input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Discuz! 1.0 - 'referer' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Discuz! 1.0 - 'referer' Cross-Site Scripting. Author: indoushka
|
Analyze the security implications of: Discuz! 1.0 - 'referer' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! component com_jsjobs 1.2.6 - Arbitrary File Deletion
|
This is a webapps exploit for php platform. Description: Joomla! component com_jsjobs 1.2.6 - Arbitrary File Deletion. Author: qw3rTyTy
|
Analyze the security implications of: Joomla! component com_jsjobs 1.2.6 - Arbitrary File Deletion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: EasyService Billing 1.0 - SQL Injection / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: EasyService Billing 1.0 - SQL Injection / Cross-Site Scripting. Author: AkkuS
|
Analyze the security implications of: EasyService Billing 1.0 - SQL Injection / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FS Book Store Script - 'category' SQL Injection
|
This is a webapps exploit for php platform. Description: FS Book Store Script - 'category' SQL Injection. Author: 8bitsec
|
Analyze the security implications of: FS Book Store Script - 'category' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: APNGDis 2.8 - 'image width / height chunk' Heap Buffer Overflow
|
This is a dos exploit for multiple platform. Description: APNGDis 2.8 - 'image width / height chunk' Heap Buffer Overflow. Author: Alwin Peppels
|
Analyze the security implications of: APNGDis 2.8 - 'image width / height chunk' Heap Buffer Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: EkinBoard 1.0.3 - '/config.php' SQL Injection / Command Execution
|
This is a webapps exploit for php platform. Description: EkinBoard 1.0.3 - '/config.php' SQL Injection / Command Execution. Author: rgod
|
Analyze the security implications of: EkinBoard 1.0.3 - '/config.php' SQL Injection / Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AutoIndex PHP Script 2.2.2 - 'PHP_SELF index.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: AutoIndex PHP Script 2.2.2 - 'PHP_SELF index.php' Cross-Site Scripting. Author: L4teral
|
Analyze the security implications of: AutoIndex PHP Script 2.2.2 - 'PHP_SELF index.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Intelligent Platform Management Interface - Information Disclosure
|
This is a remote exploit for multiple platform. Description: Intelligent Platform Management Interface - Information Disclosure. Author: Dan Farmer
|
Analyze the security implications of: Intelligent Platform Management Interface - Information Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: DMXReady Links Manager 1.1 - Remote Contents Change
|
This is a webapps exploit for asp platform. Description: DMXReady Links Manager 1.1 - Remote Contents Change. Author: ajann
|
Analyze the security implications of: DMXReady Links Manager 1.1 - Remote Contents Change
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Flexible Poll 1.2 - SQL Injection
|
This is a webapps exploit for php platform. Description: Flexible Poll 1.2 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Flexible Poll 1.2 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Adobe Flash - textfield.maxChars Use-After-Free
|
This is a dos exploit for multiple platform. Description: Adobe Flash - textfield.maxChars Use-After-Free. Author: Google Security Research
|
Analyze the security implications of: Adobe Flash - textfield.maxChars Use-After-Free
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Aim Web Design - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Aim Web Design - Multiple Vulnerabilities. Author: XroGuE
|
Analyze the security implications of: Aim Web Design - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: kawf 1.0 - 'main.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: kawf 1.0 - 'main.php' Remote File Inclusion. Author: o0xxdark0o
|
Analyze the security implications of: kawf 1.0 - 'main.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Grandstream Budge Tone-200 IP Phone - Digest domain Denial of Service
|
This is a dos exploit for hardware platform. Description: Grandstream Budge Tone-200 IP Phone - Digest domain Denial of Service. Author: MADYNES
|
Analyze the security implications of: Grandstream Budge Tone-200 IP Phone - Digest domain Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Easy News Content Management - Database Disclosure
|
This is a webapps exploit for asp platform. Description: Easy News Content Management - Database Disclosure. Author: BeyazKurt
|
Analyze the security implications of: Easy News Content Management - Database Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Lorex LH300 Series - ActiveX Buffer Overflow (PoC)
|
This is a dos exploit for hardware platform. Description: Lorex LH300 Series - ActiveX Buffer Overflow (PoC). Author: Pedro Ribeiro
|
Analyze the security implications of: Lorex LH300 Series - ActiveX Buffer Overflow (PoC)
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: rConfig - install Command Execution (Metasploit)
|
This is a remote exploit for linux platform. Description: rConfig - install Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: rConfig - install Command Execution (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: fipsShop - Multiple SQL Injections
|
This is a webapps exploit for asp platform. Description: fipsShop - Multiple SQL Injections. Author: Aria-Security Team
