input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Sagemcom F@ST 3890 (50_10_19-T1) Cable Modem - 'Cable Haunt' Remote Code Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Jara 1.6 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Jara 1.6 - Multiple Vulnerabilities. Author: Or4nG.M4N |
Analyze the security implications of: Jara 1.6 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DMXReady Secure Login Manager 1.0 - 'content.asp?sent' SQL Injection | This is a webapps exploit for asp platform. Description: DMXReady Secure Login Manager 1.0 - 'content.asp?sent' SQL Injection. Author: Doz |
Analyze the security implications of: DMXReady Secure Login Manager 1.0 - 'content.asp?sent' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component com_jdrugstopics - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_jdrugstopics - SQL Injection. Author: SadHaCkEr |
Analyze the security implications of: Joomla! Component com_jdrugstopics - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FipsCMS 4.5 - 'index.asp' SQL Injection | This is a webapps exploit for asp platform. Description: FipsCMS 4.5 - 'index.asp' SQL Injection. Author: ajann |
Analyze the security implications of: FipsCMS 4.5 - 'index.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: AChecker 1.2 - Multiple Error-Based SQL Injection Vulnerabilities | This is a webapps exploit for php platform. Description: AChecker 1.2 - Multiple Error-Based SQL Injection Vulnerabilities. Author: LiquidWorm |
Analyze the security implications of: AChecker 1.2 - Multiple Error-Based SQL Injection Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mozilla Firefox 3.5.x and SeaMonkey 2.0.1 - Remote Denial of Service | This is a dos exploit for multiple platform. Description: Mozilla Firefox 3.5.x and SeaMonkey 2.0.1 - Remote Denial of Service. Author: 599eme Man |
Analyze the security implications of: Mozilla Firefox 3.5.x and SeaMonkey 2.0.1 - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: EyesOfNetwork 5.1 - Authenticated Remote Command Execution | This is a webapps exploit for php platform. Description: EyesOfNetwork 5.1 - Authenticated Remote Command Execution. Author: Nassim Asrir |
Analyze the security implications of: EyesOfNetwork 5.1 - Authenticated Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 2DayBiz B2B Portal Script - SQL Injection | This is a webapps exploit for php platform. Description: 2DayBiz B2B Portal Script - SQL Injection. Author: JaMbA |
Analyze the security implications of: 2DayBiz B2B Portal Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Procps-ng - Multiple Vulnerabilities | This is a local exploit for linux platform. Description: Procps-ng - Multiple Vulnerabilities. Author: Qualys Corporation |
Analyze the security implications of: Procps-ng - Multiple Vulnerabilities | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_payplans 3.3.6 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_payplans 3.3.6 - SQL Injection. Author: Persian Hack Team |
Analyze the security implications of: Joomla! Component com_payplans 3.3.6 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Webhosting - 'catid' Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Webhosting - 'catid' Blind SQL Injection. Author: cO2 |
Analyze the security implications of: Joomla! Component Webhosting - 'catid' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DataLife Engine 8.3 - '/engine/ajax/addcomments.php?_REQUEST[skin]' Remote File Inclusion | This is a webapps exploit for php platform. Description: DataLife Engine 8.3 - '/engine/ajax/addcomments.php?_REQUEST[skin]' Remote File Inclusion. Author: indoushka |
Analyze the security implications of: DataLife Engine 8.3 - '/engine/ajax/addcomments.php?_REQUEST[skin]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HotScripts Type PHP Clone Script - 'lostpassword.php?msg' Cross-Site Scripting | This is a webapps exploit for php platform. Description: HotScripts Type PHP Clone Script - 'lostpassword.php?msg' Cross-Site Scripting. Author: Moudi |
Analyze the security implications of: HotScripts Type PHP Clone Script - 'lostpassword.php?msg' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DmxReady Bilboard 1.2 - SQL Injection | This is a webapps exploit for asp platform. Description: DmxReady Bilboard 1.2 - SQL Injection. Author: Bellatrix |
Analyze the security implications of: DmxReady Bilboard 1.2 - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Greenwood Content Manager 0.3.2 - Local File Inclusion | This is a webapps exploit for php platform. Description: Greenwood Content Manager 0.3.2 - Local File Inclusion. Author: Khashayar Fereidani |
Analyze the security implications of: Greenwood Content Manager 0.3.2 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco Unified Communications Manager 6.1 - 'key' SQL Injection | This is a webapps exploit for java platform. Description: Cisco Unified Communications Manager 6.1 - 'key' SQL Injection. Author: Nico Leidecker |
