input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Digital Interchange Calendar - SQL Injection | This is a webapps exploit for asp platform. Description: Digital Interchange Calendar - SQL Injection. Author: L0rd CrusAd3r |
Analyze the security implications of: Digital Interchange Calendar - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: GrayCMS 1.1 - 'error.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: GrayCMS 1.1 - 'error.php' Remote File Inclusion. Author: Kold |
Analyze the security implications of: GrayCMS 1.1 - 'error.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ZYCOO IP Phone System - Remote Command Execution | This is a webapps exploit for cgi platform. Description: ZYCOO IP Phone System - Remote Command Execution. Author: 0x4148 |
Analyze the security implications of: ZYCOO IP Phone System - Remote Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Lemon CMS 1.10 - 'browser.php' Local File Inclusion | This is a webapps exploit for php platform. Description: Lemon CMS 1.10 - 'browser.php' Local File Inclusion. Author: Ciph3r |
Analyze the security implications of: Lemon CMS 1.10 - 'browser.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Klog Server 2.4.1 - Unauthenticated Command Injection (Metasploit) | This is a webapps exploit for php platform. Description: Klog Server 2.4.1 - Unauthenticated Command Injection (Metasploit). Author: Metin Yunus Kandemir |
Analyze the security implications of: Klog Server 2.4.1 - Unauthenticated Command Injection (Metasploit) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Computrols CBAS-Web 19.0.0 - 'username' Reflected Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: Computrols CBAS-Web 19.0.0 - 'username' Reflected Cross-Site Scripting. Author: LiquidWorm |
Analyze the security implications of: Computrols CBAS-Web 19.0.0 - 'username' Reflected Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Watson Management Console 4.11.2.G - Directory Traversal | This is a webapps exploit for hardware platform. Description: Watson Management Console 4.11.2.G - Directory Traversal. Author: Dhruv Shah |
Analyze the security implications of: Watson Management Console 4.11.2.G - Directory Traversal | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Lucee 5.4.2.17 - Authenticated Reflected XSS | This is a webapps exploit for multiple platform. Description: Lucee 5.4.2.17 - Authenticated Reflected XSS. Author: Yehia Elghaly |
Analyze the security implications of: Lucee 5.4.2.17 - Authenticated Reflected XSS | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Multiple Vendor 'librpc.dll' Signedness Error - Remote Code Execution | This is a dos exploit for multiple platform. Description: Multiple Vendor 'librpc.dll' Signedness Error - Remote Code Execution. Author: ZSploit.com |
Analyze the security implications of: Multiple Vendor 'librpc.dll' Signedness Error - Remote Code Execution | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Laravel Pulse 1.3.1 - Arbitrary Code Injection | This is a webapps exploit for php platform. Description: Laravel Pulse 1.3.1 - Arbitrary Code Injection. Author: Mohammed Idrees Banyamer |
Analyze the security implications of: Laravel Pulse 1.3.1 - Arbitrary Code Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: jPORTAL 2.3.1 & UserPatch - 'forum.php' Remote Code Execution | This is a webapps exploit for php platform. Description: jPORTAL 2.3.1 & UserPatch - 'forum.php' Remote Code Execution. Author: irk4z |
Analyze the security implications of: jPORTAL 2.3.1 & UserPatch - 'forum.php' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Restaurant Listing with Online Ordering - SQL Injection | This is a webapps exploit for asp platform. Description: Restaurant Listing with Online Ordering - SQL Injection. Author: L0rd CrusAd3r |
Analyze the security implications of: Restaurant Listing with Online Ordering - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: MetaCart E-Shop V-8 - 'StrCatalog_NAME' SQL Injection | This is a webapps exploit for asp platform. Description: MetaCart E-Shop V-8 - 'StrCatalog_NAME' SQL Injection. Author: Dcrab |
Analyze the security implications of: MetaCart E-Shop V-8 - 'StrCatalog_NAME' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: BandSite CMS 1.1 - 'mp3_content.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: BandSite CMS 1.1 - 'mp3_content.php' Cross-Site Scripting. Author: HACKERS PAL |
Analyze the security implications of: BandSite CMS 1.1 - 'mp3_content.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Banex PHP MySQL Banner Exchange 2.21 - 'members.php?cfg_root' Remote File Inclusion | This is a webapps exploit for php platform. Description: Banex PHP MySQL Banner Exchange 2.21 - 'members.php?cfg_root' Remote File Inclusion. Author: SirDarckCat |
Analyze the security implications of: Banex PHP MySQL Banner Exchange 2.21 - 'members.php?cfg_root' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: VM Turbo Operations Manager 4.5x - Directory Traversal | This is a webapps exploit for cgi platform. Description: VM Turbo Operations Manager 4.5x - Directory Traversal. Author: Jamal Pecou |
Analyze the security implications of: VM Turbo Operations Manager 4.5x - Directory Traversal | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Jax PHP Scripts 1.0/1.34/2.14/3.31 - formmailer.log User Sent Mail Disclosure | This is a webapps exploit for php platform. Description: Jax PHP Scripts 1.0/1.34/2.14/3.31 - formmailer.log User Sent Mail Disclosure. Author: Lostmon |