|
Analyze the security implications of: fipsShop - Multiple SQL Injections
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: DELTAScripts PHP Links 1.0 - 'email' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: DELTAScripts PHP Links 1.0 - 'email' Cross-Site Scripting. Author: Crux
|
Analyze the security implications of: DELTAScripts PHP Links 1.0 - 'email' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WFChat 1.0 - Information Disclosure
|
This is a remote exploit for multiple platform. Description: WFChat 1.0 - Information Disclosure. Author: subj
|
Analyze the security implications of: WFChat 1.0 - Information Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ImagoScripts Deviant Art Clone - SQL Injection
|
This is a webapps exploit for php platform. Description: ImagoScripts Deviant Art Clone - SQL Injection. Author: alnjm33
|
Analyze the security implications of: ImagoScripts Deviant Art Clone - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IBM Tivoli Access Manager for E-Business - '/ibm/wpm/pop?method' Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: IBM Tivoli Access Manager for E-Business - '/ibm/wpm/pop?method' Cross-Site Scripting. Author: IBM
|
Analyze the security implications of: IBM Tivoli Access Manager for E-Business - '/ibm/wpm/pop?method' Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Ximian Evolution 1.x - UUEncoding Denial of Service
|
This is a dos exploit for linux platform. Description: Ximian Evolution 1.x - UUEncoding Denial of Service. Author: Core Security
|
Analyze the security implications of: Ximian Evolution 1.x - UUEncoding Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component com_sobi2 2.9.3.2 - Blind SQL Injections
|
This is a webapps exploit for php platform. Description: Joomla! Component com_sobi2 2.9.3.2 - Blind SQL Injections. Author: jdc
|
Analyze the security implications of: Joomla! Component com_sobi2 2.9.3.2 - Blind SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FUJI XEROX DocuCentre-V 3065 Printer - Remote Command Execution
|
This is a remote exploit for hardware platform. Description: FUJI XEROX DocuCentre-V 3065 Printer - Remote Command Execution. Author: vr_system
|
Analyze the security implications of: FUJI XEROX DocuCentre-V 3065 Printer - Remote Command Execution
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Virtual Support Office XP 2 - 'MyIssuesView.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: Virtual Support Office XP 2 - 'MyIssuesView.asp' SQL Injection. Author: The-0utl4w
|
Analyze the security implications of: Virtual Support Office XP 2 - 'MyIssuesView.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Estate Agent Manager 1.3 - 'default.asp' Authentication Bypass
|
This is a webapps exploit for asp platform. Description: Estate Agent Manager 1.3 - 'default.asp' Authentication Bypass. Author: ajann
|
Analyze the security implications of: Estate Agent Manager 1.3 - 'default.asp' Authentication Bypass
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: class.upload.php 0.30 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: class.upload.php 0.30 - Arbitrary File Upload. Author: DIES3L
|
Analyze the security implications of: class.upload.php 0.30 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Home Of AlegroCart 1.1 - Cross-Site Request Forgery (Change Administrator Password)
|
This is a webapps exploit for php platform. Description: Home Of AlegroCart 1.1 - Cross-Site Request Forgery (Change Administrator Password). Author: The.Morpheus
|
Analyze the security implications of: Home Of AlegroCart 1.1 - Cross-Site Request Forgery (Change Administrator Password)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Palo Alto Networks Firewalls - Root Remote Code Execution
|
This is a remote exploit for hardware platform. Description: Palo Alto Networks Firewalls - Root Remote Code Execution. Author: Philip Pettersson
|
Analyze the security implications of: Palo Alto Networks Firewalls - Root Remote Code Execution
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Apache Tomcat 6.0.13 - Host Manager Servlet Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: Apache Tomcat 6.0.13 - Host Manager Servlet Cross-Site Scripting. Author: NTT OSS CENTER
|
Analyze the security implications of: Apache Tomcat 6.0.13 - Host Manager Servlet Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: TerminatorX 3.8 - Multiple Command-Line and Environment Buffer Overrun Vulnerabilities (3)
|
This is a local exploit for linux platform. Description: TerminatorX 3.8 - Multiple Command-Line and Environment Buffer Overrun Vulnerabilities (3). Author: m00 security
|
Analyze the security implications of: TerminatorX 3.8 - Multiple Command-Line and Environment Buffer Overrun Vulnerabilities (3)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Watchguard XCS - Remote Command Execution (Metasploit)
|
This is a remote exploit for bsd platform. Description: Watchguard XCS - Remote Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Watchguard XCS - Remote Command Execution (Metasploit)
|
This exploit targets bsd systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets bsd platform
|
What is this exploit about: dotDefender 3.8-5 - Remote Command Execution
|
This is a webapps exploit for linux platform. Description: dotDefender 3.8-5 - Remote Command Execution. Author: John Dos
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.