input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Auktionshaus Gelb 3 - 'news.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ChangshinSoft EZTrans Server - 'download.php' Directory Traversal | This is a webapps exploit for php platform. Description: ChangshinSoft EZTrans Server - 'download.php' Directory Traversal. Author: SSR Team |
Analyze the security implications of: ChangshinSoft EZTrans Server - 'download.php' Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WSO2 Carbon 4.4.5 - Local File Inclusion | This is a webapps exploit for jsp platform. Description: WSO2 Carbon 4.4.5 - Local File Inclusion. Author: hyp3rlinx |
Analyze the security implications of: WSO2 Carbon 4.4.5 - Local File Inclusion | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: PLANET Technology IP Surveillance Cameras - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: PLANET Technology IP Surveillance Cameras - Multiple Vulnerabilities. Author: Orwelllabs |
Analyze the security implications of: PLANET Technology IP Surveillance Cameras - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: D-Link DCS Series - Cross-Site Request Forgery (Change Admin Password) | This is a webapps exploit for hardware platform. Description: D-Link DCS Series - Cross-Site Request Forgery (Change Admin Password). Author: rigan |
Analyze the security implications of: D-Link DCS Series - Cross-Site Request Forgery (Change Admin Password) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: TL-WR849N 0.9.1 4.16 - Authentication Bypass (Upload Firmware) | This is a webapps exploit for hardware platform. Description: TL-WR849N 0.9.1 4.16 - Authentication Bypass (Upload Firmware). Author: Elber Tavares |
Analyze the security implications of: TL-WR849N 0.9.1 4.16 - Authentication Bypass (Upload Firmware) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Drupal 6.15 - Multiple Persistent Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Drupal 6.15 - Multiple Persistent Cross-Site Scripting Vulnerabilities. Author: emgent |
Analyze the security implications of: Drupal 6.15 - Multiple Persistent Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Alexandria Book Library 3.1.2 - 'letter' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Alexandria Book Library 3.1.2 - 'letter' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Alexandria Book Library 3.1.2 - 'letter' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla HikaShop 4.7.4 - Reflected XSS | This is a webapps exploit for php platform. Description: Joomla HikaShop 4.7.4 - Reflected XSS. Author: CraCkEr |
Analyze the security implications of: Joomla HikaShop 4.7.4 - Reflected XSS | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Trend Micro WebReputation API 10.5 - URI SecURIty Bypass | This is a remote exploit for multiple platform. Description: Trend Micro WebReputation API 10.5 - URI SecURIty Bypass. Author: DcLabs Security Research Group |
Analyze the security implications of: Trend Micro WebReputation API 10.5 - URI SecURIty Bypass | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FreeBSD 3.5/4.x - '/usr/bin/top' Format String | This is a local exploit for freebsd platform. Description: FreeBSD 3.5/4.x - '/usr/bin/top' Format String. Author: truefinder |
Analyze the security implications of: FreeBSD 3.5/4.x - '/usr/bin/top' Format String | This exploit targets freebsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: Vivotek Cameras - Sensitive Information Disclosure | This is a webapps exploit for hardware platform. Description: Vivotek Cameras - Sensitive Information Disclosure. Author: GothicX |
Analyze the security implications of: Vivotek Cameras - Sensitive Information Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Flexense HTTP Server 10.6.24 - Buffer Overflow (DoS) (Metasploit) | This is a remote exploit for multiple platform. Description: Flexense HTTP Server 10.6.24 - Buffer Overflow (DoS) (Metasploit). Author: Ege Balci |
Analyze the security implications of: Flexense HTTP Server 10.6.24 - Buffer Overflow (DoS) (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: pdfium - CPDF_Function::Call Stack Buffer Overflow | This is a dos exploit for multiple platform. Description: pdfium - CPDF_Function::Call Stack Buffer Overflow. Author: Google Security Research |
Analyze the security implications of: pdfium - CPDF_Function::Call Stack Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apache Pluto 3.0.0 / 3.0.1 - Persistent Cross-Site Scripting | This is a webapps exploit for java platform. Description: Apache Pluto 3.0.0 / 3.0.1 - Persistent Cross-Site Scripting. Author: Dhiraj Mishra |
Analyze the security implications of: Apache Pluto 3.0.0 / 3.0.1 - Persistent Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: JChit counter 1.0.0 - 'imgsrv.php?ac' Remote File Disclosure | This is a webapps exploit for php platform. Description: JChit counter 1.0.0 - 'imgsrv.php?ac' Remote File Disclosure. Author: Dj7xpl |
Analyze the security implications of: JChit counter 1.0.0 - 'imgsrv.php?ac' Remote File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GKrellM GKrellWeather 0.2.7 Plugin - Local Stack Buffer Overflow | This is a local exploit for linux platform. Description: GKrellM GKrellWeather 0.2.7 Plugin - Local Stack Buffer Overflow. Author: forensec |
Analyze the security implications of: GKrellM GKrellWeather 0.2.7 Plugin - Local Stack Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Oops Proxy Server 1.4.22 - Remote Buffer Overflow (2) | This is a remote exploit for linux platform. Description: Oops Proxy Server 1.4.22 - Remote Buffer Overflow (2). Author: diman |
