input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: digiSHOP 2.0.2 - SQL Injection | This is a webapps exploit for php platform. Description: digiSHOP 2.0.2 - SQL Injection. Author: Silic0n |
Analyze the security implications of: digiSHOP 2.0.2 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Feindura CMS Groupware - Multiple Local File Inclusion / Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Feindura CMS Groupware - Multiple Local File Inclusion / Cross-Site Scripting Vulnerabilities. Author: Justanotherhacker.com |
Analyze the security implications of: Feindura CMS Groupware - Multiple Local File Inclusion / Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BS Business Directory - 'articlesdetails.php' SQL Injection | This is a webapps exploit for php platform. Description: BS Business Directory - 'articlesdetails.php' SQL Injection. Author: Easy Laster |
Analyze the security implications of: BS Business Directory - 'articlesdetails.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DM FileManager 3.9.11 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: DM FileManager 3.9.11 - Arbitrary File Upload. Author: eidelweiss |
Analyze the security implications of: DM FileManager 3.9.11 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CGI Script Center Account Manager 1.0 LITE / PRO - Administrative Password Alteration (2) | This is a remote exploit for cgi platform. Description: CGI Script Center Account Manager 1.0 LITE / PRO - Administrative Password Alteration (2). Author: n30 |
Analyze the security implications of: CGI Script Center Account Manager 1.0 LITE / PRO - Administrative Password Alteration (2) | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: EVA-Web 2.1.2 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: EVA-Web 2.1.2 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities. Author: r0t |
Analyze the security implications of: EVA-Web 2.1.2 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle HTML DB 1.5/1.6 - 'wwv_flow.accept?p_t02' Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Oracle HTML DB 1.5/1.6 - 'wwv_flow.accept?p_t02' Cross-Site Scripting. Author: Red-Database-Security |
Analyze the security implications of: Oracle HTML DB 1.5/1.6 - 'wwv_flow.accept?p_t02' Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: G. Wilford man 2.3.10 - Symlink | This is a local exploit for linux platform. Description: G. Wilford man 2.3.10 - Symlink. Author: Thomas Fischbacher |
Analyze the security implications of: G. Wilford man 2.3.10 - Symlink | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FTLS Guestbook 1.1 - Script Injection | This is a webapps exploit for php platform. Description: FTLS Guestbook 1.1 - Script Injection. Author: BrainRawt |
Analyze the security implications of: FTLS Guestbook 1.1 - Script Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Qualcomm Eudora 5.2.1/6.x - Embedded Hyperlink Buffer Overrun | This is a dos exploit for linux platform. Description: Qualcomm Eudora 5.2.1/6.x - Embedded Hyperlink Buffer Overrun. Author: Paul Szabo |
Analyze the security implications of: Qualcomm Eudora 5.2.1/6.x - Embedded Hyperlink Buffer Overrun | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Fuzzylime CMS 3.01 - 'admindir' Remote File Inclusion | This is a webapps exploit for php platform. Description: Fuzzylime CMS 3.01 - 'admindir' Remote File Inclusion. Author: irk4z |
Analyze the security implications of: Fuzzylime CMS 3.01 - 'admindir' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Campsite 3.x - 'article_id' SQL Injection | This is a webapps exploit for php platform. Description: Campsite 3.x - 'article_id' SQL Injection. Author: Stefan Esser |
Analyze the security implications of: Campsite 3.x - 'article_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Irola My-Time 3.5 - SQL Injection | This is a webapps exploit for php platform. Description: Irola My-Time 3.5 - SQL Injection. Author: Aria-Security Team |
Analyze the security implications of: Irola My-Time 3.5 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: UCM6202 1.0.18.13 - Remote Command Injection | This is a webapps exploit for hardware platform. Description: UCM6202 1.0.18.13 - Remote Command Injection. Author: Jacob Baines |
Analyze the security implications of: UCM6202 1.0.18.13 - Remote Command Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component Restaurante - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Joomla! Component Restaurante - Arbitrary File Upload. Author: Cold Zero |
Analyze the security implications of: Joomla! Component Restaurante - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX Kernel - Use-After-Free Due to Bad Locking in IOAcceleratorFamily2 | This is a dos exploit for osx platform. Description: Apple Mac OSX Kernel - Use-After-Free Due to Bad Locking in IOAcceleratorFamily2. Author: Google Security Research |
Analyze the security implications of: Apple Mac OSX Kernel - Use-After-Free Due to Bad Locking in IOAcceleratorFamily2 | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: RSA Authentication Manager 8.2.1.4.0-build1394922 / < 8.3 P1 - XML External Entity Injection / Cross-Site Flashing / DOM Cross-Site Scripting | This is a webapps exploit for java platform. Description: RSA Authentication Manager 8.2.1.4.0-build1394922 / < 8.3 P1 - XML External Entity Injection / Cross-Site Flashing / DOM Cross-Site Scripting. Author: SEC Consult |
