input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Applied Watch Command Center 1.0 - Authentication Bypass (2) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component JE Video Rate 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JE Video Rate 1.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component JE Video Rate 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle 10g - SYS.KUPV$FT.ATTACH_JOB PL / SQL Injection | This is a local exploit for multiple platform. Description: Oracle 10g - SYS.KUPV$FT.ATTACH_JOB PL / SQL Injection. Author: Joxean Koret |
Analyze the security implications of: Oracle 10g - SYS.KUPV$FT.ATTACH_JOB PL / SQL Injection | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: SiteInteractive Subscribe Me - 'Setup.pl' Arbitrary Command Execution | This is a webapps exploit for cgi platform. Description: SiteInteractive Subscribe Me - 'Setup.pl' Arbitrary Command Execution. Author: Paul Craig |
Analyze the security implications of: SiteInteractive Subscribe Me - 'Setup.pl' Arbitrary Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: AWStats 6.0 < 6.2 - 'configdir' Remote Command Execution | This is a webapps exploit for cgi platform. Description: AWStats 6.0 < 6.2 - 'configdir' Remote Command Execution. Author: THUNDER |
Analyze the security implications of: AWStats 6.0 < 6.2 - 'configdir' Remote Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: B2B Marketplace Script 2.0 - SQL Injection | This is a webapps exploit for php platform. Description: B2B Marketplace Script 2.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: B2B Marketplace Script 2.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Hosting Controller 6.1 - Multiple SQL Injections | This is a webapps exploit for asp platform. Description: Hosting Controller 6.1 - Multiple SQL Injections. Author: Soroush Dalili |
Analyze the security implications of: Hosting Controller 6.1 - Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: In-portal In-Link 2.3.4 - 'ADODB_DIR.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: In-portal In-Link 2.3.4 - 'ADODB_DIR.php' Remote File Inclusion. Author: Saudi Hackrz |
Analyze the security implications of: In-portal In-Link 2.3.4 - 'ADODB_DIR.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Justin Hagstrom Auto Directory Index 1.2.3 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Justin Hagstrom Auto Directory Index 1.2.3 - Cross-Site Scripting. Author: David Sopas Ferreira |
Analyze the security implications of: Justin Hagstrom Auto Directory Index 1.2.3 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_articlemanager - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_articlemanager - SQL Injection. Author: FL0RiX |
Analyze the security implications of: Joomla! Component com_articlemanager - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Evolve Merchant - 'viewcart.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Evolve Merchant - 'viewcart.asp' SQL Injection. Author: laurent gaffie |
Analyze the security implications of: Evolve Merchant - 'viewcart.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Jetty 9.4.37.v20210219 - Information Disclosure | This is a webapps exploit for java platform. Description: Jetty 9.4.37.v20210219 - Information Disclosure. Author: Mayank Deshmukh |
Analyze the security implications of: Jetty 9.4.37.v20210219 - Information Disclosure | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Ubuntu 5.10 Installer - Password Disclosure | This is a local exploit for linux platform. Description: Ubuntu 5.10 Installer - Password Disclosure. Author: Kristian Hermansen |
Analyze the security implications of: Ubuntu 5.10 Installer - Password Disclosure | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PHP 7.0 - JsonSerializable::jsonSerialize json_encode Local Denial of Service | This is a dos exploit for php platform. Description: PHP 7.0 - JsonSerializable::jsonSerialize json_encode Local Denial of Service. Author: Yakir Wizman |
Analyze the security implications of: PHP 7.0 - JsonSerializable::jsonSerialize json_encode Local Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DotNetNuke 4.8.3 - 'Default.aspx' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: DotNetNuke 4.8.3 - 'Default.aspx' Cross-Site Scripting. Author: AmnPardaz Security Research Team |
Analyze the security implications of: DotNetNuke 4.8.3 - 'Default.aspx' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: eBay Magento 1.9.2.1 - PHP FPM XML eXternal Entity Injection | This is a webapps exploit for php platform. Description: eBay Magento 1.9.2.1 - PHP FPM XML eXternal Entity Injection. Author: Dawid Golunski |
Analyze the security implications of: eBay Magento 1.9.2.1 - PHP FPM XML eXternal Entity Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Plunet BusinessManager 4.1 - 'pagesUTF8/auftrag_job.jsp?Pfad' Direct Request Information Disclosure | This is a webapps exploit for jsp platform. Description: Plunet BusinessManager 4.1 - 'pagesUTF8/auftrag_job.jsp?Pfad' Direct Request Information Disclosure. Author: Matteo Ignaccolo |
Analyze the security implications of: Plunet BusinessManager 4.1 - 'pagesUTF8/auftrag_job.jsp?Pfad' Direct Request Information Disclosure | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Kahf Poems 1.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Kahf Poems 1.0 - Multiple Vulnerabilities. Author: Yassin Aboukir |
