input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Kajona 4.7 - Cross-Site Scripting / Directory Traversal | This is a webapps exploit for php platform. Description: Kajona 4.7 - Cross-Site Scripting / Directory Traversal. Author: Curesec Research Team |
Analyze the security implications of: Kajona 4.7 - Cross-Site Scripting / Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Koch Roland Rolis Guestbook 1.0 - '$path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Koch Roland Rolis Guestbook 1.0 - '$path' Remote File Inclusion. Author: RusH security team |
Analyze the security implications of: Koch Roland Rolis Guestbook 1.0 - '$path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jinzora 2.7.5 - 'slim.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Jinzora 2.7.5 - 'slim.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Alexandr Polyakov |
Analyze the security implications of: Jinzora 2.7.5 - 'slim.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Zix Forum 1.12 - 'layid' SQL Injection | This is a webapps exploit for asp platform. Description: Zix Forum 1.12 - 'layid' SQL Injection. Author: FarhadKey |
Analyze the security implications of: Zix Forum 1.12 - 'layid' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Xine-Lib 1.1 - 'Media Player Library' Remote Format String | This is a remote exploit for linux platform. Description: Xine-Lib 1.1 - 'Media Player Library' Remote Format String. Author: Ulf Harnhammar |
Analyze the security implications of: Xine-Lib 1.1 - 'Media Player Library' Remote Format String | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: WordPress Plugin Ajax Load More 2.8.1.1 - PHP Upload (Metasploit) | This is a remote exploit for php platform. Description: WordPress Plugin Ajax Load More 2.8.1.1 - PHP Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: WordPress Plugin Ajax Load More 2.8.1.1 - PHP Upload (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM DB2 - 'db2govd' Command Line Argument Local Overflow | This is a dos exploit for linux platform. Description: IBM DB2 - 'db2govd' Command Line Argument Local Overflow. Author: SNOSoft |
Analyze the security implications of: IBM DB2 - 'db2govd' Command Line Argument Local Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Drupal < 5.22/6.16 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Drupal < 5.22/6.16 - Multiple Vulnerabilities. Author: David Rothstein |
Analyze the security implications of: Drupal < 5.22/6.16 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sagem F@ST 2604 ADSL Router - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: Sagem F@ST 2604 ADSL Router - Cross-Site Request Forgery. Author: KinG Of PiraTeS |
Analyze the security implications of: Sagem F@ST 2604 ADSL Router - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Denapars Shop Script - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Denapars Shop Script - Multiple Vulnerabilities. Author: indoushka |
Analyze the security implications of: Denapars Shop Script - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Payara Micro Community 5.2021.6 - Directory Traversal | This is a webapps exploit for multiple platform. Description: Payara Micro Community 5.2021.6 - Directory Traversal. Author: Yasser Khan |
Analyze the security implications of: Payara Micro Community 5.2021.6 - Directory Traversal | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Verizon Fios Router MI424WR-GEN3I - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: Verizon Fios Router MI424WR-GEN3I - Cross-Site Request Forgery. Author: Jacob Holcomb |
Analyze the security implications of: Verizon Fios Router MI424WR-GEN3I - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Aqua CMS - 'Username' SQL Injection | This is a webapps exploit for php platform. Description: Aqua CMS - 'Username' SQL Injection. Author: halkfild |
Analyze the security implications of: Aqua CMS - 'Username' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EZ Publish 2.2.7/3.0 - Multiple Full Path Disclosure Vulnerabilities | This is a webapps exploit for php platform. Description: EZ Publish 2.2.7/3.0 - Multiple Full Path Disclosure Vulnerabilities. Author: gregory Le Bras |
Analyze the security implications of: EZ Publish 2.2.7/3.0 - Multiple Full Path Disclosure Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CourseMS 2.1 - 'name' Stored XSS | This is a webapps exploit for multiple platform. Description: CourseMS 2.1 - 'name' Stored XSS. Author: cptsticky |
Analyze the security implications of: CourseMS 2.1 - 'name' Stored XSS | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: MagicScripts E-Store Kit-2 PayPal Edition - Cross-Site Scripting | This is a webapps exploit for php platform. Description: MagicScripts E-Store Kit-2 PayPal Edition - Cross-Site Scripting. Author: Dcrab |
Analyze the security implications of: MagicScripts E-Store Kit-2 PayPal Edition - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Almond Classifieds com_aclassf 7.5 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Joomla! Component Almond Classifieds com_aclassf 7.5 - Multiple Vulnerabilities. Author: Moudi |
Analyze the security implications of: Joomla! Component Almond Classifieds com_aclassf 7.5 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Danneo CMS 0.5.1 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Danneo CMS 0.5.1 - Blind SQL Injection. Author: InATeam |
