input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Apache Struts - ClassLoader Manipulation Remote Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Volunteer 2.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Volunteer 2.0 - SQL Injection. Author: boom3rang |
Analyze the security implications of: Joomla! Component Volunteer 2.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PostgreSQL 9.3 - COPY FROM PROGRAM Command Execution (Metasploit) | This is a remote exploit for multiple platform. Description: PostgreSQL 9.3 - COPY FROM PROGRAM Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: PostgreSQL 9.3 - COPY FROM PROGRAM Command Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: NTP ntpd monlist Query Reflection - Denial of Service | This is a dos exploit for linux platform. Description: NTP ntpd monlist Query Reflection - Denial of Service. Author: Danilo PC |
Analyze the security implications of: NTP ntpd monlist Query Reflection - Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Adobe Flash - textfield.gridFitType Use-After-Free | This is a dos exploit for multiple platform. Description: Adobe Flash - textfield.gridFitType Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - textfield.gridFitType Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Integrated CMS 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Integrated CMS 1.0 - SQL Injection. Author: DSST |
Analyze the security implications of: Integrated CMS 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gordano NTMail 3.0/5.0 - SPAM Relay | This is a remote exploit for aix platform. Description: Gordano NTMail 3.0/5.0 - SPAM Relay. Author: Geo |
Analyze the security implications of: Gordano NTMail 3.0/5.0 - SPAM Relay | This exploit targets aix systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: VisualBoyAdvanced 1.7.x - Non SUID Local Shell | This is a local exploit for linux platform. Description: VisualBoyAdvanced 1.7.x - Non SUID Local Shell. Author: Qnix |
Analyze the security implications of: VisualBoyAdvanced 1.7.x - Non SUID Local Shell | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ATutor 1.5.1pl2 - SQL Injection / Command Execution | This is a webapps exploit for php platform. Description: ATutor 1.5.1pl2 - SQL Injection / Command Execution. Author: rgod |
Analyze the security implications of: ATutor 1.5.1pl2 - SQL Injection / Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dentist Website Script - SQL Injection | This is a webapps exploit for php platform. Description: Dentist Website Script - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Dentist Website Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Symantec Enterprise Firewall / Gateway Security - HTTP Proxy Internal IP Leakage | This is a remote exploit for multiple platform. Description: Symantec Enterprise Firewall / Gateway Security - HTTP Proxy Internal IP Leakage. Author: Bernhard Mueller |
Analyze the security implications of: Symantec Enterprise Firewall / Gateway Security - HTTP Proxy Internal IP Leakage | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Rumpus FTP Web File Manager 8.2.9.1 - Reflected Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Rumpus FTP Web File Manager 8.2.9.1 - Reflected Cross-Site Scripting. Author: Harshit Shukla |
Analyze the security implications of: Rumpus FTP Web File Manager 8.2.9.1 - Reflected Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Nodejs - 'js-yaml load()' Code Exec (Metasploit) | This is a local exploit for multiple platform. Description: Nodejs - 'js-yaml load()' Code Exec (Metasploit). Author: Metasploit |
Analyze the security implications of: Nodejs - 'js-yaml load()' Code Exec (Metasploit) | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Magic Photo Storage Website - '/user/change_catalog_template.php?_config[site_path]' Remote File Inclusion | This is a webapps exploit for php platform. Description: Magic Photo Storage Website - '/user/change_catalog_template.php?_config[site_path]' Remote File Inclusion. Author: IbnuSina |
Analyze the security implications of: Magic Photo Storage Website - '/user/change_catalog_template.php?_config[site_path]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gravy Media Photo Host 1.0.8 - Local File Disclosure | This is a webapps exploit for php platform. Description: Gravy Media Photo Host 1.0.8 - Local File Disclosure. Author: Lo$er |
Analyze the security implications of: Gravy Media Photo Host 1.0.8 - Local File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WhatsApp < 2.11.7 - Remote Crash | This is a dos exploit for multiple platform. Description: WhatsApp < 2.11.7 - Remote Crash. Author: Jaime Sánchez |
Analyze the security implications of: WhatsApp < 2.11.7 - Remote Crash | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Design4Online - 'Userpages2 Page.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Design4Online - 'Userpages2 Page.asp' SQL Injection. Author: xoron |
