input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Discuz! 1.0 - 'referer' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Discuz! 1.0 - 'referer' Cross-Site Scripting. Author: indoushka |
Analyze the security implications of: Discuz! 1.0 - 'referer' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! component com_jsjobs 1.2.6 - Arbitrary File Deletion | This is a webapps exploit for php platform. Description: Joomla! component com_jsjobs 1.2.6 - Arbitrary File Deletion. Author: qw3rTyTy |
Analyze the security implications of: Joomla! component com_jsjobs 1.2.6 - Arbitrary File Deletion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EasyService Billing 1.0 - SQL Injection / Cross-Site Scripting | This is a webapps exploit for php platform. Description: EasyService Billing 1.0 - SQL Injection / Cross-Site Scripting. Author: AkkuS |
Analyze the security implications of: EasyService Billing 1.0 - SQL Injection / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FS Book Store Script - 'category' SQL Injection | This is a webapps exploit for php platform. Description: FS Book Store Script - 'category' SQL Injection. Author: 8bitsec |
Analyze the security implications of: FS Book Store Script - 'category' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: APNGDis 2.8 - 'image width / height chunk' Heap Buffer Overflow | This is a dos exploit for multiple platform. Description: APNGDis 2.8 - 'image width / height chunk' Heap Buffer Overflow. Author: Alwin Peppels |
Analyze the security implications of: APNGDis 2.8 - 'image width / height chunk' Heap Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: EkinBoard 1.0.3 - '/config.php' SQL Injection / Command Execution | This is a webapps exploit for php platform. Description: EkinBoard 1.0.3 - '/config.php' SQL Injection / Command Execution. Author: rgod |
Analyze the security implications of: EkinBoard 1.0.3 - '/config.php' SQL Injection / Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AutoIndex PHP Script 2.2.2 - 'PHP_SELF index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: AutoIndex PHP Script 2.2.2 - 'PHP_SELF index.php' Cross-Site Scripting. Author: L4teral |
Analyze the security implications of: AutoIndex PHP Script 2.2.2 - 'PHP_SELF index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Intelligent Platform Management Interface - Information Disclosure | This is a remote exploit for multiple platform. Description: Intelligent Platform Management Interface - Information Disclosure. Author: Dan Farmer |
Analyze the security implications of: Intelligent Platform Management Interface - Information Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DMXReady Links Manager 1.1 - Remote Contents Change | This is a webapps exploit for asp platform. Description: DMXReady Links Manager 1.1 - Remote Contents Change. Author: ajann |
Analyze the security implications of: DMXReady Links Manager 1.1 - Remote Contents Change | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Flexible Poll 1.2 - SQL Injection | This is a webapps exploit for php platform. Description: Flexible Poll 1.2 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Flexible Poll 1.2 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Flash - textfield.maxChars Use-After-Free | This is a dos exploit for multiple platform. Description: Adobe Flash - textfield.maxChars Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - textfield.maxChars Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Aim Web Design - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Aim Web Design - Multiple Vulnerabilities. Author: XroGuE |
Analyze the security implications of: Aim Web Design - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: kawf 1.0 - 'main.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: kawf 1.0 - 'main.php' Remote File Inclusion. Author: o0xxdark0o |
Analyze the security implications of: kawf 1.0 - 'main.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Grandstream Budge Tone-200 IP Phone - Digest domain Denial of Service | This is a dos exploit for hardware platform. Description: Grandstream Budge Tone-200 IP Phone - Digest domain Denial of Service. Author: MADYNES |
Analyze the security implications of: Grandstream Budge Tone-200 IP Phone - Digest domain Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Easy News Content Management - Database Disclosure | This is a webapps exploit for asp platform. Description: Easy News Content Management - Database Disclosure. Author: BeyazKurt |
Analyze the security implications of: Easy News Content Management - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Lorex LH300 Series - ActiveX Buffer Overflow (PoC) | This is a dos exploit for hardware platform. Description: Lorex LH300 Series - ActiveX Buffer Overflow (PoC). Author: Pedro Ribeiro |
Analyze the security implications of: Lorex LH300 Series - ActiveX Buffer Overflow (PoC) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: rConfig - install Command Execution (Metasploit) | This is a remote exploit for linux platform. Description: rConfig - install Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: rConfig - install Command Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: fipsShop - Multiple SQL Injections | This is a webapps exploit for asp platform. Description: fipsShop - Multiple SQL Injections. Author: Aria-Security Team |
