input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Mango Blog 1.4.1 - '/archives.cfm/search' Cross-Site Scripting | This is a webapps exploit for cfm platform. Description: Mango Blog 1.4.1 - '/archives.cfm/search' Cross-Site Scripting. Author: MustLive |
Analyze the security implications of: Mango Blog 1.4.1 - '/archives.cfm/search' Cross-Site Scripting | This exploit targets cfm systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cfm platform |
What is this exploit about: MyServer 0.9.8 - Post.MSCGI Cross-Site Scripting | This is a remote exploit for multiple platform. Description: MyServer 0.9.8 - Post.MSCGI Cross-Site Scripting. Author: Prili |
Analyze the security implications of: MyServer 0.9.8 - Post.MSCGI Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Tenable WAS-Scanner 7.4.1708 - Remote Command Execution | This is a remote exploit for linux platform. Description: Tenable WAS-Scanner 7.4.1708 - Remote Command Execution. Author: Sameer Goyal |
Analyze the security implications of: Tenable WAS-Scanner 7.4.1708 - Remote Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Exponent CMS 0.96.5/0.96.6 - 'magpie_slashbox.php?rss_url' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Exponent CMS 0.96.5/0.96.6 - 'magpie_slashbox.php?rss_url' Cross-Site Scripting. Author: Hamid Ebadi |
Analyze the security implications of: Exponent CMS 0.96.5/0.96.6 - 'magpie_slashbox.php?rss_url' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RomPager 4.34 (Multiple Router Vendors) - 'Misfortune Cookie' Authentication Bypass | This is a webapps exploit for hardware platform. Description: RomPager 4.34 (Multiple Router Vendors) - 'Misfortune Cookie' Authentication Bypass. Author: Milad Doorbash |
Analyze the security implications of: RomPager 4.34 (Multiple Router Vendors) - 'Misfortune Cookie' Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: K-Search - SQL Injection / Cross-Site Scripting | This is a webapps exploit for php platform. Description: K-Search - SQL Injection / Cross-Site Scripting. Author: Sangteamtham |
Analyze the security implications of: K-Search - SQL Injection / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: E-Xoops 1.0.5/1.0.8 - '/mydownloads/ratefile.php?lid' SQL Injection | This is a webapps exploit for php platform. Description: E-Xoops 1.0.5/1.0.8 - '/mydownloads/ratefile.php?lid' SQL Injection. Author: Lostmon |
Analyze the security implications of: E-Xoops 1.0.5/1.0.8 - '/mydownloads/ratefile.php?lid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ac4p Mobile - 'polls.php' Multiple Cross-Site Scripting Vulnerabilities (2) | This is a webapps exploit for php platform. Description: ac4p Mobile - 'polls.php' Multiple Cross-Site Scripting Vulnerabilities (2). Author: SwEET-DeViL |
Analyze the security implications of: ac4p Mobile - 'polls.php' Multiple Cross-Site Scripting Vulnerabilities (2) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Content ConstructionKit 1.1 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Content ConstructionKit 1.1 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Content ConstructionKit 1.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DMXReady Member Directory Manager 1.1 - SQL Injection | This is a webapps exploit for asp platform. Description: DMXReady Member Directory Manager 1.1 - SQL Injection. Author: ajann |
Analyze the security implications of: DMXReady Member Directory Manager 1.1 - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Apple iTouch/iPhone 1.1.1 - '.tif' Remote Privilege Escalation 'Jailbreak' | This is a remote exploit for ios platform. Description: Apple iTouch/iPhone 1.1.1 - '.tif' Remote Privilege Escalation 'Jailbreak'. Author: Niacin & Dre |
Analyze the security implications of: Apple iTouch/iPhone 1.1.1 - '.tif' Remote Privilege Escalation 'Jailbreak' | This exploit targets ios systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Wireshark 1.4.4 - DECT Dissector Remote Buffer Overflow | This is a remote exploit for linux platform. Description: Wireshark 1.4.4 - DECT Dissector Remote Buffer Overflow. Author: ipv |
Analyze the security implications of: Wireshark 1.4.4 - DECT Dissector Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Généré par KDPics 1.18 - Remote Add Admin | This is a webapps exploit for php platform. Description: Généré par KDPics 1.18 - Remote Add Admin. Author: snakespc |
Analyze the security implications of: Généré par KDPics 1.18 - Remote Add Admin | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Wired Community Software WWWThreads 5.0 - SQL Command Input | This is a remote exploit for cgi platform. Description: Wired Community Software WWWThreads 5.0 - SQL Command Input. Author: rain forest puppy |
Analyze the security implications of: Wired Community Software WWWThreads 5.0 - SQL Command Input | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Prima FlexAir Access Control 2.3.38 - Remote Code Execution | This is a webapps exploit for hardware platform. Description: Prima FlexAir Access Control 2.3.38 - Remote Code Execution. Author: LiquidWorm |
Analyze the security implications of: Prima FlexAir Access Control 2.3.38 - Remote Code Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: BandSite CMS 1.1 - 'help_merch.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: BandSite CMS 1.1 - 'help_merch.php' Cross-Site Scripting. Author: HACKERS PAL |
Analyze the security implications of: BandSite CMS 1.1 - 'help_merch.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Drupal Module Embedded Media Field/Media 6.x : Video Flotsam/Media: Audio Flotsam - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Drupal Module Embedded Media Field/Media 6.x : Video Flotsam/Media: Audio Flotsam - Multiple Vulnerabilities. Author: Justin Klein Keane |
