input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: eXV2 Module MyAnnonces - 'lid' SQL Injection | This is a webapps exploit for php platform. Description: eXV2 Module MyAnnonces - 'lid' SQL Injection. Author: S@BUN |
Analyze the security implications of: eXV2 Module MyAnnonces - 'lid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IPCop 1.4.1 - Web Administration Interface Proxy Log HTML Injection | This is a webapps exploit for multiple platform. Description: IPCop 1.4.1 - Web Administration Interface Proxy Log HTML Injection. Author: Paul Kurczaba |
Analyze the security implications of: IPCop 1.4.1 - Web Administration Interface Proxy Log HTML Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_dirfrm - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Joomla! Component com_dirfrm - Multiple SQL Injections. Author: Hieuneo |
Analyze the security implications of: Joomla! Component com_dirfrm - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpManager 6/7 - 'ping.do?name' Cross-Site Scripting | This is a webapps exploit for java platform. Description: OpManager 6/7 - 'ping.do?name' Cross-Site Scripting. Author: Lostmon |
Analyze the security implications of: OpManager 6/7 - 'ping.do?name' Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Absolute News Manager .NET 5.1 - '/pages/default.aspx?template' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Absolute News Manager .NET 5.1 - '/pages/default.aspx?template' Cross-Site Scripting. Author: Adrian Pastor |
Analyze the security implications of: Absolute News Manager .NET 5.1 - '/pages/default.aspx?template' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component Ultimate Portfolio 1.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Ultimate Portfolio 1.0 - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component Ultimate Portfolio 1.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GWExtranet - Multiple Directory Traversal Vulnerabilities | This is a webapps exploit for cgi platform. Description: GWExtranet - Multiple Directory Traversal Vulnerabilities. Author: joseph.giron13 |
Analyze the security implications of: GWExtranet - Multiple Directory Traversal Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Nullsoft SHOUTcast 1.8.9 - Remote Buffer Overflow | This is a remote exploit for multiple platform. Description: Nullsoft SHOUTcast 1.8.9 - Remote Buffer Overflow. Author: eSDee |
Analyze the security implications of: Nullsoft SHOUTcast 1.8.9 - Remote Buffer Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Telecom Italia Alice Pirelli routers - Backdoor from internal LAN/WAN | This is a remote exploit for hardware platform. Description: Telecom Italia Alice Pirelli routers - Backdoor from internal LAN/WAN. Author: saxdax & drpepperONE |
Analyze the security implications of: Telecom Italia Alice Pirelli routers - Backdoor from internal LAN/WAN | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Synology DiskStation Manager 4.1 - Directory Traversal | This is a webapps exploit for linux platform. Description: Synology DiskStation Manager 4.1 - Directory Traversal. Author: Berk Dusunur |
Analyze the security implications of: Synology DiskStation Manager 4.1 - Directory Traversal | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: HSRS 1.0 - 'addcode.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: HSRS 1.0 - 'addcode.php' Remote File Inclusion. Author: Cold Zero |
Analyze the security implications of: HSRS 1.0 - 'addcode.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BirdBlog 1.4 - '/admin/admincore.php?msg' Cross-Site Scripting | This is a webapps exploit for php platform. Description: BirdBlog 1.4 - '/admin/admincore.php?msg' Cross-Site Scripting. Author: the_Edit0r |
Analyze the security implications of: BirdBlog 1.4 - '/admin/admincore.php?msg' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ruby 1.9 - REXML Remote Denial of Service | This is a dos exploit for linux platform. Description: Ruby 1.9 - REXML Remote Denial of Service. Author: Luka Treiber |
Analyze the security implications of: Ruby 1.9 - REXML Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: EZContents CMS 2.0.0 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: EZContents CMS 2.0.0 - Multiple SQL Injections. Author: Virangar Security |
Analyze the security implications of: EZContents CMS 2.0.0 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Caravel CMS 3.0 Beta 1 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Caravel CMS 3.0 Beta 1 - Multiple Cross-Site Scripting Vulnerabilities. Author: r0t3d3Vil |
Analyze the security implications of: Caravel CMS 3.0 Beta 1 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Knusperleicht Guestbook 3.5 - 'GB_PATH' Remote File Inclusion | This is a webapps exploit for php platform. Description: Knusperleicht Guestbook 3.5 - 'GB_PATH' Remote File Inclusion. Author: Kurdish Security |
Analyze the security implications of: Knusperleicht Guestbook 3.5 - 'GB_PATH' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Galil-RIO Modbus - Denial of Service | This is a dos exploit for hardware platform. Description: Galil-RIO Modbus - Denial of Service. Author: Sapling |
Analyze the security implications of: Galil-RIO Modbus - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: TRENDnet TEW-634GRU 1.00.23 - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: TRENDnet TEW-634GRU 1.00.23 - Multiple Vulnerabilities. Author: SirGod |
