input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Emek Portal 2.1 - 'Uyegiris.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Emek Portal 2.1 - 'Uyegiris.asp' SQL Injection. Author: Dj ReMix |
Analyze the security implications of: Emek Portal 2.1 - 'Uyegiris.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component Table JX - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joomla! Component Table JX - Cross-Site Scripting. Author: Valentin |
Analyze the security implications of: Joomla! Component Table JX - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Beetel TC1-450 Airtel Wireless Router - Multiple Cross-Site Request Forgery Vulnerabilities | This is a webapps exploit for hardware platform. Description: Beetel TC1-450 Airtel Wireless Router - Multiple Cross-Site Request Forgery Vulnerabilities. Author: Samandeep Singh |
Analyze the security implications of: Beetel TC1-450 Airtel Wireless Router - Multiple Cross-Site Request Forgery Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: e107 0.7.x - '/e107_admin/banner.php' SQL Injection | This is a webapps exploit for php platform. Description: e107 0.7.x - '/e107_admin/banner.php' SQL Injection. Author: High-Tech Bridge SA |
Analyze the security implications of: e107 0.7.x - '/e107_admin/banner.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GoAhead Web Server 2.5 - 'goform/formTest' Multiple HTML Injection Vulnerabilities | This is a webapps exploit for multiple platform. Description: GoAhead Web Server 2.5 - 'goform/formTest' Multiple HTML Injection Vulnerabilities. Author: Syed Affan Ahmed (ZEROXINN) |
Analyze the security implications of: GoAhead Web Server 2.5 - 'goform/formTest' Multiple HTML Injection Vulnerabilities | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Thomson Wireless VoIP Cable Modem - Authentication Bypass | This is a webapps exploit for hardware platform. Description: Thomson Wireless VoIP Cable Modem - Authentication Bypass. Author: Glafkos Charalambous |
Analyze the security implications of: Thomson Wireless VoIP Cable Modem - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: BBS E-Market Professional bf_130 (1.3.0) - Remote File Inclusion | This is a webapps exploit for php platform. Description: BBS E-Market Professional bf_130 (1.3.0) - Remote File Inclusion. Author: Ahmad Muammar |
Analyze the security implications of: BBS E-Market Professional bf_130 (1.3.0) - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FileMaster SY-IT 3.1 iOS - Multiple Web Vulnerabilities | This is a webapps exploit for ios platform. Description: FileMaster SY-IT 3.1 iOS - Multiple Web Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: FileMaster SY-IT 3.1 iOS - Multiple Web Vulnerabilities | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Open Game Panel - Remote Code Execution (RCE) (Authenticated) | This is a webapps exploit for multiple platform. Description: Open Game Panel - Remote Code Execution (RCE) (Authenticated). Author: prey |
Analyze the security implications of: Open Game Panel - Remote Code Execution (RCE) (Authenticated) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Openfire 3.10.2 - Remote File Inclusion | This is a webapps exploit for jsp platform. Description: Openfire 3.10.2 - Remote File Inclusion. Author: hyp3rlinx |
Analyze the security implications of: Openfire 3.10.2 - Remote File Inclusion | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Mercury MR804 Router - Multiple HTTP Header Fields Denial of Service Vulnerabilities | This is a dos exploit for hardware platform. Description: Mercury MR804 Router - Multiple HTTP Header Fields Denial of Service Vulnerabilities. Author: demonalex |
Analyze the security implications of: Mercury MR804 Router - Multiple HTTP Header Fields Denial of Service Vulnerabilities | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Envolution 1.1.0 - 'PNSVlang' Remote Code Execution | This is a webapps exploit for php platform. Description: Envolution 1.1.0 - 'PNSVlang' Remote Code Execution. Author: Kacper |
Analyze the security implications of: Envolution 1.1.0 - 'PNSVlang' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_hotbrackets - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_hotbrackets - Blind SQL Injection. Author: FL0RiX |
Analyze the security implications of: Joomla! Component com_hotbrackets - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBWd Guestbook 1.0 - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: IBWd Guestbook 1.0 - 'index.php' SQL Injection. Author: SpC-x |
Analyze the security implications of: IBWd Guestbook 1.0 - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Proxim Tsunami MP.11 2411 Wireless Access Point - 'system.sysName.0' SNMP HTML Injection | This is a remote exploit for hardware platform. Description: Proxim Tsunami MP.11 2411 Wireless Access Point - 'system.sysName.0' SNMP HTML Injection. Author: Adrian Pastor |
Analyze the security implications of: Proxim Tsunami MP.11 2411 Wireless Access Point - 'system.sysName.0' SNMP HTML Injection | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: BEA WebLogic 6/7/8 - InteractiveQuery.jsp Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: BEA WebLogic 6/7/8 - InteractiveQuery.jsp Cross-Site Scripting. Author: Corsaire Limited |
Analyze the security implications of: BEA WebLogic 6/7/8 - InteractiveQuery.jsp Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Wolfram Research webMathematica 4.0 - File Disclosure | This is a webapps exploit for java platform. Description: Wolfram Research webMathematica 4.0 - File Disclosure. Author: Andrew Badr |
