input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: VideoIQ Camera - Local File Disclosure | This is a webapps exploit for hardware platform. Description: VideoIQ Camera - Local File Disclosure. Author: Yakir Wizman |
Analyze the security implications of: VideoIQ Camera - Local File Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ITGuard-Manager 0.0.0.1 - Remote Code Execution | This is a webapps exploit for cgi platform. Description: ITGuard-Manager 0.0.0.1 - Remote Code Execution. Author: Nassim Asrir |
Analyze the security implications of: ITGuard-Manager 0.0.0.1 - Remote Code Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: TDizin - 'Arama.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: TDizin - 'Arama.asp' Cross-Site Scripting. Author: GeFORC3 |
Analyze the security implications of: TDizin - 'Arama.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Cyberfolio 2.0 RC1 - 'av' Remote File Inclusion | This is a webapps exploit for php platform. Description: Cyberfolio 2.0 RC1 - 'av' Remote File Inclusion. Author: the_day |
Analyze the security implications of: Cyberfolio 2.0 RC1 - 'av' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASPThai.Net Guestbook 5.5 - Authentication Bypass | This is a webapps exploit for asp platform. Description: ASPThai.Net Guestbook 5.5 - Authentication Bypass. Author: Zodiac |
Analyze the security implications of: ASPThai.Net Guestbook 5.5 - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Apple Mac OSX Safari Browser - 'Safe File' Remote Code Execution (Metasploit) | This is a remote exploit for osx platform. Description: Apple Mac OSX Safari Browser - 'Safe File' Remote Code Execution (Metasploit). Author: H D Moore |
Analyze the security implications of: Apple Mac OSX Safari Browser - 'Safe File' Remote Code Execution (Metasploit) | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: RAD SecFlow-1v SF_0290_2.3.01.26 - Persistent Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: RAD SecFlow-1v SF_0290_2.3.01.26 - Persistent Cross-Site Scripting. Author: Jonatan Schor |
Analyze the security implications of: RAD SecFlow-1v SF_0290_2.3.01.26 - Persistent Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Centos Web Panel 7 v0.9.8.1147 - Unauthenticated Remote Code Execution (RCE) | This is a webapps exploit for linux platform. Description: Centos Web Panel 7 v0.9.8.1147 - Unauthenticated Remote Code Execution (RCE). Author: numan türle |
Analyze the security implications of: Centos Web Panel 7 v0.9.8.1147 - Unauthenticated Remote Code Execution (RCE) | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: BandSite CMS 1.1 - 'news_content.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: BandSite CMS 1.1 - 'news_content.php' Cross-Site Scripting. Author: HACKERS PAL |
Analyze the security implications of: BandSite CMS 1.1 - 'news_content.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iOS 10.1.x - Certificate File Memory Corruption | This is a dos exploit for ios platform. Description: iOS 10.1.x - Certificate File Memory Corruption. Author: Maksymilian Arciemowicz |
Analyze the security implications of: iOS 10.1.x - Certificate File Memory Corruption | This exploit targets ios systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: cpDynaLinks 1.02 - 'category.php' SQL Injection | This is a webapps exploit for php platform. Description: cpDynaLinks 1.02 - 'category.php' SQL Injection. Author: ka0x |
Analyze the security implications of: cpDynaLinks 1.02 - 'category.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Justdial Clone Script - 'fid' SQL Injection | This is a webapps exploit for php platform. Description: Justdial Clone Script - 'fid' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Justdial Clone Script - 'fid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NTPsec 1.1.2 - 'config' (Authenticated) Out-of-Bounds Write Denial of Service (PoC) | This is a dos exploit for linux platform. Description: NTPsec 1.1.2 - 'config' (Authenticated) Out-of-Bounds Write Denial of Service (PoC). Author: Magnus Klaaborg Stubman |
Analyze the security implications of: NTPsec 1.1.2 - 'config' (Authenticated) Out-of-Bounds Write Denial of Service (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AIX5l with FTP-Server - Hash Disclosure | This is a remote exploit for aix platform. Description: AIX5l with FTP-Server - Hash Disclosure. Author: kingcope |
Analyze the security implications of: AIX5l with FTP-Server - Hash Disclosure | This exploit targets aix systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: Elastix 2.2.0 - 'graph.php' Local File Inclusion | This is a webapps exploit for php platform. Description: Elastix 2.2.0 - 'graph.php' Local File Inclusion. Author: cheki |
Analyze the security implications of: Elastix 2.2.0 - 'graph.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AINS 0.02b - 'ains_main.php?ains_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: AINS 0.02b - 'ains_main.php?ains_path' Remote File Inclusion. Author: ThE dE@Th |
Analyze the security implications of: AINS 0.02b - 'ains_main.php?ains_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ashop Shopping Cart Software - 'bannedcustomers.php?blacklistitemid' SQL Injection | This is a webapps exploit for php platform. Description: Ashop Shopping Cart Software - 'bannedcustomers.php?blacklistitemid' SQL Injection. Author: Doğukan Karaciğer |
