input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: GetSimple CMS v3.3.16 - Remote Code Execution (RCE) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alstrasoft EPay Enterprise 4.0 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Alstrasoft EPay Enterprise 4.0 - Blind SQL Injection. Author: Don |
Analyze the security implications of: Alstrasoft EPay Enterprise 4.0 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AIOCP 1.4.001 - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: AIOCP 1.4.001 - Cross-Site Request Forgery. Author: AutoSec Tools |
Analyze the security implications of: AIOCP 1.4.001 - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sama Educational Management System - 'error.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Sama Educational Management System - 'error.asp' Cross-Site Scripting. Author: Lagon666 |
Analyze the security implications of: Sama Educational Management System - 'error.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: IBM Websphere 2.0/3.0 - ikeyman Weak Encrypted Password | This is a local exploit for multiple platform. Description: IBM Websphere 2.0/3.0 - ikeyman Weak Encrypted Password. Author: Ben Laurie |
Analyze the security implications of: IBM Websphere 2.0/3.0 - ikeyman Weak Encrypted Password | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Nanopool Claymore Dual Miner - APIs Remote Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Nanopool Claymore Dual Miner - APIs Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Nanopool Claymore Dual Miner - APIs Remote Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Macromedia ColdFusion MX 6.0 - Error Message Full Path Disclosure | This is a webapps exploit for cfm platform. Description: Macromedia ColdFusion MX 6.0 - Error Message Full Path Disclosure. Author: Network Intelligence |
Analyze the security implications of: Macromedia ColdFusion MX 6.0 - Error Message Full Path Disclosure | This exploit targets cfm systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cfm platform |
What is this exploit about: GCALDaemon 1.0-beta13 - Remote Denial of Service | This is a dos exploit for multiple platform. Description: GCALDaemon 1.0-beta13 - Remote Denial of Service. Author: ikki |
Analyze the security implications of: GCALDaemon 1.0-beta13 - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BitchX IRC Client 75p1/75p3/1.0 c16 - '/INVITE' Format String | This is a remote exploit for linux platform. Description: BitchX IRC Client 75p1/75p3/1.0 c16 - '/INVITE' Format String. Author: RaiSe |
Analyze the security implications of: BitchX IRC Client 75p1/75p3/1.0 c16 - '/INVITE' Format String | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Zen Load Balancer 3.10.1 - Directory Traversal (Metasploit) | This is a webapps exploit for cgi platform. Description: Zen Load Balancer 3.10.1 - Directory Traversal (Metasploit). Author: Dhiraj Mishra |
Analyze the security implications of: Zen Load Balancer 3.10.1 - Directory Traversal (Metasploit) | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Link Bank - 'Iframe.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Link Bank - 'Iframe.php' Cross-Site Scripting. Author: Retard |
Analyze the security implications of: Link Bank - 'Iframe.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Enthrallweb eHomes - 'homeDetail.asp?AD_ID' SQL Injection | This is a webapps exploit for asp platform. Description: Enthrallweb eHomes - 'homeDetail.asp?AD_ID' SQL Injection. Author: laurent gaffie |
Analyze the security implications of: Enthrallweb eHomes - 'homeDetail.asp?AD_ID' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Netlify CMS 2.10.192 - Stored Cross-Site Scripting (XSS) | This is a webapps exploit for java platform. Description: Netlify CMS 2.10.192 - Stored Cross-Site Scripting (XSS). Author: tmrswrr |
Analyze the security implications of: Netlify CMS 2.10.192 - Stored Cross-Site Scripting (XSS) | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Joomla! Component com_portfolio - Local File Disclosure | This is a webapps exploit for php platform. Description: Joomla! Component com_portfolio - Local File Disclosure. Author: Mr.tro0oqy |
Analyze the security implications of: Joomla! Component com_portfolio - Local File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sagem F@st 3304-V2 - Local File Inclusion | This is a webapps exploit for hardware platform. Description: Sagem F@st 3304-V2 - Local File Inclusion. Author: Loudiyi Mohamed |
Analyze the security implications of: Sagem F@st 3304-V2 - Local File Inclusion | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: BST (BestShopPro) - 'nowosci.php' Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: BST (BestShopPro) - 'nowosci.php' Multiple Vulnerabilities. Author: CoBRa_21 |
Analyze the security implications of: BST (BestShopPro) - 'nowosci.php' Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Airties AIR5342 1.0.0.18 - Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: Airties AIR5342 1.0.0.18 - Cross-Site Scripting. Author: Ismail Tasdelen |
