input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Flexmonster Pivot Table & Charts 2.7.17 - 'Remote JSON' Reflected XSS | This is a webapps exploit for multiple platform. Description: Flexmonster Pivot Table & Charts 2.7.17 - 'Remote JSON' Reflected XSS. Author: Marco Nappi |
Analyze the security implications of: Flexmonster Pivot Table & Charts 2.7.17 - 'Remote JSON' Reflected XSS | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Gallery 1.4 - 'index.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Gallery 1.4 - 'index.php' Remote File Inclusion. Author: peter |
Analyze the security implications of: Gallery 1.4 - 'index.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AzDGDatingLite 2.1.3 - Remote Code Execution | This is a webapps exploit for php platform. Description: AzDGDatingLite 2.1.3 - Remote Code Execution. Author: rgod |
Analyze the security implications of: AzDGDatingLite 2.1.3 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_simpleswfupload - 'uploadhandler.php' Arbitrary File Upload | This is a webapps exploit for php platform. Description: Joomla! Component com_simpleswfupload - 'uploadhandler.php' Arbitrary File Upload. Author: Sammy FORGIT |
Analyze the security implications of: Joomla! Component com_simpleswfupload - 'uploadhandler.php' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: KAPhotoservice - 'order.asp?page' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: KAPhotoservice - 'order.asp?page' Cross-Site Scripting. Author: by_casper41 |
Analyze the security implications of: KAPhotoservice - 'order.asp?page' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Chamilo LMS - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Chamilo LMS - Persistent Cross-Site Scripting. Author: Vulnerability-Lab |
Analyze the security implications of: Chamilo LMS - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fastpublish CMS 1.6.9 - config[fsBase] Remote File Inclusion | This is a webapps exploit for php platform. Description: Fastpublish CMS 1.6.9 - config[fsBase] Remote File Inclusion. Author: Kacper |
Analyze the security implications of: Fastpublish CMS 1.6.9 - config[fsBase] Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Spread The Word - Multiple SQL Injections | This is a webapps exploit for asp platform. Description: Spread The Word - Multiple SQL Injections. Author: Lostmon |
Analyze the security implications of: Spread The Word - Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Interaction SIP Proxy 3.0 - Remote Heap Corruption Denial of Service | This is a dos exploit for multiple platform. Description: Interaction SIP Proxy 3.0 - Remote Heap Corruption Denial of Service. Author: Behrang Fouladi |
Analyze the security implications of: Interaction SIP Proxy 3.0 - Remote Heap Corruption Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Invoice Template - 'hash' SQL Injection | This is a webapps exploit for php platform. Description: Invoice Template - 'hash' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Invoice Template - 'hash' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Telerik UI for ASP.NET AJAX 2012.3.1308 < 2017.1.118 - Encryption Keys Disclosure | This is a webapps exploit for aspx platform. Description: Telerik UI for ASP.NET AJAX 2012.3.1308 < 2017.1.118 - Encryption Keys Disclosure. Author: Paul Taylor |
Analyze the security implications of: Telerik UI for ASP.NET AJAX 2012.3.1308 < 2017.1.118 - Encryption Keys Disclosure | This exploit targets aspx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aspx platform |
What is this exploit about: Nethack 3 - Local Buffer Overflow (3) | This is a local exploit for linux platform. Description: Nethack 3 - Local Buffer Overflow (3). Author: tsao@efnet |
Analyze the security implications of: Nethack 3 - Local Buffer Overflow (3) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component MooFAQ (com_moofaq) - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component MooFAQ (com_moofaq) - Local File Inclusion. Author: Chip d3 bi0s |
Analyze the security implications of: Joomla! Component MooFAQ (com_moofaq) - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alstrasoft FMyLife Pro 1.02 - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: Alstrasoft FMyLife Pro 1.02 - Cross-Site Request Forgery (Add Admin). Author: Ihsan Sencan |
Analyze the security implications of: Alstrasoft FMyLife Pro 1.02 - Cross-Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: File Management System 1.1 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: File Management System 1.1 - Persistent Cross-Site Scripting. Author: KeopssGroup0day_Inc |
Analyze the security implications of: File Management System 1.1 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX - mDNSResponder UPnP Location Overflow (Metasploit) | This is a remote exploit for osx platform. Description: Apple Mac OSX - mDNSResponder UPnP Location Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: Apple Mac OSX - mDNSResponder UPnP Location Overflow (Metasploit) | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: BloofoxCMS 0.3.4 - 'lang' Local File Inclusion | This is a webapps exploit for php platform. Description: BloofoxCMS 0.3.4 - 'lang' Local File Inclusion. Author: fuzion |
Analyze the security implications of: BloofoxCMS 0.3.4 - 'lang' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Goolery 0.3 - 'viewalbum.php?page' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Goolery 0.3 - 'viewalbum.php?page' Cross-Site Scripting. Author: Lostmon |
