input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: HasanMWB 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: HasanMWB 1.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: HasanMWB 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FS Freelancer Clone 1.0 - 'profile.php?u' SQL Injection | This is a webapps exploit for php platform. Description: FS Freelancer Clone 1.0 - 'profile.php?u' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: FS Freelancer Clone 1.0 - 'profile.php?u' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Unraid 6.8.0 - Auth Bypass PHP Code Execution (Metasploit) | This is a remote exploit for linux platform. Description: Unraid 6.8.0 - Auth Bypass PHP Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Unraid 6.8.0 - Auth Bypass PHP Code Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Synology DiskStation Manager (DSM) 4.3-3776 - Multiple Vulnerabilities | This is a webapps exploit for linux platform. Description: Synology DiskStation Manager (DSM) 4.3-3776 - Multiple Vulnerabilities. Author: Andrea Fabrizi |
Analyze the security implications of: Synology DiskStation Manager (DSM) 4.3-3776 - Multiple Vulnerabilities | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ec21 clone 3.0 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: ec21 clone 3.0 - 'id' SQL Injection. Author: v3n0m |
Analyze the security implications of: ec21 clone 3.0 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Opera 8.02 - Remote Denial of Service (1) | This is a dos exploit for multiple platform. Description: Opera 8.02 - Remote Denial of Service (1). Author: posidron |
Analyze the security implications of: Opera 8.02 - Remote Denial of Service (1) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Jetbox CMS 2.1 - 'Search_function.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Jetbox CMS 2.1 - 'Search_function.php' Remote File Inclusion. Author: D3nGeR |
Analyze the security implications of: Jetbox CMS 2.1 - 'Search_function.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.6.x - 'posix-timers.c' Null Pointer Dereference Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - 'posix-timers.c' Null Pointer Dereference Denial of Service. Author: Hiroshi Shimamoto |
Analyze the security implications of: Linux Kernel 2.6.x - 'posix-timers.c' Null Pointer Dereference Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Bloq 0.5.4 - '/files/mainfile.php?page[path]' Remote File Inclusion | This is a webapps exploit for php platform. Description: Bloq 0.5.4 - '/files/mainfile.php?page[path]' Remote File Inclusion. Author: KorsaN |
Analyze the security implications of: Bloq 0.5.4 - '/files/mainfile.php?page[path]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AimStats 3.2 - 'process.php?update' Remote Code Execution | This is a webapps exploit for php platform. Description: AimStats 3.2 - 'process.php?update' Remote Code Execution. Author: Dj7xpl |
Analyze the security implications of: AimStats 3.2 - 'process.php?update' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component aardvertiser 2.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component aardvertiser 2.0 - Local File Inclusion. Author: eidelweiss |
Analyze the security implications of: Joomla! Component aardvertiser 2.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Saxum Astro 4.0.14 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Saxum Astro 4.0.14 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Saxum Astro 4.0.14 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eXtrovert software Thyme 1.3 - 'add_calendars.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: eXtrovert software Thyme 1.3 - 'add_calendars.php' Cross-Site Scripting. Author: DigiTrust Group |
Analyze the security implications of: eXtrovert software Thyme 1.3 - 'add_calendars.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreeBSD OpenSSH 3.5p1 - Remote Command Execution | This is a remote exploit for freebsd platform. Description: FreeBSD OpenSSH 3.5p1 - Remote Command Execution. Author: kingcope |
Analyze the security implications of: FreeBSD OpenSSH 3.5p1 - Remote Command Execution | This exploit targets freebsd systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: BES-CMS 0.4/0.5 - 'folder.php' File Inclusion | This is a webapps exploit for php platform. Description: BES-CMS 0.4/0.5 - 'folder.php' File Inclusion. Author: frog |
Analyze the security implications of: BES-CMS 0.4/0.5 - 'folder.php' File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASP cvmatik 1.1 - Multiple HTML Injection Vulnerabilities | This is a webapps exploit for asp platform. Description: ASP cvmatik 1.1 - Multiple HTML Injection Vulnerabilities. Author: GeFORC3 |
Analyze the security implications of: ASP cvmatik 1.1 - Multiple HTML Injection Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: OpenText Documentum Content Server - Arbitrary File Download | This is a webapps exploit for multiple platform. Description: OpenText Documentum Content Server - Arbitrary File Download. Author: Andrey B. Panfilov |
Analyze the security implications of: OpenText Documentum Content Server - Arbitrary File Download | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Atar2b CMS 4.0.1 - 'gallery_e.php?id' SQL Injection | This is a webapps exploit for php platform. Description: Atar2b CMS 4.0.1 - 'gallery_e.php?id' SQL Injection. Author: BHG Security Center |
