input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Joomla! Component com_waticketsystem - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP-UX 11i - 'LIBC TZ' Enviroment Variable Privilege Escalation | This is a local exploit for hp-ux platform. Description: HP-UX 11i - 'LIBC TZ' Enviroment Variable Privilege Escalation. Author: prdelka |
Analyze the security implications of: HP-UX 11i - 'LIBC TZ' Enviroment Variable Privilege Escalation | This exploit targets hp-ux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hp-ux platform |
What is this exploit about: AdaptCMS 2.0 - SQL Injection | This is a webapps exploit for php platform. Description: AdaptCMS 2.0 - SQL Injection. Author: X-Cisadane |
Analyze the security implications of: AdaptCMS 2.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle - SYS.LT.MERGEWORKSPACE Evil Cursor | This is a local exploit for multiple platform. Description: Oracle - SYS.LT.MERGEWORKSPACE Evil Cursor. Author: Andrea Purificato |
Analyze the security implications of: Oracle - SYS.LT.MERGEWORKSPACE Evil Cursor | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ajax PHP Penny Auction 1.x 2.x - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Ajax PHP Penny Auction 1.x 2.x - Multiple Vulnerabilities. Author: Taha Hunter |
Analyze the security implications of: Ajax PHP Penny Auction 1.x 2.x - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_bit - 'Controller' Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_bit - 'Controller' Local File Inclusion. Author: Xr0b0t |
Analyze the security implications of: Joomla! Component com_bit - 'Controller' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Archangel Weblog 0.90.02 - 'post_id' SQL Injection | This is a webapps exploit for php platform. Description: Archangel Weblog 0.90.02 - 'post_id' SQL Injection. Author: Stack |
Analyze the security implications of: Archangel Weblog 0.90.02 - 'post_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Invision Power Board 2.1.5 - 'from_contact' SQL Injection | This is a webapps exploit for php platform. Description: Invision Power Board 2.1.5 - 'from_contact' SQL Injection. Author: Ykstortion Security |
Analyze the security implications of: Invision Power Board 2.1.5 - 'from_contact' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Virtual Reception v1.0 - Web Server Directory Traversal | This is a webapps exploit for multiple platform. Description: Virtual Reception v1.0 - Web Server Directory Traversal. Author: Spinae |
Analyze the security implications of: Virtual Reception v1.0 - Web Server Directory Traversal | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DesignerfreeSolutions NewsLetter Manager Pro - Authentication Bypass | This is a webapps exploit for asp platform. Description: DesignerfreeSolutions NewsLetter Manager Pro - Authentication Bypass. Author: ByALBAYX |
Analyze the security implications of: DesignerfreeSolutions NewsLetter Manager Pro - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: JSFTemplating / Mojarra Scales / GlassFish - File Disclosure | This is a webapps exploit for asp platform. Description: JSFTemplating / Mojarra Scales / GlassFish - File Disclosure. Author: SEC Consult |
Analyze the security implications of: JSFTemplating / Mojarra Scales / GlassFish - File Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Add Artwork | This is a webapps exploit for multiple platform. Description: Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Add Artwork. Author: Shahrukh Iqbal Mirza |
Analyze the security implications of: Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Add Artwork | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Bloginator 1a - SQL Injection / Command Injection (via Cookie Bypass ) | This is a webapps exploit for php platform. Description: Bloginator 1a - SQL Injection / Command Injection (via Cookie Bypass ). Author: Fireshot |
Analyze the security implications of: Bloginator 1a - SQL Injection / Command Injection (via Cookie Bypass ) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NetCommWireless HSPA 3G10WVE Wireless Router - Multiple Vulnerabilities | This is a webapps exploit for cgi platform. Description: NetCommWireless HSPA 3G10WVE Wireless Router - Multiple Vulnerabilities. Author: Bhadresh Patel |
Analyze the security implications of: NetCommWireless HSPA 3G10WVE Wireless Router - Multiple Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Net Portal Dynamic System 5.0 - Register Users Denial of Service | This is a dos exploit for multiple platform. Description: Net Portal Dynamic System 5.0 - Register Users Denial of Service. Author: DarkFig |
Analyze the security implications of: Net Portal Dynamic System 5.0 - Register Users Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Exim 4.41 - 'dns_build_reverse' Local Read Emails | This is a local exploit for linux platform. Description: Exim 4.41 - 'dns_build_reverse' Local Read Emails. Author: Plugger |
Analyze the security implications of: Exim 4.41 - 'dns_build_reverse' Local Read Emails | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FreeWebShop 2.2.9 R2 - 'ajax_save_name.php' Remote Code Execution | This is a webapps exploit for php platform. Description: FreeWebShop 2.2.9 R2 - 'ajax_save_name.php' Remote Code Execution. Author: EgiX |
Analyze the security implications of: FreeWebShop 2.2.9 R2 - 'ajax_save_name.php' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alerton Webtalk 2.5/3.3 - Multiple Vulnerabilities | This is a webapps exploit for linux platform. Description: Alerton Webtalk 2.5/3.3 - Multiple Vulnerabilities. Author: David Tomaschik |
