input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Ice HRM 26.2.0 - Cross-Site Request Forgery (Add User) | This is a webapps exploit for php platform. Description: Ice HRM 26.2.0 - Cross-Site Request Forgery (Add User). Author: J3rryBl4nks |
Analyze the security implications of: Ice HRM 26.2.0 - Cross-Site Request Forgery (Add User) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OneWorldStore - 'DisplayResults.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: OneWorldStore - 'DisplayResults.asp' Cross-Site Scripting. Author: Lostmon |
Analyze the security implications of: OneWorldStore - 'DisplayResults.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Netkamp Emlak Scripti - Multiple Input Validation Vulnerabilities | This is a webapps exploit for asp platform. Description: Netkamp Emlak Scripti - Multiple Input Validation Vulnerabilities. Author: GeFORC3 |
Analyze the security implications of: Netkamp Emlak Scripti - Multiple Input Validation Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Free Bible Search PHP Script - SQL Injection | This is a webapps exploit for php platform. Description: Free Bible Search PHP Script - SQL Injection. Author: nuclear |
Analyze the security implications of: Free Bible Search PHP Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gizzar 03162002 - 'index.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Gizzar 03162002 - 'index.php' Remote File Inclusion. Author: DeltahackingTEAM |
Analyze the security implications of: Gizzar 03162002 - 'index.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MicroTik RouterOS < 6.43rc3 - Remote Root | This is a remote exploit for hardware platform. Description: MicroTik RouterOS < 6.43rc3 - Remote Root. Author: Jacob Baines |
Analyze the security implications of: MicroTik RouterOS < 6.43rc3 - Remote Root | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Linux Kernel 4.13 (Debian 9) - Local Privilege Escalation | This is a local exploit for linux platform. Description: Linux Kernel 4.13 (Debian 9) - Local Privilege Escalation. Author: anonymous |
Analyze the security implications of: Linux Kernel 4.13 (Debian 9) - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_flash - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_flash - SQL Injection. Author: DevilZ TM |
Analyze the security implications of: Joomla! Component com_flash - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Minicom 1.82/1.83 - Capture-file Group Ownership | This is a local exploit for linux platform. Description: Minicom 1.82/1.83 - Capture-file Group Ownership. Author: Michal Zalewski |
Analyze the security implications of: Minicom 1.82/1.83 - Capture-file Group Ownership | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component Alphacontent 2.5.8 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Alphacontent 2.5.8 - 'id' SQL Injection. Author: cO2 |
Analyze the security implications of: Joomla! Component Alphacontent 2.5.8 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Evaria ECMS 1.1 - 'DOCUMENT_ROOT' Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: Evaria ECMS 1.1 - 'DOCUMENT_ROOT' Multiple Remote File Inclusions. Author: ahmadbady |
Analyze the security implications of: Evaria ECMS 1.1 - 'DOCUMENT_ROOT' Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreeWebShop 2.2 - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: FreeWebShop 2.2 - 'index.php' SQL Injection. Author: Spiked |
Analyze the security implications of: FreeWebShop 2.2 - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LifeRay 7.2.1 GA2 - Stored XSS | This is a webapps exploit for multiple platform. Description: LifeRay 7.2.1 GA2 - Stored XSS. Author: 3ndG4me |
Analyze the security implications of: LifeRay 7.2.1 GA2 - Stored XSS | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Art Gallery Management System Project v1.0 - SQL Injection (editid) authenticated | This is a webapps exploit for php platform. Description: Art Gallery Management System Project v1.0 - SQL Injection (editid) authenticated. Author: Rahul Patwari |
Analyze the security implications of: Art Gallery Management System Project v1.0 - SQL Injection (editid) authenticated | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Guestbook Scripts PHP 1.5 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Guestbook Scripts PHP 1.5 - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: Guestbook Scripts PHP 1.5 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fully Modded phpBB 2021.4.40 - Multiple File Inclusions | This is a webapps exploit for php platform. Description: Fully Modded phpBB 2021.4.40 - Multiple File Inclusions. Author: 020 |
Analyze the security implications of: Fully Modded phpBB 2021.4.40 - Multiple File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: doorGets CMS - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: doorGets CMS - Cross-Site Request Forgery. Author: n0pe |
Analyze the security implications of: doorGets CMS - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Webee Comments 1.1/1.2 - 'index2.php' articleId SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Webee Comments 1.1/1.2 - 'index2.php' articleId SQL Injection. Author: Jeff Channell |
