input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Joomla! Component com_memorix - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_memorix - SQL Injection. Author: Omar |
Analyze the security implications of: Joomla! Component com_memorix - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: VisNetic ActiveDefense 1.3.1 - GET Multiple Denial of Service Vulnerabilities | This is a dos exploit for multiple platform. Description: VisNetic ActiveDefense 1.3.1 - GET Multiple Denial of Service Vulnerabilities. Author: Positive Technologies |
Analyze the security implications of: VisNetic ActiveDefense 1.3.1 - GET Multiple Denial of Service Vulnerabilities | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_amocourse - 'catid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_amocourse - 'catid' SQL Injection. Author: Chip d3 bi0s |
Analyze the security implications of: Joomla! Component com_amocourse - 'catid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Abantecart v1.3.2 - Authenticated Remote Code Execution | This is a webapps exploit for php platform. Description: Abantecart v1.3.2 - Authenticated Remote Code Execution. Author: Sarang Tumne |
Analyze the security implications of: Abantecart v1.3.2 - Authenticated Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Photo Org WonderApplications 8.3 iOS - Local File Inclusion | This is a webapps exploit for ios platform. Description: Photo Org WonderApplications 8.3 iOS - Local File Inclusion. Author: Vulnerability-Lab |
Analyze the security implications of: Photo Org WonderApplications 8.3 iOS - Local File Inclusion | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Link Bid Script 1.5 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Link Bid Script 1.5 - Multiple SQL Injections. Author: SirGod |
Analyze the security implications of: Link Bid Script 1.5 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FlashBB 1.1.8 - 'sendmsg.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: FlashBB 1.1.8 - 'sendmsg.php' Remote File Inclusion. Author: Kw3[R]Ln |
Analyze the security implications of: FlashBB 1.1.8 - 'sendmsg.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo Component 'com_glossary' 2.0 - 'catid' SQL Injection | This is a webapps exploit for php platform. Description: Mambo Component 'com_glossary' 2.0 - 'catid' SQL Injection. Author: S@BUN |
Analyze the security implications of: Mambo Component 'com_glossary' 2.0 - 'catid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Omnicom Content Platform - 'browser.asp' Directory Traversal | This is a webapps exploit for asp platform. Description: Omnicom Content Platform - 'browser.asp' Directory Traversal. Author: AlbaniaN-[H] |
Analyze the security implications of: Omnicom Content Platform - 'browser.asp' Directory Traversal | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: LibrettoCMS File Manager - Arbitrary File Upload (Metasploit) | This is a remote exploit for php platform. Description: LibrettoCMS File Manager - Arbitrary File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: LibrettoCMS File Manager - Arbitrary File Upload (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco IOS 12.x - HTTP Server Multiple Cross-Site Scripting Vulnerabilities | This is a remote exploit for hardware platform. Description: Cisco IOS 12.x - HTTP Server Multiple Cross-Site Scripting Vulnerabilities. Author: Adrian Pastor |
Analyze the security implications of: Cisco IOS 12.x - HTTP Server Multiple Cross-Site Scripting Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apache Geronimo 2.1.x - '/console/portal/' URI Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Apache Geronimo 2.1.x - '/console/portal/' URI Cross-Site Scripting. Author: DSecRG |
Analyze the security implications of: Apache Geronimo 2.1.x - '/console/portal/' URI Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Pi-Hole Web Interface 2.8.1 - Persistent Cross-Site Scripting in Whitelist/Blacklist | This is a webapps exploit for linux platform. Description: Pi-Hole Web Interface 2.8.1 - Persistent Cross-Site Scripting in Whitelist/Blacklist. Author: loneferret |
Analyze the security implications of: Pi-Hole Web Interface 2.8.1 - Persistent Cross-Site Scripting in Whitelist/Blacklist | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component Quiz 0.81 - 'tid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Quiz 0.81 - 'tid' SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! Component Quiz 0.81 - 'tid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Wireshark 1.2.5 - 'LWRES getaddrbyname' Stack Buffer Overflow (PoC) | This is a dos exploit for multiple platform. Description: Wireshark 1.2.5 - 'LWRES getaddrbyname' Stack Buffer Overflow (PoC). Author: babi |
Analyze the security implications of: Wireshark 1.2.5 - 'LWRES getaddrbyname' Stack Buffer Overflow (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: MuM MapEdit 3.2.6.0 - Multiple Vulnerabilities | This is a webapps exploit for aspx platform. Description: MuM MapEdit 3.2.6.0 - Multiple Vulnerabilities. Author: Paul Baade & Sven Krewitt |
Analyze the security implications of: MuM MapEdit 3.2.6.0 - Multiple Vulnerabilities | This exploit targets aspx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aspx platform |
What is this exploit about: Apache Geronimo 2.1.x - '/console/portal/Server/Monitoring' Multiple Cross-Site Scripting Vulnerabilities | This is a remote exploit for multiple platform. Description: Apache Geronimo 2.1.x - '/console/portal/Server/Monitoring' Multiple Cross-Site Scripting Vulnerabilities. Author: DSecRG |
