input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: BPConferenceReporting Web Reporting - Authentication Bypass | This is a webapps exploit for asp platform. Description: BPConferenceReporting Web Reporting - Authentication Bypass. Author: v3n0m |
Analyze the security implications of: BPConferenceReporting Web Reporting - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: kitForm CRM Extension 0.43 - 'sorter.ph?sorter_value' SQL Injection | This is a webapps exploit for php platform. Description: kitForm CRM Extension 0.43 - 'sorter.ph?sorter_value' SQL Injection. Author: chapp |
Analyze the security implications of: kitForm CRM Extension 0.43 - 'sorter.ph?sorter_value' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gadget Works Online Ordering System 1.0 - 'Category' Persistent Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Gadget Works Online Ordering System 1.0 - 'Category' Persistent Cross-Site Scripting (XSS). Author: Vinay H C |
Analyze the security implications of: Gadget Works Online Ordering System 1.0 - 'Category' Persistent Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SafeSHOP 1.5.6 - Cross-Site Scripting / Multiple Cross-Site Request Forgery Vulnerabilities | This is a webapps exploit for asp platform. Description: SafeSHOP 1.5.6 - Cross-Site Scripting / Multiple Cross-Site Request Forgery Vulnerabilities. Author: cp77fk4r |
Analyze the security implications of: SafeSHOP 1.5.6 - Cross-Site Scripting / Multiple Cross-Site Request Forgery Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Web Calendar - Remote Database Disclosure | This is a webapps exploit for asp platform. Description: Web Calendar - Remote Database Disclosure. Author: RENO |
Analyze the security implications of: Web Calendar - Remote Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component JE Event Calendar - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JE Event Calendar - SQL Injection. Author: B-HUNT3|2 |
Analyze the security implications of: Joomla! Component JE Event Calendar - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AllMyGuests 0.3.0 - 'AMG_serverpath' Remote File Inclusion | This is a webapps exploit for php platform. Description: AllMyGuests 0.3.0 - 'AMG_serverpath' Remote File Inclusion. Author: beks |
Analyze the security implications of: AllMyGuests 0.3.0 - 'AMG_serverpath' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache Struts 2 - Struts 1 Plugin Showcase OGNL Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Apache Struts 2 - Struts 1 Plugin Showcase OGNL Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Apache Struts 2 - Struts 1 Plugin Showcase OGNL Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apache Struts 1.2.7 - Error Response Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Apache Struts 1.2.7 - Error Response Cross-Site Scripting. Author: Irene Abezgauz |
Analyze the security implications of: Apache Struts 1.2.7 - Error Response Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Microsoft BizTalk Server 2000/2002 DTA - 'rawdocdata.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Microsoft BizTalk Server 2000/2002 DTA - 'rawdocdata.asp' SQL Injection. Author: Cesar Cerrudo |
Analyze the security implications of: Microsoft BizTalk Server 2000/2002 DTA - 'rawdocdata.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Gallarific - 'search.php?query' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Gallarific - 'search.php?query' Cross-Site Scripting. Author: ZoRLu |
Analyze the security implications of: Gallarific - 'search.php?query' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Aztech DSL5005EN Router - 'sysAccess.asp' Admin Password Change (Unauthenticated) | This is a remote exploit for hardware platform. Description: Aztech DSL5005EN Router - 'sysAccess.asp' Admin Password Change (Unauthenticated). Author: Amir Hossein Jamshidi |
Analyze the security implications of: Aztech DSL5005EN Router - 'sysAccess.asp' Admin Password Change (Unauthenticated) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Ktools Photostore 4.7.5 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Ktools Photostore 4.7.5 - Blind SQL Injection. Author: Gal Goldshtein & Viktor Minin |
Analyze the security implications of: Ktools Photostore 4.7.5 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Viessmann Vitogate 300 2.1.3.0 - Remote Code Execution (RCE) | This is a remote exploit for hardware platform. Description: Viessmann Vitogate 300 2.1.3.0 - Remote Code Execution (RCE). Author: ByteHunter |
Analyze the security implications of: Viessmann Vitogate 300 2.1.3.0 - Remote Code Execution (RCE) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Aestiva HTML/OS 2.4 - Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: Aestiva HTML/OS 2.4 - Cross-Site Scripting. Author: eax@3xT.org |
Analyze the security implications of: Aestiva HTML/OS 2.4 - Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Verity K2 Toolkit 2.20 - Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: Verity K2 Toolkit 2.20 - Cross-Site Scripting. Author: SSR Team |
Analyze the security implications of: Verity K2 Toolkit 2.20 - Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: WordPress User Registration & Membership Plugin 4.1.1 - Unauthenticated Privilege Escalation | This is a webapps exploit for multiple platform. Description: WordPress User Registration & Membership Plugin 4.1.1 - Unauthenticated Privilege Escalation. Author: Al Baradi Joy |
