input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Joomla! Component Classified - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Classified - SQL Injection. Author: R4dc0re |
Analyze the security implications of: Joomla! Component Classified - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ManageEngine OpManager 12.4x - Unauthenticated Remote Command Execution (Metasploit) | This is a remote exploit for multiple platform. Description: ManageEngine OpManager 12.4x - Unauthenticated Remote Command Execution (Metasploit). Author: AkkuS |
Analyze the security implications of: ManageEngine OpManager 12.4x - Unauthenticated Remote Command Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Easy Youtube Gallery 1.0.2 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Easy Youtube Gallery 1.0.2 - SQL Injection. Author: Persian Hack Team |
Analyze the security implications of: Joomla! Component Easy Youtube Gallery 1.0.2 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo 4.5.2.1 - Fetch Password Hash | This is a webapps exploit for php platform. Description: Mambo 4.5.2.1 - Fetch Password Hash. Author: pokleyzz |
Analyze the security implications of: Mambo 4.5.2.1 - Fetch Password Hash | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache James Server 2.2 - SMTP Denial of Service | This is a dos exploit for multiple platform. Description: Apache James Server 2.2 - SMTP Denial of Service. Author: y3dips |
Analyze the security implications of: Apache James Server 2.2 - SMTP Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FreeBSD 8.0/7.3/7.2 - 'nfs_mount()' Local Privilege Escalation | This is a local exploit for freebsd platform. Description: FreeBSD 8.0/7.3/7.2 - 'nfs_mount()' Local Privilege Escalation. Author: Patroklos Argyroudis |
Analyze the security implications of: FreeBSD 8.0/7.3/7.2 - 'nfs_mount()' Local Privilege Escalation | This exploit targets freebsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: Sony Playstation 3 (PS3) 4.82 - 'Jailbreak' (ROP) | This is a local exploit for hardware platform. Description: Sony Playstation 3 (PS3) 4.82 - 'Jailbreak' (ROP). Author: PS3Xploit |
Analyze the security implications of: Sony Playstation 3 (PS3) 4.82 - 'Jailbreak' (ROP) | This exploit targets hardware systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: iDesk - 'download.php?cat_id' SQL Injection | This is a webapps exploit for php platform. Description: iDesk - 'download.php?cat_id' SQL Injection. Author: Mr.SQL |
Analyze the security implications of: iDesk - 'download.php?cat_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GV 2.x/3.x - '.PDF'/'.PS' File Buffer Overflow (1) | This is a local exploit for linux platform. Description: GV 2.x/3.x - '.PDF'/'.PS' File Buffer Overflow (1). Author: zen-parse |
Analyze the security implications of: GV 2.x/3.x - '.PDF'/'.PS' File Buffer Overflow (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Future Internet - 'index.cfm?categoryId' Cross-Site Scripting | This is a webapps exploit for cfm platform. Description: Future Internet - 'index.cfm?categoryId' Cross-Site Scripting. Author: Linux_Drox |
Analyze the security implications of: Future Internet - 'index.cfm?categoryId' Cross-Site Scripting | This exploit targets cfm systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cfm platform |
What is this exploit about: Apache 2.0.52 - GET Denial of Service | This is a dos exploit for multiple platform. Description: Apache 2.0.52 - GET Denial of Service. Author: GreenwooD |
Analyze the security implications of: Apache 2.0.52 - GET Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Bludit 3.9.2 - Auth Bruteforce Bypass | This is a webapps exploit for php platform. Description: Bludit 3.9.2 - Auth Bruteforce Bypass. Author: Mayank Deshmukh |
Analyze the security implications of: Bludit 3.9.2 - Auth Bruteforce Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mozilla Firefox - Address Bar Spoofing | This is a local exploit for multiple platform. Description: Mozilla Firefox - Address Bar Spoofing. Author: 649 |
Analyze the security implications of: Mozilla Firefox - Address Bar Spoofing | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Astaro Security Linux 5 - 'index.fpl' Cross-Site Scripting | This is a remote exploit for linux platform. Description: Astaro Security Linux 5 - 'index.fpl' Cross-Site Scripting. Author: Vincent Hautot |
Analyze the security implications of: Astaro Security Linux 5 - 'index.fpl' Cross-Site Scripting | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: WebDisk+ 2.1 iOS - Code Execution | This is a webapps exploit for ios platform. Description: WebDisk+ 2.1 iOS - Code Execution. Author: Vulnerability-Lab |
Analyze the security implications of: WebDisk+ 2.1 iOS - Code Execution | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: KDPics 1.11/1.16 - 'index.php3?categories' Cross-Site Scripting | This is a webapps exploit for php platform. Description: KDPics 1.11/1.16 - 'index.php3?categories' Cross-Site Scripting. Author: Mr_KaLiMaN |
Analyze the security implications of: KDPics 1.11/1.16 - 'index.php3?categories' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: KB-Bestellsystem - 'kb_whois.cgi' Command Execution | This is a webapps exploit for cgi platform. Description: KB-Bestellsystem - 'kb_whois.cgi' Command Execution. Author: Zero X |