Analyze the security implications of: Cisco Unified Communications Manager 6.1 - 'key' SQL Injection | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: AWStats 6.1 < 6.2 - 'configdir' Remote Command Execution (Metasploit) | This is a webapps exploit for cgi platform. Description: AWStats 6.1 < 6.2 - 'configdir' Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: AWStats 6.1 < 6.2 - 'configdir' Remote Command Execution (Metasploit) | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: D-Tendencia Bt 2008 - SQL Injection | This is a webapps exploit for php platform. Description: D-Tendencia Bt 2008 - SQL Injection. Author: Dr.0rYX & Cr3W-DZ |
Analyze the security implications of: D-Tendencia Bt 2008 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component iDoBlog b24 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component iDoBlog b24 - SQL Injection. Author: His0k4 |
Analyze the security implications of: Joomla! Component iDoBlog b24 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM AIX 5.3 SP6 - Capture Terminal Sequence Privilege Escalation | This is a local exploit for aix platform. Description: IBM AIX 5.3 SP6 - Capture Terminal Sequence Privilege Escalation. Author: qaaz |
Analyze the security implications of: IBM AIX 5.3 SP6 - Capture Terminal Sequence Privilege Escalation | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: Carbon Forum 5.9.0 - Stored XSS | This is a webapps exploit for php platform. Description: Carbon Forum 5.9.0 - Stored XSS. Author: Chokri Hammedi |
Analyze the security implications of: Carbon Forum 5.9.0 - Stored XSS | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WebBatch - 'webbatch.exe?dumpinputdata' Remote Information Disclosure | This is a webapps exploit for cgi platform. Description: WebBatch - 'webbatch.exe?dumpinputdata' Remote Information Disclosure. Author: Doz |
Analyze the security implications of: WebBatch - 'webbatch.exe?dumpinputdata' Remote Information Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: 60cycleCMS 2.5.2 - 'DOCUMENT_ROOT' Multiple Local File Inclusions | This is a webapps exploit for php platform. Description: 60cycleCMS 2.5.2 - 'DOCUMENT_ROOT' Multiple Local File Inclusions. Author: eidelweiss |
Analyze the security implications of: 60cycleCMS 2.5.2 - 'DOCUMENT_ROOT' Multiple Local File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_gigfe - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_gigfe - SQL Injection. Author: DevilZ TM |
Analyze the security implications of: Joomla! Component com_gigfe - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mailtraq 2.2 - 'Browse.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Mailtraq 2.2 - 'Browse.asp' Cross-Site Scripting. Author: Ziv Kamir |
Analyze the security implications of: Mailtraq 2.2 - 'Browse.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Linux Kernel 2.4.0 - Stack Infoleaks | This is a local exploit for linux platform. Description: Linux Kernel 2.4.0 - Stack Infoleaks. Author: Dan Rosenberg |
Analyze the security implications of: Linux Kernel 2.4.0 - Stack Infoleaks | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Alienvault Open Source SIEM (OSSIM) 4.1.2 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Alienvault Open Source SIEM (OSSIM) 4.1.2 - Multiple SQL Injections. Author: RunRunLevel |
Analyze the security implications of: Alienvault Open Source SIEM (OSSIM) 4.1.2 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ManageEngine ServiceDesk Plus 8.0 - Directory Traversal | This is a webapps exploit for jsp platform. Description: ManageEngine ServiceDesk Plus 8.0 - Directory Traversal. Author: Keith Lee |
Analyze the security implications of: ManageEngine ServiceDesk Plus 8.0 - Directory Traversal | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Horde 3.3.5 - '/Administration Interface admin/cmdshell.php?PATH_INFO' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Horde 3.3.5 - '/Administration Interface admin/cmdshell.php?PATH_INFO' Cross-Site Scripting. Author: Juan Galiana Lara |
Analyze the security implications of: Horde 3.3.5 - '/Administration Interface admin/cmdshell.php?PATH_INFO' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CSZ CMS Version 1.3.0 - Authenticated Remote Command Execution | This is a webapps exploit for php platform. Description: CSZ CMS Version 1.3.0 - Authenticated Remote Command Execution. Author: tmrswrr |
Analyze the security implications of: CSZ CMS Version 1.3.0 - Authenticated Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: cPanel 10.9 - 'editzonetemplate?template' Cross-Site Scripting | This is a webapps exploit for php platform. Description: cPanel 10.9 - 'editzonetemplate?template' Cross-Site Scripting. Author: Crackers_Child |
Analyze the security implications of: cPanel 10.9 - 'editzonetemplate?template' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DieselPay 1.6 - Cross-Site Scripting / Directory Traversal | This is a webapps exploit for php platform. Description: DieselPay 1.6 - Cross-Site Scripting / Directory Traversal. Author: indoushka |
Analyze the security implications of: DieselPay 1.6 - Cross-Site Scripting / Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel < 4.13.1 - BlueTooth Buffer Overflow (PoC) | This is a dos exploit for linux platform. Description: Linux Kernel < 4.13.1 - BlueTooth Buffer Overflow (PoC). Author: Marcin Kozlowski |
Analyze the security implications of: Linux Kernel < 4.13.1 - BlueTooth Buffer Overflow (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.