input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Ganib Project Management 2.3 - SQL Injection | This is a webapps exploit for jsp platform. Description: Ganib Project Management 2.3 - SQL Injection. Author: drone |
Analyze the security implications of: Ganib Project Management 2.3 - SQL Injection | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: 20/20 Auto Gallery 3.2 - Multiple SQL Injections | This is a webapps exploit for asp platform. Description: 20/20 Auto Gallery 3.2 - Multiple SQL Injections. Author: laurent gaffie |
Analyze the security implications of: 20/20 Auto Gallery 3.2 - Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ZTE ZXDSL 831 II Modem - Arbitrary Configuration Access | This is a remote exploit for hardware platform. Description: ZTE ZXDSL 831 II Modem - Arbitrary Configuration Access. Author: SuNHouSe2 |
Analyze the security implications of: ZTE ZXDSL 831 II Modem - Arbitrary Configuration Access | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: 2Point Solutions - 'cmspages.php' SQL Injection | This is a webapps exploit for php platform. Description: 2Point Solutions - 'cmspages.php' SQL Injection. Author: Newbie Campuz |
Analyze the security implications of: 2Point Solutions - 'cmspages.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Comersus Shopping Cart 6.0 - Remote User Pass | This is a webapps exploit for asp platform. Description: Comersus Shopping Cart 6.0 - Remote User Pass. Author: ajann |
Analyze the security implications of: Comersus Shopping Cart 6.0 - Remote User Pass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: MailBee WebMail Pro 3.4 - 'Check_login.asp' Cross-Site Scripting | This is a webapps exploit for php platform. Description: MailBee WebMail Pro 3.4 - 'Check_login.asp' Cross-Site Scripting. Author: David Vieira-Kurz |
Analyze the security implications of: MailBee WebMail Pro 3.4 - 'Check_login.asp' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Novell Edirectory 8.8 SP5 - Cross-Site Scripting | This is a webapps exploit for novell platform. Description: Novell Edirectory 8.8 SP5 - Cross-Site Scripting. Author: Francis Provencher |
Analyze the security implications of: Novell Edirectory 8.8 SP5 - Cross-Site Scripting | This exploit targets novell systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets novell platform |
What is this exploit about: Nfdump Nfcapd 1.6.14 - Multiple Vulnerabilities | This is a dos exploit for linux platform. Description: Nfdump Nfcapd 1.6.14 - Multiple Vulnerabilities. Author: Security-Assessment.com |
Analyze the security implications of: Nfdump Nfcapd 1.6.14 - Multiple Vulnerabilities | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Linux Kernel 4.8.0 UDEV < 232 - Local Privilege Escalation | This is a local exploit for linux platform. Description: Linux Kernel 4.8.0 UDEV < 232 - Local Privilege Escalation. Author: Nassim Asrir |
Analyze the security implications of: Linux Kernel 4.8.0 UDEV < 232 - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Acidcat CMS 2.1.13 - 'acidcat.mdb' Remote Information Disclosure | This is a webapps exploit for asp platform. Description: Acidcat CMS 2.1.13 - 'acidcat.mdb' Remote Information Disclosure. Author: admin@hamid.ir |
Analyze the security implications of: Acidcat CMS 2.1.13 - 'acidcat.mdb' Remote Information Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: WebKit - 'Document::prepareForDestruction' / 'CachedFrame' Universal Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: WebKit - 'Document::prepareForDestruction' / 'CachedFrame' Universal Cross-Site Scripting. Author: Google Security Research |
Analyze the security implications of: WebKit - 'Document::prepareForDestruction' / 'CachedFrame' Universal Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ethereal - EIGRP Dissector TLV_IP_INT Long IP Remote Denial of Service | This is a dos exploit for multiple platform. Description: Ethereal - EIGRP Dissector TLV_IP_INT Long IP Remote Denial of Service. Author: Rémi Denis-Courmont |
Analyze the security implications of: Ethereal - EIGRP Dissector TLV_IP_INT Long IP Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Liferay Portal - Java Unmarshalling via JSONWS RCE (Metasploit) | This is a remote exploit for java platform. Description: Liferay Portal - Java Unmarshalling via JSONWS RCE (Metasploit). Author: Metasploit |
Analyze the security implications of: Liferay Portal - Java Unmarshalling via JSONWS RCE (Metasploit) | This exploit targets java systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Inteno DG301 - Command Injection | This is a webapps exploit for hardware platform. Description: Inteno DG301 - Command Injection. Author: Juan J. Guelfo |
Analyze the security implications of: Inteno DG301 - Command Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Virtual Programming VP-ASP 4.00/5.00 - 'shopdisplayproducts.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Virtual Programming VP-ASP 4.00/5.00 - 'shopdisplayproducts.asp' SQL Injection. Author: Nick Gudov |
Analyze the security implications of: Virtual Programming VP-ASP 4.00/5.00 - 'shopdisplayproducts.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: FileZilla 3.40.0 - 'Local search' / 'Local site' Denial of Service (PoC) | This is a dos exploit for linux platform. Description: FileZilla 3.40.0 - 'Local search' / 'Local site' Denial of Service (PoC). Author: Mr Winst0n |
Analyze the security implications of: FileZilla 3.40.0 - 'Local search' / 'Local site' Denial of Service (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Aurora CMS 1.0.2 - 'install.plugin.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Aurora CMS 1.0.2 - 'install.plugin.php' Remote File Inclusion. Author: EA Ngel |
