input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Joomla! Component J-MultipleHotelReservation Standard 6.0.2 - 'review_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo Component Hestar - SQL Injection | This is a webapps exploit for php platform. Description: Mambo Component Hestar - SQL Injection. Author: M3NW5 |
Analyze the security implications of: Mambo Component Hestar - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMS Made Simple (CMSMS) Showtime2 - File Upload Remote Code Execution (Metasploit) | This is a remote exploit for php platform. Description: CMS Made Simple (CMSMS) Showtime2 - File Upload Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: CMS Made Simple (CMSMS) Showtime2 - File Upload Remote Code Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: asp-project 1.0 - Insecure Cookie Method | This is a webapps exploit for asp platform. Description: asp-project 1.0 - Insecure Cookie Method. Author: Khashayar Fereidani |
Analyze the security implications of: asp-project 1.0 - Insecure Cookie Method | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Boa Web Server v0.94.14 - Authentication Bypass | This is a webapps exploit for linux platform. Description: Boa Web Server v0.94.14 - Authentication Bypass. Author: George Tsimpidas |
Analyze the security implications of: Boa Web Server v0.94.14 - Authentication Bypass | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Cisco/Protego CS-MARS < 4.2.1 - 'JBoss' Remote Code Execution | This is a remote exploit for hardware platform. Description: Cisco/Protego CS-MARS < 4.2.1 - 'JBoss' Remote Code Execution. Author: Jon Hart |
Analyze the security implications of: Cisco/Protego CS-MARS < 4.2.1 - 'JBoss' Remote Code Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Indexu 5.0.1 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: Indexu 5.0.1 - Multiple Remote File Inclusions. Author: CrAsh_oVeR_rIdE |
Analyze the security implications of: Indexu 5.0.1 - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RubyGems < 2.6.13 - Arbitrary File Overwrite | This is a local exploit for linux platform. Description: RubyGems < 2.6.13 - Arbitrary File Overwrite. Author: mame |
Analyze the security implications of: RubyGems < 2.6.13 - Arbitrary File Overwrite | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AuraCMS 3.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: AuraCMS 3.0 - Multiple Vulnerabilities. Author: Mustafa ALTINKAYNAK |
Analyze the security implications of: AuraCMS 3.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ImageVue 1.7 - 'dirxml.php?path' Cross-Site Scripting | This is a webapps exploit for php platform. Description: ImageVue 1.7 - 'dirxml.php?path' Cross-Site Scripting. Author: ZoRLu |
Analyze the security implications of: ImageVue 1.7 - 'dirxml.php?path' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JBoss AS 3/4/5/6 - Remote Command Execution | This is a webapps exploit for multiple platform. Description: JBoss AS 3/4/5/6 - Remote Command Execution. Author: João Filho Matos Figueiredo |
Analyze the security implications of: JBoss AS 3/4/5/6 - Remote Command Execution | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Gnome 1.0/1.1 / Group X 11.0 / XFree86 X11R6 3.3.x/4.0 - Denial of Service | This is a dos exploit for linux platform. Description: Gnome 1.0/1.1 / Group X 11.0 / XFree86 X11R6 3.3.x/4.0 - Denial of Service. Author: Chris Evans |
Analyze the security implications of: Gnome 1.0/1.1 / Group X 11.0 / XFree86 X11R6 3.3.x/4.0 - Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CMS buzz - Cross-Site Scripting / Password Change / HTML Injection | This is a webapps exploit for php platform. Description: CMS buzz - Cross-Site Scripting / Password Change / HTML Injection. Author: ThE g0bL!N |
Analyze the security implications of: CMS buzz - Cross-Site Scripting / Password Change / HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux < 4.20.14 - Virtual Address 0 is Mappable via Privileged write() to /proc/*/mem | This is a dos exploit for linux platform. Description: Linux < 4.20.14 - Virtual Address 0 is Mappable via Privileged write() to /proc/*/mem. Author: Google Security Research |
Analyze the security implications of: Linux < 4.20.14 - Virtual Address 0 is Mappable via Privileged write() to /proc/*/mem | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: kandalf upper 0.1 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: kandalf upper 0.1 - Arbitrary File Upload. Author: indoushka |
Analyze the security implications of: kandalf upper 0.1 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: bbScript 1.1.2.1 - 'id' Blind SQL Injection | This is a webapps exploit for php platform. Description: bbScript 1.1.2.1 - 'id' Blind SQL Injection. Author: cOndemned |
Analyze the security implications of: bbScript 1.1.2.1 - 'id' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_ksadvertiser - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_ksadvertiser - SQL Injection. Author: FL0RiX |
Analyze the security implications of: Joomla! Component com_ksadvertiser - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: cP Creator 2.7.1 - SQL Injection | This is a webapps exploit for multiple platform. Description: cP Creator 2.7.1 - SQL Injection. Author: Sina Yazdanmehr |
Analyze the security implications of: cP Creator 2.7.1 - SQL Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Care2x Integrated Hospital Info System 2.7 - 'Multiple' SQL Injection | This is a webapps exploit for php platform. Description: Care2x Integrated Hospital Info System 2.7 - 'Multiple' SQL Injection. Author: securityforeveryone.com |
