input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Blogator-script 0.95 - 'incl_page' Remote File Inclusion | This is a webapps exploit for php platform. Description: Blogator-script 0.95 - 'incl_page' Remote File Inclusion. Author: JIKO |
Analyze the security implications of: Blogator-script 0.95 - 'incl_page' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Graugon PHP Article Publisher Pro 1.5 - Insecure Cookie Handling | This is a webapps exploit for php platform. Description: Graugon PHP Article Publisher Pro 1.5 - Insecure Cookie Handling. Author: ZoRLu |
Analyze the security implications of: Graugon PHP Article Publisher Pro 1.5 - Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Document Management Template - 'hash' SQL Injection | This is a webapps exploit for php platform. Description: Document Management Template - 'hash' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Document Management Template - 'hash' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Visale 1.0 - 'pbpgst.cgi?keyval' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: Visale 1.0 - 'pbpgst.cgi?keyval' Cross-Site Scripting. Author: r0t |
Analyze the security implications of: Visale 1.0 - 'pbpgst.cgi?keyval' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Joomla! Component com_joomnik - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_joomnik - SQL Injection. Author: SOLVER |
Analyze the security implications of: Joomla! Component com_joomnik - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: InstantCoder 1.0 iOS - Multiple Vulnerabilities | This is a webapps exploit for ios platform. Description: InstantCoder 1.0 iOS - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: InstantCoder 1.0 iOS - Multiple Vulnerabilities | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Gnew 2013.1 - Multiple Vulnerabilities (1) | This is a webapps exploit for php platform. Description: Gnew 2013.1 - Multiple Vulnerabilities (1). Author: LiquidWorm |
Analyze the security implications of: Gnew 2013.1 - Multiple Vulnerabilities (1) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IMG2ASCII - Cross-Site Scripting | This is a webapps exploit for php platform. Description: IMG2ASCII - Cross-Site Scripting. Author: indoushka |
Analyze the security implications of: IMG2ASCII - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Madness Pro 1.14 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Madness Pro 1.14 - Persistent Cross-Site Scripting. Author: bwall |
Analyze the security implications of: Madness Pro 1.14 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Invision Power Board (IP.Board) 2.1 - 'admin.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Invision Power Board (IP.Board) 2.1 - 'admin.php' Multiple Cross-Site Scripting Vulnerabilities. Author: benjilenoob |
Analyze the security implications of: Invision Power Board (IP.Board) 2.1 - 'admin.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gallarific 1.1 - '/gallery.php' Arbitrary Delete/Edit Category | This is a webapps exploit for php platform. Description: Gallarific 1.1 - '/gallery.php' Arbitrary Delete/Edit Category. Author: ilker Kandemir |
Analyze the security implications of: Gallarific 1.1 - '/gallery.php' Arbitrary Delete/Edit Category | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IPTBB 0.5.6 - Arbitrary Add Admin | This is a webapps exploit for php platform. Description: IPTBB 0.5.6 - Arbitrary Add Admin. Author: CWH Underground |
Analyze the security implications of: IPTBB 0.5.6 - Arbitrary Add Admin | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Invision Power Board (IP.Board) < 1.3.1 - Design Error | This is a webapps exploit for php platform. Description: Invision Power Board (IP.Board) < 1.3.1 - Design Error. Author: GulfTech Security |
Analyze the security implications of: Invision Power Board (IP.Board) < 1.3.1 - Design Error | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FileRun 2019.05.21 - Reflected Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: FileRun 2019.05.21 - Reflected Cross-Site Scripting. Author: Emre ÖVÜNÇ |
Analyze the security implications of: FileRun 2019.05.21 - Reflected Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! 3.4.6 - Remote Code Execution (Metasploit) | This is a webapps exploit for php platform. Description: Joomla! 3.4.6 - Remote Code Execution (Metasploit). Author: Alessandro Groppo |
Analyze the security implications of: Joomla! 3.4.6 - Remote Code Execution (Metasploit) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LFCMS 3.7.0 - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: LFCMS 3.7.0 - Cross-Site Request Forgery (Add Admin). Author: bay0net |
Analyze the security implications of: LFCMS 3.7.0 - Cross-Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AiCart 2.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: AiCart 2.0 - Multiple Vulnerabilities. Author: takeshix |
Analyze the security implications of: AiCart 2.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NeoSys Neon Webmail for Java 5.06/5.07 - 'updatemail' Servlet Arbitrary Mail Message Manipulation | This is a webapps exploit for jsp platform. Description: NeoSys Neon Webmail for Java 5.06/5.07 - 'updatemail' Servlet Arbitrary Mail Message Manipulation. Author: Tan Chew Keong |