Analyze the security implications of: Jax PHP Scripts 1.0/1.34/2.14/3.31 - formmailer.log User Sent Mail Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component onisMusic 2 - 'tag' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component onisMusic 2 - 'tag' SQL Injection. Author: Persian Hack Team |
Analyze the security implications of: Joomla! Component onisMusic 2 - 'tag' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Operator Shell (OSH) 1.7-14 - Local Privilege Escalation | This is a local exploit for linux platform. Description: Operator Shell (OSH) 1.7-14 - Local Privilege Escalation. Author: Charles Stevenson |
Analyze the security implications of: Operator Shell (OSH) 1.7-14 - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Visual Tools DVR3.0.6.16_ vx series 4.2.19.2 - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Visual Tools DVR3.0.6.16_ vx series 4.2.19.2 - Multiple Vulnerabilities. Author: Andrea Fabrizi |
Analyze the security implications of: Visual Tools DVR3.0.6.16_ vx series 4.2.19.2 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: PHP 5.3.2 - 'xml_utf8_decode()' UTF-8 Input Validation | This is a remote exploit for php platform. Description: PHP 5.3.2 - 'xml_utf8_decode()' UTF-8 Input Validation. Author: root@80sec.com |
Analyze the security implications of: PHP 5.3.2 - 'xml_utf8_decode()' UTF-8 Input Validation | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Food Ordering Script 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Food Ordering Script 1.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Food Ordering Script 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMS Ortus 1.13 - SQL Injection | This is a webapps exploit for php platform. Description: CMS Ortus 1.13 - SQL Injection. Author: otmorozok428 |
Analyze the security implications of: CMS Ortus 1.13 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache 1.x/2.0.x - Chunked-Encoding Memory Corruption (2) | This is a remote exploit for multiple platform. Description: Apache 1.x/2.0.x - Chunked-Encoding Memory Corruption (2). Author: Gobbles Security |
Analyze the security implications of: Apache 1.x/2.0.x - Chunked-Encoding Memory Corruption (2) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FS Thumbtack Clone 1.0 - 'cat' / 'sc' SQL Injection | This is a webapps exploit for php platform. Description: FS Thumbtack Clone 1.0 - 'cat' / 'sc' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: FS Thumbtack Clone 1.0 - 'cat' / 'sc' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ECShop 2.5.0 - 'order_sn' SQL Injection | This is a webapps exploit for php platform. Description: ECShop 2.5.0 - 'order_sn' SQL Injection. Author: Securitylab.ir |
Analyze the security implications of: ECShop 2.5.0 - 'order_sn' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Targem Games Battle Mages 1.0 - Remote Denial of Service | This is a dos exploit for multiple platform. Description: Targem Games Battle Mages 1.0 - Remote Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: Targem Games Battle Mages 1.0 - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: 2DayBiz Matrimonial Script - SQL Injection / Cross-Site Scripting | This is a webapps exploit for php platform. Description: 2DayBiz Matrimonial Script - SQL Injection / Cross-Site Scripting. Author: Sangteamtham |
Analyze the security implications of: 2DayBiz Matrimonial Script - SQL Injection / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ABB Cylon Aspect 3.07.02 - File Disclosure | This is a webapps exploit for multiple platform. Description: ABB Cylon Aspect 3.07.02 - File Disclosure. Author: LiquidWorm |
Analyze the security implications of: ABB Cylon Aspect 3.07.02 - File Disclosure | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DeluxeBB 1.06 - 'Attachment mod_mime' Remote Command Execution | This is a webapps exploit for php platform. Description: DeluxeBB 1.06 - 'Attachment mod_mime' Remote Command Execution. Author: rgod |
Analyze the security implications of: DeluxeBB 1.06 - 'Attachment mod_mime' Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Flexpaper PHP Publish Service 2.3.6 - Remote Code Execution | This is a webapps exploit for php platform. Description: Flexpaper PHP Publish Service 2.3.6 - Remote Code Execution. Author: redtimmysec |
Analyze the security implications of: Flexpaper PHP Publish Service 2.3.6 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple QuickTime - 'rtsp URL Handler' Remote Stack Buffer Overflow | This is a remote exploit for multiple platform. Description: Apple QuickTime - 'rtsp URL Handler' Remote Stack Buffer Overflow. Author: MoAB |
Analyze the security implications of: Apple QuickTime - 'rtsp URL Handler' Remote Stack Buffer Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Sielco Analog FM Transmitter 2.12 - Remote Privilege Escalation | This is a remote exploit for hardware platform. Description: Sielco Analog FM Transmitter 2.12 - Remote Privilege Escalation. Author: LiquidWorm |
Analyze the security implications of: Sielco Analog FM Transmitter 2.12 - Remote Privilege Escalation | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: IBM Tivoli Access Manager for E-Business - '/ibm/wpm/gso?method' Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: IBM Tivoli Access Manager for E-Business - '/ibm/wpm/gso?method' Cross-Site Scripting. Author: IBM |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.