input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HLstats 1.35 - 'hlstats.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: HLstats 1.35 - 'hlstats.php' Multiple Cross-Site Scripting Vulnerabilities. Author: John Martinelli |
Analyze the security implications of: HLstats 1.35 - 'hlstats.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alibaba Clone B2B 3.4 - SQL Injection | This is a webapps exploit for php platform. Description: Alibaba Clone B2B 3.4 - SQL Injection. Author: Dr.0rYX & Cr3W-DZ |
Analyze the security implications of: Alibaba Clone B2B 3.4 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Izumi 1.1.0 - Multiple Local File Inclusion / Remote File Inclusions | This is a webapps exploit for php platform. Description: Izumi 1.1.0 - Multiple Local File Inclusion / Remote File Inclusions. Author: cr4wl3r |
Analyze the security implications of: Izumi 1.1.0 - Multiple Local File Inclusion / Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Inout Celebrities 1.0 Script - Improper Access Restrictions | This is a webapps exploit for php platform. Description: Inout Celebrities 1.0 Script - Improper Access Restrictions. Author: Ihsan Sencan |
Analyze the security implications of: Inout Celebrities 1.0 Script - Improper Access Restrictions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Zyxel ZyWall 310 / ZyWall 110 / USG1900 / ATP500 / USG40 - Login Page Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: Zyxel ZyWall 310 / ZyWall 110 / USG1900 / ATP500 / USG40 - Login Page Cross-Site Scripting. Author: Aaron Bishop |
Analyze the security implications of: Zyxel ZyWall 310 / ZyWall 110 / USG1900 / ATP500 / USG40 - Login Page Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Invision Power Board 2.1.5 - showtopic SQL Injection | This is a webapps exploit for php platform. Description: Invision Power Board 2.1.5 - showtopic SQL Injection. Author: Mr.SNAKE |
Analyze the security implications of: Invision Power Board 2.1.5 - showtopic SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: E-Xoops 1.0.5/1.0.8 - '/modules/banners/click.php?bid' SQL Injection | This is a webapps exploit for php platform. Description: E-Xoops 1.0.5/1.0.8 - '/modules/banners/click.php?bid' SQL Injection. Author: Lostmon |
Analyze the security implications of: E-Xoops 1.0.5/1.0.8 - '/modules/banners/click.php?bid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple iPhone MobileSafari LibTIFF - 'browser' Remote Buffer Overflow (Metasploit) (1) | This is a remote exploit for hardware platform. Description: Apple iPhone MobileSafari LibTIFF - 'browser' Remote Buffer Overflow (Metasploit) (1). Author: Metasploit |
Analyze the security implications of: Apple iPhone MobileSafari LibTIFF - 'browser' Remote Buffer Overflow (Metasploit) (1) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apache + PHP < 5.3.12 / < 5.4.2 - Remote Code Execution + Scanner | This is a remote exploit for php platform. Description: Apache + PHP < 5.3.12 / < 5.4.2 - Remote Code Execution + Scanner. Author: noptrix |
Analyze the security implications of: Apache + PHP < 5.3.12 / < 5.4.2 - Remote Code Execution + Scanner | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Air Contacts Lite - HTTP Packet Denial of Service | This is a dos exploit for multiple platform. Description: Air Contacts Lite - HTTP Packet Denial of Service. Author: Rodrigo Escobar |
Analyze the security implications of: Air Contacts Lite - HTTP Packet Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DirPHP 1.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: DirPHP 1.0 - Local File Inclusion. Author: black hat |
Analyze the security implications of: DirPHP 1.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CommuniMail 1.2 - 'templates.cgi?form_id' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: CommuniMail 1.2 - 'templates.cgi?form_id' Cross-Site Scripting. Author: r0t |
Analyze the security implications of: CommuniMail 1.2 - 'templates.cgi?form_id' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Cisco Unified Operations Manager 8.5 - 'iptm/ddv.do?deviceInstanceName' Cross-Site Scripting | This is a remote exploit for hardware platform. Description: Cisco Unified Operations Manager 8.5 - 'iptm/ddv.do?deviceInstanceName' Cross-Site Scripting. Author: Sense of Security |
Analyze the security implications of: Cisco Unified Operations Manager 8.5 - 'iptm/ddv.do?deviceInstanceName' Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: FreeNAS 0.7.2.5543 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: FreeNAS 0.7.2.5543 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities. Author: db.pub.mail |
Analyze the security implications of: FreeNAS 0.7.2.5543 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FiberHome LM53Q1 - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: FiberHome LM53Q1 - Multiple Vulnerabilities. Author: Ibad Shah |
Analyze the security implications of: FiberHome LM53Q1 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CandyPress eCommerce suite 4.1.1.26 - Multiple Vulnerabilities | This is a webapps exploit for asp platform. Description: CandyPress eCommerce suite 4.1.1.26 - Multiple Vulnerabilities. Author: BugReport.IR |
Analyze the security implications of: CandyPress eCommerce suite 4.1.1.26 - Multiple Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: CommonSense CMS - SQL Injection | This is a webapps exploit for php platform. Description: CommonSense CMS - SQL Injection. Author: Pokeng |
