input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Redis 4.x / 5.x - Unauthenticated Code Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: 1Book Guestbook Script 1.0.1 - Code Execution | This is a webapps exploit for php platform. Description: 1Book Guestbook Script 1.0.1 - Code Execution. Author: JIKO |
Analyze the security implications of: 1Book Guestbook Script 1.0.1 - Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Serviio PRO 1.8 DLNA Media Streaming Server - REST API Information Disclosure | This is a webapps exploit for java platform. Description: Serviio PRO 1.8 DLNA Media Streaming Server - REST API Information Disclosure. Author: LiquidWorm |
Analyze the security implications of: Serviio PRO 1.8 DLNA Media Streaming Server - REST API Information Disclosure | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: HP-UX 10.x/11.x - Aserver PATH | This is a local exploit for hp-ux platform. Description: HP-UX 10.x/11.x - Aserver PATH. Author: Loneguard |
Analyze the security implications of: HP-UX 10.x/11.x - Aserver PATH | This exploit targets hp-ux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hp-ux platform |
What is this exploit about: Sumus 0.2.2 - HTTPd Remote Buffer Overflow | This is a remote exploit for linux platform. Description: Sumus 0.2.2 - HTTPd Remote Buffer Overflow. Author: vade79 |
Analyze the security implications of: Sumus 0.2.2 - HTTPd Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: DVGuestbook 1.0/1.2.2 - 'dv_gbook.php?f' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DVGuestbook 1.0/1.2.2 - 'dv_gbook.php?f' Cross-Site Scripting. Author: Liz0ziM |
Analyze the security implications of: DVGuestbook 1.0/1.2.2 - 'dv_gbook.php?f' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MitraStar DSL-100HN-T1/GPT-2541GNAC - Privilege Escalation | This is a remote exploit for hardware platform. Description: MitraStar DSL-100HN-T1/GPT-2541GNAC - Privilege Escalation. Author: j0lama |
Analyze the security implications of: MitraStar DSL-100HN-T1/GPT-2541GNAC - Privilege Escalation | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CMS Bolt - Arbitrary File Upload (Metasploit) | This is a remote exploit for php platform. Description: CMS Bolt - Arbitrary File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: CMS Bolt - Arbitrary File Upload (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Enthrallweb eCoupons 1.0 - 'myprofile.asp' Remote Pass Change | This is a webapps exploit for asp platform. Description: Enthrallweb eCoupons 1.0 - 'myprofile.asp' Remote Pass Change. Author: ajann |
Analyze the security implications of: Enthrallweb eCoupons 1.0 - 'myprofile.asp' Remote Pass Change | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Adobe Flash - scale9Grid Use-After-Free | This is a dos exploit for multiple platform. Description: Adobe Flash - scale9Grid Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - scale9Grid Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Spinner 360 1.3.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Spinner 360 1.3.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Spinner 360 1.3.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Matt Wright Guestbook 2.3.1 - Guestbook.pl Multiple HTML Injection Vulnerabilities | This is a webapps exploit for cgi platform. Description: Matt Wright Guestbook 2.3.1 - Guestbook.pl Multiple HTML Injection Vulnerabilities. Author: Liz0ziM |
Analyze the security implications of: Matt Wright Guestbook 2.3.1 - Guestbook.pl Multiple HTML Injection Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: MySQL 3.23.x - 'mysqld' Local Privilege Escalation | This is a local exploit for linux platform. Description: MySQL 3.23.x - 'mysqld' Local Privilege Escalation. Author: bugsman@libero.it |
Analyze the security implications of: MySQL 3.23.x - 'mysqld' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ASPReferral 5.3 - 'AccountID' Blind SQL Injection | This is a webapps exploit for asp platform. Description: ASPReferral 5.3 - 'AccountID' Blind SQL Injection. Author: R3d-D3V!L |
Analyze the security implications of: ASPReferral 5.3 - 'AccountID' Blind SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component custompages 1.1 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component custompages 1.1 - Remote File Inclusion. Author: Sniper456 |
Analyze the security implications of: Joomla! Component custompages 1.1 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Novell Netware 4.1/4.11 - SP5B NDS Default Rights | This is a remote exploit for netware platform. Description: Novell Netware 4.1/4.11 - SP5B NDS Default Rights. Author: Simple Nomad |
Analyze the security implications of: Novell Netware 4.1/4.11 - SP5B NDS Default Rights | This exploit targets netware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets netware platform |
What is this exploit about: Spreecommerce 0.60.1 - Arbitrary Command Execution (Metasploit) | This is a webapps exploit for linux platform. Description: Spreecommerce 0.60.1 - Arbitrary Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Spreecommerce 0.60.1 - Arbitrary Command Execution (Metasploit) | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Library Management System 2.0 - Auth Bypass SQL Injection | This is a webapps exploit for php platform. Description: Library Management System 2.0 - Auth Bypass SQL Injection. Author: Manish Solanki |