Analyze the security implications of: Kahf Poems 1.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EasyNews PRO News Publishing 4.0 - Password Disclosure | This is a webapps exploit for php platform. Description: EasyNews PRO News Publishing 4.0 - Password Disclosure. Author: bd0rk |
Analyze the security implications of: EasyNews PRO News Publishing 4.0 - Password Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Article Factory Manager 4.3.9 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Article Factory Manager 4.3.9 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Article Factory Manager 4.3.9 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 5.3.x 'Intl' Extension - 'NumberFormatter::setSymbol()' Denial of Service | This is a dos exploit for php platform. Description: PHP 5.3.x 'Intl' Extension - 'NumberFormatter::setSymbol()' Denial of Service. Author: thoger |
Analyze the security implications of: PHP 5.3.x 'Intl' Extension - 'NumberFormatter::setSymbol()' Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple macOS < 10.12.2 / iOS < 10.2 - '_kernelrpc_mach_port_insert_right_trap' Kernel Reference Count Leak / Use-After-Free | This is a local exploit for macos platform. Description: Apple macOS < 10.12.2 / iOS < 10.2 - '_kernelrpc_mach_port_insert_right_trap' Kernel Reference Count Leak / Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Apple macOS < 10.12.2 / iOS < 10.2 - '_kernelrpc_mach_port_insert_right_trap' Kernel Reference Count Leak / Use-After-Free | This exploit targets macos systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Citadel/UX - Remote Buffer Overflow | This is a remote exploit for linux platform. Description: Citadel/UX - Remote Buffer Overflow. Author: Nebunu |
Analyze the security implications of: Citadel/UX - Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: SheerDNS 1.0 - Information Disclosure | This is a remote exploit for linux platform. Description: SheerDNS 1.0 - Information Disclosure. Author: Jedi/Sector One |
Analyze the security implications of: SheerDNS 1.0 - Information Disclosure | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_king - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_king - Blind SQL Injection. Author: Pyske |
Analyze the security implications of: Joomla! Component com_king - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CVE-2023-50071 - Multiple SQL Injection | This is a webapps exploit for php platform. Description: CVE-2023-50071 - Multiple SQL Injection. Author: Geraldo Alcantara |
Analyze the security implications of: CVE-2023-50071 - Multiple SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Trend Micro Deep Discovery Inspector 3.8/3.7 - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: Trend Micro Deep Discovery Inspector 3.8/3.7 - Cross-Site Request Forgery. Author: hyp3rlinx |
Analyze the security implications of: Trend Micro Deep Discovery Inspector 3.8/3.7 - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Java - Web Start Double Quote Injection Remote Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Java - Web Start Double Quote Injection Remote Code Execution (Metasploit). Author: Rh0 |
Analyze the security implications of: Java - Web Start Double Quote Injection Remote Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AirDrive HD 1.6 iPad iPhone - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: AirDrive HD 1.6 iPad iPhone - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: AirDrive HD 1.6 iPad iPhone - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Loki Download Manager 2.0 - 'default.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Loki Download Manager 2.0 - 'default.asp' SQL Injection. Author: hack_912 |
Analyze the security implications of: Loki Download Manager 2.0 - 'default.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: 20/20 Applications Data Shed 1.0 - 'f-email.asp?itemID' SQL Injection | This is a webapps exploit for asp platform. Description: 20/20 Applications Data Shed 1.0 - 'f-email.asp?itemID' SQL Injection. Author: laurent gaffie |
Analyze the security implications of: 20/20 Applications Data Shed 1.0 - 'f-email.asp?itemID' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Family Project 2.x - Authentication Bypass | This is a webapps exploit for php platform. Description: Family Project 2.x - Authentication Bypass. Author: The_5p3ctrum |
Analyze the security implications of: Family Project 2.x - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BistroStays 3.0 - 'guests' SQL Injection | This is a webapps exploit for php platform. Description: BistroStays 3.0 - 'guests' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: BistroStays 3.0 - 'guests' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: appRain Quick Start Edition Core Edition Multiple 0.1.4-Alpha - Cross-Site Scripting | This is a webapps exploit for php platform. Description: appRain Quick Start Edition Core Edition Multiple 0.1.4-Alpha - Cross-Site Scripting. Author: SecPod Research |
Analyze the security implications of: appRain Quick Start Edition Core Edition Multiple 0.1.4-Alpha - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.