Analyze the security implications of: TRENDnet TEW-634GRU 1.00.23 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! / Mambo Component com_hello_world - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! / Mambo Component com_hello_world - 'id' SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! / Mambo Component com_hello_world - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MNOGoSearch 3.1.20 - 'search.cgi?UL' Remote Buffer Overflow (2) | This is a remote exploit for cgi platform. Description: MNOGoSearch 3.1.20 - 'search.cgi?UL' Remote Buffer Overflow (2). Author: inv |
Analyze the security implications of: MNOGoSearch 3.1.20 - 'search.cgi?UL' Remote Buffer Overflow (2) | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: CMSuno 1.7 - 'tgo' Stored Cross-Site Scripting (XSS) (Authenticated) | This is a webapps exploit for php platform. Description: CMSuno 1.7 - 'tgo' Stored Cross-Site Scripting (XSS) (Authenticated). Author: splint3rsec |
Analyze the security implications of: CMSuno 1.7 - 'tgo' Stored Cross-Site Scripting (XSS) (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Links_ ELinks 'smbclient' - Remote Command Execution | This is a remote exploit for linux platform. Description: Links_ ELinks 'smbclient' - Remote Command Execution. Author: Teemu Salmela |
Analyze the security implications of: Links_ ELinks 'smbclient' - Remote Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Prozilla 1.3.6 - Remote Stack Overflow | This is a remote exploit for linux platform. Description: Prozilla 1.3.6 - Remote Stack Overflow. Author: Serkan Akpolat |
Analyze the security implications of: Prozilla 1.3.6 - Remote Stack Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: klibc 1.5.2 - DHCP Options Processing Remote Shell Command Execution | This is a remote exploit for linux platform. Description: klibc 1.5.2 - DHCP Options Processing Remote Shell Command Execution. Author: maximilian attems |
Analyze the security implications of: klibc 1.5.2 - DHCP Options Processing Remote Shell Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Fork CMS 3.2.4 - Local File Inclusion / Cross-Site Scripting | This is a webapps exploit for php platform. Description: Fork CMS 3.2.4 - Local File Inclusion / Cross-Site Scripting. Author: Avram Marius |
Analyze the security implications of: Fork CMS 3.2.4 - Local File Inclusion / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Car Rental Management System 1.0 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Car Rental Management System 1.0 - Arbitrary File Upload. Author: Jyotsna Adhana |
Analyze the security implications of: Car Rental Management System 1.0 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Parity Browser < 1.6.10 - Bypass Same Origin Policy | This is a local exploit for multiple platform. Description: Parity Browser < 1.6.10 - Bypass Same Origin Policy. Author: tintinweb |
Analyze the security implications of: Parity Browser < 1.6.10 - Bypass Same Origin Policy | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mambo Open Source 4.5 - 'index.php?mos_change_template' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Mambo Open Source 4.5 - 'index.php?mos_change_template' Cross-Site Scripting. Author: JeiAr |
Analyze the security implications of: Mambo Open Source 4.5 - 'index.php?mos_change_template' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Azaronline Design - SQL Injection | This is a webapps exploit for php platform. Description: Azaronline Design - SQL Injection. Author: XroGuE |
Analyze the security implications of: Azaronline Design - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Internet Security Systems 3.6 - 'ZWDeleteFile()' Arbitrary File Deletion | This is a local exploit for multiple platform. Description: Internet Security Systems 3.6 - 'ZWDeleteFile()' Arbitrary File Deletion. Author: Matousec Transparent security |
Analyze the security implications of: Internet Security Systems 3.6 - 'ZWDeleteFile()' Arbitrary File Deletion | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Netgear WGR614v9 Wireless Router - Denial of Service | This is a dos exploit for hardware platform. Description: Netgear WGR614v9 Wireless Router - Denial of Service. Author: staticrez |
Analyze the security implications of: Netgear WGR614v9 Wireless Router - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Linux Kernel 2.4.x/2.6.x - Multiple ISO9660 Filesystem Handling Vulnerabilities | This is a dos exploit for linux platform. Description: Linux Kernel 2.4.x/2.6.x - Multiple ISO9660 Filesystem Handling Vulnerabilities. Author: Michal Zalewski |
Analyze the security implications of: Linux Kernel 2.4.x/2.6.x - Multiple ISO9660 Filesystem Handling Vulnerabilities | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component JGen 0.9.33 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JGen 0.9.33 - SQL Injection. Author: **RoAd_KiLlEr** |
Analyze the security implications of: Joomla! Component JGen 0.9.33 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IRIS Citations Management Tool - (Authenticated) Remote Command Execution | This is a webapps exploit for php platform. Description: IRIS Citations Management Tool - (Authenticated) Remote Command Execution. Author: aeon |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.