Analyze the security implications of: Danneo CMS 0.5.1 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JooDatabase 3.1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JooDatabase 3.1.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component JooDatabase 3.1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component PayPal IPN for DOCman 3.1 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component PayPal IPN for DOCman 3.1 - 'id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component PayPal IPN for DOCman 3.1 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Eibiz i-Media Server Digital Signage 3.8.0 - Authentication Bypass | This is a webapps exploit for hardware platform. Description: Eibiz i-Media Server Digital Signage 3.8.0 - Authentication Bypass. Author: LiquidWorm |
Analyze the security implications of: Eibiz i-Media Server Digital Signage 3.8.0 - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: FileContral - Local File Inclusion / Local File Disclosure | This is a webapps exploit for php platform. Description: FileContral - Local File Inclusion / Local File Disclosure. Author: Ashiyane Digital Security Team |
Analyze the security implications of: FileContral - Local File Inclusion / Local File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CodoForum 3.4 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: CodoForum 3.4 - Persistent Cross-Site Scripting. Author: Ahmed Sherif |
Analyze the security implications of: CodoForum 3.4 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GeoBlog MOD_1.0 - 'deletecomment.php?id' Arbitrary Comment Deletion | This is a webapps exploit for php platform. Description: GeoBlog MOD_1.0 - 'deletecomment.php?id' Arbitrary Comment Deletion. Author: joseph.giron13 |
Analyze the security implications of: GeoBlog MOD_1.0 - 'deletecomment.php?id' Arbitrary Comment Deletion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Anevia Flamingo XL 3.6.20 - Authenticated Root Remote Code Execution | This is a remote exploit for hardware platform. Description: Anevia Flamingo XL 3.6.20 - Authenticated Root Remote Code Execution. Author: LiquidWorm |
Analyze the security implications of: Anevia Flamingo XL 3.6.20 - Authenticated Root Remote Code Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Drupal < 7.58 - 'Drupalgeddon3' (Authenticated) Remote Code (Metasploit) | This is a webapps exploit for php platform. Description: Drupal < 7.58 - 'Drupalgeddon3' (Authenticated) Remote Code (Metasploit). Author: SixP4ck3r |
Analyze the security implications of: Drupal < 7.58 - 'Drupalgeddon3' (Authenticated) Remote Code (Metasploit) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MercurySteam Scrapland Game Server 1.0 - Remote Denial of Service | This is a dos exploit for multiple platform. Description: MercurySteam Scrapland Game Server 1.0 - Remote Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: MercurySteam Scrapland Game Server 1.0 - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Date & Sex Vor und Rückwärts Auktions System 2 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Date & Sex Vor und Rückwärts Auktions System 2 - Blind SQL Injection. Author: Easy Laster |
Analyze the security implications of: Date & Sex Vor und Rückwärts Auktions System 2 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mah-Jong 1.4 - Client/Server Remote sscanf() Buffer Overflow | This is a remote exploit for linux platform. Description: Mah-Jong 1.4 - Client/Server Remote sscanf() Buffer Overflow. Author: V9 |
Analyze the security implications of: Mah-Jong 1.4 - Client/Server Remote sscanf() Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Oracle WebLogic Server 10.3.6.0 - Java Deserialization Remote Code Execution | This is a remote exploit for java platform. Description: Oracle WebLogic Server 10.3.6.0 - Java Deserialization Remote Code Execution. Author: SlidingWindow |
Analyze the security implications of: Oracle WebLogic Server 10.3.6.0 - Java Deserialization Remote Code Execution | This exploit targets java systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Joomla! Component com_macgallery 1.5 - Arbitrary File Download | This is a webapps exploit for php platform. Description: Joomla! Component com_macgallery 1.5 - Arbitrary File Download. Author: Claudio Viviani |
Analyze the security implications of: Joomla! Component com_macgallery 1.5 - Arbitrary File Download | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Samsung DVR SHR2040 - HTTPd Remote Denial of Service Denial of Service (PoC) | This is a dos exploit for hardware platform. Description: Samsung DVR SHR2040 - HTTPd Remote Denial of Service Denial of Service (PoC). Author: Alex Hernandez |
Analyze the security implications of: Samsung DVR SHR2040 - HTTPd Remote Denial of Service Denial of Service (PoC) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component joom12pic 1.0 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component joom12pic 1.0 - Remote File Inclusion. Author: Morgan |
Analyze the security implications of: Joomla! Component joom12pic 1.0 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.