input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Joomla! Component com_qpersonel - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joomla! Component com_qpersonel - Cross-Site Scripting. Author: Pyske |
Analyze the security implications of: Joomla! Component com_qpersonel - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Teams - Multiple Blind SQL Injections | This is a webapps exploit for php platform. Description: Joomla! Component Teams - Multiple Blind SQL Injections. Author: Salvatore Fresta |
Analyze the security implications of: Joomla! Component Teams - Multiple Blind SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo Module HTMLArea3 1.5 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Mambo Module HTMLArea3 1.5 - Remote File Inclusion. Author: Matdhule |
Analyze the security implications of: Mambo Module HTMLArea3 1.5 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Microsys CyberPatrol 4.0 4.003/4.0 4.005 - Insecure Registration | This is a remote exploit for multiple platform. Description: Microsys CyberPatrol 4.0 4.003/4.0 4.005 - Insecure Registration. Author: Joey Maier |
Analyze the security implications of: Microsys CyberPatrol 4.0 4.003/4.0 4.005 - Insecure Registration | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AtMail Email Server Appliance 6.4 - Persistent Cross-Site Scripting / Cross-Site Request Forgery / Remote Code Execution | This is a remote exploit for linux platform. Description: AtMail Email Server Appliance 6.4 - Persistent Cross-Site Scripting / Cross-Site Request Forgery / Remote Code Execution. Author: muts |
Analyze the security implications of: AtMail Email Server Appliance 6.4 - Persistent Cross-Site Scripting / Cross-Site Request Forgery / Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: GoldLink 3.0 - Cookie SQL Injection | This is a webapps exploit for php platform. Description: GoldLink 3.0 - Cookie SQL Injection. Author: Weke |
Analyze the security implications of: GoldLink 3.0 - Cookie SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ibProArcade 2.x - module 'vBulletin/IPB' SQL Injection | This is a webapps exploit for php platform. Description: ibProArcade 2.x - module 'vBulletin/IPB' SQL Injection. Author: B~HFH |
Analyze the security implications of: ibProArcade 2.x - module 'vBulletin/IPB' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eduTrac - 'showmask' Directory Traversal | This is a webapps exploit for php platform. Description: eduTrac - 'showmask' Directory Traversal. Author: High-Tech Bridge |
Analyze the security implications of: eduTrac - 'showmask' Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CommSy 8.6.5 - SQL injection | This is a webapps exploit for php platform. Description: CommSy 8.6.5 - SQL injection. Author: Jens Regel |
Analyze the security implications of: CommSy 8.6.5 - SQL injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: dl_stats - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: dl_stats - Multiple Vulnerabilities. Author: Valentin Hoebel |
Analyze the security implications of: dl_stats - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Link Directory 1.0.3 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Link Directory 1.0.3 - Remote File Inclusion. Author: camino |
Analyze the security implications of: Joomla! Component Link Directory 1.0.3 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GHIA CamIP 1.2 for iOS - 'Password' Denial of Service (PoC) | This is a dos exploit for ios platform. Description: GHIA CamIP 1.2 for iOS - 'Password' Denial of Service (PoC). Author: Ivan Marmolejo |
Analyze the security implications of: GHIA CamIP 1.2 for iOS - 'Password' Denial of Service (PoC) | This exploit targets ios systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: RICOH MP C1803 JPN Printer - Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: RICOH MP C1803 JPN Printer - Cross-Site Scripting. Author: Ismail Tasdelen |
Analyze the security implications of: RICOH MP C1803 JPN Printer - Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: free QBoard 1.1 - 'index.php?qb_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: free QBoard 1.1 - 'index.php?qb_path' Remote File Inclusion. Author: CrAsh_oVeR_rIdE |
Analyze the security implications of: free QBoard 1.1 - 'index.php?qb_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AwesomeTemplateEngine 1 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: AwesomeTemplateEngine 1 - Multiple Cross-Site Scripting Vulnerabilities. Author: MustLive |
Analyze the security implications of: AwesomeTemplateEngine 1 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DarkComet (C2 Server) - File Upload | This is a webapps exploit for multiple platform. Description: DarkComet (C2 Server) - File Upload. Author: Pseudo Laboratories |
Analyze the security implications of: DarkComet (C2 Server) - File Upload | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple Mac OSX 10.10 - BlueTooth DispatchHCICreateConnection Crash (PoC) | This is a dos exploit for osx platform. Description: Apple Mac OSX 10.10 - BlueTooth DispatchHCICreateConnection Crash (PoC). Author: rpaleari & joystick |