Analyze the security implications of: Design4Online - 'Userpages2 Page.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component Gnosis 1.1.2 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Gnosis 1.1.2 - 'id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Gnosis 1.1.2 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: VP-ASP Shopping Cart 7.0 - Database Disclosure | This is a webapps exploit for asp platform. Description: VP-ASP Shopping Cart 7.0 - Database Disclosure. Author: indoushka |
Analyze the security implications of: VP-ASP Shopping Cart 7.0 - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: IBM Lotus Domino 6.x/7.0 iNotes - Email Subject Cross-Site Scripting | This is a remote exploit for multiple platform. Description: IBM Lotus Domino 6.x/7.0 iNotes - Email Subject Cross-Site Scripting. Author: Jakob Balle |
Analyze the security implications of: IBM Lotus Domino 6.x/7.0 iNotes - Email Subject Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GetSimple CMS My SMTP Contact Plugin 1.1.2 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: GetSimple CMS My SMTP Contact Plugin 1.1.2 - Persistent Cross-Site Scripting. Author: boku |
Analyze the security implications of: GetSimple CMS My SMTP Contact Plugin 1.1.2 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RARLAB WinRar 2.90/3.x - UUE/XXE Invalid Filename Error Message Format String | This is a dos exploit for linux platform. Description: RARLAB WinRar 2.90/3.x - UUE/XXE Invalid Filename Error Message Format String. Author: Tan Chew Keong |
Analyze the security implications of: RARLAB WinRar 2.90/3.x - UUE/XXE Invalid Filename Error Message Format String | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PESCMS TEAM 2.3.2 - Multiple Reflected XSS | This is a webapps exploit for multiple platform. Description: PESCMS TEAM 2.3.2 - Multiple Reflected XSS. Author: icekam |
Analyze the security implications of: PESCMS TEAM 2.3.2 - Multiple Reflected XSS | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Fundraising Script 1.0 - SQLi | This is a webapps exploit for php platform. Description: Fundraising Script 1.0 - SQLi. Author: nu11secur1ty |
Analyze the security implications of: Fundraising Script 1.0 - SQLi | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Virata EmWeb R6.0.1 - Remote Crash | This is a dos exploit for linux platform. Description: Virata EmWeb R6.0.1 - Remote Crash. Author: Jobert Abma |
Analyze the security implications of: Virata EmWeb R6.0.1 - Remote Crash | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Axis Network Cameras - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Axis Network Cameras - Multiple Vulnerabilities. Author: Orwelllabs |
Analyze the security implications of: Axis Network Cameras - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: AneCMS 1.0/1.3 - 'register/next' SQL Injection | This is a webapps exploit for php platform. Description: AneCMS 1.0/1.3 - 'register/next' SQL Injection. Author: Sweet |
Analyze the security implications of: AneCMS 1.0/1.3 - 'register/next' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Achievo 1.3.4 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Achievo 1.3.4 - Multiple Cross-Site Scripting Vulnerabilities. Author: MaXe |
Analyze the security implications of: Achievo 1.3.4 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo Open Source 4.5 - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: Mambo Open Source 4.5 - 'index.php' SQL Injection. Author: JeiAr |
Analyze the security implications of: Mambo Open Source 4.5 - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: phpBB 2.0.15 - Register Multiple Users (Denial of Service) | This is a dos exploit for php platform. Description: phpBB 2.0.15 - Register Multiple Users (Denial of Service). Author: HaCkZaTaN |
Analyze the security implications of: phpBB 2.0.15 - Register Multiple Users (Denial of Service) | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_graph_common.php?base_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_graph_common.php?base_path' Remote File Inclusion. Author: indoushka |
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_graph_common.php?base_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ATutor 1.2 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: ATutor 1.2 - Multiple Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: ATutor 1.2 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gitlist - Remote Command Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Gitlist - Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Gitlist - Remote Command Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Envolution 1.1.0 - 'topic' SQL Injection | This is a webapps exploit for php platform. Description: Envolution 1.1.0 - 'topic' SQL Injection. Author: k1tk4t |
Analyze the security implications of: Envolution 1.1.0 - 'topic' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.