input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: philboard 0.5 - 'W1L3D4_foruma_yeni_konu_ac.asp?forumid' SQL Injection | This is a webapps exploit for asp platform. Description: philboard 0.5 - 'W1L3D4_foruma_yeni_konu_ac.asp?forumid' SQL Injection. Author: U238 |
Analyze the security implications of: philboard 0.5 - 'W1L3D4_foruma_yeni_konu_ac.asp?forumid' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: FUDForum 3.1.0 - 'author' Reflected XSS | This is a webapps exploit for php platform. Description: FUDForum 3.1.0 - 'author' Reflected XSS. Author: Piyush Patil |
Analyze the security implications of: FUDForum 3.1.0 - 'author' Reflected XSS | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DCForum 1-6 DCBoard Script - 'Page' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DCForum 1-6 DCBoard Script - 'Page' Cross-Site Scripting. Author: r0t3d3Vil |
Analyze the security implications of: DCForum 1-6 DCBoard Script - 'Page' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AzDGDatingLite 2.1.1 - 'index.php?language' Cross-Site Scripting | This is a webapps exploit for php platform. Description: AzDGDatingLite 2.1.1 - 'index.php?language' Cross-Site Scripting. Author: Janek Vind |
Analyze the security implications of: AzDGDatingLite 2.1.1 - 'index.php?language' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Easywall 0.3.1 - Authenticated Remote Command Execution | This is a webapps exploit for multiple platform. Description: Easywall 0.3.1 - Authenticated Remote Command Execution. Author: Melvin Mejia |
Analyze the security implications of: Easywall 0.3.1 - Authenticated Remote Command Execution | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CPAINT 1.3/2.0.2 - 'TYPE.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: CPAINT 1.3/2.0.2 - 'TYPE.php' Cross-Site Scripting. Author: GulfTech Security |
Analyze the security implications of: CPAINT 1.3/2.0.2 - 'TYPE.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Avaya IP Office Manager TFTP Server 8.1 - Directory Traversal | This is a remote exploit for hardware platform. Description: Avaya IP Office Manager TFTP Server 8.1 - Directory Traversal. Author: SecPod Research |
Analyze the security implications of: Avaya IP Office Manager TFTP Server 8.1 - Directory Traversal | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Contus Job Portal - 'Category' SQL Injection | This is a webapps exploit for java platform. Description: Contus Job Portal - 'Category' SQL Injection. Author: Lazmania61 |
Analyze the security implications of: Contus Job Portal - 'Category' SQL Injection | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: JiRos Link Manager 1.0 - 'viewlinks.asp?categoryId' SQL Injection | This is a webapps exploit for asp platform. Description: JiRos Link Manager 1.0 - 'viewlinks.asp?categoryId' SQL Injection. Author: laurent gaffie |
Analyze the security implications of: JiRos Link Manager 1.0 - 'viewlinks.asp?categoryId' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: IBM DB2 - Universal Database for Linux 6.1/Windows NT 6.1 Known Default Password | This is a remote exploit for multiple platform. Description: IBM DB2 - Universal Database for Linux 6.1/Windows NT 6.1 Known Default Password. Author: benjurry |
Analyze the security implications of: IBM DB2 - Universal Database for Linux 6.1/Windows NT 6.1 Known Default Password | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Host Directory PRO 2.1.0 - Remote Database Backup | This is a webapps exploit for php platform. Description: Host Directory PRO 2.1.0 - Remote Database Backup. Author: ZoRLu |
Analyze the security implications of: Host Directory PRO 2.1.0 - Remote Database Backup | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: B2C Booking Centre Systems - SQL Injection | This is a webapps exploit for php platform. Description: B2C Booking Centre Systems - SQL Injection. Author: Salvatore Fresta |
Analyze the security implications of: B2C Booking Centre Systems - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Easysitenetwork Jokes Complete Website - 'id' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Easysitenetwork Jokes Complete Website - 'id' Cross-Site Scripting. Author: indoushka |
Analyze the security implications of: Easysitenetwork Jokes Complete Website - 'id' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bugzilla 4.2 - Tabular Reports Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: Bugzilla 4.2 - Tabular Reports Cross-Site Scripting. Author: Mateusz Goik |
Analyze the security implications of: Bugzilla 4.2 - Tabular Reports Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Akiva WebBoard 8.x - SQL Injection | This is a webapps exploit for php platform. Description: Akiva WebBoard 8.x - SQL Injection. Author: Alexander Fuchs |
Analyze the security implications of: Akiva WebBoard 8.x - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreeBSD Kernel (FreeBSD 10.2 x64) - 'sendmsg' Kernel Heap Overflow (PoC) | This is a dos exploit for freebsd_x86-64 platform. Description: FreeBSD Kernel (FreeBSD 10.2 x64) - 'sendmsg' Kernel Heap Overflow (PoC). Author: CTurt |
Analyze the security implications of: FreeBSD Kernel (FreeBSD 10.2 x64) - 'sendmsg' Kernel Heap Overflow (PoC) | This exploit targets freebsd_x86-64 systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd_x86-64 platform |
