input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Joomla! Component com_cmotour - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_cmotour - 'id' SQL Injection. Author: the_cyber_nuxbie |
Analyze the security implications of: Joomla! Component com_cmotour - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple macOS < 10.14.5 / iOS < 12.3 JavaScriptCore - AIR Optimization Incorrectly Removes Assignment to Register | This is a dos exploit for multiple platform. Description: Apple macOS < 10.14.5 / iOS < 12.3 JavaScriptCore - AIR Optimization Incorrectly Removes Assignment to Register. Author: Google Security Research |
Analyze the security implications of: Apple macOS < 10.14.5 / iOS < 12.3 JavaScriptCore - AIR Optimization Incorrectly Removes Assignment to Register | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: cPanel 5.0 - 'Guestbook.cgi' Remote Command Execution (4) | This is a webapps exploit for cgi platform. Description: cPanel 5.0 - 'Guestbook.cgi' Remote Command Execution (4). Author: pokleyzz |
Analyze the security implications of: cPanel 5.0 - 'Guestbook.cgi' Remote Command Execution (4) | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: OpenBSD 3.x - ISAKMPD Security Association Piggyback Delete Payload Denial of Service | This is a dos exploit for openbsd platform. Description: OpenBSD 3.x - ISAKMPD Security Association Piggyback Delete Payload Denial of Service. Author: Thomas Walpuski |
Analyze the security implications of: OpenBSD 3.x - ISAKMPD Security Association Piggyback Delete Payload Denial of Service | This exploit targets openbsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets openbsd platform |
What is this exploit about: Efkan Forum 1.0 - 'Grup' SQL Injection | This is a webapps exploit for asp platform. Description: Efkan Forum 1.0 - 'Grup' SQL Injection. Author: ShaFuq31 |
Analyze the security implications of: Efkan Forum 1.0 - 'Grup' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ITA Forum 1.49 - SQL Injection | This is a webapps exploit for php platform. Description: ITA Forum 1.49 - SQL Injection. Author: RusH |
Analyze the security implications of: ITA Forum 1.49 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component 3D Cloud - 'tagcloud.swf' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joomla! Component 3D Cloud - 'tagcloud.swf' Cross-Site Scripting. Author: MustLive |
Analyze the security implications of: Joomla! Component 3D Cloud - 'tagcloud.swf' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PeerCast 0.12 - HandshakeHTTP Multiple Buffer Overflow Vulnerabilities | This is a dos exploit for linux platform. Description: PeerCast 0.12 - HandshakeHTTP Multiple Buffer Overflow Vulnerabilities. Author: Luigi Auriemma |
Analyze the security implications of: PeerCast 0.12 - HandshakeHTTP Multiple Buffer Overflow Vulnerabilities | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: MetaDot < 5.6.5.4b5 - Multiple Vulnerabilities | This is a webapps exploit for perl platform. Description: MetaDot < 5.6.5.4b5 - Multiple Vulnerabilities. Author: GulfTech Security |
Analyze the security implications of: MetaDot < 5.6.5.4b5 - Multiple Vulnerabilities | This exploit targets perl systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets perl platform |
What is this exploit about: Angry IP Scanner for Linux 3.5.3 - Denial of Service (PoC) | This is a dos exploit for linux platform. Description: Angry IP Scanner for Linux 3.5.3 - Denial of Service (PoC). Author: Sam |
Analyze the security implications of: Angry IP Scanner for Linux 3.5.3 - Denial of Service (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Oracle Forms and Reports 11.1 - Arbitrary Code Execution | This is a remote exploit for jsp platform. Description: Oracle Forms and Reports 11.1 - Arbitrary Code Execution. Author: Mekanismen |
Analyze the security implications of: Oracle Forms and Reports 11.1 - Arbitrary Code Execution | This exploit targets jsp systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: ASPThai Forums 8.0 - 'login.asp' SQL Injection | This is a webapps exploit for asp platform. Description: ASPThai Forums 8.0 - 'login.asp' SQL Injection. Author: code.shell |
Analyze the security implications of: ASPThai Forums 8.0 - 'login.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Dating Gold 3.0.5 - 'footer.php?int_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Dating Gold 3.0.5 - 'footer.php?int_path' Remote File Inclusion. Author: mostafa_ragab |
Analyze the security implications of: Dating Gold 3.0.5 - 'footer.php?int_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: KubeLance 1.7.6 - 'profile.php' SQL Injection | This is a webapps exploit for php platform. Description: KubeLance 1.7.6 - 'profile.php' SQL Injection. Author: L0rd CrusAd3r |
Analyze the security implications of: KubeLance 1.7.6 - 'profile.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NetGain EM 7.2.647 build 941 - Authentication Bypass / Local File Inclusion | This is a webapps exploit for jsp platform. Description: NetGain EM 7.2.647 build 941 - Authentication Bypass / Local File Inclusion. Author: f3ci |
Analyze the security implications of: NetGain EM 7.2.647 build 941 - Authentication Bypass / Local File Inclusion | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Palo Alto Network Vulnerability - Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: Palo Alto Network Vulnerability - Cross-Site Scripting. Author: Jeromie Jackson |
Analyze the security implications of: Palo Alto Network Vulnerability - Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Web Host Automation Ltd. Helm 3.2.8 - 'ForgotPassword.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Web Host Automation Ltd. Helm 3.2.8 - 'ForgotPassword.asp' Cross-Site Scripting. Author: M.Neset KABAKLI |
