input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: F5 FirePass 6.0.2.3 - '/vdesk/admincon/index.php?sql_matchscope' Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component com_motor - 'cid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_motor - 'cid' SQL Injection. Author: the_cyber_nuxbie |
Analyze the security implications of: Joomla! Component com_motor - 'cid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ERPNext 12.14.0 - SQL Injection (Authenticated) | This is a webapps exploit for multiple platform. Description: ERPNext 12.14.0 - SQL Injection (Authenticated). Author: Hodorsec |
Analyze the security implications of: ERPNext 12.14.0 - SQL Injection (Authenticated) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple macOS - 'getrusage' Stack Leak Through struct Padding | This is a dos exploit for macos platform. Description: Apple macOS - 'getrusage' Stack Leak Through struct Padding. Author: Google Security Research |
Analyze the security implications of: Apple macOS - 'getrusage' Stack Leak Through struct Padding | This exploit targets macos systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Buy and Sell Market Place Software - SQL Injection | This is a webapps exploit for php platform. Description: Buy and Sell Market Place Software - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Buy and Sell Market Place Software - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: UCOPIA Wireless Appliance < 5.1.8 - Restricted Shell Escape | This is a local exploit for linux platform. Description: UCOPIA Wireless Appliance < 5.1.8 - Restricted Shell Escape. Author: Sysdream |
Analyze the security implications of: UCOPIA Wireless Appliance < 5.1.8 - Restricted Shell Escape | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Invision Power Services Invision Gallery 1.0.1/1.3 - SQL Injection | This is a webapps exploit for php platform. Description: Invision Power Services Invision Gallery 1.0.1/1.3 - SQL Injection. Author: GulfTech Security |
Analyze the security implications of: Invision Power Services Invision Gallery 1.0.1/1.3 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AnnonceScriptHP 2.0 - '/Templates/admin.dwt.php?email' Cross-Site Scripting | This is a webapps exploit for php platform. Description: AnnonceScriptHP 2.0 - '/Templates/admin.dwt.php?email' Cross-Site Scripting. Author: Mr_KaLiMaN |
Analyze the security implications of: AnnonceScriptHP 2.0 - '/Templates/admin.dwt.php?email' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Samsung ml85p Printer Driver 1.0 - Insecure Temporary File Creation (2) | This is a local exploit for hardware platform. Description: Samsung ml85p Printer Driver 1.0 - Insecure Temporary File Creation (2). Author: ml85p |
Analyze the security implications of: Samsung ml85p Printer Driver 1.0 - Insecure Temporary File Creation (2) | This exploit targets hardware systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Advanced File Management 1.4 - 'users.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Advanced File Management 1.4 - 'users.php' Cross-Site Scripting. Author: Am!r |
Analyze the security implications of: Advanced File Management 1.4 - 'users.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Church Management System 1.0 - 'password' SQL Injection (Authentication Bypass) | This is a webapps exploit for php platform. Description: Church Management System 1.0 - 'password' SQL Injection (Authentication Bypass). Author: Murat DEMİRCİ |
Analyze the security implications of: Church Management System 1.0 - 'password' SQL Injection (Authentication Bypass) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreeCMS.us 0.2 - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: FreeCMS.us 0.2 - 'index.php' SQL Injection. Author: Mr.SQL |
Analyze the security implications of: FreeCMS.us 0.2 - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! / Mambo Component Cinema 1.0 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! / Mambo Component Cinema 1.0 - 'id' SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! / Mambo Component Cinema 1.0 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Chrome < M73 - FileSystemOperationRunner Use-After-Free | This is a dos exploit for multiple platform. Description: Google Chrome < M73 - FileSystemOperationRunner Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Google Chrome < M73 - FileSystemOperationRunner Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Webmin < 1.290 / Usermin < 1.220 - Arbitrary File Disclosure | This is a remote exploit for multiple platform. Description: Webmin < 1.290 / Usermin < 1.220 - Arbitrary File Disclosure. Author: joffer |
Analyze the security implications of: Webmin < 1.290 / Usermin < 1.220 - Arbitrary File Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Xmind 2020 - Persistent Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Xmind 2020 - Persistent Cross-Site Scripting. Author: TaurusOmar |
Analyze the security implications of: Xmind 2020 - Persistent Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Zemra Botnet (C2 Web Panel) - Remote Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Zemra Botnet (C2 Web Panel) - Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Zemra Botnet (C2 Web Panel) - Remote Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CuteNews 1.4.1 - 'categories.mdu' Remote Command Execution | This is a webapps exploit for php platform. Description: CuteNews 1.4.1 - 'categories.mdu' Remote Command Execution. Author: cijfer |
