input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: CMS from Scratch 1.1.3 - 'image.php' Directory Traversal | This is a webapps exploit for php platform. Description: CMS from Scratch 1.1.3 - 'image.php' Directory Traversal. Author: Stack |
Analyze the security implications of: CMS from Scratch 1.1.3 - 'image.php' Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CdomainFree 2.4 - Remote Command Execution | This is a remote exploit for multiple platform. Description: CdomainFree 2.4 - Remote Command Execution. Author: Salvatore Sanfilippo -antirez- |
Analyze the security implications of: CdomainFree 2.4 - Remote Command Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BoonEx Ray 3.5 - 'sIncPath' Remote File Inclusion | This is a webapps exploit for php platform. Description: BoonEx Ray 3.5 - 'sIncPath' Remote File Inclusion. Author: RoMaNcYxHaCkEr |
Analyze the security implications of: BoonEx Ray 3.5 - 'sIncPath' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Human Resource Management System 1.0 - SQL Injection (unauthenticated) | This is a webapps exploit for php platform. Description: Human Resource Management System 1.0 - SQL Injection (unauthenticated). Author: Matthijs van der Vaart (eMVee) |
Analyze the security implications of: Human Resource Management System 1.0 - SQL Injection (unauthenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 11in1 CMS 1.2.1 - 'admin/tps?id' SQL Injection | This is a webapps exploit for php platform. Description: 11in1 CMS 1.2.1 - 'admin/tps?id' SQL Injection. Author: Chokri B.A |
Analyze the security implications of: 11in1 CMS 1.2.1 - 'admin/tps?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Moxa EDR-810 - Command Injection / Information Disclosure | This is a remote exploit for hardware platform. Description: Moxa EDR-810 - Command Injection / Information Disclosure. Author: RandoriSec |
Analyze the security implications of: Moxa EDR-810 - Command Injection / Information Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: OpenBSD 2.x/3.x - Local Malformed Binary Execution Denial of Service | This is a dos exploit for openbsd platform. Description: OpenBSD 2.x/3.x - Local Malformed Binary Execution Denial of Service. Author: Georgi Guninski |
Analyze the security implications of: OpenBSD 2.x/3.x - Local Malformed Binary Execution Denial of Service | This exploit targets openbsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets openbsd platform |
What is this exploit about: Joomla! Component City Portal - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component City Portal - Blind SQL Injection. Author: FL0RiX |
Analyze the security implications of: Joomla! Component City Portal - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iOS myDBLite 1.1.10 - Directory Traversal | This is a remote exploit for ios platform. Description: iOS myDBLite 1.1.10 - Directory Traversal. Author: R3d@l3rt_ Sp@2K_ Sunlight |
Analyze the security implications of: iOS myDBLite 1.1.10 - Directory Traversal | This exploit targets ios systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: File Lite 3.3/3.5 PRO iOS - Multiple Vulnerabilities | This is a webapps exploit for ios platform. Description: File Lite 3.3/3.5 PRO iOS - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: File Lite 3.3/3.5 PRO iOS - Multiple Vulnerabilities | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: am4ss Support System 1.2 - PHP Code Injection | This is a webapps exploit for php platform. Description: am4ss Support System 1.2 - PHP Code Injection. Author: i-Hmx |
Analyze the security implications of: am4ss Support System 1.2 - PHP Code Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gitea 1.7.5 - Remote Code Execution | This is a webapps exploit for multiple platform. Description: Gitea 1.7.5 - Remote Code Execution. Author: 1F98D |
Analyze the security implications of: Gitea 1.7.5 - Remote Code Execution | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Poll It CGI 2.0 - Multiple Vulnerabilities | This is a webapps exploit for cgi platform. Description: Poll It CGI 2.0 - Multiple Vulnerabilities. Author: keelis |
Analyze the security implications of: Poll It CGI 2.0 - Multiple Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Man Utility 2.3.19 - Local Compression Program Privilege Escalation | This is a local exploit for linux platform. Description: Man Utility 2.3.19 - Local Compression Program Privilege Escalation. Author: Sebastian Krahmer |
Analyze the security implications of: Man Utility 2.3.19 - Local Compression Program Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Composr CMS 10.0.36 - Cross Site Scripting | This is a webapps exploit for php platform. Description: Composr CMS 10.0.36 - Cross Site Scripting. Author: Orion Hridoy |
Analyze the security implications of: Composr CMS 10.0.36 - Cross Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Client Management System 1.0 - 'searchdata' SQL injection | This is a webapps exploit for php platform. Description: Client Management System 1.0 - 'searchdata' SQL injection. Author: Serkan Sancar |
Analyze the security implications of: Client Management System 1.0 - 'searchdata' SQL injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ajax Full Featured Calendar 2.0 - 'search' SQL Injection | This is a webapps exploit for php platform. Description: Ajax Full Featured Calendar 2.0 - 'search' SQL Injection. Author: AkkuS |
