input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: AZ Photo Album Script Pro - Cross-Site Scripting | This is a webapps exploit for php platform. Description: AZ Photo Album Script Pro - Cross-Site Scripting. Author: Luny |
Analyze the security implications of: AZ Photo Album Script Pro - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SAP ConfigServlet - OS Command Execution (Metasploit) | This is a remote exploit for multiple platform. Description: SAP ConfigServlet - OS Command Execution (Metasploit). Author: Andras Kabai |
Analyze the security implications of: SAP ConfigServlet - OS Command Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Klog Server 2.4.1 - Command Injection (Authenticated) | This is a webapps exploit for php platform. Description: Klog Server 2.4.1 - Command Injection (Authenticated). Author: Metin Yunus Kandemir |
Analyze the security implications of: Klog Server 2.4.1 - Command Injection (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 2WIRE Routers - 'CD35_SETUP_01' Access Validation | This is a remote exploit for hardware platform. Description: 2WIRE Routers - 'CD35_SETUP_01' Access Validation. Author: hkm |
Analyze the security implications of: 2WIRE Routers - 'CD35_SETUP_01' Access Validation | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component JquickContact 1.3.2.2.1 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JquickContact 1.3.2.2.1 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component JquickContact 1.3.2.2.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ajax Upload - Arbitrary File Upload | This is a webapps exploit for multiple platform. Description: Ajax Upload - Arbitrary File Upload. Author: Daniel Godoy |
Analyze the security implications of: Ajax Upload - Arbitrary File Upload | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: IkonBoard 3.x - Multiple SQL Injections | This is a webapps exploit for cgi platform. Description: IkonBoard 3.x - Multiple SQL Injections. Author: anonymous |
Analyze the security implications of: IkonBoard 3.x - Multiple SQL Injections | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: AzDGDatingMedium 1.9.3 - Multiple Remote Vulnerabilities | This is a webapps exploit for php platform. Description: AzDGDatingMedium 1.9.3 - Multiple Remote Vulnerabilities. Author: AkaStep |
Analyze the security implications of: AzDGDatingMedium 1.9.3 - Multiple Remote Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ane CMS 1 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Ane CMS 1 - Persistent Cross-Site Scripting. Author: pratul agrawal |
Analyze the security implications of: Ane CMS 1 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: XFree86 X11R6 3.3.5/3.3.6/4.0 Xserver - Denial of Service | This is a dos exploit for linux platform. Description: XFree86 X11R6 3.3.5/3.3.6/4.0 Xserver - Denial of Service. Author: Chris Evans |
Analyze the security implications of: XFree86 X11R6 3.3.5/3.3.6/4.0 Xserver - Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: GenesisTrader 1.0 - 'form.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: GenesisTrader 1.0 - 'form.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Mr_KaLiMaN |
Analyze the security implications of: GenesisTrader 1.0 - 'form.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Douran Portal 3.9.7.55 - Arbitrary File Upload / Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Douran Portal 3.9.7.55 - Arbitrary File Upload / Cross-Site Scripting. Author: ITSecTeam |
Analyze the security implications of: Douran Portal 3.9.7.55 - Arbitrary File Upload / Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Active Calendar 1.2 - '/data/m_2.php?css' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Active Calendar 1.2 - '/data/m_2.php?css' Cross-Site Scripting. Author: Simon Bonnard |
Analyze the security implications of: Active Calendar 1.2 - '/data/m_2.php?css' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FizzMedia 1.51.2 - SQL Injection | This is a webapps exploit for php platform. Description: FizzMedia 1.51.2 - SQL Injection. Author: Mr.SQL |
Analyze the security implications of: FizzMedia 1.51.2 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Faq Administrator 2.1 - 'faq_reply.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Faq Administrator 2.1 - 'faq_reply.php' Remote File Inclusion. Author: v1per-haCker |
Analyze the security implications of: Faq Administrator 2.1 - 'faq_reply.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Crafty Syntax Live Help 2.14.6 - 'livehelp_js.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Crafty Syntax Live Help 2.14.6 - 'livehelp_js.php' Cross-Site Scripting. Author: CoRSaNTuRK |
Analyze the security implications of: Crafty Syntax Live Help 2.14.6 - 'livehelp_js.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: sudo 1.8.0 < 1.8.3p1 - Format String | This is a dos exploit for linux platform. Description: sudo 1.8.0 < 1.8.3p1 - Format String. Author: joernchen |
Analyze the security implications of: sudo 1.8.0 < 1.8.3p1 - Format String | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CommuniMail 1.2 - 'mailadmin.cgi?list_id' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: CommuniMail 1.2 - 'mailadmin.cgi?list_id' Cross-Site Scripting. Author: r0t |
