input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: IRIS Citations Management Tool - (Authenticated) Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PDFunite 0.41.0 - '.pdf' Local Buffer Overflow | This is a dos exploit for linux platform. Description: PDFunite 0.41.0 - '.pdf' Local Buffer Overflow. Author: Hamm3r.py |
Analyze the security implications of: PDFunite 0.41.0 - '.pdf' Local Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component JE Photo Gallery 1.1 - 'categoryid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JE Photo Gallery 1.1 - 'categoryid' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component JE Photo Gallery 1.1 - 'categoryid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple macOS/iOS - Memory Corruption Due to Bad Bounds Checking in NSCharacterSet Coding for NSKeyedUnarchiver | This is a dos exploit for multiple platform. Description: Apple macOS/iOS - Memory Corruption Due to Bad Bounds Checking in NSCharacterSet Coding for NSKeyedUnarchiver. Author: Google Security Research |
Analyze the security implications of: Apple macOS/iOS - Memory Corruption Due to Bad Bounds Checking in NSCharacterSet Coding for NSKeyedUnarchiver | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: NetBSD 5.0 - Hack GENOCIDE Environment Overflow (PoC) | This is a dos exploit for netbsd_x86 platform. Description: NetBSD 5.0 - Hack GENOCIDE Environment Overflow (PoC). Author: JMIT |
Analyze the security implications of: NetBSD 5.0 - Hack GENOCIDE Environment Overflow (PoC) | This exploit targets netbsd_x86 systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets netbsd_x86 platform |
What is this exploit about: FS OLX Clone - 'catg_id' SQL Injection | This is a webapps exploit for php platform. Description: FS OLX Clone - 'catg_id' SQL Injection. Author: 8bitsec |
Analyze the security implications of: FS OLX Clone - 'catg_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: lustig.cms Beta 2.5 - 'forum.php?view' Remote File Inclusion | This is a webapps exploit for php platform. Description: lustig.cms Beta 2.5 - 'forum.php?view' Remote File Inclusion. Author: GoLd_M |
Analyze the security implications of: lustig.cms Beta 2.5 - 'forum.php?view' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Freenews 1.1 - 'Aff_News.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Freenews 1.1 - 'Aff_News.php' Remote File Inclusion. Author: MoHaNdKo |
Analyze the security implications of: Freenews 1.1 - 'Aff_News.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Foojan Wms 1.0 - 'story' SQL Injection | This is a webapps exploit for php platform. Description: Foojan Wms 1.0 - 'story' SQL Injection. Author: Khashayar Fereidani |
Analyze the security implications of: Foojan Wms 1.0 - 'story' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AWStats 5.x/6.x - Debug Remote Information Disclosure | This is a webapps exploit for cgi platform. Description: AWStats 5.x/6.x - Debug Remote Information Disclosure. Author: GHC |
Analyze the security implications of: AWStats 5.x/6.x - Debug Remote Information Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: LiteSpeed Web Server Enterprise 5.4.11 - Command Injection (Authenticated) | This is a webapps exploit for php platform. Description: LiteSpeed Web Server Enterprise 5.4.11 - Command Injection (Authenticated). Author: SunCSR |
Analyze the security implications of: LiteSpeed Web Server Enterprise 5.4.11 - Command Injection (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP OpenView Network Node Manager 7.53 - Multiple Vulnerabilities | This is a remote exploit for multiple platform. Description: HP OpenView Network Node Manager 7.53 - Multiple Vulnerabilities. Author: Luigi Auriemma |
Analyze the security implications of: HP OpenView Network Node Manager 7.53 - Multiple Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cisco Firepower Threat Management Console 6.0.1 - Remote Command Execution | This is a webapps exploit for cgi platform. Description: Cisco Firepower Threat Management Console 6.0.1 - Remote Command Execution. Author: KoreLogic |
Analyze the security implications of: Cisco Firepower Threat Management Console 6.0.1 - Remote Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: LoveCMS 1.6.2 Final (Download Manager 1.0) - Arbitrary File Upload | This is a webapps exploit for php platform. Description: LoveCMS 1.6.2 Final (Download Manager 1.0) - Arbitrary File Upload. Author: cOndemned |
Analyze the security implications of: LoveCMS 1.6.2 Final (Download Manager 1.0) - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco Catalyst 3500 XL - Arbitrary Command Execution | This is a remote exploit for hardware platform. Description: Cisco Catalyst 3500 XL - Arbitrary Command Execution. Author: blackangels |
Analyze the security implications of: Cisco Catalyst 3500 XL - Arbitrary Command Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Mambo 4.6.5 - 'index.php' Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: Mambo 4.6.5 - 'index.php' Cross-Site Request Forgery. Author: Caddy-Dz |
Analyze the security implications of: Mambo 4.6.5 - 'index.php' Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mozilla Firefox 2.0.9 - 'view-source:' Scheme Information Disclosure | This is a remote exploit for linux platform. Description: Mozilla Firefox 2.0.9 - 'view-source:' Scheme Information Disclosure. Author: Ronald van den Heetkamp |