Analyze the security implications of: Alerton Webtalk 2.5/3.3 - Multiple Vulnerabilities | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FicHive 1.0 - 'category' Blind SQL Injection | This is a webapps exploit for php platform. Description: FicHive 1.0 - 'category' Blind SQL Injection. Author: His0k4 |
Analyze the security implications of: FicHive 1.0 - 'category' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ActiveMQ < 5.14.0 - Web Shell Upload (Metasploit) | This is a remote exploit for java platform. Description: ActiveMQ < 5.14.0 - Web Shell Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: ActiveMQ < 5.14.0 - Web Shell Upload (Metasploit) | This exploit targets java systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Kensei Board 2.0.0b - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Kensei Board 2.0.0b - Multiple SQL Injections. Author: cOndemned |
Analyze the security implications of: Kensei Board 2.0.0b - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenBSD 3.9/4.0 - 'ld.so' Local Environment Variable Clearing | This is a local exploit for openbsd platform. Description: OpenBSD 3.9/4.0 - 'ld.so' Local Environment Variable Clearing. Author: Mark Dowd |
Analyze the security implications of: OpenBSD 3.9/4.0 - 'ld.so' Local Environment Variable Clearing | This exploit targets openbsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets openbsd platform |
What is this exploit about: Crafty Syntax Live Help 2.7.3 - Multiple HTML Injection Vulnerabilities | This is a webapps exploit for php platform. Description: Crafty Syntax Live Help 2.7.3 - Multiple HTML Injection Vulnerabilities. Author: HNK Technology Solutions |
Analyze the security implications of: Crafty Syntax Live Help 2.7.3 - Multiple HTML Injection Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple macOS 10.13.1 (High Sierra) - 'Blank Root' Local Privilege Escalation (Metasploit) | This is a local exploit for macos platform. Description: Apple macOS 10.13.1 (High Sierra) - 'Blank Root' Local Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: Apple macOS 10.13.1 (High Sierra) - 'Blank Root' Local Privilege Escalation (Metasploit) | This exploit targets macos systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: HealthNode Hospital Management System 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: HealthNode Hospital Management System 1.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: HealthNode Hospital Management System 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gravity GTD 0.4.5 - Local File Inclusion / Remote Code Execution | This is a webapps exploit for php platform. Description: Gravity GTD 0.4.5 - Local File Inclusion / Remote Code Execution. Author: dun |
Analyze the security implications of: Gravity GTD 0.4.5 - Local File Inclusion / Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Magnet Networks Tesley CPVA 642 Router - Weak WPA-PSK Passphrase Algorithm | This is a dos exploit for hardware platform. Description: Magnet Networks Tesley CPVA 642 Router - Weak WPA-PSK Passphrase Algorithm. Author: Matt O'Connor |
Analyze the security implications of: Magnet Networks Tesley CPVA 642 Router - Weak WPA-PSK Passphrase Algorithm | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: AtomCMS v2.0 - SQLi | This is a webapps exploit for php platform. Description: AtomCMS v2.0 - SQLi. Author: Luca Cuzzolin |
Analyze the security implications of: AtomCMS v2.0 - SQLi | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component ProDesk 1.5 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component ProDesk 1.5 - Local File Inclusion. Author: d3v1l |
Analyze the security implications of: Joomla! Component ProDesk 1.5 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mod_NTLM 0.x - Authorisation Format String | This is a dos exploit for multiple platform. Description: Mod_NTLM 0.x - Authorisation Format String. Author: Matthew Murphy |
Analyze the security implications of: Mod_NTLM 0.x - Authorisation Format String | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Community Server 2007/2008 - 'TagSelector.aspx' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Community Server 2007/2008 - 'TagSelector.aspx' Cross-Site Scripting. Author: PontoSec |
Analyze the security implications of: Community Server 2007/2008 - 'TagSelector.aspx' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: gxine 0.5.6 - HTTP Plugin Remote Buffer Overflow (PoC) | This is a dos exploit for linux platform. Description: gxine 0.5.6 - HTTP Plugin Remote Buffer Overflow (PoC). Author: Federico L. Bossi Bonin |
Analyze the security implications of: gxine 0.5.6 - HTTP Plugin Remote Buffer Overflow (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: WebCal 3.0 4 - 'webcal.cgi' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for cgi platform. Description: WebCal 3.0 4 - 'webcal.cgi' Multiple Cross-Site Scripting Vulnerabilities. Author: Stan Bubrouski |
Analyze the security implications of: WebCal 3.0 4 - 'webcal.cgi' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: HP VSA - Remote Command Execution | This is a remote exploit for hardware platform. Description: HP VSA - Remote Command Execution. Author: Nicolas Gregoire |
Analyze the security implications of: HP VSA - Remote Command Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.