input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Nagios < 4.2.4 - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Borland Interbase 2007 - 'PWD_db_aliased' Remote Buffer Overflow (Metasploit) | This is a remote exploit for linux platform. Description: Borland Interbase 2007 - 'PWD_db_aliased' Remote Buffer Overflow (Metasploit). Author: Adriano Lima |
Analyze the security implications of: Borland Interbase 2007 - 'PWD_db_aliased' Remote Buffer Overflow (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: itech TrainSmart r1044 - SQL injection | This is a webapps exploit for php platform. Description: itech TrainSmart r1044 - SQL injection. Author: Adrian Bondocea |
Analyze the security implications of: itech TrainSmart r1044 - SQL injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Asp VevoCart Control System 3.0.4 - Database Disclosure | This is a webapps exploit for asp platform. Description: Asp VevoCart Control System 3.0.4 - Database Disclosure. Author: indoushka |
Analyze the security implications of: Asp VevoCart Control System 3.0.4 - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: YP Portal MS-Pro Surumu 1.0 - Database Disclosure | This is a webapps exploit for asp platform. Description: YP Portal MS-Pro Surumu 1.0 - Database Disclosure. Author: indoushka |
Analyze the security implications of: YP Portal MS-Pro Surumu 1.0 - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: COVID19 Testing Management System 1.0 - 'State' Stored Cross-Site-Scripting (XSS) | This is a webapps exploit for php platform. Description: COVID19 Testing Management System 1.0 - 'State' Stored Cross-Site-Scripting (XSS). Author: BHAVESH KAUL |
Analyze the security implications of: COVID19 Testing Management System 1.0 - 'State' Stored Cross-Site-Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RealestateZONE 4.2 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for cfm platform. Description: RealestateZONE 4.2 - Multiple Cross-Site Scripting Vulnerabilities. Author: r0t |
Analyze the security implications of: RealestateZONE 4.2 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets cfm systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cfm platform |
What is this exploit about: DoceboLms 2.0.x - 'connector.php' Directory Traversal | This is a webapps exploit for php platform. Description: DoceboLms 2.0.x - 'connector.php' Directory Traversal. Author: rgod |
Analyze the security implications of: DoceboLms 2.0.x - 'connector.php' Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Article Management System 2.1.2 - Reinstall | This is a webapps exploit for php platform. Description: Article Management System 2.1.2 - Reinstall. Author: indoushka |
Analyze the security implications of: Article Management System 2.1.2 - Reinstall | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Com_Joomclip - 'cat' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Com_Joomclip - 'cat' SQL Injection. Author: 599eme Man |
Analyze the security implications of: Joomla! Component Com_Joomclip - 'cat' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TM RG4332 Wireless Router - Arbitrary File Disclosure | This is a webapps exploit for hardware platform. Description: TM RG4332 Wireless Router - Arbitrary File Disclosure. Author: Saeid Atabaki |
Analyze the security implications of: TM RG4332 Wireless Router - Arbitrary File Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CU Village CMS Site 1.0 - 'print_view' Blind SQL Injection | This is a webapps exploit for php platform. Description: CU Village CMS Site 1.0 - 'print_view' Blind SQL Injection. Author: Red-D3v1L |
Analyze the security implications of: CU Village CMS Site 1.0 - 'print_view' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Safari Web Browser 1.x - HTML Form Status Bar Misrepresentation | This is a dos exploit for osx platform. Description: Apple Safari Web Browser 1.x - HTML Form Status Bar Misrepresentation. Author: Guillaume |
Analyze the security implications of: Apple Safari Web Browser 1.x - HTML Form Status Bar Misrepresentation | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Thomson TCW690 - POST Password Validation | This is a remote exploit for hardware platform. Description: Thomson TCW690 - POST Password Validation. Author: MurDoK |
Analyze the security implications of: Thomson TCW690 - POST Password Validation | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Strapi 3.0.0-beta - Set Password (Unauthenticated) | This is a webapps exploit for multiple platform. Description: Strapi 3.0.0-beta - Set Password (Unauthenticated). Author: David Anglada |
Analyze the security implications of: Strapi 3.0.0-beta - Set Password (Unauthenticated) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Newsfeeds - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Newsfeeds - SQL Injection. Author: Archimonde |
Analyze the security implications of: Joomla! Component Newsfeeds - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: inertianews 0.02b - 'inertianews_main.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: inertianews 0.02b - 'inertianews_main.php' Remote File Inclusion. Author: bd0rk |
Analyze the security implications of: inertianews 0.02b - 'inertianews_main.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_shop - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_shop - SQL Injection. Author: ThunDEr HeaD |