Analyze the security implications of: Oops Proxy Server 1.4.22 - Remote Buffer Overflow (2) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ZTE / TP-Link RomPager - Denial of Service | This is a dos exploit for hardware platform. Description: ZTE / TP-Link RomPager - Denial of Service. Author: Osanda Malith Jayathissa |
Analyze the security implications of: ZTE / TP-Link RomPager - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Absolute Image Gallery 2.0 - 'gallery.asp?categoryId' SQL Injection | This is a webapps exploit for asp platform. Description: Absolute Image Gallery 2.0 - 'gallery.asp?categoryId' SQL Injection. Author: WiLdBoY |
Analyze the security implications of: Absolute Image Gallery 2.0 - 'gallery.asp?categoryId' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Linux Kernel 2.6.x - Audit Subsystems Local Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - Audit Subsystems Local Denial of Service. Author: Steve Grubb |
Analyze the security implications of: Linux Kernel 2.6.x - Audit Subsystems Local Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component rekry 1.0.0 - 'op_id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component rekry 1.0.0 - 'op_id' SQL Injection. Author: Sniper456 |
Analyze the security implications of: Joomla! Component rekry 1.0.0 - 'op_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.5.x/2.6.x - CPUFreq Proc Handler Integer Handling Memory Read | This is a local exploit for linux platform. Description: Linux Kernel 2.5.x/2.6.x - CPUFreq Proc Handler Integer Handling Memory Read. Author: Brad Spengler |
Analyze the security implications of: Linux Kernel 2.5.x/2.6.x - CPUFreq Proc Handler Integer Handling Memory Read | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: SGI IRIX 6.4 - 'netprint' Local Privilege Escalation | This is a local exploit for irix platform. Description: SGI IRIX 6.4 - 'netprint' Local Privilege Escalation. Author: Yuri Volobuev |
Analyze the security implications of: SGI IRIX 6.4 - 'netprint' Local Privilege Escalation | This exploit targets irix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: ManageEngine Password Manager - MetadataServlet.dat SQL Injection (Metasploit) | This is a webapps exploit for multiple platform. Description: ManageEngine Password Manager - MetadataServlet.dat SQL Injection (Metasploit). Author: Pedro Ribeiro |
Analyze the security implications of: ManageEngine Password Manager - MetadataServlet.dat SQL Injection (Metasploit) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CraftCMS 3 vCard Plugin 1.0.0 - Remote Code Execution | This is a webapps exploit for php platform. Description: CraftCMS 3 vCard Plugin 1.0.0 - Remote Code Execution. Author: Wade Guest |
Analyze the security implications of: CraftCMS 3 vCard Plugin 1.0.0 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Flux CMS 1.5.0 - 'loadsave.php' Arbitrary File Overwrite | This is a webapps exploit for php platform. Description: Flux CMS 1.5.0 - 'loadsave.php' Arbitrary File Overwrite. Author: EgiX |
Analyze the security implications of: Flux CMS 1.5.0 - 'loadsave.php' Arbitrary File Overwrite | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Axigen 2.0.0b1 - Remote Denial of Service (1) | This is a dos exploit for linux platform. Description: Axigen 2.0.0b1 - Remote Denial of Service (1). Author: mu-b |
Analyze the security implications of: Axigen 2.0.0b1 - Remote Denial of Service (1) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Github Enterprise - Default Session Secret and Deserialization (Metasploit) | This is a remote exploit for linux platform. Description: Github Enterprise - Default Session Secret and Deserialization (Metasploit). Author: Metasploit |
Analyze the security implications of: Github Enterprise - Default Session Secret and Deserialization (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Forritun - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Forritun - Multiple SQL Injections. Author: eXeSoul |
Analyze the security implications of: Forritun - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: microASP (Portal+) CMS - 'pagina.phtml?explode_tree' SQL Injection | This is a webapps exploit for asp platform. Description: microASP (Portal+) CMS - 'pagina.phtml?explode_tree' SQL Injection. Author: felipe andrian |
Analyze the security implications of: microASP (Portal+) CMS - 'pagina.phtml?explode_tree' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: FLIR Thermal Camera F/FC/PT/D - SSH Backdoor Access | This is a remote exploit for hardware platform. Description: FLIR Thermal Camera F/FC/PT/D - SSH Backdoor Access. Author: LiquidWorm |
Analyze the security implications of: FLIR Thermal Camera F/FC/PT/D - SSH Backdoor Access | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Easy Photo Gallery 2.1 - Cross-Site Scripting / File Disclosure/Bypass / SQL Injection | This is a webapps exploit for php platform. Description: Easy Photo Gallery 2.1 - Cross-Site Scripting / File Disclosure/Bypass / SQL Injection. Author: Khashayar Fereidani |
Analyze the security implications of: Easy Photo Gallery 2.1 - Cross-Site Scripting / File Disclosure/Bypass / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DynaTracker 1.5.1 - 'action.php?base_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: DynaTracker 1.5.1 - 'action.php?base_path' Remote File Inclusion. Author: alijsb |
Analyze the security implications of: DynaTracker 1.5.1 - 'action.php?base_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.