Analyze the security implications of: KB-Bestellsystem - 'kb_whois.cgi' Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Java Search Engine 0.9.34 - search.jsp Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: Java Search Engine 0.9.34 - search.jsp Cross-Site Scripting. Author: r0t |
Analyze the security implications of: Java Search Engine 0.9.34 - search.jsp Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: WebLogic Server - Deserialization RCE - BadAttributeValueExpException (Metasploit) | This is a remote exploit for multiple platform. Description: WebLogic Server - Deserialization RCE - BadAttributeValueExpException (Metasploit). Author: Metasploit |
Analyze the security implications of: WebLogic Server - Deserialization RCE - BadAttributeValueExpException (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Employee Record System 1.0 - Unrestricted File Upload to Remote Code Execution | This is a webapps exploit for php platform. Description: Employee Record System 1.0 - Unrestricted File Upload to Remote Code Execution. Author: Saeed Bala Ahmed |
Analyze the security implications of: Employee Record System 1.0 - Unrestricted File Upload to Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cockpit CMS 0.6.1 - Remote Code Execution | This is a webapps exploit for php platform. Description: Cockpit CMS 0.6.1 - Remote Code Execution. Author: Rafael Resende |
Analyze the security implications of: Cockpit CMS 0.6.1 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! / Mambo Component Download3000 1.0 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! / Mambo Component Download3000 1.0 - 'id' SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! / Mambo Component Download3000 1.0 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Crestron AM-100 - Multiple Vulnerabilities | This is a remote exploit for hardware platform. Description: Crestron AM-100 - Multiple Vulnerabilities. Author: Zach Lanier |
Analyze the security implications of: Crestron AM-100 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Bytes interactive Web shopper 1.0/2.0 - Directory Traversal | This is a remote exploit for cgi platform. Description: Bytes interactive Web shopper 1.0/2.0 - Directory Traversal. Author: f0bic |
Analyze the security implications of: Bytes interactive Web shopper 1.0/2.0 - Directory Traversal | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Unreal Tournament 2004 (Linux) - 'secure' Remote Overflow (Metasploit) | This is a remote exploit for linux platform. Description: Unreal Tournament 2004 (Linux) - 'secure' Remote Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: Unreal Tournament 2004 (Linux) - 'secure' Remote Overflow (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: GLPI GZIP(Py3) 9.4.5 - RCE | This is a webapps exploit for php platform. Description: GLPI GZIP(Py3) 9.4.5 - RCE. Author: Brian Peters |
Analyze the security implications of: GLPI GZIP(Py3) 9.4.5 - RCE | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: QEMU - Denial of Service | This is a dos exploit for linux platform. Description: QEMU - Denial of Service. Author: vishnudevtj |
Analyze the security implications of: QEMU - Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: WebKit JSC - BytecodeGenerator::hoistSloppyModeFunctionIfNecessary Does not Invalidate the 'ForInContext' Object | This is a dos exploit for multiple platform. Description: WebKit JSC - BytecodeGenerator::hoistSloppyModeFunctionIfNecessary Does not Invalidate the 'ForInContext' Object. Author: Google Security Research |
Analyze the security implications of: WebKit JSC - BytecodeGenerator::hoistSloppyModeFunctionIfNecessary Does not Invalidate the 'ForInContext' Object | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: iTech Freelancer Script 5.27 - SQL Injection | This is a webapps exploit for php platform. Description: iTech Freelancer Script 5.27 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: iTech Freelancer Script 5.27 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: cgit 1.2.1 - Directory Traversal (Metasploit) | This is a webapps exploit for linux platform. Description: cgit 1.2.1 - Directory Traversal (Metasploit). Author: Dhiraj Mishra |
Analyze the security implications of: cgit 1.2.1 - Directory Traversal (Metasploit) | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ManageEngine Exchange Reporter Plus < Build 5311 - Remote Code Execution | This is a webapps exploit for java platform. Description: ManageEngine Exchange Reporter Plus < Build 5311 - Remote Code Execution. Author: Kacper Szurek |
Analyze the security implications of: ManageEngine Exchange Reporter Plus < Build 5311 - Remote Code Execution | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Jax Guestbook 3.50 - Admin Login | This is a webapps exploit for php platform. Description: Jax Guestbook 3.50 - Admin Login. Author: Sora |
Analyze the security implications of: Jax Guestbook 3.50 - Admin Login | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_trabalhe_conosco - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joomla! Component com_trabalhe_conosco - Cross-Site Scripting. Author: Pyske |
Analyze the security implications of: Joomla! Component com_trabalhe_conosco - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Magic Photo Storage Website - '/user/user_email.php?_config[site_path]' Remote File Inclusion | This is a webapps exploit for php platform. Description: Magic Photo Storage Website - '/user/user_email.php?_config[site_path]' Remote File Inclusion. Author: IbnuSina |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.