. Description: CMS Ortus 1.13 - SQL Injection. Author: otmorozok428
|
Analyze the security implications of: CMS Ortus 1.13 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apache 1.x/2.0.x - Chunked-Encoding Memory Corruption (2)
|
This is a remote exploit for multiple platform. Description: Apache 1.x/2.0.x - Chunked-Encoding Memory Corruption (2). Author: Gobbles Security
|
Analyze the security implications of: Apache 1.x/2.0.x - Chunked-Encoding Memory Corruption (2)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: FS Thumbtack Clone 1.0 - 'cat' / 'sc' SQL Injection
|
This is a webapps exploit for php platform. Description: FS Thumbtack Clone 1.0 - 'cat' / 'sc' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: FS Thumbtack Clone 1.0 - 'cat' / 'sc' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ECShop 2.5.0 - 'order_sn' SQL Injection
|
This is a webapps exploit for php platform. Description: ECShop 2.5.0 - 'order_sn' SQL Injection. Author: Securitylab.ir
|
Analyze the security implications of: ECShop 2.5.0 - 'order_sn' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Targem Games Battle Mages 1.0 - Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: Targem Games Battle Mages 1.0 - Remote Denial of Service. Author: Luigi Auriemma
|
Analyze the security implications of: Targem Games Battle Mages 1.0 - Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: 2DayBiz Matrimonial Script - SQL Injection / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: 2DayBiz Matrimonial Script - SQL Injection / Cross-Site Scripting. Author: Sangteamtham
|
Analyze the security implications of: 2DayBiz Matrimonial Script - SQL Injection / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ABB Cylon Aspect 3.07.02 - File Disclosure
|
This is a webapps exploit for multiple platform. Description: ABB Cylon Aspect 3.07.02 - File Disclosure. Author: LiquidWorm
|
Analyze the security implications of: ABB Cylon Aspect 3.07.02 - File Disclosure
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: DeluxeBB 1.06 - 'Attachment mod_mime' Remote Command Execution
|
This is a webapps exploit for php platform. Description: DeluxeBB 1.06 - 'Attachment mod_mime' Remote Command Execution. Author: rgod
|
Analyze the security implications of: DeluxeBB 1.06 - 'Attachment mod_mime' Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Flexpaper PHP Publish Service 2.3.6 - Remote Code Execution
|
This is a webapps exploit for php platform. Description: Flexpaper PHP Publish Service 2.3.6 - Remote Code Execution. Author: redtimmysec
|
Analyze the security implications of: Flexpaper PHP Publish Service 2.3.6 - Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple QuickTime - 'rtsp URL Handler' Remote Stack Buffer Overflow
|
This is a remote exploit for multiple platform. Description: Apple QuickTime - 'rtsp URL Handler' Remote Stack Buffer Overflow. Author: MoAB
|
Analyze the security implications of: Apple QuickTime - 'rtsp URL Handler' Remote Stack Buffer Overflow
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Sielco Analog FM Transmitter 2.12 - Remote Privilege Escalation
|
This is a remote exploit for hardware platform. Description: Sielco Analog FM Transmitter 2.12 - Remote Privilege Escalation. Author: LiquidWorm
|
Analyze the security implications of: Sielco Analog FM Transmitter 2.12 - Remote Privilege Escalation
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: IBM Tivoli Access Manager for E-Business - '/ibm/wpm/gso?method' Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: IBM Tivoli Access Manager for E-Business - '/ibm/wpm/gso?method' Cross-Site Scripting. Author: IBM
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.