Analyze the security implications of: fipsShop - Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: DELTAScripts PHP Links 1.0 - 'email' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DELTAScripts PHP Links 1.0 - 'email' Cross-Site Scripting. Author: Crux |
Analyze the security implications of: DELTAScripts PHP Links 1.0 - 'email' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WFChat 1.0 - Information Disclosure | This is a remote exploit for multiple platform. Description: WFChat 1.0 - Information Disclosure. Author: subj |
Analyze the security implications of: WFChat 1.0 - Information Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ImagoScripts Deviant Art Clone - SQL Injection | This is a webapps exploit for php platform. Description: ImagoScripts Deviant Art Clone - SQL Injection. Author: alnjm33 |
Analyze the security implications of: ImagoScripts Deviant Art Clone - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM Tivoli Access Manager for E-Business - '/ibm/wpm/pop?method' Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: IBM Tivoli Access Manager for E-Business - '/ibm/wpm/pop?method' Cross-Site Scripting. Author: IBM |
Analyze the security implications of: IBM Tivoli Access Manager for E-Business - '/ibm/wpm/pop?method' Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ximian Evolution 1.x - UUEncoding Denial of Service | This is a dos exploit for linux platform. Description: Ximian Evolution 1.x - UUEncoding Denial of Service. Author: Core Security |
Analyze the security implications of: Ximian Evolution 1.x - UUEncoding Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_sobi2 2.9.3.2 - Blind SQL Injections | This is a webapps exploit for php platform. Description: Joomla! Component com_sobi2 2.9.3.2 - Blind SQL Injections. Author: jdc |
Analyze the security implications of: Joomla! Component com_sobi2 2.9.3.2 - Blind SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FUJI XEROX DocuCentre-V 3065 Printer - Remote Command Execution | This is a remote exploit for hardware platform. Description: FUJI XEROX DocuCentre-V 3065 Printer - Remote Command Execution. Author: vr_system |
Analyze the security implications of: FUJI XEROX DocuCentre-V 3065 Printer - Remote Command Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Virtual Support Office XP 2 - 'MyIssuesView.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Virtual Support Office XP 2 - 'MyIssuesView.asp' SQL Injection. Author: The-0utl4w |
Analyze the security implications of: Virtual Support Office XP 2 - 'MyIssuesView.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Estate Agent Manager 1.3 - 'default.asp' Authentication Bypass | This is a webapps exploit for asp platform. Description: Estate Agent Manager 1.3 - 'default.asp' Authentication Bypass. Author: ajann |
Analyze the security implications of: Estate Agent Manager 1.3 - 'default.asp' Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: class.upload.php 0.30 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: class.upload.php 0.30 - Arbitrary File Upload. Author: DIES3L |
Analyze the security implications of: class.upload.php 0.30 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Home Of AlegroCart 1.1 - Cross-Site Request Forgery (Change Administrator Password) | This is a webapps exploit for php platform. Description: Home Of AlegroCart 1.1 - Cross-Site Request Forgery (Change Administrator Password). Author: The.Morpheus |
Analyze the security implications of: Home Of AlegroCart 1.1 - Cross-Site Request Forgery (Change Administrator Password) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Palo Alto Networks Firewalls - Root Remote Code Execution | This is a remote exploit for hardware platform. Description: Palo Alto Networks Firewalls - Root Remote Code Execution. Author: Philip Pettersson |
Analyze the security implications of: Palo Alto Networks Firewalls - Root Remote Code Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apache Tomcat 6.0.13 - Host Manager Servlet Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Apache Tomcat 6.0.13 - Host Manager Servlet Cross-Site Scripting. Author: NTT OSS CENTER |
Analyze the security implications of: Apache Tomcat 6.0.13 - Host Manager Servlet Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: TerminatorX 3.8 - Multiple Command-Line and Environment Buffer Overrun Vulnerabilities (3) | This is a local exploit for linux platform. Description: TerminatorX 3.8 - Multiple Command-Line and Environment Buffer Overrun Vulnerabilities (3). Author: m00 security |
Analyze the security implications of: TerminatorX 3.8 - Multiple Command-Line and Environment Buffer Overrun Vulnerabilities (3) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Watchguard XCS - Remote Command Execution (Metasploit) | This is a remote exploit for bsd platform. Description: Watchguard XCS - Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Watchguard XCS - Remote Command Execution (Metasploit) | This exploit targets bsd systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: dotDefender 3.8-5 - Remote Command Execution | This is a webapps exploit for linux platform. Description: dotDefender 3.8-5 - Remote Command Execution. Author: John Dos |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.