input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: TP-Link TL-WR2543ND Router - Admin Panel Multiple Cross-Site Request Forgery Vulnerabilities | This is a remote exploit for hardware platform. Description: TP-Link TL-WR2543ND Router - Admin Panel Multiple Cross-Site Request Forgery Vulnerabilities. Author: Juan Manuel Garcia |
Analyze the security implications of: TP-Link TL-WR2543ND Router - Admin Panel Multiple Cross-Site Request Forgery Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: FiverrScript - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: FiverrScript - Cross-Site Request Forgery (Add Admin). Author: Mahmoud Gamal |
Analyze the security implications of: FiverrScript - Cross-Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ECOA Building Automation System - Local File Disclosure | This is a webapps exploit for hardware platform. Description: ECOA Building Automation System - Local File Disclosure. Author: Neurogenesia |
Analyze the security implications of: ECOA Building Automation System - Local File Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Citrix Netscaler 8.0 build 47.8 - Generic_API_Call.pl Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: Citrix Netscaler 8.0 build 47.8 - Generic_API_Call.pl Cross-Site Scripting. Author: nnposter |
Analyze the security implications of: Citrix Netscaler 8.0 build 47.8 - Generic_API_Call.pl Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Admin News Tools - Remote Contents Change | This is a webapps exploit for php platform. Description: Admin News Tools - Remote Contents Change. Author: Securitylab.ir |
Analyze the security implications of: Admin News Tools - Remote Contents Change | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mail-it Now! Upload2Server 1.5 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Mail-it Now! Upload2Server 1.5 - Arbitrary File Upload. Author: rgod |
Analyze the security implications of: Mail-it Now! Upload2Server 1.5 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jenkins 2.235.3 - 'Description' Stored XSS | This is a webapps exploit for java platform. Description: Jenkins 2.235.3 - 'Description' Stored XSS. Author: gx1 |
Analyze the security implications of: Jenkins 2.235.3 - 'Description' Stored XSS | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: ACS Blog 0.8/0.9/1.0/1.1 - 'search.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: ACS Blog 0.8/0.9/1.0/1.1 - 'search.asp' Cross-Site Scripting. Author: farhad koosha |
Analyze the security implications of: ACS Blog 0.8/0.9/1.0/1.1 - 'search.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: AdaptCMS 2.0.2 TinyURL Plugin - 'admin.php' Multiple SQL Injections | This is a webapps exploit for php platform. Description: AdaptCMS 2.0.2 TinyURL Plugin - 'admin.php' Multiple SQL Injections. Author: KedAns-Dz |
Analyze the security implications of: AdaptCMS 2.0.2 TinyURL Plugin - 'admin.php' Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Responsive Portfolio 1.6.1 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Responsive Portfolio 1.6.1 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Responsive Portfolio 1.6.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alstrasoft Video Share Enterprise 4.x - 'MyajaxPHP.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Alstrasoft Video Share Enterprise 4.x - 'MyajaxPHP.php' Remote File Inclusion. Author: night_warrior771 |
Analyze the security implications of: Alstrasoft Video Share Enterprise 4.x - 'MyajaxPHP.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_album 1.14 - Directory Traversal | This is a webapps exploit for php platform. Description: Joomla! Component com_album 1.14 - Directory Traversal. Author: DreamTurk |
Analyze the security implications of: Joomla! Component com_album 1.14 - Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMS Made Simple 0.10 - 'Lang.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: CMS Made Simple 0.10 - 'Lang.php' Remote File Inclusion. Author: groszynskif |
Analyze the security implications of: CMS Made Simple 0.10 - 'Lang.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ISC INN 2.0/2.1/2.2.x - Multiple Local Format String Vulnerabilities | This is a local exploit for linux platform. Description: ISC INN 2.0/2.1/2.2.x - Multiple Local Format String Vulnerabilities. Author: Paul Starzetz |
Analyze the security implications of: ISC INN 2.0/2.1/2.2.x - Multiple Local Format String Vulnerabilities | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Adobe Flash - Out-of-Bounds Image Read | This is a dos exploit for multiple platform. Description: Adobe Flash - Out-of-Bounds Image Read. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - Out-of-Bounds Image Read | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: WebScripts WebBBS 4.x/5.0 - Remote Command Execution | This is a webapps exploit for cgi platform. Description: WebScripts WebBBS 4.x/5.0 - Remote Command Execution. Author: NERF Security |
Analyze the security implications of: WebScripts WebBBS 4.x/5.0 - Remote Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: FlatNuke 2.5.x - 'index.php' Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: FlatNuke 2.5.x - 'index.php' Multiple Remote File Inclusions. Author: abducter_minds@yahoo.com |
