input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: DD-WRT 24-preSP2 - Information Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: doorGets CMS 7.0 - Arbitrary File Download | This is a webapps exploit for php platform. Description: doorGets CMS 7.0 - Arbitrary File Download. Author: Ihsan Sencan |
Analyze the security implications of: doorGets CMS 7.0 - Arbitrary File Download | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GNU Tar 1.1x - 'GNUTYPE_NAMES' Directory Traversal | This is a remote exploit for linux platform. Description: GNU Tar 1.1x - 'GNUTYPE_NAMES' Directory Traversal. Author: Teemu Salmela |
Analyze the security implications of: GNU Tar 1.1x - 'GNUTYPE_NAMES' Directory Traversal | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Form Tools 1.5.0b - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: Form Tools 1.5.0b - Multiple Remote File Inclusions. Author: RoMaNcYxHaCkEr |
Analyze the security implications of: Form Tools 1.5.0b - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Photo Manager Pro 4.4.0 iOS - Local File Inclusion | This is a webapps exploit for ios platform. Description: Photo Manager Pro 4.4.0 iOS - Local File Inclusion. Author: Vulnerability-Lab |
Analyze the security implications of: Photo Manager Pro 4.4.0 iOS - Local File Inclusion | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: ac4p Mobile - 'polls.php' Multiple Cross-Site Scripting Vulnerabilities (1) | This is a webapps exploit for php platform. Description: ac4p Mobile - 'polls.php' Multiple Cross-Site Scripting Vulnerabilities (1). Author: AL-garnei |
Analyze the security implications of: ac4p Mobile - 'polls.php' Multiple Cross-Site Scripting Vulnerabilities (1) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Captaris Infinite Mobile Delivery Webmail 2.6 - Full Path Disclosure | This is a webapps exploit for php platform. Description: Captaris Infinite Mobile Delivery Webmail 2.6 - Full Path Disclosure. Author: steven@lovebug.org |
Analyze the security implications of: Captaris Infinite Mobile Delivery Webmail 2.6 - Full Path Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eXtplorer 2.1.9 - '.ZIP' Directory Traversal | This is a webapps exploit for php platform. Description: eXtplorer 2.1.9 - '.ZIP' Directory Traversal. Author: hyp3rlinx |
Analyze the security implications of: eXtplorer 2.1.9 - '.ZIP' Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Pure-FTPd 1.0.21 (CentOS 6.2 / Ubuntu 8.04) - Null Pointer Dereference Crash (PoC) | This is a dos exploit for linux platform. Description: Pure-FTPd 1.0.21 (CentOS 6.2 / Ubuntu 8.04) - Null Pointer Dereference Crash (PoC). Author: kingcope |
Analyze the security implications of: Pure-FTPd 1.0.21 (CentOS 6.2 / Ubuntu 8.04) - Null Pointer Dereference Crash (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PHP 7.0 < 7.4 (Unix) - 'debug_backtrace' disable_functions Bypass | This is a local exploit for php platform. Description: PHP 7.0 < 7.4 (Unix) - 'debug_backtrace' disable_functions Bypass. Author: mm0r1 |
Analyze the security implications of: PHP 7.0 < 7.4 (Unix) - 'debug_backtrace' disable_functions Bypass | This exploit targets php systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JE Job - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JE Job - SQL Injection. Author: Easy Laster |
Analyze the security implications of: Joomla! Component JE Job - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AdaptBB 1.0 - 'topic_id' SQL Injection / Credentials Disclosure | This is a webapps exploit for php platform. Description: AdaptBB 1.0 - 'topic_id' SQL Injection / Credentials Disclosure. Author: StAkeR |
Analyze the security implications of: AdaptBB 1.0 - 'topic_id' SQL Injection / Credentials Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Limny - 'index.php' Multiple SQL Injections | This is a webapps exploit for php platform. Description: Limny - 'index.php' Multiple SQL Injections. Author: L0n3ly-H34rT |
Analyze the security implications of: Limny - 'index.php' Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_spa - SQL Injection (2) | This is a webapps exploit for php platform. Description: Joomla! Component com_spa - SQL Injection (2). Author: Palyo34 & KroNicKq |
Analyze the security implications of: Joomla! Component com_spa - SQL Injection (2) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component VirtueMart Module Customers_who_bought - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component VirtueMart Module Customers_who_bought - SQL Injection. Author: B-HUNT3|2 |
Analyze the security implications of: Joomla! Component VirtueMart Module Customers_who_bought - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: flatCore 1.5.5 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: flatCore 1.5.5 - Arbitrary File Upload. Author: CodeSecLab |
Analyze the security implications of: flatCore 1.5.5 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BPTutors Tutoring site script - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: BPTutors Tutoring site script - Cross-Site Request Forgery (Add Admin). Author: bi0 |