Analyze the security implications of: Wolfram Research webMathematica 4.0 - File Disclosure | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Netgear WG111v2 Wireless Driver - Long Beacon Overflow (Metasploit) | This is a remote exploit for hardware platform. Description: Netgear WG111v2 Wireless Driver - Long Beacon Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: Netgear WG111v2 Wireless Driver - Long Beacon Overflow (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component com_tax - 'eid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_tax - 'eid' SQL Injection. Author: FL0RiX |
Analyze the security implications of: Joomla! Component com_tax - 'eid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: cPanel 11.25 - Cross-Site Request Forgery (Add FTP Account) | This is a webapps exploit for php platform. Description: cPanel 11.25 - Cross-Site Request Forgery (Add FTP Account). Author: G0D-F4Th3r |
Analyze the security implications of: cPanel 11.25 - Cross-Site Request Forgery (Add FTP Account) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: phpGroupWare 0.9.13 - Debian Package Configuration | This is a remote exploit for linux platform. Description: phpGroupWare 0.9.13 - Debian Package Configuration. Author: Matthias Jordan |
Analyze the security implications of: phpGroupWare 0.9.13 - Debian Package Configuration | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Freeware Advanced Audio Coder (FAAC) 1.28 - Denial of Service | This is a dos exploit for linux platform. Description: Freeware Advanced Audio Coder (FAAC) 1.28 - Denial of Service. Author: qflb.wu |
Analyze the security implications of: Freeware Advanced Audio Coder (FAAC) 1.28 - Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: aflog 1.01 - Cross-Site Scripting / SQL Injection | This is a webapps exploit for php platform. Description: aflog 1.01 - Cross-Site Scripting / SQL Injection. Author: shinmai |
Analyze the security implications of: aflog 1.01 - Cross-Site Scripting / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Poppler 0.10.3 - Denial of Service | This is a dos exploit for linux platform. Description: Poppler 0.10.3 - Denial of Service. Author: Romario |
Analyze the security implications of: Poppler 0.10.3 - Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Mambo Component 'com_phpshop' 1.2 RC2b - Remote File Inclusion | This is a webapps exploit for php platform. Description: Mambo Component 'com_phpshop' 1.2 RC2b - Remote File Inclusion. Author: Cmaster4 |
Analyze the security implications of: Mambo Component 'com_phpshop' 1.2 RC2b - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RedHat 6 GLIBC/locale - Subsystem Format String | This is a local exploit for linux platform. Description: RedHat 6 GLIBC/locale - Subsystem Format String. Author: warning3 |
Analyze the security implications of: RedHat 6 GLIBC/locale - Subsystem Format String | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FS IMDB Clone 1.0 - 'f' / 's' / 'id' SQL Injection | This is a webapps exploit for php platform. Description: FS IMDB Clone 1.0 - 'f' / 's' / 'id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: FS IMDB Clone 1.0 - 'f' / 's' / 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JAKCMS 2.01 RC1 - Blind SQL Injection | This is a webapps exploit for php platform. Description: JAKCMS 2.01 RC1 - Blind SQL Injection. Author: mr_me |
Analyze the security implications of: JAKCMS 2.01 RC1 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Technicolor TC7200 - Multiple Cross-Site Request Forgery Vulnerabilities | This is a webapps exploit for hardware platform. Description: Technicolor TC7200 - Multiple Cross-Site Request Forgery Vulnerabilities. Author: Jeroen - IT Nerdbox |
Analyze the security implications of: Technicolor TC7200 - Multiple Cross-Site Request Forgery Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: X Window 4.0/4.1/4.2 - System Oversized Font Denial of Service | This is a dos exploit for linux platform. Description: X Window 4.0/4.1/4.2 - System Oversized Font Denial of Service. Author: Tom Vogt |
Analyze the security implications of: X Window 4.0/4.1/4.2 - System Oversized Font Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Country on Sale Script - SQL Injection | This is a webapps exploit for php platform. Description: Country on Sale Script - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Country on Sale Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HitHost 1.0 - 'viewuser.php?hits' Cross-Site Scripting | This is a webapps exploit for php platform. Description: HitHost 1.0 - 'viewuser.php?hits' Cross-Site Scripting. Author: Retard |
Analyze the security implications of: HitHost 1.0 - 'viewuser.php?hits' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Easy-Clanpage 2.2 - Multiple SQL Injections / | This is a webapps exploit for php platform. Description: Easy-Clanpage 2.2 - Multiple SQL Injections /. Author: Easy Laster |
Analyze the security implications of: Easy-Clanpage 2.2 - Multiple SQL Injections / | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cacti 0.8.7 - 'graph_xport.php?local_graph_id' SQL Injection | This is a webapps exploit for php platform. Description: Cacti 0.8.7 - 'graph_xport.php?local_graph_id' SQL Injection. Author: aScii |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.