Analyze the security implications of: Atar2b CMS 4.0.1 - 'gallery_e.php?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: XLineSoft ASPRunner 1.0/2.x - 'export.asp?SQL' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: XLineSoft ASPRunner 1.0/2.x - 'export.asp?SQL' Cross-Site Scripting. Author: Ferruh Mavituna |
Analyze the security implications of: XLineSoft ASPRunner 1.0/2.x - 'export.asp?SQL' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component Simple Shop Galore 3.x - 'catid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Simple Shop Galore 3.x - 'catid' SQL Injection. Author: eXeCuTeR |
Analyze the security implications of: Joomla! Component Simple Shop Galore 3.x - 'catid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Call of Duty 1.4 - Denial of Service | This is a dos exploit for multiple platform. Description: Call of Duty 1.4 - Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: Call of Duty 1.4 - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AtomPhotoBlog 1.15 - 'atomPhotoBlog.php' SQL Injection | This is a webapps exploit for php platform. Description: AtomPhotoBlog 1.15 - 'atomPhotoBlog.php' SQL Injection. Author: Mr.SQL |
Analyze the security implications of: AtomPhotoBlog 1.15 - 'atomPhotoBlog.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DataLife Engine 4.1 - SQL Injection | This is a webapps exploit for php platform. Description: DataLife Engine 4.1 - SQL Injection. Author: RusH |
Analyze the security implications of: DataLife Engine 4.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Seagate BlackArmor NAS - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Seagate BlackArmor NAS - Multiple Vulnerabilities. Author: Shayan S |
Analyze the security implications of: Seagate BlackArmor NAS - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Departmental Store Management System 1.2 - SQL Injection | This is a webapps exploit for php platform. Description: Departmental Store Management System 1.2 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Departmental Store Management System 1.2 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Concrete5 CME v9.1.3 - Xpath injection | This is a webapps exploit for php platform. Description: Concrete5 CME v9.1.3 - Xpath injection. Author: nu11secur1ty |
Analyze the security implications of: Concrete5 CME v9.1.3 - Xpath injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WebKit - TypedArray.copyWithin Memory Corruption | This is a dos exploit for multiple platform. Description: WebKit - TypedArray.copyWithin Memory Corruption. Author: Google Security Research |
Analyze the security implications of: WebKit - TypedArray.copyWithin Memory Corruption | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: SKILLS.com.au Industry App - Man In The Middle Remote Code Execution | This is a remote exploit for android platform. Description: SKILLS.com.au Industry App - Man In The Middle Remote Code Execution. Author: intern0t |
Analyze the security implications of: SKILLS.com.au Industry App - Man In The Middle Remote Code Execution | This exploit targets android systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: D-Link DNS-320 ShareCenter - Remote Reboot/Shutdown/Reset (Denial of Service) | This is a dos exploit for hardware platform. Description: D-Link DNS-320 ShareCenter - Remote Reboot/Shutdown/Reset (Denial of Service). Author: rigan |
Analyze the security implications of: D-Link DNS-320 ShareCenter - Remote Reboot/Shutdown/Reset (Denial of Service) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Adult WebMaster Script - Password Disclosure | This is a webapps exploit for php platform. Description: Adult WebMaster Script - Password Disclosure. Author: Dshellnoi Unix |
Analyze the security implications of: Adult WebMaster Script - Password Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP-UX 11i - 'swmodify' Local Stack Overflow / Local Privilege Escalation | This is a local exploit for hp-ux platform. Description: HP-UX 11i - 'swmodify' Local Stack Overflow / Local Privilege Escalation. Author: prdelka |
Analyze the security implications of: HP-UX 11i - 'swmodify' Local Stack Overflow / Local Privilege Escalation | This exploit targets hp-ux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hp-ux platform |
What is this exploit about: NetBSD 3.1 - 'FTPd / Tnftpd' Port Remote Buffer Overflow | This is a dos exploit for netbsd_x86 platform. Description: NetBSD 3.1 - 'FTPd / Tnftpd' Port Remote Buffer Overflow. Author: kcope |
Analyze the security implications of: NetBSD 3.1 - 'FTPd / Tnftpd' Port Remote Buffer Overflow | This exploit targets netbsd_x86 systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets netbsd_x86 platform |
What is this exploit about: DirectAdmin 1.561 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: DirectAdmin 1.561 - Multiple Vulnerabilities. Author: InfinitumIT |
Analyze the security implications of: DirectAdmin 1.561 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: KnowledgeBuilder 2.2 - 'visEdit_Control.Class.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: KnowledgeBuilder 2.2 - 'visEdit_Control.Class.php' Remote File Inclusion. Author: igi |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.