Analyze the security implications of: NeoSys Neon Webmail for Java 5.06/5.07 - 'updatemail' Servlet Arbitrary Mail Message Manipulation | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: reSIProcate 1.10.2 - Heap Overflow | This is a dos exploit for multiple platform. Description: reSIProcate 1.10.2 - Heap Overflow. Author: Joachim De Zutter |
Analyze the security implications of: reSIProcate 1.10.2 - Heap Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Kaqoo Auction - 'install_root' Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: Kaqoo Auction - 'install_root' Multiple Remote File Inclusions. Author: ThE dE@Th |
Analyze the security implications of: Kaqoo Auction - 'install_root' Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bigware Shop 2.0 - 'pollid' SQL Injection | This is a webapps exploit for php platform. Description: Bigware Shop 2.0 - 'pollid' SQL Injection. Author: D4m14n |
Analyze the security implications of: Bigware Shop 2.0 - 'pollid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CentOS Web Panel 0.9.8.740 - Cross-Site Request Forgery / Cross-Site Scripting | This is a webapps exploit for php platform. Description: CentOS Web Panel 0.9.8.740 - Cross-Site Request Forgery / Cross-Site Scripting. Author: InfinitumIT |
Analyze the security implications of: CentOS Web Panel 0.9.8.740 - Cross-Site Request Forgery / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PortWise SSL VPN 4.6 - 'reloadFrame' Cross-Site Scripting | This is a remote exploit for multiple platform. Description: PortWise SSL VPN 4.6 - 'reloadFrame' Cross-Site Scripting. Author: George Christopoulos |
Analyze the security implications of: PortWise SSL VPN 4.6 - 'reloadFrame' Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component JProject Manager 1.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component JProject Manager 1.0 - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component JProject Manager 1.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Opera 7.10 - Permanent Denial of Service | This is a dos exploit for multiple platform. Description: Opera 7.10 - Permanent Denial of Service. Author: David F. Madrid |
Analyze the security implications of: Opera 7.10 - Permanent Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Intex Router N-150 - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for hardware platform. Description: Intex Router N-150 - Cross-Site Request Forgery (Add Admin). Author: Samrat Das |
Analyze the security implications of: Intex Router N-150 - Cross-Site Request Forgery (Add Admin) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: UPS Web/SNMP-Manager CS121 - Authentication Bypass | This is a remote exploit for multiple platform. Description: UPS Web/SNMP-Manager CS121 - Authentication Bypass. Author: jkmac |
Analyze the security implications of: UPS Web/SNMP-Manager CS121 - Authentication Bypass | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: IBM DB2 - 'db2start' Command Line Argument Local Overflow | This is a dos exploit for linux platform. Description: IBM DB2 - 'db2start' Command Line Argument Local Overflow. Author: SNOSoft |
Analyze the security implications of: IBM DB2 - 'db2start' Command Line Argument Local Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CyberPanel 2.3.6 - Remote Code Execution (RCE) | This is a webapps exploit for multiple platform. Description: CyberPanel 2.3.6 - Remote Code Execution (RCE). Author: Luka Petrovic (refr4g) |
Analyze the security implications of: CyberPanel 2.3.6 - Remote Code Execution (RCE) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mambo Open Source 4.0.14 Server - SQL Injection | This is a webapps exploit for php platform. Description: Mambo Open Source 4.0.14 Server - SQL Injection. Author: Chintan Trivedi |
Analyze the security implications of: Mambo Open Source 4.0.14 Server - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Symantec Gateway Security 5400 Series 2.0 - Error Page Cross-Site Scripting | This is a remote exploit for hardware platform. Description: Symantec Gateway Security 5400 Series 2.0 - Error Page Cross-Site Scripting. Author: Soby |
Analyze the security implications of: Symantec Gateway Security 5400 Series 2.0 - Error Page Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Fhimage 1.2.1 - Remote Index Change | This is a webapps exploit for php platform. Description: Fhimage 1.2.1 - Remote Index Change. Author: Osirys |
Analyze the security implications of: Fhimage 1.2.1 - Remote Index Change | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: makit Newsposter Script 3.0 - SQL Injection | This is a webapps exploit for asp platform. Description: makit Newsposter Script 3.0 - SQL Injection. Author: ajann |
Analyze the security implications of: makit Newsposter Script 3.0 - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: InnovaStudio WYSIWYG Editor 5.4 - Unrestricted File Upload / Directory Traversal | This is a webapps exploit for asp platform. Description: InnovaStudio WYSIWYG Editor 5.4 - Unrestricted File Upload / Directory Traversal. Author: Zer0FauLT |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.