input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HLstats 1.35 - 'hlstats.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: HLstats 1.35 - 'hlstats.php' Multiple Cross-Site Scripting Vulnerabilities. Author: John Martinelli
|
Analyze the security implications of: HLstats 1.35 - 'hlstats.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Alibaba Clone B2B 3.4 - SQL Injection
|
This is a webapps exploit for php platform. Description: Alibaba Clone B2B 3.4 - SQL Injection. Author: Dr.0rYX & Cr3W-DZ
|
Analyze the security implications of: Alibaba Clone B2B 3.4 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Izumi 1.1.0 - Multiple Local File Inclusion / Remote File Inclusions
|
This is a webapps exploit for php platform. Description: Izumi 1.1.0 - Multiple Local File Inclusion / Remote File Inclusions. Author: cr4wl3r
|
Analyze the security implications of: Izumi 1.1.0 - Multiple Local File Inclusion / Remote File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Inout Celebrities 1.0 Script - Improper Access Restrictions
|
This is a webapps exploit for php platform. Description: Inout Celebrities 1.0 Script - Improper Access Restrictions. Author: Ihsan Sencan
|
Analyze the security implications of: Inout Celebrities 1.0 Script - Improper Access Restrictions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Zyxel ZyWall 310 / ZyWall 110 / USG1900 / ATP500 / USG40 - Login Page Cross-Site Scripting
|
This is a webapps exploit for hardware platform. Description: Zyxel ZyWall 310 / ZyWall 110 / USG1900 / ATP500 / USG40 - Login Page Cross-Site Scripting. Author: Aaron Bishop
|
Analyze the security implications of: Zyxel ZyWall 310 / ZyWall 110 / USG1900 / ATP500 / USG40 - Login Page Cross-Site Scripting
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Invision Power Board 2.1.5 - showtopic SQL Injection
|
This is a webapps exploit for php platform. Description: Invision Power Board 2.1.5 - showtopic SQL Injection. Author: Mr.SNAKE
|
Analyze the security implications of: Invision Power Board 2.1.5 - showtopic SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: E-Xoops 1.0.5/1.0.8 - '/modules/banners/click.php?bid' SQL Injection
|
This is a webapps exploit for php platform. Description: E-Xoops 1.0.5/1.0.8 - '/modules/banners/click.php?bid' SQL Injection. Author: Lostmon
|
Analyze the security implications of: E-Xoops 1.0.5/1.0.8 - '/modules/banners/click.php?bid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple iPhone MobileSafari LibTIFF - 'browser' Remote Buffer Overflow (Metasploit) (1)
|
This is a remote exploit for hardware platform. Description: Apple iPhone MobileSafari LibTIFF - 'browser' Remote Buffer Overflow (Metasploit) (1). Author: Metasploit
|
Analyze the security implications of: Apple iPhone MobileSafari LibTIFF - 'browser' Remote Buffer Overflow (Metasploit) (1)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Apache + PHP < 5.3.12 / < 5.4.2 - Remote Code Execution + Scanner
|
This is a remote exploit for php platform. Description: Apache + PHP < 5.3.12 / < 5.4.2 - Remote Code Execution + Scanner. Author: noptrix
|
Analyze the security implications of: Apache + PHP < 5.3.12 / < 5.4.2 - Remote Code Execution + Scanner
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Air Contacts Lite - HTTP Packet Denial of Service
|
This is a dos exploit for multiple platform. Description: Air Contacts Lite - HTTP Packet Denial of Service. Author: Rodrigo Escobar
|
Analyze the security implications of: Air Contacts Lite - HTTP Packet Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: DirPHP 1.0 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: DirPHP 1.0 - Local File Inclusion. Author: black hat
|
Analyze the security implications of: DirPHP 1.0 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CommuniMail 1.2 - 'templates.cgi?form_id' Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: CommuniMail 1.2 - 'templates.cgi?form_id' Cross-Site Scripting. Author: r0t
|
Analyze the security implications of: CommuniMail 1.2 - 'templates.cgi?form_id' Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Cisco Unified Operations Manager 8.5 - 'iptm/ddv.do?deviceInstanceName' Cross-Site Scripting
|
This is a remote exploit for hardware platform. Description: Cisco Unified Operations Manager 8.5 - 'iptm/ddv.do?deviceInstanceName' Cross-Site Scripting. Author: Sense of Security
|
Analyze the security implications of: Cisco Unified Operations Manager 8.5 - 'iptm/ddv.do?deviceInstanceName' Cross-Site Scripting
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: FreeNAS 0.7.2.5543 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: FreeNAS 0.7.2.5543 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities. Author: db.pub.mail
|
Analyze the security implications of: FreeNAS 0.7.2.5543 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FiberHome LM53Q1 - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: FiberHome LM53Q1 - Multiple Vulnerabilities. Author: Ibad Shah
|
Analyze the security implications of: FiberHome LM53Q1 - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: CandyPress eCommerce suite 4.1.1.26 - Multiple Vulnerabilities
|
This is a webapps exploit for asp platform. Description: CandyPress eCommerce suite 4.1.1.26 - Multiple Vulnerabilities. Author: BugReport.IR
|
Analyze the security implications of: CandyPress eCommerce suite 4.1.1.26 - Multiple Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: CommonSense CMS - SQL Injection
|
This is a webapps exploit for php platform. Description: CommonSense CMS - SQL Injection. Author: Pokeng
|