Analyze the security implications of: CommonSense CMS - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EditTag 1.2 - 'mkpw_mp.cgi?plain' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: EditTag 1.2 - 'mkpw_mp.cgi?plain' Cross-Site Scripting. Author: NetJackal |
Analyze the security implications of: EditTag 1.2 - 'mkpw_mp.cgi?plain' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Wavlink WN530HG4 - Password Disclosure | This is a webapps exploit for hardware platform. Description: Wavlink WN530HG4 - Password Disclosure. Author: Ahmed Alroky |
Analyze the security implications of: Wavlink WN530HG4 - Password Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Fullaspsite ASP Hosting Site - 'listmain.asp?cat' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Fullaspsite ASP Hosting Site - 'listmain.asp?cat' Cross-Site Scripting. Author: ShaFuck31 |
Analyze the security implications of: Fullaspsite ASP Hosting Site - 'listmain.asp?cat' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Edimax EW-7438RPn - Cross-Site Request Forgery (MAC Filtering) | This is a webapps exploit for hardware platform. Description: Edimax EW-7438RPn - Cross-Site Request Forgery (MAC Filtering). Author: Besim |
Analyze the security implications of: Edimax EW-7438RPn - Cross-Site Request Forgery (MAC Filtering) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: LineWeb 1.0.5 - Multiple Remote Vulnerabilities | This is a webapps exploit for php platform. Description: LineWeb 1.0.5 - Multiple Remote Vulnerabilities. Author: Ignacio Garrido |
Analyze the security implications of: LineWeb 1.0.5 - Multiple Remote Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Croogo 3.0.2 - 'Multiple' Stored Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Croogo 3.0.2 - 'Multiple' Stored Cross-Site Scripting (XSS). Author: Enes Özeser |
Analyze the security implications of: Croogo 3.0.2 - 'Multiple' Stored Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Safari 10.1 - Spread Operator Integer Overflow Remote Code Execution | This is a remote exploit for macos platform. Description: Apple Safari 10.1 - Spread Operator Integer Overflow Remote Code Execution. Author: saelo |
Analyze the security implications of: Apple Safari 10.1 - Spread Operator Integer Overflow Remote Code Execution | This exploit targets macos systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Enterprise Connector 1.0.2 - 'main.php' SQL Injection | This is a webapps exploit for php platform. Description: Enterprise Connector 1.0.2 - 'main.php' SQL Injection. Author: Attila Gerendi |
Analyze the security implications of: Enterprise Connector 1.0.2 - 'main.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Docker Daemon - Local Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: Docker Daemon - Local Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: Docker Daemon - Local Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Comersus Open Technologies Comersus 5.0 - 'comersus_gatewayPayPal.asp' Price Manipulation | This is a webapps exploit for asp platform. Description: Comersus Open Technologies Comersus 5.0 - 'comersus_gatewayPayPal.asp' Price Manipulation. Author: Thomas Ryan |
Analyze the security implications of: Comersus Open Technologies Comersus 5.0 - 'comersus_gatewayPayPal.asp' Price Manipulation | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Boozt 0.9.8 - Remote Buffer Overflow | This is a remote exploit for linux platform. Description: Boozt 0.9.8 - Remote Buffer Overflow. Author: Rafael San Miguel Carrasco |
Analyze the security implications of: Boozt 0.9.8 - Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Linksys SPA941 - Remote Reboot (Denial of Service) | This is a dos exploit for hardware platform. Description: Linksys SPA941 - Remote Reboot (Denial of Service). Author: MADYNES |
Analyze the security implications of: Linksys SPA941 - Remote Reboot (Denial of Service) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Human Resource Management System 1.0 - 'employeeid' SQL Injection | This is a webapps exploit for php platform. Description: Human Resource Management System 1.0 - 'employeeid' SQL Injection. Author: Srikar |
Analyze the security implications of: Human Resource Management System 1.0 - 'employeeid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Flash Media Server 4.0.2 - Null Pointer Dereference Remote Denial of Service | This is a dos exploit for multiple platform. Description: Adobe Flash Media Server 4.0.2 - Null Pointer Dereference Remote Denial of Service. Author: Knud Erik Hojgaard |
Analyze the security implications of: Adobe Flash Media Server 4.0.2 - Null Pointer Dereference Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Comersus Cart 6 - User Email and User Password Unauthorized Access | This is a webapps exploit for asp platform. Description: Comersus Cart 6 - User Email and User Password Unauthorized Access. Author: ajann |
Analyze the security implications of: Comersus Cart 6 - User Email and User Password Unauthorized Access | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: OpenEMM-2013 8.10.380.hf13.0.066 - SOAP SQL Injection / Persistent Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: OpenEMM-2013 8.10.380.hf13.0.066 - SOAP SQL Injection / Persistent Cross-Site Scripting. Author: drone |
Analyze the security implications of: OpenEMM-2013 8.10.380.hf13.0.066 - SOAP SQL Injection / Persistent Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.