Analyze the security implications of: Ajax Full Featured Calendar 2.0 - 'search' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LAMS < 3.1 - Cross-Site Scripting | This is a webapps exploit for java platform. Description: LAMS < 3.1 - Cross-Site Scripting. Author: Nikola Kojic |
Analyze the security implications of: LAMS < 3.1 - Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: CubeCart 3.0.20 - '/admin/login.php?goto' Arbitrary Site Redirect | This is a webapps exploit for php platform. Description: CubeCart 3.0.20 - '/admin/login.php?goto' Arbitrary Site Redirect. Author: Aung Khant |
Analyze the security implications of: CubeCart 3.0.20 - '/admin/login.php?goto' Arbitrary Site Redirect | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreeRadius 0.x/1.1.x - Tag Field Heap Corruption | This is a dos exploit for linux platform. Description: FreeRadius 0.x/1.1.x - Tag Field Heap Corruption. Author: Evgeny Legerov |
Analyze the security implications of: FreeRadius 0.x/1.1.x - Tag Field Heap Corruption | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Mythic Entertainment Dark Age of Camelot 1.6x - Encryption Key Signing | This is a remote exploit for multiple platform. Description: Mythic Entertainment Dark Age of Camelot 1.6x - Encryption Key Signing. Author: Todd Chapman |
Analyze the security implications of: Mythic Entertainment Dark Age of Camelot 1.6x - Encryption Key Signing | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GAzie 5.10 - 'Login' Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: GAzie 5.10 - 'Login' Multiple Vulnerabilities. Author: LiquidWorm |
Analyze the security implications of: GAzie 5.10 - 'Login' Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Acrobat Reader DC 15.016.20045 - Invalid Font '.ttf' Memory Corruption (1) | This is a dos exploit for multiple platform. Description: Adobe Acrobat Reader DC 15.016.20045 - Invalid Font '.ttf' Memory Corruption (1). Author: COSIG |
Analyze the security implications of: Adobe Acrobat Reader DC 15.016.20045 - Invalid Font '.ttf' Memory Corruption (1) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Early Impact ProductCart 2.6/2.7 - 'viewPrd.asp?idcategory' SQL Injection | This is a webapps exploit for asp platform. Description: Early Impact ProductCart 2.6/2.7 - 'viewPrd.asp?idcategory' SQL Injection. Author: Dedi Dwianto |
Analyze the security implications of: Early Impact ProductCart 2.6/2.7 - 'viewPrd.asp?idcategory' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Fritz!Box - Remote Command Execution | This is a webapps exploit for hardware platform. Description: Fritz!Box - Remote Command Execution. Author: 0x4148 |
Analyze the security implications of: Fritz!Box - Remote Command Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Karaf v4.4.3 Console - RCE | This is a webapps exploit for java platform. Description: Karaf v4.4.3 Console - RCE. Author: Andrzej Olchawa_ Milenko Starcik |
Analyze the security implications of: Karaf v4.4.3 Console - RCE | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: KeystoneJS 4.0.0-beta.5 - CSV Excel Macro Injection | This is a webapps exploit for nodejs platform. Description: KeystoneJS 4.0.0-beta.5 - CSV Excel Macro Injection. Author: Ishaq Mohammed |
Analyze the security implications of: KeystoneJS 4.0.0-beta.5 - CSV Excel Macro Injection | This exploit targets nodejs systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets nodejs platform |
What is this exploit about: Axis Network Camera 2.x And Video Server 1-3 - HTTP Authentication Bypass | This is a webapps exploit for cgi platform. Description: Axis Network Camera 2.x And Video Server 1-3 - HTTP Authentication Bypass. Author: bashis |
Analyze the security implications of: Axis Network Camera 2.x And Video Server 1-3 - HTTP Authentication Bypass | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Oracle 8 - File Access | This is a local exploit for linux platform. Description: Oracle 8 - File Access. Author: Kevin Wenchel |
Analyze the security implications of: Oracle 8 - File Access | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Openfire 3.6.2 - 'log.jsp' Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: Openfire 3.6.2 - 'log.jsp' Cross-Site Scripting. Author: Federico Muttis |
Analyze the security implications of: Openfire 3.6.2 - 'log.jsp' Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Joomla! Component com_pccookbook - 'user_id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_pccookbook - 'user_id' SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! Component com_pccookbook - 'user_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ClipShare - 'UID' SQL Injection | This is a webapps exploit for php platform. Description: ClipShare - 'UID' SQL Injection. Author: Krit |
Analyze the security implications of: ClipShare - 'UID' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Grandstream GXV-3000 Phone - Remote Denial of Service | This is a dos exploit for hardware platform. Description: Grandstream GXV-3000 Phone - Remote Denial of Service. Author: MADYNES |
Analyze the security implications of: Grandstream GXV-3000 Phone - Remote Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.