Analyze the security implications of: WordPress User Registration & Membership Plugin 4.1.1 - Unauthenticated Privilege Escalation | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ImgPals Photo Host 1.0 - Admin Account Disactivation | This is a webapps exploit for php platform. Description: ImgPals Photo Host 1.0 - Admin Account Disactivation. Author: CorryL |
Analyze the security implications of: ImgPals Photo Host 1.0 - Admin Account Disactivation | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LoudBlog 0.41 - 'backend_settings.php' Traversal Arbitrary File Access | This is a webapps exploit for php platform. Description: LoudBlog 0.41 - 'backend_settings.php' Traversal Arbitrary File Access. Author: tzitaroth |
Analyze the security implications of: LoudBlog 0.41 - 'backend_settings.php' Traversal Arbitrary File Access | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FS Thumbtack Clone - 'ser' SQL Injection | This is a webapps exploit for php platform. Description: FS Thumbtack Clone - 'ser' SQL Injection. Author: 8bitsec |
Analyze the security implications of: FS Thumbtack Clone - 'ser' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Geeklog 1.3.x - SQL Injection | This is a webapps exploit for php platform. Description: Geeklog 1.3.x - SQL Injection. Author: Lorenzo Hernandez Garcia-Hierro |
Analyze the security implications of: Geeklog 1.3.x - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link DNS-343 ShareCenter < 1.05 - Command Injection | This is a webapps exploit for php platform. Description: D-Link DNS-343 ShareCenter < 1.05 - Command Injection. Author: GulfTech Security |
Analyze the security implications of: D-Link DNS-343 ShareCenter < 1.05 - Command Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RuggedCom Devices - Backdoor Access | This is a remote exploit for hardware platform. Description: RuggedCom Devices - Backdoor Access. Author: jc |
Analyze the security implications of: RuggedCom Devices - Backdoor Access | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: SolarWinds Virtualization Manager - Local Privilege Escalation | This is a local exploit for linux platform. Description: SolarWinds Virtualization Manager - Local Privilege Escalation. Author: Nate Kettlewell |
Analyze the security implications of: SolarWinds Virtualization Manager - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AIX 5.3.0 - 'invscout' Local Command Execution | This is a local exploit for aix platform. Description: AIX 5.3.0 - 'invscout' Local Command Execution. Author: ri0t |
Analyze the security implications of: AIX 5.3.0 - 'invscout' Local Command Execution | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: Websense Email Security - Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: Websense Email Security - Cross-Site Scripting. Author: Nikolas Sotiriu |
Analyze the security implications of: Websense Email Security - Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: OpenDcHub 0.8.1 - Remote Code Execution | This is a remote exploit for linux platform. Description: OpenDcHub 0.8.1 - Remote Code Execution. Author: Pierre Nogues |
Analyze the security implications of: OpenDcHub 0.8.1 - Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PHP/FI 1.0/FI 2.0/FI 2.0 b10 - mylog/mlog | This is a remote exploit for php platform. Description: PHP/FI 1.0/FI 2.0/FI 2.0 b10 - mylog/mlog. Author: Bryan Berg |
Analyze the security implications of: PHP/FI 1.0/FI 2.0/FI 2.0 b10 - mylog/mlog | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Chyrp 2.1.2 - '/includes/error.php?body' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Chyrp 2.1.2 - '/includes/error.php?body' Cross-Site Scripting. Author: High-Tech Bridge SA |
Analyze the security implications of: Chyrp 2.1.2 - '/includes/error.php?body' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Employee Management System 1.0 - Cross Site Scripting (Stored) | This is a webapps exploit for php platform. Description: Employee Management System 1.0 - Cross Site Scripting (Stored). Author: Ankita Pal |
Analyze the security implications of: Employee Management System 1.0 - Cross Site Scripting (Stored) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Citrix Application Delivery Controller and Gateway 10.5 - Remote Code Execution (Metasploit) | This is a webapps exploit for multiple platform. Description: Citrix Application Delivery Controller and Gateway 10.5 - Remote Code Execution (Metasploit). Author: mekhalleh |
Analyze the security implications of: Citrix Application Delivery Controller and Gateway 10.5 - Remote Code Execution (Metasploit) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Cross-Site Request Forgery. Author: LiquidWorm |
Analyze the security implications of: Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: AVEVA InTouch Access Anywhere Secure Gateway 2020 R2 - Path Traversal | This is a remote exploit for hardware platform. Description: AVEVA InTouch Access Anywhere Secure Gateway 2020 R2 - Path Traversal. Author: Jens Regel |
Analyze the security implications of: AVEVA InTouch Access Anywhere Secure Gateway 2020 R2 - Path Traversal | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.