Analyze the security implications of: RSA Authentication Manager 8.2.1.4.0-build1394922 / < 8.3 P1 - XML External Entity Injection / Cross-Site Flashing / DOM Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: OpenCMS 6.0/6.2 - Multiple Unauthorized Access Vulnerabilities | This is a webapps exploit for jsp platform. Description: OpenCMS 6.0/6.2 - Multiple Unauthorized Access Vulnerabilities. Author: Meder Kydyraliev |
Analyze the security implications of: OpenCMS 6.0/6.2 - Multiple Unauthorized Access Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: EPublisherPro 0.9.7 - 'Moreinfo.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: EPublisherPro 0.9.7 - 'Moreinfo.asp' Cross-Site Scripting. Author: Dj_Eyes |
Analyze the security implications of: EPublisherPro 0.9.7 - 'Moreinfo.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: MVDSV 0.165 b/0.171 Quake Server - Download Buffer Overrun | This is a remote exploit for multiple platform. Description: MVDSV 0.165 b/0.171 Quake Server - Download Buffer Overrun. Author: Oscar Linderholm |
Analyze the security implications of: MVDSV 0.165 b/0.171 Quake Server - Download Buffer Overrun | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Gallery 1.4.4 - Remote Server-Side Script Execution | This is a webapps exploit for php platform. Description: Gallery 1.4.4 - Remote Server-Side Script Execution. Author: aCiDBiTS |
Analyze the security implications of: Gallery 1.4.4 - Remote Server-Side Script Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DataLife Engine 8.3 - '/engine/inc/help.php?config[langs]' Remote File Inclusion | This is a webapps exploit for php platform. Description: DataLife Engine 8.3 - '/engine/inc/help.php?config[langs]' Remote File Inclusion. Author: indoushka |
Analyze the security implications of: DataLife Engine 8.3 - '/engine/inc/help.php?config[langs]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Pulse Secure 8.1R15.1/8.2/8.3/9.0 SSL VPN - Arbitrary File Disclosure (Metasploit) | This is a webapps exploit for multiple platform. Description: Pulse Secure 8.1R15.1/8.2/8.3/9.0 SSL VPN - Arbitrary File Disclosure (Metasploit). Author: Alyssa Herrera |
Analyze the security implications of: Pulse Secure 8.1R15.1/8.2/8.3/9.0 SSL VPN - Arbitrary File Disclosure (Metasploit) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Courier Management System 1.0 - 'ref_no' SQL Injection | This is a webapps exploit for php platform. Description: Courier Management System 1.0 - 'ref_no' SQL Injection. Author: Zhaiyi |
Analyze the security implications of: Courier Management System 1.0 - 'ref_no' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component mod_artuploader - 'upload.php' Arbitrary File Upload | This is a webapps exploit for php platform. Description: Joomla! Component mod_artuploader - 'upload.php' Arbitrary File Upload. Author: Sammy FORGIT |
Analyze the security implications of: Joomla! Component mod_artuploader - 'upload.php' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Geeklog 1.3.7 - 'users.php?uid' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Geeklog 1.3.7 - 'users.php?uid' Cross-Site Scripting. Author: snooq |
Analyze the security implications of: Geeklog 1.3.7 - 'users.php?uid' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Memcached 1.5.5 - 'Memcrashed' Insufficient Control Network Message Volume Denial of Service (2) | This is a dos exploit for linux platform. Description: Memcached 1.5.5 - 'Memcrashed' Insufficient Control Network Message Volume Denial of Service (2). Author: Alex Conrey |
Analyze the security implications of: Memcached 1.5.5 - 'Memcrashed' Insufficient Control Network Message Volume Denial of Service (2) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: E107 Website System 0.7.2 Chatbox Plugin - HTML Injection | This is a webapps exploit for php platform. Description: E107 Website System 0.7.2 Chatbox Plugin - HTML Injection. Author: marc & shb |
Analyze the security implications of: E107 Website System 0.7.2 Chatbox Plugin - HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Chyrp 2.x - 'action' Traversal Local File Inclusion | This is a webapps exploit for php platform. Description: Chyrp 2.x - 'action' Traversal Local File Inclusion. Author: Wireghoul |
Analyze the security implications of: Chyrp 2.x - 'action' Traversal Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Magento 1.2 - '/app/code/core/Mage/Admin/Model/Session.php?login['Username']' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Magento 1.2 - '/app/code/core/Mage/Admin/Model/Session.php?login['Username']' Cross-Site Scripting. Author: Loukas Kalenderidis |
Analyze the security implications of: Magento 1.2 - '/app/code/core/Mage/Admin/Model/Session.php?login['Username']' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASP Portal - Multiple Vulnerabilities | This is a webapps exploit for asp platform. Description: ASP Portal - Multiple Vulnerabilities. Author: Manuel Lopez |
Analyze the security implications of: ASP Portal - Multiple Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Linux Kernel 3.1.8 - KVM Local Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 3.1.8 - KVM Local Denial of Service. Author: Stephan Sattler |
Analyze the security implications of: Linux Kernel 3.1.8 - KVM Local Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_gcalendar 1.1.2 - 'gcid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_gcalendar 1.1.2 - 'gcid' SQL Injection. Author: Yogyacarderlink Crew |
Analyze the security implications of: Joomla! Component com_gcalendar 1.1.2 - 'gcid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jamit Job Board 2.4.1 - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: Jamit Job Board 2.4.1 - 'index.php' SQL Injection. Author: r0t3d3Vil |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.