input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: DotBr 0.1 - 'System.php3' Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Coppermine Photo Gallery 1.3.x - Blind SQL Injection | This is a webapps exploit for php platform. Description: Coppermine Photo Gallery 1.3.x - Blind SQL Injection. Author: s0cratex |
Analyze the security implications of: Coppermine Photo Gallery 1.3.x - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Flatnuke3 File Manager Module - Unauthorized Access | This is a webapps exploit for php platform. Description: Flatnuke3 File Manager Module - Unauthorized Access. Author: KiNgOfThEwOrLd |
Analyze the security implications of: Flatnuke3 File Manager Module - Unauthorized Access | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component FocalPoint 1.2.3 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component FocalPoint 1.2.3 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component FocalPoint 1.2.3 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: b2evolution 4.0.3 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: b2evolution 4.0.3 - Persistent Cross-Site Scripting. Author: AutoSec Tools |
Analyze the security implications of: b2evolution 4.0.3 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TPC-110W - Missing Authentication for Critical Function | This is a remote exploit for hardware platform. Description: TPC-110W - Missing Authentication for Critical Function. Author: Amirhossein Bahramizadeh |
Analyze the security implications of: TPC-110W - Missing Authentication for Critical Function | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: PSnews - Database Disclosure | This is a webapps exploit for asp platform. Description: PSnews - Database Disclosure. Author: indoushka |
Analyze the security implications of: PSnews - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Trlinux Postaci Webmail 1.1.3 - Password Disclosure | This is a remote exploit for multiple platform. Description: Trlinux Postaci Webmail 1.1.3 - Password Disclosure. Author: Michael R. Rudel |
Analyze the security implications of: Trlinux Postaci Webmail 1.1.3 - Password Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: C2 WebResource - 'File' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: C2 WebResource - 'File' Cross-Site Scripting. Author: anonymous |
Analyze the security implications of: C2 WebResource - 'File' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Adobe Flash - Metadata Parsing Out-of-Bounds Read | This is a dos exploit for multiple platform. Description: Adobe Flash - Metadata Parsing Out-of-Bounds Read. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - Metadata Parsing Out-of-Bounds Read | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: SIPP 3.3 - Stack-Based Buffer Overflow | This is a local exploit for linux platform. Description: SIPP 3.3 - Stack-Based Buffer Overflow. Author: Juan Sacco |
Analyze the security implications of: SIPP 3.3 - Stack-Based Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Jasmin Ransomware - SQL Injection Login Bypass | This is a webapps exploit for php platform. Description: Jasmin Ransomware - SQL Injection Login Bypass. Author: Buğra Enis Dönmez |
Analyze the security implications of: Jasmin Ransomware - SQL Injection Login Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Download Center Lite (DCL) 1.5 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Download Center Lite (DCL) 1.5 - Remote File Inclusion. Author: Filip Groszynski |
Analyze the security implications of: Download Center Lite (DCL) 1.5 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EasyDynamicPages 1.0 - 'config_page.php' PHP Remote File Inclusion | This is a webapps exploit for php platform. Description: EasyDynamicPages 1.0 - 'config_page.php' PHP Remote File Inclusion. Author: tsbeginnervn |
Analyze the security implications of: EasyDynamicPages 1.0 - 'config_page.php' PHP Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle HTTP Server 8.1.7/9.0.1/9.2 - isqlplus Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Oracle HTTP Server 8.1.7/9.0.1/9.2 - isqlplus Cross-Site Scripting. Author: Rafel Ivgi The-Insider |
Analyze the security implications of: Oracle HTTP Server 8.1.7/9.0.1/9.2 - isqlplus Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: OpenFiler 2.99.1 - Multiple Persistent Cross-Site Scripting Vulnerabilities | This is a webapps exploit for hardware platform. Description: OpenFiler 2.99.1 - Multiple Persistent Cross-Site Scripting Vulnerabilities. Author: Dolev Farhi |
Analyze the security implications of: OpenFiler 2.99.1 - Multiple Persistent Cross-Site Scripting Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! 3.7.0 - 'com_fields' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! 3.7.0 - 'com_fields' SQL Injection. Author: Mateus Lino |
Analyze the security implications of: Joomla! 3.7.0 - 'com_fields' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASPNuke 0.80 - 'forgot_password.asp?email' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: ASPNuke 0.80 - 'forgot_password.asp?email' Cross-Site Scripting. Author: Alberto Trivero |