Analyze the security implications of: Care2x Integrated Hospital Info System 2.7 - 'Multiple' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GuppY 2.4 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: GuppY 2.4 - Cross-Site Scripting. Author: frog |
Analyze the security implications of: GuppY 2.4 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Freeway 1.4.1.171 - '/templates/Freeway/mainpage_modules/mainpage.php?language' Traversal Local File Inclusion | This is a webapps exploit for php platform. Description: Freeway 1.4.1.171 - '/templates/Freeway/mainpage_modules/mainpage.php?language' Traversal Local File Inclusion. Author: Digital Security Research Group |
Analyze the security implications of: Freeway 1.4.1.171 - '/templates/Freeway/mainpage_modules/mainpage.php?language' Traversal Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Huawei E303 Router - Cross-Site Request Forgery | This is a remote exploit for hardware platform. Description: Huawei E303 Router - Cross-Site Request Forgery. Author: Benjamin Daniel Mussler |
Analyze the security implications of: Huawei E303 Router - Cross-Site Request Forgery | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Virtual Programming VP-ASP Shoperror Script 4/5 - Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Virtual Programming VP-ASP Shoperror Script 4/5 - Cross-Site Scripting. Author: Thomas Ryan |
Analyze the security implications of: Virtual Programming VP-ASP Shoperror Script 4/5 - Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Gattaca Server 2003 - Null Byte Full Path Disclosure | This is a webapps exploit for cgi platform. Description: Gattaca Server 2003 - Null Byte Full Path Disclosure. Author: dr_insane |
Analyze the security implications of: Gattaca Server 2003 - Null Byte Full Path Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Polycom VVX Web Interface - Change Admin Password | This is a webapps exploit for hardware platform. Description: Polycom VVX Web Interface - Change Admin Password. Author: Mike Brown |
Analyze the security implications of: Polycom VVX Web Interface - Change Admin Password | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Darwin Kernel 7.1 - Mach File Parsing Local Integer Overflow | This is a local exploit for osx platform. Description: Darwin Kernel 7.1 - Mach File Parsing Local Integer Overflow. Author: nemo@felinemenace.org |
Analyze the security implications of: Darwin Kernel 7.1 - Mach File Parsing Local Integer Overflow | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: ManageEngine Desktop Central 10.0.271 - Cross-Site Scripting | This is a webapps exploit for java platform. Description: ManageEngine Desktop Central 10.0.271 - Cross-Site Scripting. Author: Ismail Tasdelen |
Analyze the security implications of: ManageEngine Desktop Central 10.0.271 - Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: LookStrike Lan Manager 0.9 - Local/Remote File Inclusion | This is a webapps exploit for php platform. Description: LookStrike Lan Manager 0.9 - Local/Remote File Inclusion. Author: MhZ91 |
Analyze the security implications of: LookStrike Lan Manager 0.9 - Local/Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RaakCMS - Multiple Vulnerabilities | This is a webapps exploit for asp platform. Description: RaakCMS - Multiple Vulnerabilities. Author: Pouya Daneshmand |
Analyze the security implications of: RaakCMS - Multiple Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Simple Message Board 2.0 beta1 - 'Thread.cfm' Cross-Site Scripting | This is a webapps exploit for cfm platform. Description: Simple Message Board 2.0 beta1 - 'Thread.cfm' Cross-Site Scripting. Author: rUnViRuS |
Analyze the security implications of: Simple Message Board 2.0 beta1 - 'Thread.cfm' Cross-Site Scripting | This exploit targets cfm systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cfm platform |
What is this exploit about: Flatpress 0.804 < 0.812.1 - Local File Inclusion | This is a webapps exploit for php platform. Description: Flatpress 0.804 < 0.812.1 - Local File Inclusion. Author: Giuseppe Fuggiano |
Analyze the security implications of: Flatpress 0.804 < 0.812.1 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Brother MFC-J6520DW - Authentication Bypass / Password Change | This is a webapps exploit for hardware platform. Description: Brother MFC-J6520DW - Authentication Bypass / Password Change. Author: Patryk Bogdan |
Analyze the security implications of: Brother MFC-J6520DW - Authentication Bypass / Password Change | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: FOSCAM IP-Cameras - Improper Access Restrictions | This is a webapps exploit for hardware platform. Description: FOSCAM IP-Cameras - Improper Access Restrictions. Author: Core Security |
Analyze the security implications of: FOSCAM IP-Cameras - Improper Access Restrictions | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Acuity CMS 2.6.2 - '/admin/file_manager/file_upload_submit.asp' Multiple Arbitrary File Upload / Code Executions | This is a webapps exploit for asp platform. Description: Acuity CMS 2.6.2 - '/admin/file_manager/file_upload_submit.asp' Multiple Arbitrary File Upload / Code Executions. Author: Aung Khant |
Analyze the security implications of: Acuity CMS 2.6.2 - '/admin/file_manager/file_upload_submit.asp' Multiple Arbitrary File Upload / Code Executions | This exploit targets asp systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.