Analyze the security implications of: Ashop Shopping Cart Software - 'bannedcustomers.php?blacklistitemid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: osCommerce 2.2 - 'product_info.php' Denial of Service | This is a dos exploit for php platform. Description: osCommerce 2.2 - 'product_info.php' Denial of Service. Author: Lorenzo Hernandez Garcia-Hierro |
Analyze the security implications of: osCommerce 2.2 - 'product_info.php' Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dokuwiki 2009-02-14 - Temporary/Remote File Inclusion | This is a webapps exploit for php platform. Description: Dokuwiki 2009-02-14 - Temporary/Remote File Inclusion. Author: Nine:Situations:Group |
Analyze the security implications of: Dokuwiki 2009-02-14 - Temporary/Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component J2Store < 3.3.7 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component J2Store < 3.3.7 - SQL Injection. Author: Andrei Conache |
Analyze the security implications of: Joomla! Component J2Store < 3.3.7 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SGI IRIX 6.4 / SGI license_oeo 3.0/3.1/3.1.1 LicenseManager - 'LICENSEMGR_FILE_ROOT' Local Privilege Escalation | This is a local exploit for irix platform. Description: SGI IRIX 6.4 / SGI license_oeo 3.0/3.1/3.1.1 LicenseManager - 'LICENSEMGR_FILE_ROOT' Local Privilege Escalation. Author: Yuri Volobuev |
Analyze the security implications of: SGI IRIX 6.4 / SGI license_oeo 3.0/3.1/3.1.1 LicenseManager - 'LICENSEMGR_FILE_ROOT' Local Privilege Escalation | This exploit targets irix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: SAP Business Objects InfoView System - '/help/helpredir.aspx?guide' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: SAP Business Objects InfoView System - '/help/helpredir.aspx?guide' Cross-Site Scripting. Author: vulns@dionach.com |
Analyze the security implications of: SAP Business Objects InfoView System - '/help/helpredir.aspx?guide' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: D-link DAP-1360 - Path Traversal / Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: D-link DAP-1360 - Path Traversal / Cross-Site Scripting. Author: r3m0t3nu11 |
Analyze the security implications of: D-link DAP-1360 - Path Traversal / Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Car Park Management System 1.0 - Authentication Bypass | This is a webapps exploit for php platform. Description: Car Park Management System 1.0 - Authentication Bypass. Author: Tarun Sehgal |
Analyze the security implications of: Car Park Management System 1.0 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: scadaApp for iOS 1.1.4.0 - 'Servername' Denial of Service (PoC) | This is a dos exploit for ios platform. Description: scadaApp for iOS 1.1.4.0 - 'Servername' Denial of Service (PoC). Author: Luis Martínez |
Analyze the security implications of: scadaApp for iOS 1.1.4.0 - 'Servername' Denial of Service (PoC) | This exploit targets ios systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: @cid Stats 2.3 - 'Install.php3' Remote File Inclusion | This is a webapps exploit for php platform. Description: @cid Stats 2.3 - 'Install.php3' Remote File Inclusion. Author: Mahmood_ali |
Analyze the security implications of: @cid Stats 2.3 - 'Install.php3' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! < 1.5.11 - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities | This is a webapps exploit for php platform. Description: Joomla! < 1.5.11 - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities. Author: Airton Torres |
Analyze the security implications of: Joomla! < 1.5.11 - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Online Exam 1.5.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Online Exam 1.5.0 - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component Online Exam 1.5.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Siemens Simatic S7-300/400 - CPU START/STOP Module (Metasploit) | This is a remote exploit for hardware platform. Description: Siemens Simatic S7-300/400 - CPU START/STOP Module (Metasploit). Author: Dillon Beresford |
Analyze the security implications of: Siemens Simatic S7-300/400 - CPU START/STOP Module (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: GeneShop 5.1.1 - SQL Injection | This is a webapps exploit for php platform. Description: GeneShop 5.1.1 - SQL Injection. Author: 41.w4r10r |
Analyze the security implications of: GeneShop 5.1.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Nagios Plugins 1.4.2/1.4.9 - Location Header Remote Buffer Overflow | This is a dos exploit for linux platform. Description: Nagios Plugins 1.4.2/1.4.9 - Location Header Remote Buffer Overflow. Author: Nobuhiro Ban |
Analyze the security implications of: Nagios Plugins 1.4.2/1.4.9 - Location Header Remote Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Catviz 0.4.0 beta1 - Local File Inclusion / Cross-Site Scripting | This is a webapps exploit for php platform. Description: Catviz 0.4.0 beta1 - Local File Inclusion / Cross-Site Scripting. Author: ByALBAYX |
Analyze the security implications of: Catviz 0.4.0 beta1 - Local File Inclusion / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: jPORTAL 2 - 'mailer.php' SQL Injection | This is a webapps exploit for php platform. Description: jPORTAL 2 - 'mailer.php' SQL Injection. Author: Kacper |
Analyze the security implications of: jPORTAL 2 - 'mailer.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LightOpenCMS 0.1 - 'smarty.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: LightOpenCMS 0.1 - 'smarty.php' Remote File Inclusion. Author: Zer0 Thunder |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.