input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Jettweb Hazır Rent A Car Scripti V4 - SQL Injection
|
This is a webapps exploit for php platform. Description: Jettweb Hazır Rent A Car Scripti V4 - SQL Injection. Author: Ahmet Ümit BAYRAM
|
Analyze the security implications of: Jettweb Hazır Rent A Car Scripti V4 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: RICOH SP 4510DN Printer - HTML Injection
|
This is a webapps exploit for hardware platform. Description: RICOH SP 4510DN Printer - HTML Injection. Author: Ismail Tasdelen
|
Analyze the security implications of: RICOH SP 4510DN Printer - HTML Injection
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component com_bnf - 'seccion_id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_bnf - 'seccion_id' SQL Injection. Author: Daniel Godoy
|
Analyze the security implications of: Joomla! Component com_bnf - 'seccion_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Unify eWave ServletExec 3 - .JSP Source Disclosure
|
This is a remote exploit for jsp platform. Description: Unify eWave ServletExec 3 - .JSP Source Disclosure. Author: Wojciech Woch
|
Analyze the security implications of: Unify eWave ServletExec 3 - .JSP Source Disclosure
|
This exploit targets jsp systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: gpEasy CMS Minishop 1.5 Plugin - Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: gpEasy CMS Minishop 1.5 Plugin - Persistent Cross-Site Scripting. Author: Carlos Mario Penagos Hollmann
|
Analyze the security implications of: gpEasy CMS Minishop 1.5 Plugin - Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Library System in PHP 1.0 - 'publisher name' Stored Cross-Site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: Library System in PHP 1.0 - 'publisher name' Stored Cross-Site Scripting (XSS). Author: Akash Patil
|
Analyze the security implications of: Library System in PHP 1.0 - 'publisher name' Stored Cross-Site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BBPortalS 2.0 - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: BBPortalS 2.0 - Blind SQL Injection. Author: Max007
|
Analyze the security implications of: BBPortalS 2.0 - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Multiple Vendor - TCP Sequence Number Approximation (2)
|
This is a remote exploit for multiple platform. Description: Multiple Vendor - TCP Sequence Number Approximation (2). Author: Paul A. Watson
|
Analyze the security implications of: Multiple Vendor - TCP Sequence Number Approximation (2)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Blink Blog System - Authentication Bypass
|
This is a webapps exploit for php platform. Description: Blink Blog System - Authentication Bypass. Author: Salvatore Fresta
|
Analyze the security implications of: Blink Blog System - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BugHunter HTTP Server 1.6.2 - Parse Error Information Disclosure
|
This is a remote exploit for multiple platform. Description: BugHunter HTTP Server 1.6.2 - Parse Error Information Disclosure. Author: Prili
|
Analyze the security implications of: BugHunter HTTP Server 1.6.2 - Parse Error Information Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: LSH 1.x - Remote Buffer Overflow (1)
|
This is a remote exploit for linux platform. Description: LSH 1.x - Remote Buffer Overflow (1). Author: Carl Livitt
|
Analyze the security implications of: LSH 1.x - Remote Buffer Overflow (1)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! J2 Store 3.3.11 - 'filter_order_Dir' Authenticated SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! J2 Store 3.3.11 - 'filter_order_Dir' Authenticated SQL Injection. Author: Mehmet Kelepçe
|
Analyze the security implications of: Joomla! J2 Store 3.3.11 - 'filter_order_Dir' Authenticated SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AirvaeCommerce 3.0 - 'pid' SQL Injection
|
This is a webapps exploit for php platform. Description: AirvaeCommerce 3.0 - 'pid' SQL Injection. Author: QTRinux
|
Analyze the security implications of: AirvaeCommerce 3.0 - 'pid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CartWIZ 1.10 - 'searchresults.asp' SKU Argument Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: CartWIZ 1.10 - 'searchresults.asp' SKU Argument Cross-Site Scripting. Author: Dcrab
|
Analyze the security implications of: CartWIZ 1.10 - 'searchresults.asp' SKU Argument Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: CodetoSell ViArt Shop Enterprise 2.1.6 - 'news_view.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: CodetoSell ViArt Shop Enterprise 2.1.6 - 'news_view.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Lostmon
|
Analyze the security implications of: CodetoSell ViArt Shop Enterprise 2.1.6 - 'news_view.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Hot Banana Web Content Management Suite 5.3 - Cross-Site Scripting
|
This is a webapps exploit for cfm platform. Description: Hot Banana Web Content Management Suite 5.3 - Cross-Site Scripting. Author: r0t3d3Vil
|
Analyze the security implications of: Hot Banana Web Content Management Suite 5.3 - Cross-Site Scripting
|
This exploit targets cfm systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cfm platform
|
What is this exploit about: Network Management Card 6.2.0 - Host Header Injection
|
This is a webapps exploit for hardware platform. Description: Network Management Card 6.2.0 - Host Header Injection. Author: Amal E Thamban
|
Analyze the security implications of: Network Management Card 6.2.0 - Host Header Injection
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: DBHcms 1.1.4 - 'dbhcms_user/SearchString' SQL Injection
|
This is a webapps exploit for php platform. Description: DBHcms 1.1.4 - 'dbhcms_user/SearchString' SQL Injection. Author: High-Tech Bridge SA
|
