input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Bontq - 'user/' URI Cross-Site Scripting | This is a webapps exploit for php platform. Description: Bontq - 'user/' URI Cross-Site Scripting. Author: sonyy |
Analyze the security implications of: Bontq - 'user/' URI Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution (2) | This is a webapps exploit for jsp platform. Description: Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution (2). Author: intx0x80 |
Analyze the security implications of: Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution (2) | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Afian - 'includer.php' Directory Traversal | This is a webapps exploit for php platform. Description: Afian - 'includer.php' Directory Traversal. Author: vnbrain.net |
Analyze the security implications of: Afian - 'includer.php' Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DeluxeBB 1.3 - 'qorder' SQL Injection | This is a webapps exploit for php platform. Description: DeluxeBB 1.3 - 'qorder' SQL Injection. Author: girex |
Analyze the security implications of: DeluxeBB 1.3 - 'qorder' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenSSH 7.2p2 - Username Enumeration | This is a remote exploit for linux platform. Description: OpenSSH 7.2p2 - Username Enumeration. Author: 0_o |
Analyze the security implications of: OpenSSH 7.2p2 - Username Enumeration | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: LifeSize Room - Command Injection (Metasploit) | This is a webapps exploit for php platform. Description: LifeSize Room - Command Injection (Metasploit). Author: Spencer McIntyre |
Analyze the security implications of: LifeSize Room - Command Injection (Metasploit) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! 1.5.x - SQL Error Information Disclosure | This is a webapps exploit for php platform. Description: Joomla! 1.5.x - SQL Error Information Disclosure. Author: YGN Ethical Hacker Group |
Analyze the security implications of: Joomla! 1.5.x - SQL Error Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gazelle CMS 1.0 - Cross-Site Scripting / SQL Injection | This is a webapps exploit for php platform. Description: Gazelle CMS 1.0 - Cross-Site Scripting / SQL Injection. Author: kurdish hackers team |
Analyze the security implications of: Gazelle CMS 1.0 - Cross-Site Scripting / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ManageEngine Applications Manager 13 - 'MenuHandlerServlet' SQL Injection | This is a webapps exploit for java platform. Description: ManageEngine Applications Manager 13 - 'MenuHandlerServlet' SQL Injection. Author: aldorm |
Analyze the security implications of: ManageEngine Applications Manager 13 - 'MenuHandlerServlet' SQL Injection | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Sudo 1.5/1.6 - Heap Corruption | This is a local exploit for linux platform. Description: Sudo 1.5/1.6 - Heap Corruption. Author: MaXX |
Analyze the security implications of: Sudo 1.5/1.6 - Heap Corruption | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Gedit 2.x - Filename Format String | This is a local exploit for linux platform. Description: Gedit 2.x - Filename Format String. Author: jsk:exworm |
Analyze the security implications of: Gedit 2.x - Filename Format String | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Plugin tinybrowser 1.5.12 - Arbitrary File Upload / Execution | This is a webapps exploit for php platform. Description: Joomla! Plugin tinybrowser 1.5.12 - Arbitrary File Upload / Execution. Author: spinbad |
Analyze the security implications of: Joomla! Plugin tinybrowser 1.5.12 - Arbitrary File Upload / Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Agares ThemeSiteScript 1.0 - 'loadadminpage' Remote File Inclusion | This is a webapps exploit for php platform. Description: Agares ThemeSiteScript 1.0 - 'loadadminpage' Remote File Inclusion. Author: DaRkLiFe |
Analyze the security implications of: Agares ThemeSiteScript 1.0 - 'loadadminpage' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HLstatsX Community Edition 1.6.5 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: HLstatsX Community Edition 1.6.5 - Cross-Site Scripting. Author: Sora |
Analyze the security implications of: HLstatsX Community Edition 1.6.5 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dolibarr ERP/CRM 3.1.0 - '/user/index.php' Multiple SQL Injections | This is a webapps exploit for php platform. Description: Dolibarr ERP/CRM 3.1.0 - '/user/index.php' Multiple SQL Injections. Author: High-Tech Bridge SA |
Analyze the security implications of: Dolibarr ERP/CRM 3.1.0 - '/user/index.php' Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Falcon Series One 1.4.3 stable - Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: Falcon Series One 1.4.3 stable - Multiple Input Validation Vulnerabilities. Author: MhZ91 |
Analyze the security implications of: Falcon Series One 1.4.3 stable - Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SGI IRIX 6.2 - 'eject' Local Privilege Escalation (1) | This is a local exploit for irix platform. Description: SGI IRIX 6.2 - 'eject' Local Privilege Escalation (1). Author: DCRH |
Analyze the security implications of: SGI IRIX 6.2 - 'eject' Local Privilege Escalation (1) | This exploit targets irix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: 1024 CMS 1.4.2 - Local File Inclusion / Blind SQL Injection | This is a webapps exploit for php platform. Description: 1024 CMS 1.4.2 - Local File Inclusion / Blind SQL Injection. Author: girex |