Analyze the security implications of: Mozilla Firefox 2.0.9 - 'view-source:' Scheme Information Disclosure | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AskPert - Authentication Bypass | This is a webapps exploit for php platform. Description: AskPert - Authentication Bypass. Author: TR-ShaRk |
Analyze the security implications of: AskPert - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link DIR-8xx Routers - Local Firmware Upload | This is a webapps exploit for hardware platform. Description: D-Link DIR-8xx Routers - Local Firmware Upload. Author: embedi |
Analyze the security implications of: D-Link DIR-8xx Routers - Local Firmware Upload | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: T-Soft E-Commerce 4 - SQLi (Authenticated) | This is a webapps exploit for multiple platform. Description: T-Soft E-Commerce 4 - SQLi (Authenticated). Author: Alperen Ergel |
Analyze the security implications of: T-Soft E-Commerce 4 - SQLi (Authenticated) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Manage Engine Exchange Reporter Plus - Remote Code Execution (Metasploit) | This is a remote exploit for java platform. Description: Manage Engine Exchange Reporter Plus - Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Manage Engine Exchange Reporter Plus - Remote Code Execution (Metasploit) | This exploit targets java systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Dokeos 1.x - '/work/work.php?display_upload_form Action origin' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Dokeos 1.x - '/work/work.php?display_upload_form Action origin' Cross-Site Scripting. Author: Doz |
Analyze the security implications of: Dokeos 1.x - '/work/work.php?display_upload_form Action origin' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 6rbScript - 'cat.php' SQL Injection | This is a webapps exploit for php platform. Description: 6rbScript - 'cat.php' SQL Injection. Author: Karar Alshami |
Analyze the security implications of: 6rbScript - 'cat.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Belkin N150 Wireless Router - Password Disclosure | This is a webapps exploit for hardware platform. Description: Belkin N150 Wireless Router - Password Disclosure. Author: Avinash Tangirala |
Analyze the security implications of: Belkin N150 Wireless Router - Password Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: GeometriX Download Portal - 'down_indir.asp?id' SQL Injection | This is a webapps exploit for asp platform. Description: GeometriX Download Portal - 'down_indir.asp?id' SQL Injection. Author: CyberGhost |
Analyze the security implications of: GeometriX Download Portal - 'down_indir.asp?id' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Samba 2.2.8 (OSX/PPC) - 'trans2open' Remote Overflow (Metasploit) | This is a remote exploit for osx_ppc platform. Description: Samba 2.2.8 (OSX/PPC) - 'trans2open' Remote Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: Samba 2.2.8 (OSX/PPC) - 'trans2open' Remote Overflow (Metasploit) | This exploit targets osx_ppc systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx_ppc platform |
What is this exploit about: PHP 4.x/5.0 - 'Strip_Tags()' Function Bypass | This is a remote exploit for php platform. Description: PHP 4.x/5.0 - 'Strip_Tags()' Function Bypass. Author: Stefan Esser |
Analyze the security implications of: PHP 4.x/5.0 - 'Strip_Tags()' Function Bypass | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fuel CMS 1.4.7 - 'col' SQL Injection (Authenticated) | This is a webapps exploit for php platform. Description: Fuel CMS 1.4.7 - 'col' SQL Injection (Authenticated). Author: Roel van Beurden |
Analyze the security implications of: Fuel CMS 1.4.7 - 'col' SQL Injection (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Built2go News Manager 1.0 Blog - 'news.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Built2go News Manager 1.0 Blog - 'news.php' Multiple Cross-Site Scripting Vulnerabilities. Author: the_Edit0r |
Analyze the security implications of: Built2go News Manager 1.0 Blog - 'news.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ADODB < 4.70 (PHPOpenChat 3.0.x) - 'Server.php' SQL Injection | This is a webapps exploit for php platform. Description: ADODB < 4.70 (PHPOpenChat 3.0.x) - 'Server.php' SQL Injection. Author: rgod |
Analyze the security implications of: ADODB < 4.70 (PHPOpenChat 3.0.x) - 'Server.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Indeed Job Search 2.5 iOS API - Multiple Vulnerabilities | This is a webapps exploit for ios platform. Description: Indeed Job Search 2.5 iOS API - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: Indeed Job Search 2.5 iOS API - Multiple Vulnerabilities | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Kloxo 6.1.18 Stable - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: Kloxo 6.1.18 Stable - Cross-Site Request Forgery. Author: Necmettin COSKUN |
Analyze the security implications of: Kloxo 6.1.18 Stable - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: STUNSHELL (Web Shell) - Remote Code Execution (Metasploit) | This is a remote exploit for php platform. Description: STUNSHELL (Web Shell) - Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: STUNSHELL (Web Shell) - Remote Code Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Inout Adserver - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Inout Adserver - 'id' SQL Injection. Author: boom3rang |
Analyze the security implications of: Inout Adserver - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.