Analyze the security implications of: Goolery 0.3 - 'viewalbum.php?page' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Clipbucket 2.6 - 'collections.php?cat' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Clipbucket 2.6 - 'collections.php?cat' Cross-Site Scripting. Author: YaDoY666 |
Analyze the security implications of: Clipbucket 2.6 - 'collections.php?cat' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MIDAS 1.43 - (Authentication Bypass) Insecure Cookie Handling | This is a webapps exploit for cgi platform. Description: MIDAS 1.43 - (Authentication Bypass) Insecure Cookie Handling. Author: HxH |
Analyze the security implications of: MIDAS 1.43 - (Authentication Bypass) Insecure Cookie Handling | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Oracle WebCenter Sites (FatWire Content Server) - Multiple Vulnerabilities | This is a webapps exploit for multiple platform. Description: Oracle WebCenter Sites (FatWire Content Server) - Multiple Vulnerabilities. Author: SEC Consult |
Analyze the security implications of: Oracle WebCenter Sites (FatWire Content Server) - Multiple Vulnerabilities | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Allegro RomPager 4.07 - UPnP HTTP Request Remote Denial of Service | This is a dos exploit for multiple platform. Description: Allegro RomPager 4.07 - UPnP HTTP Request Remote Denial of Service. Author: Ricky-Lee Birtles |
Analyze the security implications of: Allegro RomPager 4.07 - UPnP HTTP Request Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ITechClassifieds - 'viewcat.php?CatID' Cross-Site Scripting | This is a webapps exploit for php platform. Description: ITechClassifieds - 'viewcat.php?CatID' Cross-Site Scripting. Author: Crackers_Child |
Analyze the security implications of: ITechClassifieds - 'viewcat.php?CatID' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP-UX 10/11 - NLSPATH Environment Variable Format String (1) | This is a local exploit for hp-ux platform. Description: HP-UX 10/11 - NLSPATH Environment Variable Format String (1). Author: watercloud |
Analyze the security implications of: HP-UX 10/11 - NLSPATH Environment Variable Format String (1) | This exploit targets hp-ux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hp-ux platform |
What is this exploit about: Snitz Forums 2000 - Database Disclosure | This is a webapps exploit for asp platform. Description: Snitz Forums 2000 - Database Disclosure. Author: ViRuSMaN |
Analyze the security implications of: Snitz Forums 2000 - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Thecus N4800Eco Nas Server Control Panel - Comand Injection | This is a webapps exploit for hardware platform. Description: Thecus N4800Eco Nas Server Control Panel - Comand Injection. Author: Metin Yunus Kandemir |
Analyze the security implications of: Thecus N4800Eco Nas Server Control Panel - Comand Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: SQL-Ledger 2.6.x/LedgerSMB 1.0 - 'Terminal' Directory Traversal | This is a webapps exploit for cgi platform. Description: SQL-Ledger 2.6.x/LedgerSMB 1.0 - 'Terminal' Directory Traversal. Author: Chris Murtagh |
Analyze the security implications of: SQL-Ledger 2.6.x/LedgerSMB 1.0 - 'Terminal' Directory Traversal | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: PHP 5.0.0 - 'snmpwalkoid()' Local Denial of Service | This is a dos exploit for php platform. Description: PHP 5.0.0 - 'snmpwalkoid()' Local Denial of Service. Author: Yakir Wizman |
Analyze the security implications of: PHP 5.0.0 - 'snmpwalkoid()' Local Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IRIX 5.3/6.2/6.3/6.4/6.5/6.5.11 - '/usr/bin/lpstat' Local Overflow / Local Privilege Escalation | This is a local exploit for irix platform. Description: IRIX 5.3/6.2/6.3/6.4/6.5/6.5.11 - '/usr/bin/lpstat' Local Overflow / Local Privilege Escalation. Author: LSD-PLaNET |
Analyze the security implications of: IRIX 5.3/6.2/6.3/6.4/6.5/6.5.11 - '/usr/bin/lpstat' Local Overflow / Local Privilege Escalation | This exploit targets irix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: F5 BIG-IP 9.4.3 - Web Management Interface Cross-Site Request Forgery | This is a remote exploit for hardware platform. Description: F5 BIG-IP 9.4.3 - Web Management Interface Cross-Site Request Forgery. Author: nnposter |
Analyze the security implications of: F5 BIG-IP 9.4.3 - Web Management Interface Cross-Site Request Forgery | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: NUUO NVRmini - upgrade_handle.php Remote Command Execution (Metasploit) | This is a remote exploit for php platform. Description: NUUO NVRmini - upgrade_handle.php Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: NUUO NVRmini - upgrade_handle.php Remote Command Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dynamic Biz Website Builder (QuickWeb) 1.0 - '/apps/news-events/newdetail.asp?id' SQL Injection | This is a webapps exploit for asp platform. Description: Dynamic Biz Website Builder (QuickWeb) 1.0 - '/apps/news-events/newdetail.asp?id' SQL Injection. Author: R3d-D3V!L |
Analyze the security implications of: Dynamic Biz Website Builder (QuickWeb) 1.0 - '/apps/news-events/newdetail.asp?id' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Firefly Studios Stronghold 2 - Remote Denial of Service | This is a dos exploit for multiple platform. Description: Firefly Studios Stronghold 2 - Remote Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: Firefly Studios Stronghold 2 - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mambo Component bigAPE-Backup 1.1 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Mambo Component bigAPE-Backup 1.1 - Remote File Inclusion. Author: mdx |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.