Analyze the security implications of: CommuniMail 1.2 - 'mailadmin.cgi?list_id' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Samsung Smart Home Camera SNH-P-6410 - Command Injection | This is a remote exploit for hardware platform. Description: Samsung Smart Home Camera SNH-P-6410 - Command Injection. Author: PentestPartners |
Analyze the security implications of: Samsung Smart Home Camera SNH-P-6410 - Command Injection | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: DiamondList - '/user/main/update_settings?setting[site_title]' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DiamondList - '/user/main/update_settings?setting[site_title]' Cross-Site Scripting. Author: High-Tech Bridge SA |
Analyze the security implications of: DiamondList - '/user/main/update_settings?setting[site_title]' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Raven 1.0 - 'connector.asp' Arbitrary File Upload | This is a webapps exploit for asp platform. Description: Raven 1.0 - 'connector.asp' Arbitrary File Upload. Author: HELLBOY |
Analyze the security implications of: Raven 1.0 - 'connector.asp' Arbitrary File Upload | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: TIPS MailPost 5.1.1 - 'APPEND' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: TIPS MailPost 5.1.1 - 'APPEND' Cross-Site Scripting. Author: Procheckup |
Analyze the security implications of: TIPS MailPost 5.1.1 - 'APPEND' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: EasyPHP - '/index.php' Authentication Bypass / Remote PHP Code Injection | This is a webapps exploit for php platform. Description: EasyPHP - '/index.php' Authentication Bypass / Remote PHP Code Injection. Author: KedAns-Dz |
Analyze the security implications of: EasyPHP - '/index.php' Authentication Bypass / Remote PHP Code Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Zeus Web Server 4.x - Admin Interface 'VS_Diag.cgi' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: Zeus Web Server 4.x - Admin Interface 'VS_Diag.cgi' Cross-Site Scripting. Author: Hugo Vazquez |
Analyze the security implications of: Zeus Web Server 4.x - Admin Interface 'VS_Diag.cgi' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: USR IOT 4G LTE Industrial Cellular VPN Router 1.0.36 - Remote Root Backdoor | This is a remote exploit for hardware platform. Description: USR IOT 4G LTE Industrial Cellular VPN Router 1.0.36 - Remote Root Backdoor. Author: LiquidWorm |
Analyze the security implications of: USR IOT 4G LTE Industrial Cellular VPN Router 1.0.36 - Remote Root Backdoor | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Drupal Module Ajax Checklist 5.x-1.0 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Drupal Module Ajax Checklist 5.x-1.0 - Multiple SQL Injections. Author: Justin C. Klein Keane |
Analyze the security implications of: Drupal Module Ajax Checklist 5.x-1.0 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Livor 2.5 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Livor 2.5 - 'index.php' Cross-Site Scripting. Author: Arham Muhammad |
Analyze the security implications of: Livor 2.5 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Online Notebook Manager - SQL Injection | This is a webapps exploit for asp platform. Description: Online Notebook Manager - SQL Injection. Author: L0rd CrusAd3r |
Analyze the security implications of: Online Notebook Manager - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! / Mambo Component faq - 'catid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! / Mambo Component faq - 'catid' SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! / Mambo Component faq - 'catid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache Tomcat 11.0.3 - Remote Code Execution | This is a webapps exploit for multiple platform. Description: Apache Tomcat 11.0.3 - Remote Code Execution. Author: Al Baradi Joy |
Analyze the security implications of: Apache Tomcat 11.0.3 - Remote Code Execution | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Friends in War Make or Break 1.7 - Cross-Site Request Forgery (Change Admin Password) | This is a webapps exploit for php platform. Description: Friends in War Make or Break 1.7 - Cross-Site Request Forgery (Change Admin Password). Author: shinnai |
Analyze the security implications of: Friends in War Make or Break 1.7 - Cross-Site Request Forgery (Change Admin Password) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Advanced Poll 2.0.5-dev - Remote Admin Session Generator | This is a webapps exploit for php platform. Description: Advanced Poll 2.0.5-dev - Remote Admin Session Generator. Author: diwou |
Analyze the security implications of: Advanced Poll 2.0.5-dev - Remote Admin Session Generator | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NXFilter 3.0.3 - Cross-Site Request Forgery | This is a webapps exploit for jsp platform. Description: NXFilter 3.0.3 - Cross-Site Request Forgery. Author: hyp3rlinx |
Analyze the security implications of: NXFilter 3.0.3 - Cross-Site Request Forgery | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Nagios < 4.2.4 - Local Privilege Escalation | This is a local exploit for linux platform. Description: Nagios < 4.2.4 - Local Privilege Escalation. Author: Dawid Golunski |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.