Analyze the security implications of: Drupal Module Embedded Media Field/Media 6.x : Video Flotsam/Media: Audio Flotsam - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Flash - 'Setting' Use-After-Free | This is a dos exploit for multiple platform. Description: Adobe Flash - 'Setting' Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - 'Setting' Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Catalog Builder eCommerce Software - Blind SQL Injection | This is a webapps exploit for php platform. Description: Catalog Builder eCommerce Software - Blind SQL Injection. Author: takeshix |
Analyze the security implications of: Catalog Builder eCommerce Software - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ICL ScadaFlex II SCADA Controllers SC-1/SC-2 1.03.07 - Remote File CRUD | This is a remote exploit for hardware platform. Description: ICL ScadaFlex II SCADA Controllers SC-1/SC-2 1.03.07 - Remote File CRUD. Author: LiquidWorm |
Analyze the security implications of: ICL ScadaFlex II SCADA Controllers SC-1/SC-2 1.03.07 - Remote File CRUD | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: nostromo 1.9.6 - Remote Code Execution | This is a remote exploit for multiple platform. Description: nostromo 1.9.6 - Remote Code Execution. Author: Kr0ff |
Analyze the security implications of: nostromo 1.9.6 - Remote Code Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Niti Telecom Caravan Business Server 2.00-03D - Directory Traversal | This is a webapps exploit for asp platform. Description: Niti Telecom Caravan Business Server 2.00-03D - Directory Traversal. Author: dr_insane |
Analyze the security implications of: Niti Telecom Caravan Business Server 2.00-03D - Directory Traversal | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: PHP Laravel Framework 5.5.40 / 5.6.x < 5.6.30 - token Unserialize Remote Command Execution (Metasploit) | This is a remote exploit for linux platform. Description: PHP Laravel Framework 5.5.40 / 5.6.x < 5.6.30 - token Unserialize Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: PHP Laravel Framework 5.5.40 / 5.6.x < 5.6.30 - token Unserialize Remote Command Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: QNAP Turbo NAS 3.6.1 Build 0302T - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: QNAP Turbo NAS 3.6.1 Build 0302T - Multiple Vulnerabilities. Author: Sense of Security |
Analyze the security implications of: QNAP Turbo NAS 3.6.1 Build 0302T - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Datemill - 'photo_view.php?return' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Datemill - 'photo_view.php?return' Cross-Site Scripting. Author: Moudi |
Analyze the security implications of: Datemill - 'photo_view.php?return' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Opera Web browser 7.54 java implementation - Multiple Vulnerabilities (4) | This is a local exploit for linux platform. Description: Opera Web browser 7.54 java implementation - Multiple Vulnerabilities (4). Author: Marc Schoenefeld |
Analyze the security implications of: Opera Web browser 7.54 java implementation - Multiple Vulnerabilities (4) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: libgd 2.1.1 - Signedness Heap Overflow | This is a remote exploit for linux platform. Description: libgd 2.1.1 - Signedness Heap Overflow. Author: Hans Jerry Illikainen |
Analyze the security implications of: libgd 2.1.1 - Signedness Heap Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: L2J Statistik Script 0.09 - 'index.php' Local File Inclusion | This is a webapps exploit for php platform. Description: L2J Statistik Script 0.09 - 'index.php' Local File Inclusion. Author: Codebreak |
Analyze the security implications of: L2J Statistik Script 0.09 - 'index.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Anthologia 0.5.2 - 'index.php?ads_file' Remote File Inclusion | This is a webapps exploit for php platform. Description: Anthologia 0.5.2 - 'index.php?ads_file' Remote File Inclusion. Author: Dj7xpl |
Analyze the security implications of: Anthologia 0.5.2 - 'index.php?ads_file' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RealServer 5.0/6.0/7.0 - Memory Contents Disclosure | This is a remote exploit for multiple platform. Description: RealServer 5.0/6.0/7.0 - Memory Contents Disclosure. Author: CORE-SDI |
Analyze the security implications of: RealServer 5.0/6.0/7.0 - Memory Contents Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: D-Link DWR-113 Rev. Ax - Cross-Site Request Forgery / Denial of Service | This is a dos exploit for hardware platform. Description: D-Link DWR-113 Rev. Ax - Cross-Site Request Forgery / Denial of Service. Author: Blessen Thomas |
Analyze the security implications of: D-Link DWR-113 Rev. Ax - Cross-Site Request Forgery / Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Netscape Enterprise Web Server for Netware 4/5 5.0 - Information Disclosure | This is a remote exploit for novell platform. Description: Netscape Enterprise Web Server for Netware 4/5 5.0 - Information Disclosure. Author: Procheckup |
Analyze the security implications of: Netscape Enterprise Web Server for Netware 4/5 5.0 - Information Disclosure | This exploit targets novell systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets novell platform |
What is this exploit about: Apport 2.14.1 (Ubuntu 14.04.2) - Local Privilege Escalation | This is a local exploit for linux platform. Description: Apport 2.14.1 (Ubuntu 14.04.2) - Local Privilege Escalation. Author: Ricardo F. Teixeira |
Analyze the security implications of: Apport 2.14.1 (Ubuntu 14.04.2) - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Maxwebportal 1.3 - 'dl_toprated.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Maxwebportal 1.3 - 'dl_toprated.asp' SQL Injection. Author: s-dalili |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.