input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: GPS CMS 1.2 - 'print.asp' SQL Injection | This is a webapps exploit for asp platform. Description: GPS CMS 1.2 - 'print.asp' SQL Injection. Author: ajann |
Analyze the security implications of: GPS CMS 1.2 - 'print.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: DELL Quest One Password Manager - CAPTCHA Security Bypass | This is a remote exploit for multiple platform. Description: DELL Quest One Password Manager - CAPTCHA Security Bypass. Author: Johnny Bravo |
Analyze the security implications of: DELL Quest One Password Manager - CAPTCHA Security Bypass | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Agoko CMS 0.4 - Remote Command Execution | This is a webapps exploit for php platform. Description: Agoko CMS 0.4 - Remote Command Execution. Author: StAkeR |
Analyze the security implications of: Agoko CMS 0.4 - Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation | This is a local exploit for linux platform. Description: CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation. Author: I)ruid |
Analyze the security implications of: CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CuteNews 1.4.5 - Admin Password md5 Hash Fetching | This is a webapps exploit for php platform. Description: CuteNews 1.4.5 - Admin Password md5 Hash Fetching. Author: waraxe |
Analyze the security implications of: CuteNews 1.4.5 - Admin Password md5 Hash Fetching | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 11in1 CMS 1.2.1 - '/admin/index.php?class' Traversal Local File Inclusion | This is a webapps exploit for php platform. Description: 11in1 CMS 1.2.1 - '/admin/index.php?class' Traversal Local File Inclusion. Author: High-Tech Bridge SA |
Analyze the security implications of: 11in1 CMS 1.2.1 - '/admin/index.php?class' Traversal Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Grandstream UCM6200 Series CTI Interface - 'user_password' SQL Injection | This is a webapps exploit for hardware platform. Description: Grandstream UCM6200 Series CTI Interface - 'user_password' SQL Injection. Author: Jacob Baines |
Analyze the security implications of: Grandstream UCM6200 Series CTI Interface - 'user_password' SQL Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Hashicorp Consul - Remote Command Execution via Services API (Metasploit) | This is a remote exploit for linux platform. Description: Hashicorp Consul - Remote Command Execution via Services API (Metasploit). Author: Metasploit |
Analyze the security implications of: Hashicorp Consul - Remote Command Execution via Services API (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Connect Daily 3.2.8/3.2.9 - 'ViewCal.html?item_type_id' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Connect Daily 3.2.8/3.2.9 - 'ViewCal.html?item_type_id' Cross-Site Scripting. Author: r0t |
Analyze the security implications of: Connect Daily 3.2.8/3.2.9 - 'ViewCal.html?item_type_id' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASP-Rider - SQL Injection | This is a webapps exploit for asp platform. Description: ASP-Rider - SQL Injection. Author: Shervin Khaleghjou |
Analyze the security implications of: ASP-Rider - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Upclient 5.0 b7 - Command Line Argument Buffer Overflow | This is a local exploit for freebsd platform. Description: Upclient 5.0 b7 - Command Line Argument Buffer Overflow. Author: Gino Thomas |
Analyze the security implications of: Upclient 5.0 b7 - Command Line Argument Buffer Overflow | This exploit targets freebsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: Humax Wi-Fi Router HG100R 2.0.6 - Authentication Bypass | This is a webapps exploit for hardware platform. Description: Humax Wi-Fi Router HG100R 2.0.6 - Authentication Bypass. Author: Kivson |
Analyze the security implications of: Humax Wi-Fi Router HG100R 2.0.6 - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: 4images v1.7.11 - 'Profile Image' Stored Cross-Site Scripting | This is a webapps exploit for php platform. Description: 4images v1.7.11 - 'Profile Image' Stored Cross-Site Scripting. Author: Ritesh Gohil |
Analyze the security implications of: 4images v1.7.11 - 'Profile Image' Stored Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel - 'ecryptfs' '/proc/$pid/environ' Local Privilege Escalation | This is a local exploit for linux platform. Description: Linux Kernel - 'ecryptfs' '/proc/$pid/environ' Local Privilege Escalation. Author: Google Security Research |
Analyze the security implications of: Linux Kernel - 'ecryptfs' '/proc/$pid/environ' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component Weblinks - 'Itemid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Weblinks - 'Itemid' SQL Injection. Author: ViRuS Qalaa |
Analyze the security implications of: Joomla! Component Weblinks - 'Itemid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle 10g - Alter Session Integer Overflow | This is a dos exploit for multiple platform. Description: Oracle 10g - Alter Session Integer Overflow. Author: putosoft softputo |
Analyze the security implications of: Oracle 10g - Alter Session Integer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component SecurityCheck 2.8.9 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Joomla! Component SecurityCheck 2.8.9 - Multiple Vulnerabilities. Author: ADEO Security |