Analyze the security implications of: Web Host Automation Ltd. Helm 3.2.8 - 'ForgotPassword.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ClipBucket 2.8.3 - Remote Code Execution | This is a webapps exploit for php platform. Description: ClipBucket 2.8.3 - Remote Code Execution. Author: Meisam Monsef |
Analyze the security implications of: ClipBucket 2.8.3 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AWStats 5.7 < 6.2 - Multiple Remote s | This is a webapps exploit for cgi platform. Description: AWStats 5.7 < 6.2 - Multiple Remote s. Author: omin0us |
Analyze the security implications of: AWStats 5.7 < 6.2 - Multiple Remote s | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Google Android ADB Debug Server - Remote Payload Execution (Metasploit) | This is a remote exploit for android platform. Description: Google Android ADB Debug Server - Remote Payload Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Google Android ADB Debug Server - Remote Payload Execution (Metasploit) | This exploit targets android systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: aBitWhizzy - 'whizzypic.php?d' Traversal Arbitrary Directory Listing | This is a remote exploit for php platform. Description: aBitWhizzy - 'whizzypic.php?d' Traversal Arbitrary Directory Listing. Author: Lostmon |
Analyze the security implications of: aBitWhizzy - 'whizzypic.php?d' Traversal Arbitrary Directory Listing | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Percha Image Attach 1.1 - 'Controller' Traversal Arbitrary File Access | This is a webapps exploit for php platform. Description: Joomla! Component Percha Image Attach 1.1 - 'Controller' Traversal Arbitrary File Access. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component Percha Image Attach 1.1 - 'Controller' Traversal Arbitrary File Access | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ReQuest Serious Play F3 Media Server 7.0.3 - Remote Code Execution (Unauthenticated) | This is a webapps exploit for hardware platform. Description: ReQuest Serious Play F3 Media Server 7.0.3 - Remote Code Execution (Unauthenticated). Author: LiquidWorm |
Analyze the security implications of: ReQuest Serious Play F3 Media Server 7.0.3 - Remote Code Execution (Unauthenticated) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component Picasa 2.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Picasa 2.0 - Local File Inclusion. Author: Vrs-hCk |
Analyze the security implications of: Joomla! Component Picasa 2.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Hbooking 1.9.9 - 'h_id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Hbooking 1.9.9 - 'h_id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Hbooking 1.9.9 - 'h_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Live TV Script - 'index.php?mid' SQL Injection | This is a webapps exploit for php platform. Description: Live TV Script - 'index.php?mid' SQL Injection. Author: InjEctOr5 |
Analyze the security implications of: Live TV Script - 'index.php?mid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jax Calendar 1.34 - Remote Admin Access | This is a webapps exploit for php platform. Description: Jax Calendar 1.34 - Remote Admin Access. Author: Sora |
Analyze the security implications of: Jax Calendar 1.34 - Remote Admin Access | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Limny 2.0 - Cross-Site Request Forgery (Change Email and Password) | This is a webapps exploit for php platform. Description: Limny 2.0 - Cross-Site Request Forgery (Change Email and Password). Author: Luis Santana |
Analyze the security implications of: Limny 2.0 - Cross-Site Request Forgery (Change Email and Password) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Evernew Free Joke Script 1.2 - 'cat_id' SQL Injection | This is a webapps exploit for php platform. Description: Evernew Free Joke Script 1.2 - 'cat_id' SQL Injection. Author: taRentReXx |
Analyze the security implications of: Evernew Free Joke Script 1.2 - 'cat_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Advanced Guestbook 2.2/2.3 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Advanced Guestbook 2.2/2.3 - Cross-Site Scripting. Author: Emile van Elen |
Analyze the security implications of: Advanced Guestbook 2.2/2.3 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: vsftpd 2.0.5 - 'CWD' (Authenticated) Remote Memory Consumption | This is a dos exploit for linux platform. Description: vsftpd 2.0.5 - 'CWD' (Authenticated) Remote Memory Consumption. Author: Praveen Darshanam |
Analyze the security implications of: vsftpd 2.0.5 - 'CWD' (Authenticated) Remote Memory Consumption | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Advanced Guestbook 2.3.1 - 'admin.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Advanced Guestbook 2.3.1 - 'admin.php' Remote File Inclusion. Author: BrokeN-ProXy |
Analyze the security implications of: Advanced Guestbook 2.3.1 - 'admin.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Aeon 0.2a - Local Linux (2) | This is a local exploit for linux platform. Description: Aeon 0.2a - Local Linux (2). Author: patr0n |
Analyze the security implications of: Aeon 0.2a - Local Linux (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Lotus Mail Encryption Server 2.1.0.1 (Protector for Mail) - Local File Inclusion / Remote Code Execution (Metasploit) | This is a webapps exploit for php platform. Description: Lotus Mail Encryption Server 2.1.0.1 (Protector for Mail) - Local File Inclusion / Remote Code Execution (Metasploit). Author: Patrick Webster |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.