Analyze the security implications of: ASPNuke 0.80 - 'forgot_password.asp?email' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Docker based datastores for IBM Instana 241-2 243-0 - No Authentication | This is a remote exploit for multiple platform. Description: Docker based datastores for IBM Instana 241-2 243-0 - No Authentication. Author: Shahid Parvez (zippon) |
Analyze the security implications of: Docker based datastores for IBM Instana 241-2 243-0 - No Authentication | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Auto CMS 1.6 - 'autocms.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Auto CMS 1.6 - 'autocms.php' Cross-Site Scripting. Author: High-Tech Bridge SA |
Analyze the security implications of: Auto CMS 1.6 - 'autocms.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Azureus HTML WebUI 0.7.6 - Cross-Site Request Forgery | This is a webapps exploit for multiple platform. Description: Azureus HTML WebUI 0.7.6 - Cross-Site Request Forgery. Author: th3.r00k |
Analyze the security implications of: Azureus HTML WebUI 0.7.6 - Cross-Site Request Forgery | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Bedeng PSP 1.1 - 'index.php?a.nsub' SQL Injection | This is a webapps exploit for php platform. Description: Bedeng PSP 1.1 - 'index.php?a.nsub' SQL Injection. Author: r0t |
Analyze the security implications of: Bedeng PSP 1.1 - 'index.php?a.nsub' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dolibarr ERP-CRM 12.0.3 - Remote Code Execution (Authenticated) | This is a webapps exploit for php platform. Description: Dolibarr ERP-CRM 12.0.3 - Remote Code Execution (Authenticated). Author: Yilmaz Degirmenci |
Analyze the security implications of: Dolibarr ERP-CRM 12.0.3 - Remote Code Execution (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM Notes 8.5.x/9.0.x - Denial of Service | This is a dos exploit for multiple platform. Description: IBM Notes 8.5.x/9.0.x - Denial of Service. Author: Dhiraj Mishra |
Analyze the security implications of: IBM Notes 8.5.x/9.0.x - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: iTech Dating Script 3.40 - SQL Injection | This is a webapps exploit for php platform. Description: iTech Dating Script 3.40 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: iTech Dating Script 3.40 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Magic News Plus 1.0.2 - 'n_layouts.php?link_parameters' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Magic News Plus 1.0.2 - 'n_layouts.php?link_parameters' Cross-Site Scripting. Author: HACKERS PAL |
Analyze the security implications of: Magic News Plus 1.0.2 - 'n_layouts.php?link_parameters' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Discuz! 6.0.1 - 'searchid' SQL Injection | This is a webapps exploit for php platform. Description: Discuz! 6.0.1 - 'searchid' SQL Injection. Author: james |
Analyze the security implications of: Discuz! 6.0.1 - 'searchid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple macOS/iOS - Kernel Double Free due to IOSurfaceRootUserClient not Respecting MIG Ownership Rules | This is a dos exploit for multiple platform. Description: Apple macOS/iOS - Kernel Double Free due to IOSurfaceRootUserClient not Respecting MIG Ownership Rules. Author: Google Security Research |
Analyze the security implications of: Apple macOS/iOS - Kernel Double Free due to IOSurfaceRootUserClient not Respecting MIG Ownership Rules | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: e-Vision CMS 2.02 - SQL Injection / Remote Code Execution | This is a webapps exploit for php platform. Description: e-Vision CMS 2.02 - SQL Injection / Remote Code Execution. Author: Silentz |
Analyze the security implications of: e-Vision CMS 2.02 - SQL Injection / Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Getsimple CMS 3.3.10 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Getsimple CMS 3.3.10 - Arbitrary File Upload. Author: s0nk3y |
Analyze the security implications of: Getsimple CMS 3.3.10 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 1024 CMS 1.4.4 - Remote Command Execution / Remote File Inclusion | This is a webapps exploit for php platform. Description: 1024 CMS 1.4.4 - Remote Command Execution / Remote File Inclusion. Author: JosS |
Analyze the security implications of: 1024 CMS 1.4.4 - Remote Command Execution / Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_jashowcase - 'catid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_jashowcase - 'catid' SQL Injection. Author: EcHoLL |
Analyze the security implications of: Joomla! Component com_jashowcase - 'catid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DocMGR 1.1.2 - 'history.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DocMGR 1.1.2 - 'history.php' Cross-Site Scripting. Author: AutoSec Tools |
Analyze the security implications of: DocMGR 1.1.2 - 'history.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: H-Sphere WebShell 2.4 - Local Privilege Escalation | This is a local exploit for linux platform. Description: H-Sphere WebShell 2.4 - Local Privilege Escalation. Author: Carl Livitt |
Analyze the security implications of: H-Sphere WebShell 2.4 - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.