Analyze the security implications of: Apple Mac OSX 10.10 - BlueTooth DispatchHCICreateConnection Crash (PoC) | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Joomla! Component SquadManagement 1.0.3 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component SquadManagement 1.0.3 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component SquadManagement 1.0.3 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Stanford University bootpd 2.4.3 / Debian 2.0 - netstd | This is a local exploit for linux platform. Description: Stanford University bootpd 2.4.3 / Debian 2.0 - netstd. Author: anonymous |
Analyze the security implications of: Stanford University bootpd 2.4.3 / Debian 2.0 - netstd | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PHP 5.2.1 - 'Session.Save_Path()' TMPDIR open_basedir Restriction Bypass | This is a local exploit for php platform. Description: PHP 5.2.1 - 'Session.Save_Path()' TMPDIR open_basedir Restriction Bypass. Author: Stefan Esser |
Analyze the security implications of: PHP 5.2.1 - 'Session.Save_Path()' TMPDIR open_basedir Restriction Bypass | This exploit targets php systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Brewthology 0.1 - SQL Injection | This is a webapps exploit for php platform. Description: Brewthology 0.1 - SQL Injection. Author: cr4wl3r |
Analyze the security implications of: Brewthology 0.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Netgear DGN1000B - 'setup.cgi' Remote Command Execution (Metasploit) | This is a remote exploit for hardware platform. Description: Netgear DGN1000B - 'setup.cgi' Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Netgear DGN1000B - 'setup.cgi' Remote Command Execution (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Netscape Communicator 4.x - JPEG-Comment Heap Overwrite | This is a dos exploit for multiple platform. Description: Netscape Communicator 4.x - JPEG-Comment Heap Overwrite. Author: Solar Designer |
Analyze the security implications of: Netscape Communicator 4.x - JPEG-Comment Heap Overwrite | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Agora 1.4 RC1 - 'MysqlfinderAdmin.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Agora 1.4 RC1 - 'MysqlfinderAdmin.php' Remote File Inclusion. Author: the_day |
Analyze the security implications of: Agora 1.4 RC1 - 'MysqlfinderAdmin.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Destar 0.2.2-5 - Arbitrary Add New User | This is a webapps exploit for php platform. Description: Destar 0.2.2-5 - Arbitrary Add New User. Author: nonroot |
Analyze the security implications of: Destar 0.2.2-5 - Arbitrary Add New User | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Chamilo LMS 1.9.10 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Chamilo LMS 1.9.10 - Multiple Vulnerabilities. Author: Rehan Ahmed |
Analyze the security implications of: Chamilo LMS 1.9.10 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Chrome 0.2.149 - Malformed 'view-source' HTTP Header Remote Denial of Service | This is a dos exploit for multiple platform. Description: Google Chrome 0.2.149 - Malformed 'view-source' HTTP Header Remote Denial of Service. Author: Juan Pablo Lopez Yacubian |
Analyze the security implications of: Google Chrome 0.2.149 - Malformed 'view-source' HTTP Header Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Elgg 1.7.10 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Elgg 1.7.10 - Multiple Vulnerabilities. Author: Aung Khant |
Analyze the security implications of: Elgg 1.7.10 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component DT Register 3.2.7 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component DT Register 3.2.7 - 'id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component DT Register 3.2.7 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Imageview 5 - '/Cookie/index.php' Local/Remote File Inclusion | This is a webapps exploit for php platform. Description: Imageview 5 - '/Cookie/index.php' Local/Remote File Inclusion. Author: Kacper |
Analyze the security implications of: Imageview 5 - '/Cookie/index.php' Local/Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CommunityPortals 1.0 - 'import-archive.php' File Inclusion | This is a webapps exploit for php platform. Description: CommunityPortals 1.0 - 'import-archive.php' File Inclusion. Author: Nima Salehi |
Analyze the security implications of: CommunityPortals 1.0 - 'import-archive.php' File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Amaya Web Browser 10.0.1/10.1-pre5 - HTML Tag Buffer Overflow (PoC) | This is a dos exploit for multiple platform. Description: Amaya Web Browser 10.0.1/10.1-pre5 - HTML Tag Buffer Overflow (PoC). Author: webDEViL |
Analyze the security implications of: Amaya Web Browser 10.0.1/10.1-pre5 - HTML Tag Buffer Overflow (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Community Builder Enhanced (CBE) 1.4.8/1.4.9/1.4.10 - Local File Inclusion / Remote Code Execution | This is a webapps exploit for php platform. Description: Joomla! Component Community Builder Enhanced (CBE) 1.4.8/1.4.9/1.4.10 - Local File Inclusion / Remote Code Execution. Author: Delf Tonder |
Analyze the security implications of: Joomla! Component Community Builder Enhanced (CBE) 1.4.8/1.4.9/1.4.10 - Local File Inclusion / Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LG LR3100p 1.30 Series Router - IP Packet Flags Denial of Service | This is a dos exploit for hardware platform. Description: LG LR3100p 1.30 Series Router - IP Packet Flags Denial of Service. Author: Lukasz Bromirski |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.