input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: HR Assist 1.05 - 'vdateUsr.asp' Remote Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Click&Rank - SQL Injection / Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Click&Rank - SQL Injection / Cross-Site Scripting. Author: AlpHaNiX |
Analyze the security implications of: Click&Rank - SQL Injection / Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: FLEX 1080 < 1085 Web 1.6.0 - Denial of Service | This is a dos exploit for android platform. Description: FLEX 1080 < 1085 Web 1.6.0 - Denial of Service. Author: Mr Empy |
Analyze the security implications of: FLEX 1080 < 1085 Web 1.6.0 - Denial of Service | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Joomla! Component actualite 1.0 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component actualite 1.0 - 'id' SQL Injection. Author: Stack |
Analyze the security implications of: Joomla! Component actualite 1.0 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ABB Cylon FLXeon 9.3.4 - Remote Code Execution (Authenticated) | This is a hardware exploit for multiple platform. Description: ABB Cylon FLXeon 9.3.4 - Remote Code Execution (Authenticated). Author: LiquidWorm |
Analyze the security implications of: ABB Cylon FLXeon 9.3.4 - Remote Code Execution (Authenticated) | This exploit targets multiple systems. Type: hardware. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_br - 'state_id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_br - 'state_id' SQL Injection. Author: CoBRa_21 |
Analyze the security implications of: Joomla! Component com_br - 'state_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Hosting Controller 6.1 - 'error.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Hosting Controller 6.1 - 'error.asp' Cross-Site Scripting. Author: Ashiyane Digital Security Team |
Analyze the security implications of: Hosting Controller 6.1 - 'error.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: LabVantage 8.3 - Information Disclosure | This is a webapps exploit for java platform. Description: LabVantage 8.3 - Information Disclosure. Author: Joel Aviad Ossi |
Analyze the security implications of: LabVantage 8.3 - Information Disclosure | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Joomla! Component J-BusinessDirectory 4.6.8 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component J-BusinessDirectory 4.6.8 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component J-BusinessDirectory 4.6.8 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link Routers 110/412/615/815 < 1.03 - 'service.cgi' Arbitrary Code Execution | This is a webapps exploit for hardware platform. Description: D-Link Routers 110/412/615/815 < 1.03 - 'service.cgi' Arbitrary Code Execution. Author: Cr0n1c |
Analyze the security implications of: D-Link Routers 110/412/615/815 < 1.03 - 'service.cgi' Arbitrary Code Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CafeEngine - 'catid' SQL Injection | This is a webapps exploit for php platform. Description: CafeEngine - 'catid' SQL Injection. Author: SuNHouSe2 |
Analyze the security implications of: CafeEngine - 'catid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bilder Upload Script Datei Upload 1.09 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Bilder Upload Script Datei Upload 1.09 - Arbitrary File Upload. Author: Mr.Benladen |
Analyze the security implications of: Bilder Upload Script Datei Upload 1.09 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache Sling Framework (Adobe AEM) 2.3.6 - Information Disclosure | This is a webapps exploit for multiple platform. Description: Apache Sling Framework (Adobe AEM) 2.3.6 - Information Disclosure. Author: Vulnerability-Lab |
Analyze the security implications of: Apache Sling Framework (Adobe AEM) 2.3.6 - Information Disclosure | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: X.Org X Window System Xserver 1.3 - XRender Extension Divide by Zero Denial of Service | This is a dos exploit for linux platform. Description: X.Org X Window System Xserver 1.3 - XRender Extension Divide by Zero Denial of Service. Author: Derek Abdine |
Analyze the security implications of: X.Org X Window System Xserver 1.3 - XRender Extension Divide by Zero Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ProConf 6.0 - Insecure Direct Object Reference (IDOR) | This is a webapps exploit for multiple platform. Description: ProConf 6.0 - Insecure Direct Object Reference (IDOR). Author: ub3rsick |
Analyze the security implications of: ProConf 6.0 - Insecure Direct Object Reference (IDOR) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: WordPress Plugin WPGraphQL 1.3.5 - Denial of Service | This is a dos exploit for php platform. Description: WordPress Plugin WPGraphQL 1.3.5 - Denial of Service. Author: Dolev Farhi |
Analyze the security implications of: WordPress Plugin WPGraphQL 1.3.5 - Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.6.x - 'rds_recvmsg()' Local Information Disclosure | This is a local exploit for linux platform. Description: Linux Kernel 2.6.x - 'rds_recvmsg()' Local Information Disclosure. Author: Jay Fenlason |
Analyze the security implications of: Linux Kernel 2.6.x - 'rds_recvmsg()' Local Information Disclosure | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: F-Prot AntiVirus 4.6.6 - CHM Heap Overflow (PoC) | This is a dos exploit for linux platform. Description: F-Prot AntiVirus 4.6.6 - CHM Heap Overflow (PoC). Author: Evgeny Legerov |