Analyze the security implications of: CommonSense CMS - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: EditTag 1.2 - 'mkpw_mp.cgi?plain' Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: EditTag 1.2 - 'mkpw_mp.cgi?plain' Cross-Site Scripting. Author: NetJackal
|
Analyze the security implications of: EditTag 1.2 - 'mkpw_mp.cgi?plain' Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Wavlink WN530HG4 - Password Disclosure
|
This is a webapps exploit for hardware platform. Description: Wavlink WN530HG4 - Password Disclosure. Author: Ahmed Alroky
|
Analyze the security implications of: Wavlink WN530HG4 - Password Disclosure
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Fullaspsite ASP Hosting Site - 'listmain.asp?cat' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: Fullaspsite ASP Hosting Site - 'listmain.asp?cat' Cross-Site Scripting. Author: ShaFuck31
|
Analyze the security implications of: Fullaspsite ASP Hosting Site - 'listmain.asp?cat' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Edimax EW-7438RPn - Cross-Site Request Forgery (MAC Filtering)
|
This is a webapps exploit for hardware platform. Description: Edimax EW-7438RPn - Cross-Site Request Forgery (MAC Filtering). Author: Besim
|
Analyze the security implications of: Edimax EW-7438RPn - Cross-Site Request Forgery (MAC Filtering)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: LineWeb 1.0.5 - Multiple Remote Vulnerabilities
|
This is a webapps exploit for php platform. Description: LineWeb 1.0.5 - Multiple Remote Vulnerabilities. Author: Ignacio Garrido
|
Analyze the security implications of: LineWeb 1.0.5 - Multiple Remote Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Croogo 3.0.2 - 'Multiple' Stored Cross-Site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: Croogo 3.0.2 - 'Multiple' Stored Cross-Site Scripting (XSS). Author: Enes Özeser
|
Analyze the security implications of: Croogo 3.0.2 - 'Multiple' Stored Cross-Site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple Safari 10.1 - Spread Operator Integer Overflow Remote Code Execution
|
This is a remote exploit for macos platform. Description: Apple Safari 10.1 - Spread Operator Integer Overflow Remote Code Execution. Author: saelo
|
Analyze the security implications of: Apple Safari 10.1 - Spread Operator Integer Overflow Remote Code Execution
|
This exploit targets macos systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets macos platform
|
What is this exploit about: Enterprise Connector 1.0.2 - 'main.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Enterprise Connector 1.0.2 - 'main.php' SQL Injection. Author: Attila Gerendi
|
Analyze the security implications of: Enterprise Connector 1.0.2 - 'main.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Docker Daemon - Local Privilege Escalation (Metasploit)
|
This is a local exploit for linux platform. Description: Docker Daemon - Local Privilege Escalation (Metasploit). Author: Metasploit
|
Analyze the security implications of: Docker Daemon - Local Privilege Escalation (Metasploit)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Comersus Open Technologies Comersus 5.0 - 'comersus_gatewayPayPal.asp' Price Manipulation
|
This is a webapps exploit for asp platform. Description: Comersus Open Technologies Comersus 5.0 - 'comersus_gatewayPayPal.asp' Price Manipulation. Author: Thomas Ryan
|
Analyze the security implications of: Comersus Open Technologies Comersus 5.0 - 'comersus_gatewayPayPal.asp' Price Manipulation
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Boozt 0.9.8 - Remote Buffer Overflow
|
This is a remote exploit for linux platform. Description: Boozt 0.9.8 - Remote Buffer Overflow. Author: Rafael San Miguel Carrasco
|
Analyze the security implications of: Boozt 0.9.8 - Remote Buffer Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Linksys SPA941 - Remote Reboot (Denial of Service)
|
This is a dos exploit for hardware platform. Description: Linksys SPA941 - Remote Reboot (Denial of Service). Author: MADYNES
|
Analyze the security implications of: Linksys SPA941 - Remote Reboot (Denial of Service)
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Human Resource Management System 1.0 - 'employeeid' SQL Injection
|
This is a webapps exploit for php platform. Description: Human Resource Management System 1.0 - 'employeeid' SQL Injection. Author: Srikar
|
Analyze the security implications of: Human Resource Management System 1.0 - 'employeeid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Adobe Flash Media Server 4.0.2 - Null Pointer Dereference Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: Adobe Flash Media Server 4.0.2 - Null Pointer Dereference Remote Denial of Service. Author: Knud Erik Hojgaard
|
Analyze the security implications of: Adobe Flash Media Server 4.0.2 - Null Pointer Dereference Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Comersus Cart 6 - User Email and User Password Unauthorized Access
|
This is a webapps exploit for asp platform. Description: Comersus Cart 6 - User Email and User Password Unauthorized Access. Author: ajann
|
Analyze the security implications of: Comersus Cart 6 - User Email and User Password Unauthorized Access
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: OpenEMM-2013 8.10.380.hf13.0.066 - SOAP SQL Injection / Persistent Cross-Site Scripting
|
This is a webapps exploit for jsp platform. Description: OpenEMM-2013 8.10.380.hf13.0.066 - SOAP SQL Injection / Persistent Cross-Site Scripting. Author: drone
|
Analyze the security implications of: OpenEMM-2013 8.10.380.hf13.0.066 - SOAP SQL Injection / Persistent Cross-Site Scripting
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.