What is this exploit about: Joomla! Component JomWALL 4.0 - 'wuid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JomWALL 4.0 - 'wuid' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component JomWALL 4.0 - 'wuid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AvailScript Photo Album - 'pics.php' Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: AvailScript Photo Album - 'pics.php' Multiple Vulnerabilities. Author: sl4xUz |
Analyze the security implications of: AvailScript Photo Album - 'pics.php' Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gallery MX 2.0.0 - Blind SQL Injection | This is a webapps exploit for asp platform. Description: Gallery MX 2.0.0 - Blind SQL Injection. Author: R3d-D3V!L |
Analyze the security implications of: Gallery MX 2.0.0 - Blind SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: WebKit - 'WebCore::FormSubmission::create' Use-After-Free | This is a dos exploit for multiple platform. Description: WebKit - 'WebCore::FormSubmission::create' Use-After-Free. Author: Google Security Research |
Analyze the security implications of: WebKit - 'WebCore::FormSubmission::create' Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: HLDS WebMod 0.48 - Multiple Remote Vulnerabilities | This is a remote exploit for multiple platform. Description: HLDS WebMod 0.48 - Multiple Remote Vulnerabilities. Author: Luigi Auriemma |
Analyze the security implications of: HLDS WebMod 0.48 - Multiple Remote Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Habari 0.6.5 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Habari 0.6.5 - Multiple Cross-Site Scripting Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: Habari 0.6.5 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CompactCMS 1.4.0 - 'tiny_mce' Arbitrary File Upload | This is a webapps exploit for php platform. Description: CompactCMS 1.4.0 - 'tiny_mce' Arbitrary File Upload. Author: ITSecTeam |
Analyze the security implications of: CompactCMS 1.4.0 - 'tiny_mce' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BbZL.php - Remote File Inclusion | This is a webapps exploit for php platform. Description: BbZL.php - Remote File Inclusion. Author: Number 7 |
Analyze the security implications of: BbZL.php - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMS MAXSITE 1.10 - 'category' SQL Injection | This is a webapps exploit for php platform. Description: CMS MAXSITE 1.10 - 'category' SQL Injection. Author: Tesz |
Analyze the security implications of: CMS MAXSITE 1.10 - 'category' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DreamBox DM800 1.5rc1 - File Disclosure | This is a remote exploit for hardware platform. Description: DreamBox DM800 1.5rc1 - File Disclosure. Author: Todor Donev |
Analyze the security implications of: DreamBox DM800 1.5rc1 - File Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: allinta CMS 2.3.2 - 'search.asp?searchQuery' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: allinta CMS 2.3.2 - 'search.asp?searchQuery' Cross-Site Scripting. Author: r0t3d3Vil |
Analyze the security implications of: allinta CMS 2.3.2 - 'search.asp?searchQuery' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: FlySpray 0.9.7 - 'install-0.9.7.php' Remote Command Execution | This is a webapps exploit for php platform. Description: FlySpray 0.9.7 - 'install-0.9.7.php' Remote Command Execution. Author: rgod |
Analyze the security implications of: FlySpray 0.9.7 - 'install-0.9.7.php' Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JBoss Seam 2 - Arbitrary File Upload / Execution (Metasploit) | This is a remote exploit for jsp platform. Description: JBoss Seam 2 - Arbitrary File Upload / Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: JBoss Seam 2 - Arbitrary File Upload / Execution (Metasploit) | This exploit targets jsp systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: bubbling library 1.32 - 'uri' Remote File Disclosure | This is a webapps exploit for php platform. Description: bubbling library 1.32 - 'uri' Remote File Disclosure. Author: Stack |
Analyze the security implications of: bubbling library 1.32 - 'uri' Remote File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AIOCP 1.3.x - 'cp_contact_us.php' SQL Injection | This is a webapps exploit for php platform. Description: AIOCP 1.3.x - 'cp_contact_us.php' SQL Injection. Author: laurent gaffie |
Analyze the security implications of: AIOCP 1.3.x - 'cp_contact_us.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_aclsfgpl - 'index.php' Arbitrary File Upload | This is a webapps exploit for php platform. Description: Joomla! Component com_aclsfgpl - 'index.php' Arbitrary File Upload. Author: TUNISIAN CYBER |
Analyze the security implications of: Joomla! Component com_aclsfgpl - 'index.php' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: macOS 18.7.0 Kernel - Local Privilege Escalation | This is a local exploit for macos platform. Description: macOS 18.7.0 Kernel - Local Privilege Escalation. Author: A2nkF |
Analyze the security implications of: macOS 18.7.0 Kernel - Local Privilege Escalation | This exploit targets macos systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: ISPConfig - (Authenticated) Arbitrary PHP Code Execution (Metasploit) | This is a remote exploit for php platform. Description: ISPConfig - (Authenticated) Arbitrary PHP Code Execution (Metasploit). Author: Metasploit |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.