Analyze the security implications of: 1024 CMS 1.4.2 - Local File Inclusion / Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Polipo 1.0.4.1 - POST/PUT HTTP Header Processing Denial of Service | This is a dos exploit for multiple platform. Description: Polipo 1.0.4.1 - POST/PUT HTTP Header Processing Denial of Service. Author: Usman Saeed |
Analyze the security implications of: Polipo 1.0.4.1 - POST/PUT HTTP Header Processing Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Click&BaneX - 'Details.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Click&BaneX - 'Details.asp' SQL Injection. Author: Aria-Security Team |
Analyze the security implications of: Click&BaneX - 'Details.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Azon Dominator Affiliate Marketing Script - SQL Injection | This is a webapps exploit for php platform. Description: Azon Dominator Affiliate Marketing Script - SQL Injection. Author: Buğra Enis Dönmez |
Analyze the security implications of: Azon Dominator Affiliate Marketing Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FCRing 1.31 - 'fcring.php?s_fuss' Remote File Inclusion | This is a webapps exploit for php platform. Description: FCRing 1.31 - 'fcring.php?s_fuss' Remote File Inclusion. Author: kezzap66345 |
Analyze the security implications of: FCRing 1.31 - 'fcring.php?s_fuss' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple iPhone MobileSafari LibTIFF - 'email' Remote Buffer Overflow (Metasploit) (2) | This is a remote exploit for hardware platform. Description: Apple iPhone MobileSafari LibTIFF - 'email' Remote Buffer Overflow (Metasploit) (2). Author: Metasploit |
Analyze the security implications of: Apple iPhone MobileSafari LibTIFF - 'email' Remote Buffer Overflow (Metasploit) (2) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Erolife AjxGaleri VT - Database Disclosure | This is a webapps exploit for asp platform. Description: Erolife AjxGaleri VT - Database Disclosure. Author: LionTurk |
Analyze the security implications of: Erolife AjxGaleri VT - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Just William's Amazon Webstore - HTTP Response Splitting | This is a webapps exploit for php platform. Description: Just William's Amazon Webstore - HTTP Response Splitting. Author: Lostmon |
Analyze the security implications of: Just William's Amazon Webstore - HTTP Response Splitting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SHARP MX Series - Denial of Service | This is a dos exploit for hardware platform. Description: SHARP MX Series - Denial of Service. Author: pws |
Analyze the security implications of: SHARP MX Series - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Automagick Tube Script 1.4.4 - 'module' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Automagick Tube Script 1.4.4 - 'module' Cross-Site Scripting. Author: Kurd-Team |
Analyze the security implications of: Automagick Tube Script 1.4.4 - 'module' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreePBX 13/14 - Remote Command Execution / Privilege Escalation | This is a remote exploit for linux platform. Description: FreePBX 13/14 - Remote Command Execution / Privilege Escalation. Author: pgt |
Analyze the security implications of: FreePBX 13/14 - Remote Command Execution / Privilege Escalation | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: BES-CMS 0.4/0.5 - 'message.php' File Inclusion | This is a webapps exploit for php platform. Description: BES-CMS 0.4/0.5 - 'message.php' File Inclusion. Author: frog |
Analyze the security implications of: BES-CMS 0.4/0.5 - 'message.php' File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component HM Community - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Joomla! Component HM Community - Multiple Vulnerabilities. Author: 599eme Man |
Analyze the security implications of: Joomla! Component HM Community - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX networkd - 'effective_audit_token' XPC Type Confusion Sandbox Escape | This is a local exploit for osx platform. Description: Apple Mac OSX networkd - 'effective_audit_token' XPC Type Confusion Sandbox Escape. Author: Google Security Research |
Analyze the security implications of: Apple Mac OSX networkd - 'effective_audit_token' XPC Type Confusion Sandbox Escape | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: File Uploader 1.1 - 'index.php?config[root_ordner]' Remote File Inclusion | This is a webapps exploit for php platform. Description: File Uploader 1.1 - 'index.php?config[root_ordner]' Remote File Inclusion. Author: Rizgar |
Analyze the security implications of: File Uploader 1.1 - 'index.php?config[root_ordner]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: e107 Plugin lyrics_menu - 'l_id' SQL Injection | This is a webapps exploit for php platform. Description: e107 Plugin lyrics_menu - 'l_id' SQL Injection. Author: ZoRLu |
Analyze the security implications of: e107 Plugin lyrics_menu - 'l_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_waticketsystem - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_waticketsystem - Blind SQL Injection. Author: InjEctOr5 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.