Analyze the security implications of: Joomla! Component com_shop - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bitweaver 1.x/2.0 - '/search/index.php?highlight' SQL Injection | This is a webapps exploit for php platform. Description: Bitweaver 1.x/2.0 - '/search/index.php?highlight' SQL Injection. Author: Doz |
Analyze the security implications of: Bitweaver 1.x/2.0 - '/search/index.php?highlight' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenBSD 2.x/3.x - CHPass Temporary File Link File Content Revealing | This is a local exploit for openbsd platform. Description: OpenBSD 2.x/3.x - CHPass Temporary File Link File Content Revealing. Author: Marc Bevand |
Analyze the security implications of: OpenBSD 2.x/3.x - CHPass Temporary File Link File Content Revealing | This exploit targets openbsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets openbsd platform |
What is this exploit about: RPM Remote Print Manager 4.5.1 - Service Remote Buffer Overflow | This is a dos exploit for multiple platform. Description: RPM Remote Print Manager 4.5.1 - Service Remote Buffer Overflow. Author: Luigi Auriemma |
Analyze the security implications of: RPM Remote Print Manager 4.5.1 - Service Remote Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Tenda ADSL Router D152 - Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: Tenda ADSL Router D152 - Cross-Site Scripting. Author: Sandip Dey |
Analyze the security implications of: Tenda ADSL Router D152 - Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: HotScripts Clone - 'cid' SQL Injection | This is a webapps exploit for php platform. Description: HotScripts Clone - 'cid' SQL Injection. Author: Hussin X |
Analyze the security implications of: HotScripts Clone - 'cid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Simple PHP Blog 0.4 - 'preview_static_cgi.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for cgi platform. Description: Simple PHP Blog 0.4 - 'preview_static_cgi.php' Multiple Cross-Site Scripting Vulnerabilities. Author: enji@infosys.tuwien.ac.at |
Analyze the security implications of: Simple PHP Blog 0.4 - 'preview_static_cgi.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: e107 Filedownload Plugin - Arbitrary File Upload / Remote File Disclosure | This is a webapps exploit for php platform. Description: e107 Filedownload Plugin - Arbitrary File Upload / Remote File Disclosure. Author: Sammy FORGIT |
Analyze the security implications of: e107 Filedownload Plugin - Arbitrary File Upload / Remote File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo 4.5 Server - 'user.php' Script Unauthorized Access | This is a webapps exploit for php platform. Description: Mambo 4.5 Server - 'user.php' Script Unauthorized Access. Author: frog |
Analyze the security implications of: Mambo 4.5 Server - 'user.php' Script Unauthorized Access | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iBoutique 4.0 - 'key' SQL Injection | This is a webapps exploit for php platform. Description: iBoutique 4.0 - 'key' SQL Injection. Author: SecPod Research |
Analyze the security implications of: iBoutique 4.0 - 'key' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ansible 2.1.4/2.2.1 - Command Execution | This is a remote exploit for linux platform. Description: Ansible 2.1.4/2.2.1 - Command Execution. Author: Computest |
Analyze the security implications of: Ansible 2.1.4/2.2.1 - Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: WordPress Plugin Reflex Gallery - Arbitrary File Upload (Metasploit) | This is a remote exploit for php platform. Description: WordPress Plugin Reflex Gallery - Arbitrary File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: WordPress Plugin Reflex Gallery - Arbitrary File Upload (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AirDisk Pro 5.5.3 for iOS - Persistent Cross-Site Scripting | This is a webapps exploit for ios platform. Description: AirDisk Pro 5.5.3 for iOS - Persistent Cross-Site Scripting. Author: Vulnerability-Lab |
Analyze the security implications of: AirDisk Pro 5.5.3 for iOS - Persistent Cross-Site Scripting | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: HP-UX 7-11 - X Font Server Local Buffer Overflow | This is a local exploit for hp-ux platform. Description: HP-UX 7-11 - X Font Server Local Buffer Overflow. Author: watercloud |
Analyze the security implications of: HP-UX 7-11 - X Font Server Local Buffer Overflow | This exploit targets hp-ux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hp-ux platform |
What is this exploit about: ImageVue 1.7 - 'dir2.php?path' Cross-Site Scripting | This is a webapps exploit for php platform. Description: ImageVue 1.7 - 'dir2.php?path' Cross-Site Scripting. Author: ZoRLu |
Analyze the security implications of: ImageVue 1.7 - 'dir2.php?path' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_redirect 1.5.19 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_redirect 1.5.19 - Local File Inclusion. Author: jos_ali_joe |
Analyze the security implications of: Joomla! Component com_redirect 1.5.19 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iPlanet 4.1 Web Publisher - Remote Buffer Overflow (1) | This is a dos exploit for multiple platform. Description: iPlanet 4.1 Web Publisher - Remote Buffer Overflow (1). Author: Santi Claus |
Analyze the security implications of: iPlanet 4.1 Web Publisher - Remote Buffer Overflow (1) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.