Analyze the security implications of: CuteNews 1.4.1 - 'categories.mdu' Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: lcxbbportal 0.1 alpha 2 - Remote File Inclusion | This is a webapps exploit for php platform. Description: lcxbbportal 0.1 alpha 2 - Remote File Inclusion. Author: NoGe |
Analyze the security implications of: lcxbbportal 0.1 alpha 2 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JBoss 3.0.8/3.2.1 - HSQLDB Remote Command Injection | This is a remote exploit for multiple platform. Description: JBoss 3.0.8/3.2.1 - HSQLDB Remote Command Injection. Author: Marc Schoenefeld |
Analyze the security implications of: JBoss 3.0.8/3.2.1 - HSQLDB Remote Command Injection | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Lot Reservation Management System - Unauthenticated File Disclosure | This is a webapps exploit for php platform. Description: Lot Reservation Management System - Unauthenticated File Disclosure. Author: Elijah Mandila Syoyi |
Analyze the security implications of: Lot Reservation Management System - Unauthenticated File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RedHat 6.2/7.0/7.1 Lpd - Remote Command Execution via DVI Printfilter Configuration Error | This is a remote exploit for linux platform. Description: RedHat 6.2/7.0/7.1 Lpd - Remote Command Execution via DVI Printfilter Configuration Error. Author: zenith parsec |
Analyze the security implications of: RedHat 6.2/7.0/7.1 Lpd - Remote Command Execution via DVI Printfilter Configuration Error | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: GNU C Library Dynamic Loader glibc ld.so - Memory Leak / Buffer Overflow | This is a local exploit for linux platform. Description: GNU C Library Dynamic Loader glibc ld.so - Memory Leak / Buffer Overflow. Author: Qualys Corporation |
Analyze the security implications of: GNU C Library Dynamic Loader glibc ld.so - Memory Leak / Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: TP-Link TL-WR840N/TL-WR841N - Authenticaton Bypass | This is a webapps exploit for hardware platform. Description: TP-Link TL-WR840N/TL-WR841N - Authenticaton Bypass. Author: BlackFog Team |
Analyze the security implications of: TP-Link TL-WR840N/TL-WR841N - Authenticaton Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ClipShare < 3.0.1 - 'tid' SQL Injection | This is a webapps exploit for php platform. Description: ClipShare < 3.0.1 - 'tid' SQL Injection. Author: SuNHouSe2 |
Analyze the security implications of: ClipShare < 3.0.1 - 'tid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP < 4.4.5/5.2.1 - WDDX Session Deserialization Information Leak | This is a local exploit for multiple platform. Description: PHP < 4.4.5/5.2.1 - WDDX Session Deserialization Information Leak. Author: Stefan Esser |
Analyze the security implications of: PHP < 4.4.5/5.2.1 - WDDX Session Deserialization Information Leak | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple WebKit / Safari 10.0.3 (12602.4.8) - Universal Cross-Site Scripting via a Focus Event and a Link Element | This is a webapps exploit for multiple platform. Description: Apple WebKit / Safari 10.0.3 (12602.4.8) - Universal Cross-Site Scripting via a Focus Event and a Link Element. Author: Google Security Research |
Analyze the security implications of: Apple WebKit / Safari 10.0.3 (12602.4.8) - Universal Cross-Site Scripting via a Focus Event and a Link Element | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component PrayerCenter 3.0.2 - 'sessionid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component PrayerCenter 3.0.2 - 'sessionid' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component PrayerCenter 3.0.2 - 'sessionid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ecommercemax Solutions Digital Goods Seller - SQL Injection | This is a webapps exploit for asp platform. Description: Ecommercemax Solutions Digital Goods Seller - SQL Injection. Author: R4dc0re |
Analyze the security implications of: Ecommercemax Solutions Digital Goods Seller - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Cacti 0.8.7 - '/index.php/sql.php?Login Action login_username' SQL Injection | This is a webapps exploit for php platform. Description: Cacti 0.8.7 - '/index.php/sql.php?Login Action login_username' SQL Injection. Author: aScii |
Analyze the security implications of: Cacti 0.8.7 - '/index.php/sql.php?Login Action login_username' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: F5 Networks FirePass 4100 SSL VPN - 'My.Logon.php3' Cross-Site Scripting | This is a remote exploit for hardware platform. Description: F5 Networks FirePass 4100 SSL VPN - 'My.Logon.php3' Cross-Site Scripting. Author: Richard Brain |
Analyze the security implications of: F5 Networks FirePass 4100 SSL VPN - 'My.Logon.php3' Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Adobe ColdFusion - Directory Traversal | This is a remote exploit for multiple platform. Description: Adobe ColdFusion - Directory Traversal. Author: anonymous |
Analyze the security implications of: Adobe ColdFusion - Directory Traversal | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ZYXEL P-660R-T1 V2 - 'HomeCurrent_Date' Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: ZYXEL P-660R-T1 V2 - 'HomeCurrent_Date' Cross-Site Scripting. Author: Usman Saeed |
Analyze the security implications of: ZYXEL P-660R-T1 V2 - 'HomeCurrent_Date' Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Sun Java Web Start 1.0/1.2 - Remote Command Execution | This is a remote exploit for multiple platform. Description: Sun Java Web Start 1.0/1.2 - Remote Command Execution. Author: Varun Srivastava |
Analyze the security implications of: Sun Java Web Start 1.0/1.2 - Remote Command Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.