Analyze the security implications of: Aurora CMS 1.0.2 - 'install.plugin.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Employee and Visitor Gate Pass Logging System 1.0 - 'name' Stored Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Employee and Visitor Gate Pass Logging System 1.0 - 'name' Stored Cross-Site Scripting (XSS). Author: İlhami Selamet |
Analyze the security implications of: Employee and Visitor Gate Pass Logging System 1.0 - 'name' Stored Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: InfluxDB OSS 2.7.11 - Operator Token Privilege Escalation | This is a remote exploit for multiple platform. Description: InfluxDB OSS 2.7.11 - Operator Token Privilege Escalation. Author: Andrea Pasin |
Analyze the security implications of: InfluxDB OSS 2.7.11 - Operator Token Privilege Escalation | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Rumble Mail Server 0.51.3135 - 'servername' Stored XSS | This is a webapps exploit for multiple platform. Description: Rumble Mail Server 0.51.3135 - 'servername' Stored XSS. Author: Mohammed Alshehri |
Analyze the security implications of: Rumble Mail Server 0.51.3135 - 'servername' Stored XSS | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FreeBSD - '/usr/bin/top' Format String | This is a local exploit for bsd platform. Description: FreeBSD - '/usr/bin/top' Format String. Author: truefinder |
Analyze the security implications of: FreeBSD - '/usr/bin/top' Format String | This exploit targets bsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Intel (Skylake / Kaby Lake) - 'PortSmash' CPU SMT Side-Channel | This is a local exploit for hardware platform. Description: Intel (Skylake / Kaby Lake) - 'PortSmash' CPU SMT Side-Channel. Author: Billy Brumley |
Analyze the security implications of: Intel (Skylake / Kaby Lake) - 'PortSmash' CPU SMT Side-Channel | This exploit targets hardware systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ES Simple Download 1.0. - Local File Inclusion | This is a webapps exploit for php platform. Description: ES Simple Download 1.0. - Local File Inclusion. Author: Kazza |
Analyze the security implications of: ES Simple Download 1.0. - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EdmoBBS 0.9 - SQL Injection | This is a webapps exploit for php platform. Description: EdmoBBS 0.9 - SQL Injection. Author: r0t |
Analyze the security implications of: EdmoBBS 0.9 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: dit.cms 1.3 - 'path/sitemap/relPath' Local File Inclusion | This is a webapps exploit for php platform. Description: dit.cms 1.3 - 'path/sitemap/relPath' Local File Inclusion. Author: SirGod |
Analyze the security implications of: dit.cms 1.3 - 'path/sitemap/relPath' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LAME 3.99.5 - 'II_step_one' Buffer Overflow | This is a dos exploit for linux platform. Description: LAME 3.99.5 - 'II_step_one' Buffer Overflow. Author: Agostino Sarubbo |
Analyze the security implications of: LAME 3.99.5 - 'II_step_one' Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PHP-Nuke 6.x/7.x FAQ Module - 'categories' Cross-Site Scripting | This is a webapps exploit for java platform. Description: PHP-Nuke 6.x/7.x FAQ Module - 'categories' Cross-Site Scripting. Author: Janek Vind |
Analyze the security implications of: PHP-Nuke 6.x/7.x FAQ Module - 'categories' Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: PHP 4.x - 'tempnam() open_basedir' Restriction Bypass | This is a remote exploit for php platform. Description: PHP 4.x - 'tempnam() open_basedir' Restriction Bypass. Author: Maksymilian Arciemowicz |
Analyze the security implications of: PHP 4.x - 'tempnam() open_basedir' Restriction Bypass | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DBSite wb CMS - 'index.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: DBSite wb CMS - 'index.php' Multiple Cross-Site Scripting Vulnerabilities. Author: The_Exploited |
Analyze the security implications of: DBSite wb CMS - 'index.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_yanc - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_yanc - SQL Injection. Author: snakespc |
Analyze the security implications of: Joomla! Component com_yanc - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASPPlayGround.NET 3.2 SR1 - Arbitrary File Upload | This is a webapps exploit for asp platform. Description: ASPPlayGround.NET 3.2 SR1 - Arbitrary File Upload. Author: Psycho |
Analyze the security implications of: ASPPlayGround.NET 3.2 SR1 - Arbitrary File Upload | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ProFTPd 1.3.0/1.3.0a - 'mod_ctrls' 'support' Local Buffer Overflow (1) | This is a local exploit for linux platform. Description: ProFTPd 1.3.0/1.3.0a - 'mod_ctrls' 'support' Local Buffer Overflow (1). Author: Revenge |
Analyze the security implications of: ProFTPd 1.3.0/1.3.0a - 'mod_ctrls' 'support' Local Buffer Overflow (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Oracle 9.0 iSQL*Plus - TLS Listener Remote Denial of Service | This is a dos exploit for multiple platform. Description: Oracle 9.0 iSQL*Plus - TLS Listener Remote Denial of Service. Author: Alexander Kornbrust |
Analyze the security implications of: Oracle 9.0 iSQL*Plus - TLS Listener Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Wireless Transfer App 3.7 iOS - Multiple Web Vulnerabilities | This is a webapps exploit for ios platform. Description: Wireless Transfer App 3.7 iOS - Multiple Web Vulnerabilities. Author: Vulnerability-Lab |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.