Analyze the security implications of: Apache Geronimo 2.1.x - '/console/portal/Server/Monitoring' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Comersus Backoffice 4.x/5.0/6.0 - 'comersus_Backoffice_supportError.asp?error' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Comersus Backoffice 4.x/5.0/6.0 - 'comersus_Backoffice_supportError.asp?error' Cross-Site Scripting. Author: _6mO_HaCk |
Analyze the security implications of: Comersus Backoffice 4.x/5.0/6.0 - 'comersus_Backoffice_supportError.asp?error' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Blog Mod 0.1.9 - 'index.php?month' SQL Injection | This is a webapps exploit for php platform. Description: Blog Mod 0.1.9 - 'index.php?month' SQL Injection. Author: WhiteCollarGroup |
Analyze the security implications of: Blog Mod 0.1.9 - 'index.php?month' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ECardPro 2.0 - 'search.asp' SQL Injection | This is a webapps exploit for asp platform. Description: ECardPro 2.0 - 'search.asp' SQL Injection. Author: ajann |
Analyze the security implications of: ECardPro 2.0 - 'search.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ADICO - 'index.php' Script SQL Injection | This is a webapps exploit for php platform. Description: ADICO - 'index.php' Script SQL Injection. Author: Ibrahim El-Sayed |
Analyze the security implications of: ADICO - 'index.php' Script SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Censura 1.15.04 - 'censura.php?vendorid' SQL Injection | This is a webapps exploit for php platform. Description: Censura 1.15.04 - 'censura.php?vendorid' SQL Injection. Author: Mehmet Ince |
Analyze the security implications of: Censura 1.15.04 - 'censura.php?vendorid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alienvault Open Source SIEM (OSSIM) < 4.7.0 - 'get_license' Remote Command Execution (Metasploit) | This is a remote exploit for linux platform. Description: Alienvault Open Source SIEM (OSSIM) < 4.7.0 - 'get_license' Remote Command Execution (Metasploit). Author: James Fitts |
Analyze the security implications of: Alienvault Open Source SIEM (OSSIM) < 4.7.0 - 'get_license' Remote Command Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Invision Power Board (Trial) 2.0.4 - Backup | This is a webapps exploit for php platform. Description: Invision Power Board (Trial) 2.0.4 - Backup. Author: indoushka |
Analyze the security implications of: Invision Power Board (Trial) 2.0.4 - Backup | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LinPHA 1.3.1 - 'new_images.php' Blind SQL Injection | This is a webapps exploit for php platform. Description: LinPHA 1.3.1 - 'new_images.php' Blind SQL Injection. Author: EgiX |
Analyze the security implications of: LinPHA 1.3.1 - 'new_images.php' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mani Stats Reader 1.2 - 'ipath' Remote File Inclusion | This is a webapps exploit for php platform. Description: Mani Stats Reader 1.2 - 'ipath' Remote File Inclusion. Author: mozi |
Analyze the security implications of: Mani Stats Reader 1.2 - 'ipath' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DaLogin - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: DaLogin - Multiple Vulnerabilities. Author: hc0 |
Analyze the security implications of: DaLogin - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AZ Photo Album - Cross-Site Scripting / Arbitrary File Upload | This is a webapps exploit for php platform. Description: AZ Photo Album - Cross-Site Scripting / Arbitrary File Upload. Author: Eyup CELIK |
Analyze the security implications of: AZ Photo Album - Cross-Site Scripting / Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo Component N-Press - SQL Injection | This is a webapps exploit for php platform. Description: Mambo Component N-Press - SQL Injection. Author: CoBRa_21 |
Analyze the security implications of: Mambo Component N-Press - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CVSTrac - Arbitrary Code Execution | This is a remote exploit for linux platform. Description: CVSTrac - Arbitrary Code Execution. Author: anonymous |
Analyze the security implications of: CVSTrac - Arbitrary Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Ad Board Script 1.01 - Local File Inclusion | This is a webapps exploit for php platform. Description: Ad Board Script 1.01 - Local File Inclusion. Author: ITSecTeam |
Analyze the security implications of: Ad Board Script 1.01 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gallery 1.2.5 - 'GALLERY_BASEDIR' Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: Gallery 1.2.5 - 'GALLERY_BASEDIR' Multiple Remote File Inclusions. Author: GoLd_M |
Analyze the security implications of: Gallery 1.2.5 - 'GALLERY_BASEDIR' Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CPanel 5.0/5.3/6.x - Admin Interface HTML Injection | This is a webapps exploit for php platform. Description: CPanel 5.0/5.3/6.x - Admin Interface HTML Injection. Author: Ory Segal |
Analyze the security implications of: CPanel 5.0/5.3/6.x - Admin Interface HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Spring Cloud Config 2.1.x - Path Traversal (Metasploit) | This is a webapps exploit for java platform. Description: Spring Cloud Config 2.1.x - Path Traversal (Metasploit). Author: Dhiraj Mishra |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.