Analyze the security implications of: Airties AIR5342 1.0.0.18 - Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: e107 CMS 0.7.19 - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: e107 CMS 0.7.19 - Cross-Site Request Forgery. Author: High-Tech Bridge SA |
Analyze the security implications of: e107 CMS 0.7.19 - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: intuitive - 'form.php' SQL Injection | This is a webapps exploit for php platform. Description: intuitive - 'form.php' SQL Injection. Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: intuitive - 'form.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Playable 9.18 iOS - Persistent Cross-Site Scripting | This is a webapps exploit for ios platform. Description: Playable 9.18 iOS - Persistent Cross-Site Scripting. Author: Vulnerability-Lab |
Analyze the security implications of: Playable 9.18 iOS - Persistent Cross-Site Scripting | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: ArticleLive PHP 2005.0.0 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: ArticleLive PHP 2005.0.0 - Cross-Site Scripting. Author: indoushka |
Analyze the security implications of: ArticleLive PHP 2005.0.0 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FS4104-AW VDSL Device (Rooter) - GoAhead WebServer Disclosure | This is a remote exploit for hardware platform. Description: FS4104-AW VDSL Device (Rooter) - GoAhead WebServer Disclosure. Author: NeoCoderz |
Analyze the security implications of: FS4104-AW VDSL Device (Rooter) - GoAhead WebServer Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: BigDump 0.35b - Arbitrary File Upload | This is a webapps exploit for php platform. Description: BigDump 0.35b - Arbitrary File Upload. Author: felipe andrian |
Analyze the security implications of: BigDump 0.35b - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: STUNSHELL (Web Shell) - PHP Remote Code Execution (Metasploit) | This is a remote exploit for php platform. Description: STUNSHELL (Web Shell) - PHP Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: STUNSHELL (Web Shell) - PHP Remote Code Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_jphoto - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_jphoto - 'id' SQL Injection. Author: kaMtiEz |
Analyze the security implications of: Joomla! Component com_jphoto - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP-UX B11.11 - '/usr/bin/ct' Format String Privilege Escalation | This is a local exploit for hp-ux platform. Description: HP-UX B11.11 - '/usr/bin/ct' Format String Privilege Escalation. Author: watercloud |
Analyze the security implications of: HP-UX B11.11 - '/usr/bin/ct' Format String Privilege Escalation | This exploit targets hp-ux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hp-ux platform |
What is this exploit about: Indusoft Web Studio 8.1 SP2 - Remote Code Execution | This is a remote exploit for multiple platform. Description: Indusoft Web Studio 8.1 SP2 - Remote Code Execution. Author: Jacob Baines |
Analyze the security implications of: Indusoft Web Studio 8.1 SP2 - Remote Code Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Oracle WebLogic < 10.3.6 - 'wls-wsat' Component Deserialisation Remote Command Execution | This is a remote exploit for multiple platform. Description: Oracle WebLogic < 10.3.6 - 'wls-wsat' Component Deserialisation Remote Command Execution. Author: Kevin Kirsche |
Analyze the security implications of: Oracle WebLogic < 10.3.6 - 'wls-wsat' Component Deserialisation Remote Command Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Alteon OS BBI (Nortell) - Cross-Site Scripting / Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: Alteon OS BBI (Nortell) - Cross-Site Scripting / Cross-Site Request Forgery. Author: Alexey Sintsov |
Analyze the security implications of: Alteon OS BBI (Nortell) - Cross-Site Scripting / Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Learn.com - 'Learncenter.asp' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Learn.com - 'Learncenter.asp' Cross-Site Scripting. Author: Crack_MaN |
Analyze the security implications of: Learn.com - 'Learncenter.asp' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sitefinity CMS - 'ASP.NET' Arbitrary File Upload | This is a webapps exploit for asp platform. Description: Sitefinity CMS - 'ASP.NET' Arbitrary File Upload. Author: Net.Edit0r |
Analyze the security implications of: Sitefinity CMS - 'ASP.NET' Arbitrary File Upload | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component ECommerce-WD 1.2.5 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component ECommerce-WD 1.2.5 - SQL Injection. Author: Brandon Perry |
Analyze the security implications of: Joomla! Component ECommerce-WD 1.2.5 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco - 'file' Directory Traversal | This is a remote exploit for hardware platform. Description: Cisco - 'file' Directory Traversal. Author: Sandro Gauci |
Analyze the security implications of: Cisco - 'file' Directory Traversal | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CruxCMS 3.0 - 'search.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: CruxCMS 3.0 - 'search.php' Cross-Site Scripting. Author: Psiczn |
Analyze the security implications of: CruxCMS 3.0 - 'search.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.