input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: AWStats 6.4 < 6.5 - AllowToUpdateStatsFromBrowser Command Injection (Metasploit) | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: ZYXEL P-660HN-T1A Router - Authentication Bypass | This is a webapps exploit for hardware platform. Description: ZYXEL P-660HN-T1A Router - Authentication Bypass. Author: Michael Grifalconi |
Analyze the security implications of: ZYXEL P-660HN-T1A Router - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: DigitalHive 2.0 - 'msg.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DigitalHive 2.0 - 'msg.php' Cross-Site Scripting. Author: benji lemien |
Analyze the security implications of: DigitalHive 2.0 - 'msg.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Kirona-DRS 5.5.3.5 - Information Disclosure | This is a webapps exploit for php platform. Description: Kirona-DRS 5.5.3.5 - Information Disclosure. Author: Ramikan |
Analyze the security implications of: Kirona-DRS 5.5.3.5 - Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Tenda N3 Wireless N150 Router - Authentication Bypass | This is a webapps exploit for hardware platform. Description: Tenda N3 Wireless N150 Router - Authentication Bypass. Author: Mandeep Jadon |
Analyze the security implications of: Tenda N3 Wireless N150 Router - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ERPGo SaaS 3.9 - CSV Injection | This is a webapps exploit for php platform. Description: ERPGo SaaS 3.9 - CSV Injection. Author: Sajibe Kanti |
Analyze the security implications of: ERPGo SaaS 3.9 - CSV Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Redis 5.0 - Denial of Service | This is a dos exploit for linux platform. Description: Redis 5.0 - Denial of Service. Author: Fakhri Zulkifli |
Analyze the security implications of: Redis 5.0 - Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: MySQL User-Defined (Linux) (x86) - 'sys_exec' Local Privilege Escalation | This is a local exploit for linux_x86 platform. Description: MySQL User-Defined (Linux) (x86) - 'sys_exec' Local Privilege Escalation. Author: d7x |
Analyze the security implications of: MySQL User-Defined (Linux) (x86) - 'sys_exec' Local Privilege Escalation | This exploit targets linux_x86 systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux_x86 platform |
What is this exploit about: Joomla! Component com_portfol - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_portfol - SQL Injection. Author: wlhaan hacker |
Analyze the security implications of: Joomla! Component com_portfol - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IPFire 2.21 - Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: IPFire 2.21 - Cross-Site Scripting. Author: Ozer Goker |
Analyze the security implications of: IPFire 2.21 - Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Squid Web Proxy 2.2 - 'cachemgr.cgi' Unauthorized Connection | This is a remote exploit for cgi platform. Description: Squid Web Proxy 2.2 - 'cachemgr.cgi' Unauthorized Connection. Author: fsaa |
Analyze the security implications of: Squid Web Proxy 2.2 - 'cachemgr.cgi' Unauthorized Connection | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Joomla! Component com_ice - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_ice - Blind SQL Injection. Author: snakespc |
Analyze the security implications of: Joomla! Component com_ice - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Guesser 1.0.4 - 'type' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Guesser 1.0.4 - 'type' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Guesser 1.0.4 - 'type' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LG DVR LE6016D - Remote File Disclosure | This is a webapps exploit for hardware platform. Description: LG DVR LE6016D - Remote File Disclosure. Author: Yakir Wizman |
Analyze the security implications of: LG DVR LE6016D - Remote File Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Hotel Management System 1.0 - Remote Code Execution (Authenticated) | This is a webapps exploit for php platform. Description: Hotel Management System 1.0 - Remote Code Execution (Authenticated). Author: Aporlorxl23 |
Analyze the security implications of: Hotel Management System 1.0 - Remote Code Execution (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Flyspray 0.9 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Flyspray 0.9 - Multiple Cross-Site Scripting Vulnerabilities. Author: Lostmon |
Analyze the security implications of: Flyspray 0.9 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Elxis CMS 2009.2 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Elxis CMS 2009.2 - Remote File Inclusion. Author: n0n0x |
Analyze the security implications of: Elxis CMS 2009.2 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LES PACKS - 'ID' SQL Injection | This is a webapps exploit for php platform. Description: LES PACKS - 'ID' SQL Injection. Author: Cru3l.b0y |