Analyze the security implications of: F-Prot AntiVirus 4.6.6 - CHM Heap Overflow (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Legend Perl IRC Bot - Remote Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Legend Perl IRC Bot - Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Legend Perl IRC Bot - Remote Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Tmax Soft JEUS 3.1.4 p1 - URL.jsp Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: Tmax Soft JEUS 3.1.4 p1 - URL.jsp Cross-Site Scripting. Author: Jeremy Bae |
Analyze the security implications of: Tmax Soft JEUS 3.1.4 p1 - URL.jsp Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: awzMB 4.2 Beta 1 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: awzMB 4.2 Beta 1 - Multiple Remote File Inclusions. Author: S.W.A.T. |
Analyze the security implications of: awzMB 4.2 Beta 1 - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ImpressPages CMS 3.6 - Multiple Cross-Site Scripting / SQL Injection Vulnerabilities | This is a webapps exploit for php platform. Description: ImpressPages CMS 3.6 - Multiple Cross-Site Scripting / SQL Injection Vulnerabilities. Author: LiquidWorm |
Analyze the security implications of: ImpressPages CMS 3.6 - Multiple Cross-Site Scripting / SQL Injection Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_xeslidegalfx - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_xeslidegalfx - 'id' SQL Injection. Author: Ne0 H4ck3R |
Analyze the security implications of: Joomla! Component com_xeslidegalfx - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Microsoft Edge (Chromium-based) Webview2 1.0.1661.34 - Spoofing | This is a local exploit for multiple platform. Description: Microsoft Edge (Chromium-based) Webview2 1.0.1661.34 - Spoofing. Author: nu11secur1ty |
Analyze the security implications of: Microsoft Edge (Chromium-based) Webview2 1.0.1661.34 - Spoofing | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Oracle 10g Portal - 'Key' Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Oracle 10g Portal - 'Key' Cross-Site Scripting. Author: Pham Duc Hai |
Analyze the security implications of: Oracle 10g Portal - 'Key' Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ManageEngine Recovery Manager Plus 5.3 - Cross-Site Scripting | This is a webapps exploit for java platform. Description: ManageEngine Recovery Manager Plus 5.3 - Cross-Site Scripting. Author: Ahmet Gurel |
Analyze the security implications of: ManageEngine Recovery Manager Plus 5.3 - Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Ingenious School Management System 2.3.0 - 'friend_index' SQL injection | This is a webapps exploit for php platform. Description: Ingenious School Management System 2.3.0 - 'friend_index' SQL injection. Author: Giulio Comi |
Analyze the security implications of: Ingenious School Management System 2.3.0 - 'friend_index' SQL injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GNU InetUtils ftpd 1.4.2 - 'ld.so.preload' Remote Code Execution | This is a remote exploit for linux platform. Description: GNU InetUtils ftpd 1.4.2 - 'ld.so.preload' Remote Code Execution. Author: kingcope |
Analyze the security implications of: GNU InetUtils ftpd 1.4.2 - 'ld.so.preload' Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: TalentSoft Web+ Client/Monitor/server 4.6 - Internal IP Address Disclosure | This is a remote exploit for cgi platform. Description: TalentSoft Web+ Client/Monitor/server 4.6 - Internal IP Address Disclosure. Author: Delphis Consulting |
Analyze the security implications of: TalentSoft Web+ Client/Monitor/server 4.6 - Internal IP Address Disclosure | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Linux Kernel 2.6.18 - 'move_pages()' Information Leak | This is a local exploit for linux platform. Description: Linux Kernel 2.6.18 - 'move_pages()' Information Leak. Author: spender |
Analyze the security implications of: Linux Kernel 2.6.18 - 'move_pages()' Information Leak | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Amoot Web Directory - Password Field SQL Injection | This is a webapps exploit for php platform. Description: Amoot Web Directory - Password Field SQL Injection. Author: Pouya_Server |
Analyze the security implications of: Amoot Web Directory - Password Field SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: E-Publish 2.0 - Multiple Input Validation Vulnerabilities | This is a webapps exploit for cfm platform. Description: E-Publish 2.0 - Multiple Input Validation Vulnerabilities. Author: r0t3d3Vil |
Analyze the security implications of: E-Publish 2.0 - Multiple Input Validation Vulnerabilities | This exploit targets cfm systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cfm platform |
What is this exploit about: Joomla! Component Preventive And Reservation 1.0.5 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Preventive And Reservation 1.0.5 - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component Preventive And Reservation 1.0.5 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! / Mambo Component com_inter - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! / Mambo Component com_inter - 'id' SQL Injection. Author: The-0utl4w |
Analyze the security implications of: Joomla! / Mambo Component com_inter - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.