Analyze the security implications of: FlatNuke 2.5.x - 'index.php' Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Restaurante 1.0 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Restaurante 1.0 - 'id' SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! Component Restaurante 1.0 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Argyle Social - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Argyle Social - Multiple Cross-Site Scripting Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: Argyle Social - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ocean12 FAQ Manager Pro - 'Keyword' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Ocean12 FAQ Manager Pro - 'Keyword' Cross-Site Scripting. Author: Charalambous Glafkos |
Analyze the security implications of: Ocean12 FAQ Manager Pro - 'Keyword' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: WordPress Core < 4.0.1 - Denial of Service | This is a dos exploit for php platform. Description: WordPress Core < 4.0.1 - Denial of Service. Author: Javer Nieto & Andres Rojas |
Analyze the security implications of: WordPress Core < 4.0.1 - Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ElasticSearch - Remote Code Execution | This is a webapps exploit for multiple platform. Description: ElasticSearch - Remote Code Execution. Author: Jeff Geiger |
Analyze the security implications of: ElasticSearch - Remote Code Execution | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: cPanel WebHost Manager 3.1 - 'editpkg?pkg' Cross-Site Scripting | This is a webapps exploit for php platform. Description: cPanel WebHost Manager 3.1 - 'editpkg?pkg' Cross-Site Scripting. Author: Aria-Security Team |
Analyze the security implications of: cPanel WebHost Manager 3.1 - 'editpkg?pkg' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: macOS iMessage - Heap Overflow when Deserializing | This is a dos exploit for macos platform. Description: macOS iMessage - Heap Overflow when Deserializing. Author: Google Security Research |
Analyze the security implications of: macOS iMessage - Heap Overflow when Deserializing | This exploit targets macos systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Opera historysearch - Cross-Site Scripting (Metasploit) | This is a remote exploit for multiple platform. Description: Opera historysearch - Cross-Site Scripting (Metasploit). Author: Metasploit |
Analyze the security implications of: Opera historysearch - Cross-Site Scripting (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Enterasys SSR8000 SmartSwitch - Port Scan Denial of Service | This is a dos exploit for hardware platform. Description: Enterasys SSR8000 SmartSwitch - Port Scan Denial of Service. Author: Mella Marco |
Analyze the security implications of: Enterasys SSR8000 SmartSwitch - Port Scan Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Opera 9 - IRC Client Remote Denial of Service | This is a dos exploit for multiple platform. Description: Opera 9 - IRC Client Remote Denial of Service. Author: Preddy |
Analyze the security implications of: Opera 9 - IRC Client Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AcmlmBoard 1.A2 - 'pow' SQL Injection | This is a webapps exploit for php platform. Description: AcmlmBoard 1.A2 - 'pow' SQL Injection. Author: anonymous |
Analyze the security implications of: AcmlmBoard 1.A2 - 'pow' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMSimple 5.2 - 'External' Stored XSS | This is a webapps exploit for php platform. Description: CMSimple 5.2 - 'External' Stored XSS. Author: Quadron Research Lab |
Analyze the security implications of: CMSimple 5.2 - 'External' Stored XSS | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GtkFtpd 1.0.4 - Remote Buffer Overflow | This is a remote exploit for linux platform. Description: GtkFtpd 1.0.4 - Remote Buffer Overflow. Author: vade79 |
Analyze the security implications of: GtkFtpd 1.0.4 - Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: DiamondList 0.1.6 - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: DiamondList 0.1.6 - Cross-Site Request Forgery. Author: High-Tech Bridge SA |
Analyze the security implications of: DiamondList 0.1.6 - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Android 2.0 < 2.1 - Code Execution (Reverse Shell 10.0.2.2:2222/TCP) | This is a remote exploit for android platform. Description: Google Android 2.0 < 2.1 - Code Execution (Reverse Shell 10.0.2.2:2222/TCP). Author: MJ Keith |
Analyze the security implications of: Google Android 2.0 < 2.1 - Code Execution (Reverse Shell 10.0.2.2:2222/TCP) | This exploit targets android systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: HongCMS 3.0.0 - (Authenticated) SQL Injection | This is a webapps exploit for php platform. Description: HongCMS 3.0.0 - (Authenticated) SQL Injection. Author: Hzllaga |
Analyze the security implications of: HongCMS 3.0.0 - (Authenticated) SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ZKTeco ZKBioSecurity 3.0 - Hard-Coded Credentials SYSTEM Remote Code Execution | This is a webapps exploit for jsp platform. Description: ZKTeco ZKBioSecurity 3.0 - Hard-Coded Credentials SYSTEM Remote Code Execution. Author: LiquidWorm |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.