Analyze the security implications of: BPTutors Tutoring site script - Cross-Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: b2evolution 6.8.2 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: b2evolution 6.8.2 - Arbitrary File Upload. Author: Li Fei |
Analyze the security implications of: b2evolution 6.8.2 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Built2Go PHP Shopping - Cross-Site Request Forgery (Admin Password) | This is a webapps exploit for php platform. Description: Built2Go PHP Shopping - Cross-Site Request Forgery (Admin Password). Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: Built2Go PHP Shopping - Cross-Site Request Forgery (Admin Password) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iy10 Dizin Scripti - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: iy10 Dizin Scripti - Multiple Vulnerabilities. Author: KnocKout |
Analyze the security implications of: iy10 Dizin Scripti - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Extreme Networks Aerohive HiveOS 11.0 - Remote Denial of Service (PoC) | This is a dos exploit for hardware platform. Description: Extreme Networks Aerohive HiveOS 11.0 - Remote Denial of Service (PoC). Author: LiquidWorm |
Analyze the security implications of: Extreme Networks Aerohive HiveOS 11.0 - Remote Denial of Service (PoC) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Slackware Linux 3.5 - '/etc/group' Local Privilege Escalation | This is a local exploit for linux platform. Description: Slackware Linux 3.5 - '/etc/group' Local Privilege Escalation. Author: Richard Thomas |
Analyze the security implications of: Slackware Linux 3.5 - '/etc/group' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: A10 Networks ACOS 2.7.0-P2 (Build 53) - Buffer Overflow (PoC) | This is a dos exploit for hardware platform. Description: A10 Networks ACOS 2.7.0-P2 (Build 53) - Buffer Overflow (PoC). Author: Francesco Perna |
Analyze the security implications of: A10 Networks ACOS 2.7.0-P2 (Build 53) - Buffer Overflow (PoC) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_graph_main.php?base_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_graph_main.php?base_path' Remote File Inclusion. Author: indoushka |
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_graph_main.php?base_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ImpressCMS 1.3.9 - SQL Injection | This is a webapps exploit for php platform. Description: ImpressCMS 1.3.9 - SQL Injection. Author: Manuel García Cárdenas |
Analyze the security implications of: ImpressCMS 1.3.9 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eFront 3.6.15 - Directory Traversal | This is a webapps exploit for php platform. Description: eFront 3.6.15 - Directory Traversal. Author: Filippo Roncari |
Analyze the security implications of: eFront 3.6.15 - Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Easysitenetwork Recipe - 'categoryId' SQL Injection | This is a webapps exploit for php platform. Description: Easysitenetwork Recipe - 'categoryId' SQL Injection. Author: S@BUN |
Analyze the security implications of: Easysitenetwork Recipe - 'categoryId' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: friendsinwar FAQ Manager - SQL Injection / Authentication Bypass | This is a webapps exploit for php platform. Description: friendsinwar FAQ Manager - SQL Injection / Authentication Bypass. Author: d3b4g |
Analyze the security implications of: friendsinwar FAQ Manager - SQL Injection / Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SAP NetWeaver Dispatcher 7.0 ehp1/2 - Multiple Vulnerabilities | This is a dos exploit for multiple platform. Description: SAP NetWeaver Dispatcher 7.0 ehp1/2 - Multiple Vulnerabilities. Author: Core Security |
Analyze the security implications of: SAP NetWeaver Dispatcher 7.0 ehp1/2 - Multiple Vulnerabilities | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cm3 CMS - 'search.asp' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for asp platform. Description: Cm3 CMS - 'search.asp' Multiple Cross-Site Scripting Vulnerabilities. Author: Crim3R |
Analyze the security implications of: Cm3 CMS - 'search.asp' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component JPad 1.0 - (Authenticated) SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JPad 1.0 - (Authenticated) SQL Injection. Author: His0k4 |
Analyze the security implications of: Joomla! Component JPad 1.0 - (Authenticated) SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Kure 0.6.3 - 'index.php' Local File Inclusion | This is a webapps exploit for php platform. Description: Kure 0.6.3 - 'index.php' Local File Inclusion. Author: JosS |
Analyze the security implications of: Kure 0.6.3 - 'index.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo Component musepoes - 'aid' SQL Injection | This is a webapps exploit for php platform. Description: Mambo Component musepoes - 'aid' SQL Injection. Author: S@BUN |
Analyze the security implications of: Mambo Component musepoes - 'aid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GDB 6.6 - Process_Coff_Symbol UPX File Buffer Overflow | This is a remote exploit for linux platform. Description: GDB 6.6 - Process_Coff_Symbol UPX File Buffer Overflow. Author: KaiJern Lau |
Analyze the security implications of: GDB 6.6 - Process_Coff_Symbol UPX File Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.