Analyze the security implications of: DBHcms 1.1.4 - 'dbhcms_user/SearchString' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: NuCommunity 1.0 - 'cl_CatListing.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: NuCommunity 1.0 - 'cl_CatListing.asp' SQL Injection. Author: ajann
|
Analyze the security implications of: NuCommunity 1.0 - 'cl_CatListing.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Smart Office Web 20.28 - Remote Information Disclosure (Unauthenticated)
|
This is a webapps exploit for aspx platform. Description: Smart Office Web 20.28 - Remote Information Disclosure (Unauthenticated). Author: Tejas Pingulkar
|
Analyze the security implications of: Smart Office Web 20.28 - Remote Information Disclosure (Unauthenticated)
|
This exploit targets aspx systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aspx platform
|
What is this exploit about: TP-Link TL-PS110U / TL-PS110P - Cross-Site Scripting
|
This is a webapps exploit for hardware platform. Description: TP-Link TL-PS110U / TL-PS110P - Cross-Site Scripting. Author: b0telh0
|
Analyze the security implications of: TP-Link TL-PS110U / TL-PS110P - Cross-Site Scripting
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Affiliate MLM Script 1.0 - 'product-category.php?key' SQL Injection
|
This is a webapps exploit for php platform. Description: Affiliate MLM Script 1.0 - 'product-category.php?key' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Affiliate MLM Script 1.0 - 'product-category.php?key' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: TP-Link WR940N - (Authenticated) Remote Code
|
This is a webapps exploit for hardware platform. Description: TP-Link WR940N - (Authenticated) Remote Code. Author: Fidus InfoSecurity
|
Analyze the security implications of: TP-Link WR940N - (Authenticated) Remote Code
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: obotix IP Camera M1 1.9.4 .7/M10 2.0.5.2 - 'eventplayer?get_image_info_abspath' Cross-Site Scripting
|
This is a remote exploit for hardware platform. Description: obotix IP Camera M1 1.9.4 .7/M10 2.0.5.2 - 'eventplayer?get_image_info_abspath' Cross-Site Scripting. Author: Jaime Blasco
|
Analyze the security implications of: obotix IP Camera M1 1.9.4 .7/M10 2.0.5.2 - 'eventplayer?get_image_info_abspath' Cross-Site Scripting
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Option CloudGate CG0192-11897 - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: Option CloudGate CG0192-11897 - Multiple Vulnerabilities. Author: LiquidWorm
|
Analyze the security implications of: Option CloudGate CG0192-11897 - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Hailboards 1.2.0 - 'phpbb_root_path' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Hailboards 1.2.0 - 'phpbb_root_path' Remote File Inclusion. Author: Mehmet Ince
|
Analyze the security implications of: Hailboards 1.2.0 - 'phpbb_root_path' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: H2O-CMS 3.4 - Insecure Cookie Handling
|
This is a webapps exploit for php platform. Description: H2O-CMS 3.4 - Insecure Cookie Handling. Author: Stack
|
Analyze the security implications of: H2O-CMS 3.4 - Insecure Cookie Handling
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: dpkg Source Package - Index: pseudo-header Processing Multiple Local Directory Traversals
|
This is a local exploit for linux platform. Description: dpkg Source Package - Index: pseudo-header Processing Multiple Local Directory Traversals. Author: Raphael Geissert
|
Analyze the security implications of: dpkg Source Package - Index: pseudo-header Processing Multiple Local Directory Traversals
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apple iOS < 10.3.2 - Notifications API Denial of Service
|
This is a dos exploit for ios platform. Description: Apple iOS < 10.3.2 - Notifications API Denial of Service. Author: CoffeeBreakers
|
Analyze the security implications of: Apple iOS < 10.3.2 - Notifications API Denial of Service
|
This exploit targets ios systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: PlaySMS - 'import.php' (Authenticated) CSV File Upload Code Execution (Metasploit)
|
This is a remote exploit for php platform. Description: PlaySMS - 'import.php' (Authenticated) CSV File Upload Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: PlaySMS - 'import.php' (Authenticated) CSV File Upload Code Execution (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LibreOffice < 6.0.1 - '=WEBSERVICE' Remote Arbitrary File Disclosure
|
This is a remote exploit for linux platform. Description: LibreOffice < 6.0.1 - '=WEBSERVICE' Remote Arbitrary File Disclosure. Author: Mikhail Klementev
|
Analyze the security implications of: LibreOffice < 6.0.1 - '=WEBSERVICE' Remote Arbitrary File Disclosure
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Linux Kernel 2.6.13 < 2.6.17.4 - 'logrotate prctl()' Local Privilege Escalation
|
This is a local exploit for linux platform. Description: Linux Kernel 2.6.13 < 2.6.17.4 - 'logrotate prctl()' Local Privilege Escalation. Author: Marco Ivaldi
|
Analyze the security implications of: Linux Kernel 2.6.13 < 2.6.17.4 - 'logrotate prctl()' Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ApacheOfBiz 17.12.01 - Remote Command Execution (RCE)
|
This is a webapps exploit for java platform. Description: ApacheOfBiz 17.12.01 - Remote Command Execution (RCE). Author: Adrián Díaz
|
Analyze the security implications of: ApacheOfBiz 17.12.01 - Remote Command Execution (RCE)
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Linksys WRT54GC 1.5.7 Firmware - 'administration.cgi' Access Validation
|
This is a remote exploit for hardware platform. Description: Linksys WRT54GC 1.5.7 Firmware - 'administration.cgi' Access Validation. Author: Gabriel Lima
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.