Analyze the security implications of: Library Management System 2.0 - Auth Bypass SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EgavilanMedia PHPCRUD 1.0 - 'Full Name' Stored Cross Site Scripting | This is a webapps exploit for php platform. Description: EgavilanMedia PHPCRUD 1.0 - 'Full Name' Stored Cross Site Scripting. Author: Mahendra Purbia |
Analyze the security implications of: EgavilanMedia PHPCRUD 1.0 - 'Full Name' Stored Cross Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Safari 2.0.4 - Cross-Domain Browser Location Information Disclosure | This is a remote exploit for multiple platform. Description: Apple Safari 2.0.4 - Cross-Domain Browser Location Information Disclosure. Author: Gareth Heyes |
Analyze the security implications of: Apple Safari 2.0.4 - Cross-Domain Browser Location Information Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GNU Mailutils 3.7 - Privilege Escalation | This is a local exploit for linux platform. Description: GNU Mailutils 3.7 - Privilege Escalation. Author: Mike Gualtieri |
Analyze the security implications of: GNU Mailutils 3.7 - Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: SGI Advanced Linux Environment 3.0 / SGI IRIX 6.5.4 / SGI UNICOS 10.0 6 - arrayd.auth Default Configuration | This is a remote exploit for multiple platform. Description: SGI Advanced Linux Environment 3.0 / SGI IRIX 6.5.4 / SGI UNICOS 10.0 6 - arrayd.auth Default Configuration. Author: Last Stage of Delirium |
Analyze the security implications of: SGI Advanced Linux Environment 3.0 / SGI IRIX 6.5.4 / SGI UNICOS 10.0 6 - arrayd.auth Default Configuration | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! 1.0.x - 'ordering' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joomla! 1.0.x - 'ordering' Cross-Site Scripting. Author: Aung Khant |
Analyze the security implications of: Joomla! 1.0.x - 'ordering' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: cPanel 5/6 / Formail-Clone - E-Mail Restriction Bypass | This is a webapps exploit for php platform. Description: cPanel 5/6 / Formail-Clone - E-Mail Restriction Bypass. Author: Chad C. Keep |
Analyze the security implications of: cPanel 5/6 / Formail-Clone - E-Mail Restriction Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DZCP (deV!L_z Clanportal) 1.5.5 Moviebase Addon - Blind SQL Injection | This is a webapps exploit for php platform. Description: DZCP (deV!L_z Clanportal) 1.5.5 Moviebase Addon - Blind SQL Injection. Author: Easy Laster |
Analyze the security implications of: DZCP (deV!L_z Clanportal) 1.5.5 Moviebase Addon - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LuxCal Web Calendar 2.4.2/2.5.0 - SQL Injection | This is a webapps exploit for php platform. Description: LuxCal Web Calendar 2.4.2/2.5.0 - SQL Injection. Author: kaMtiEz |
Analyze the security implications of: LuxCal Web Calendar 2.4.2/2.5.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BlackBoard Academic Suite 6/7 - '/bin/common/announcement.pl?data__announcements___pk1_pk2__subject' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: BlackBoard Academic Suite 6/7 - '/bin/common/announcement.pl?data__announcements___pk1_pk2__subject' Cross-Site Scripting. Author: Knight4vn |
Analyze the security implications of: BlackBoard Academic Suite 6/7 - '/bin/common/announcement.pl?data__announcements___pk1_pk2__subject' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: FileSeek CGI Script - Remote Command Execution | This is a webapps exploit for cgi platform. Description: FileSeek CGI Script - Remote Command Execution. Author: Thijs Bosschert |
Analyze the security implications of: FileSeek CGI Script - Remote Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Sitecom N300/N600 Devices - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Sitecom N300/N600 Devices - Multiple Vulnerabilities. Author: Roberto Paleari |
Analyze the security implications of: Sitecom N300/N600 Devices - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Cisco RV130W Routers - Management Interface Remote Command Execution (Metasploit) | This is a remote exploit for hardware platform. Description: Cisco RV130W Routers - Management Interface Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Cisco RV130W Routers - Management Interface Remote Command Execution (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Zeus Web Server 4.0/4.1 - Admin Interface Cross-Site Scripting | This is a remote exploit for cgi platform. Description: Zeus Web Server 4.0/4.1 - Admin Interface Cross-Site Scripting. Author: euronymous |
Analyze the security implications of: Zeus Web Server 4.0/4.1 - Admin Interface Cross-Site Scripting | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: LushiNews 1.01 - 'comments.php' SQL Injection | This is a webapps exploit for php platform. Description: LushiNews 1.01 - 'comments.php' SQL Injection. Author: ajann |
Analyze the security implications of: LushiNews 1.01 - 'comments.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Airbnb Clone Script - Multiple SQL Injection | This is a webapps exploit for php platform. Description: Airbnb Clone Script - Multiple SQL Injection. Author: Ahmet Ümit BAYRAM |
Analyze the security implications of: Airbnb Clone Script - Multiple SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Almnzm - 'COOKIE: customer' SQL Injection | This is a webapps exploit for php platform. Description: Almnzm - 'COOKIE: customer' SQL Injection. Author: Qabandi |
Analyze the security implications of: Almnzm - 'COOKIE: customer' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.