Analyze the security implications of: Joomla! Component SecurityCheck 2.8.9 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: gr blog 1.1.4 - Arbitrary File Upload / Authentication Bypass | This is a webapps exploit for php platform. Description: gr blog 1.1.4 - Arbitrary File Upload / Authentication Bypass. Author: JosS |
Analyze the security implications of: gr blog 1.1.4 - Arbitrary File Upload / Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EPOLL SYSTEM 3.1 - 'Password.dat' Disclosure | This is a webapps exploit for php platform. Description: EPOLL SYSTEM 3.1 - 'Password.dat' Disclosure. Author: Pouya_Server |
Analyze the security implications of: EPOLL SYSTEM 3.1 - 'Password.dat' Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SISQUALWFM 7.1.319.103 - Host Header Injection | This is a webapps exploit for multiple platform. Description: SISQUALWFM 7.1.319.103 - Host Header Injection. Author: Omer Shaik |
Analyze the security implications of: SISQUALWFM 7.1.319.103 - Host Header Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple macOS 10.13.2 - Double mach_port_deallocate in kextd due to Failure to Comply with MIG Ownership Rules | This is a dos exploit for macos platform. Description: Apple macOS 10.13.2 - Double mach_port_deallocate in kextd due to Failure to Comply with MIG Ownership Rules. Author: Google Security Research |
Analyze the security implications of: Apple macOS 10.13.2 - Double mach_port_deallocate in kextd due to Failure to Comply with MIG Ownership Rules | This exploit targets macos systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Joomla! 1.5 Beta 2 - 'Search' Remote Code Execution | This is a webapps exploit for php platform. Description: Joomla! 1.5 Beta 2 - 'Search' Remote Code Execution. Author: Johannes Greil |
Analyze the security implications of: Joomla! 1.5 Beta 2 - 'Search' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Companymaps v8.0 - Stored Cross Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Companymaps v8.0 - Stored Cross Site Scripting (XSS). Author: Lucas Noki (0xPrototype) |
Analyze the security implications of: Companymaps v8.0 - Stored Cross Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: phpMyAdmin - 'preg_replace' (Authenticated) Remote Code Execution (Metasploit) | This is a remote exploit for php platform. Description: phpMyAdmin - 'preg_replace' (Authenticated) Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: phpMyAdmin - 'preg_replace' (Authenticated) Remote Code Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IPNetSentryX / IPNetMonitorX - Unauthorized Network Reconnaissance | This is a local exploit for linux platform. Description: IPNetSentryX / IPNetMonitorX - Unauthorized Network Reconnaissance. Author: @stake |
Analyze the security implications of: IPNetSentryX / IPNetMonitorX - Unauthorized Network Reconnaissance | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: SC 7.16 - Stack-Based Buffer Overflow | This is a local exploit for linux platform. Description: SC 7.16 - Stack-Based Buffer Overflow. Author: Juan Sacco |
Analyze the security implications of: SC 7.16 - Stack-Based Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Fuju News 1.0 - Authentication Bypass / SQL Injection | This is a webapps exploit for php platform. Description: Fuju News 1.0 - Authentication Bypass / SQL Injection. Author: snatcher |
Analyze the security implications of: Fuju News 1.0 - Authentication Bypass / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BlogMe 3.0 - 'archshow.asp?var' SQL Injection | This is a webapps exploit for asp platform. Description: BlogMe 3.0 - 'archshow.asp?var' SQL Injection. Author: gsy |
Analyze the security implications of: BlogMe 3.0 - 'archshow.asp?var' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Techno Dreams FAQ Manager 1.0 - SQL Injection | This is a webapps exploit for asp platform. Description: Techno Dreams FAQ Manager 1.0 - SQL Injection. Author: ajann |
Analyze the security implications of: Techno Dreams FAQ Manager 1.0 - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Gemtek CPE7000 / WLTCS-106 - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Gemtek CPE7000 / WLTCS-106 - Multiple Vulnerabilities. Author: Federico Ramondino |
Analyze the security implications of: Gemtek CPE7000 / WLTCS-106 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Ubiquiti Administration Portal - Remote Command Execution (via Cross-Site Request Forgery) | This is a webapps exploit for cgi platform. Description: Ubiquiti Administration Portal - Remote Command Execution (via Cross-Site Request Forgery). Author: KoreLogic |
Analyze the security implications of: Ubiquiti Administration Portal - Remote Command Execution (via Cross-Site Request Forgery) | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: KwsPHP Module jeuxflash 1.0 - 'cat' SQL Injection | This is a webapps exploit for php platform. Description: KwsPHP Module jeuxflash 1.0 - 'cat' SQL Injection. Author: Houssamix |
Analyze the security implications of: KwsPHP Module jeuxflash 1.0 - 'cat' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Job Board Software 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Job Board Software 1.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Job Board Software 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gnews Publisher .NET - SQL Injection | This is a webapps exploit for asp platform. Description: Gnews Publisher .NET - SQL Injection. Author: AlpHaNiX |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.