Analyze the security implications of: Joomla! Component Webee Comments 1.1/1.2 - 'index2.php' articleId SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Webmin 0.x - 'RPC' Privilege Escalation | This is a remote exploit for linux platform. Description: Webmin 0.x - 'RPC' Privilege Escalation. Author: Noam Rathaus |
Analyze the security implications of: Webmin 0.x - 'RPC' Privilege Escalation | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Linux Kernel 3.3.x < 3.7.x (Arch Linux x86-64) - 'sock_diag_handlers[]' Local Privilege Escalation (1) | This is a local exploit for linux_x86-64 platform. Description: Linux Kernel 3.3.x < 3.7.x (Arch Linux x86-64) - 'sock_diag_handlers[]' Local Privilege Escalation (1). Author: sd |
Analyze the security implications of: Linux Kernel 3.3.x < 3.7.x (Arch Linux x86-64) - 'sock_diag_handlers[]' Local Privilege Escalation (1) | This exploit targets linux_x86-64 systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux_x86-64 platform |
What is this exploit about: Apple Installer Package 2.1.5 - Filename Format String | This is a dos exploit for osx platform. Description: Apple Installer Package 2.1.5 - Filename Format String. Author: LMH |
Analyze the security implications of: Apple Installer Package 2.1.5 - Filename Format String | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Athena Web Registration - Remote Command Execution | This is a webapps exploit for php platform. Description: Athena Web Registration - Remote Command Execution. Author: Peter Kieser |
Analyze the security implications of: Athena Web Registration - Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: et-chat - Privilege Escalation / Arbitrary File Upload | This is a webapps exploit for php platform. Description: et-chat - Privilege Escalation / Arbitrary File Upload. Author: MR.XpR |
Analyze the security implications of: et-chat - Privilege Escalation / Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Abarcar Realty Portal 5.1.5/6.0.1 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Abarcar Realty Portal 5.1.5/6.0.1 - Multiple SQL Injections. Author: Benjamin Moss |
Analyze the security implications of: Abarcar Realty Portal 5.1.5/6.0.1 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EsContacts 1.0 - 'search.php?msg' Cross-Site Scripting | This is a webapps exploit for php platform. Description: EsContacts 1.0 - 'search.php?msg' Cross-Site Scripting. Author: ZoRLu |
Analyze the security implications of: EsContacts 1.0 - 'search.php?msg' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Classifieds Script - 'rate' SQL Injection | This is a webapps exploit for php platform. Description: Classifieds Script - 'rate' SQL Injection. Author: L0rd CrusAd3r |
Analyze the security implications of: Classifieds Script - 'rate' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel (PonyOS 3.0) - ELF Loader Local Privilege Escalation | This is a local exploit for linux platform. Description: Linux Kernel (PonyOS 3.0) - ELF Loader Local Privilege Escalation. Author: Hacker Fantastic |
Analyze the security implications of: Linux Kernel (PonyOS 3.0) - ELF Loader Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component CW Tags 2.0.6 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component CW Tags 2.0.6 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component CW Tags 2.0.6 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Hotel Booking Engine 1.0 - 'h_room_type' SQL Injection | This is a webapps exploit for php platform. Description: Hotel Booking Engine 1.0 - 'h_room_type' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Hotel Booking Engine 1.0 - 'h_room_type' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Maarch LetterBox 2.8 - (Authentication Bypass) Insecure Cookies | This is a webapps exploit for php platform. Description: Maarch LetterBox 2.8 - (Authentication Bypass) Insecure Cookies. Author: ZoRLu Bugrahan |
Analyze the security implications of: Maarch LetterBox 2.8 - (Authentication Bypass) Insecure Cookies | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Keeper Security desktop 16.10.2 & Browser Extension 16.5.4 - Password Dumping | This is a local exploit for multiple platform. Description: Keeper Security desktop 16.10.2 & Browser Extension 16.5.4 - Password Dumping. Author: H4rk3nz0 |
Analyze the security implications of: Keeper Security desktop 16.10.2 & Browser Extension 16.5.4 - Password Dumping | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Docebo 3.6.0.3 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Docebo 3.6.0.3 - Multiple SQL Injections. Author: Andrea Fabrizi |
Analyze the security implications of: Docebo 3.6.0.3 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CUPS Filter - Bash Environment Variable Code Injection (Metasploit) | This is a remote exploit for linux platform. Description: CUPS Filter - Bash Environment Variable Code Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: CUPS Filter - Bash Environment Variable Code Injection (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apache Geronimo 2.1.x - Cross-Site Request Forgery (Multiple Admin Function) | This is a remote exploit for multiple platform. Description: Apache Geronimo 2.1.x - Cross-Site Request Forgery (Multiple Admin Function). Author: DSecRG |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.