Analyze the security implications of: LES PACKS - 'ID' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SolarView Compact 6.00 - Directory Traversal | This is a remote exploit for hardware platform. Description: SolarView Compact 6.00 - Directory Traversal. Author: Ahmed Alroky |
Analyze the security implications of: SolarView Compact 6.00 - Directory Traversal | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: F5 Big-IP 10.2.4 Build 595.0 Hotfix HF3 - Directory Traversal | This is a webapps exploit for hardware platform. Description: F5 Big-IP 10.2.4 Build 595.0 Hotfix HF3 - Directory Traversal. Author: Karn Ganeshen |
Analyze the security implications of: F5 Big-IP 10.2.4 Build 595.0 Hotfix HF3 - Directory Traversal | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Media Player Classic 6.4.9 - FLI File Remote Buffer Overflow | This is a dos exploit for multiple platform. Description: Media Player Classic 6.4.9 - FLI File Remote Buffer Overflow. Author: wushi |
Analyze the security implications of: Media Player Classic 6.4.9 - FLI File Remote Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: SmarterMail < 7.2.3925 - LDAP Injection | This is a webapps exploit for asp platform. Description: SmarterMail < 7.2.3925 - LDAP Injection. Author: sqlhacker |
Analyze the security implications of: SmarterMail < 7.2.3925 - LDAP Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Sun GlassFish 2.1 - 'name' Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Sun GlassFish 2.1 - 'name' Cross-Site Scripting. Author: Eduardo Neves |
Analyze the security implications of: Sun GlassFish 2.1 - 'name' Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: PHP-Nuke Network Tool 0.2 Addon - MetaCharacter Filtering Command Execution | This is a remote exploit for php platform. Description: PHP-Nuke Network Tool 0.2 Addon - MetaCharacter Filtering Command Execution. Author: Cabezon Aurélien |
Analyze the security implications of: PHP-Nuke Network Tool 0.2 Addon - MetaCharacter Filtering Command Execution | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Grandora Rialto 1.6 - '/admin/default.asp' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: Grandora Rialto 1.6 - '/admin/default.asp' Multiple SQL Injections. Author: laurent gaffie |
Analyze the security implications of: Grandora Rialto 1.6 - '/admin/default.asp' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: E-INSUARANCE v1.0 - Stored Cross Site Scripting (XSS) | This is a webapps exploit for php platform. Description: E-INSUARANCE v1.0 - Stored Cross Site Scripting (XSS). Author: Sandeep Vishwakarma |
Analyze the security implications of: E-INSUARANCE v1.0 - Stored Cross Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PMS 0.42 - Local Stack-Based Overflow (ROP) | This is a local exploit for linux platform. Description: PMS 0.42 - Local Stack-Based Overflow (ROP). Author: Juan Sacco |
Analyze the security implications of: PMS 0.42 - Local Stack-Based Overflow (ROP) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: xFlow 5.46.11 - 'index.cgi' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for cgi platform. Description: xFlow 5.46.11 - 'index.cgi' Multiple Cross-Site Scripting Vulnerabilities. Author: r0t |
Analyze the security implications of: xFlow 5.46.11 - 'index.cgi' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Cobalt RaQ4 - Administrative Interface Command Execution | This is a remote exploit for linux platform. Description: Cobalt RaQ4 - Administrative Interface Command Execution. Author: grazer |
Analyze the security implications of: Cobalt RaQ4 - Administrative Interface Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Phraseanet < 4.0.7 - Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Phraseanet < 4.0.7 - Cross-Site Scripting. Author: Krzysztof Szulski |
Analyze the security implications of: Phraseanet < 4.0.7 - Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ethereal 0.10.10 - 'dissect_ipc_state' Remote Denial of Service | This is a dos exploit for multiple platform. Description: Ethereal 0.10.10 - 'dissect_ipc_state' Remote Denial of Service. Author: Nicob |
Analyze the security implications of: Ethereal 0.10.10 - 'dissect_ipc_state' Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apache CouchDB 2.3.0 - Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Apache CouchDB 2.3.0 - Cross-Site Scripting. Author: Ozer Goker |
Analyze the security implications of: Apache CouchDB 2.3.0 - Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: frame-oshop - SQL Injection | This is a webapps exploit for php platform. Description: frame-oshop - SQL Injection. Author: -SmoG- |
Analyze the security implications of: frame-oshop - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASP-DEV XM Events Diary - 'cat' SQL Injection | This is a webapps exploit for asp platform. Description: ASP-DEV XM Events Diary - 'cat' SQL Injection. Author: Pouya_Server |
Analyze the security implications of: ASP-DEV XM Events Diary - 'cat' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.