input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Pentacle In-Out Board 6.03 - 'newsdetailsview' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Professional Download Assistant 0.1 - SQL Injection | This is a webapps exploit for asp platform. Description: Professional Download Assistant 0.1 - SQL Injection. Author: ZoRLu |
Analyze the security implications of: Professional Download Assistant 0.1 - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Metainfo Sendmail 2.0/2.5 / MetaIP 3.1 - Upload / Execute Read Scripts | This is a remote exploit for multiple platform. Description: Metainfo Sendmail 2.0/2.5 / MetaIP 3.1 - Upload / Execute Read Scripts. Author: Jeff Forristal |
Analyze the security implications of: Metainfo Sendmail 2.0/2.5 / MetaIP 3.1 - Upload / Execute Read Scripts | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Front-End Article Manager System - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Joomla! Component Front-End Article Manager System - Arbitrary File Upload. Author: Sid3^effects |
Analyze the security implications of: Joomla! Component Front-End Article Manager System - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FoF Pretty Mail 1.1.2 - Server Side Template Injection (SSTI) | This is a webapps exploit for php platform. Description: FoF Pretty Mail 1.1.2 - Server Side Template Injection (SSTI). Author: Chokri Hammedi |
Analyze the security implications of: FoF Pretty Mail 1.1.2 - Server Side Template Injection (SSTI) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ecessa ShieldLink SL175EHQ < 10.7.4 - Cross-Site Request Forgery (Add Superuser) | This is a webapps exploit for hardware platform. Description: Ecessa ShieldLink SL175EHQ < 10.7.4 - Cross-Site Request Forgery (Add Superuser). Author: LiquidWorm |
Analyze the security implications of: Ecessa ShieldLink SL175EHQ < 10.7.4 - Cross-Site Request Forgery (Add Superuser) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component redSHOP 1.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component redSHOP 1.0 - Local File Inclusion. Author: NoGe |
Analyze the security implications of: Joomla! Component redSHOP 1.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Rosewill RSVA11001 - Remote Command Injection | This is a remote exploit for hardware platform. Description: Rosewill RSVA11001 - Remote Command Injection. Author: Eric Urban |
Analyze the security implications of: Rosewill RSVA11001 - Remote Command Injection | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Freelancer Marketplace Script - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Freelancer Marketplace Script - Arbitrary File Upload. Author: Sid3^effects |
Analyze the security implications of: Freelancer Marketplace Script - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component CCBoard - SQL Injection / Arbitrary File Upload | This is a webapps exploit for php platform. Description: Joomla! Component CCBoard - SQL Injection / Arbitrary File Upload. Author: KedAns-Dz |
Analyze the security implications of: Joomla! Component CCBoard - SQL Injection / Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FRITZ!Box 7.20 - DNS Rebinding Protection Bypass | This is a remote exploit for hardware platform. Description: FRITZ!Box 7.20 - DNS Rebinding Protection Bypass. Author: RedTeam Pentesting GmbH |
Analyze the security implications of: FRITZ!Box 7.20 - DNS Rebinding Protection Bypass | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: elFinder Web file manager Version - 2.1.53 Remote Command Execution | This is a webapps exploit for php platform. Description: elFinder Web file manager Version - 2.1.53 Remote Command Execution. Author: tmrswrr |
Analyze the security implications of: elFinder Web file manager Version - 2.1.53 Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Kleophatra 0.1.4 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Kleophatra 0.1.4 - Arbitrary File Upload. Author: Xr0b0t |
Analyze the security implications of: Kleophatra 0.1.4 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Lot Reservation Management System - Unauthenticated File Upload and Remote Code Execution | This is a webapps exploit for php platform. Description: Lot Reservation Management System - Unauthenticated File Upload and Remote Code Execution. Author: Elijah Mandila Syoyi |
Analyze the security implications of: Lot Reservation Management System - Unauthenticated File Upload and Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Airport - 802.11 Probe Response Kernel Memory Corruption (PoC) (Metasploit) | This is a dos exploit for hardware platform. Description: Apple Airport - 802.11 Probe Response Kernel Memory Corruption (PoC) (Metasploit). Author: H D Moore |
Analyze the security implications of: Apple Airport - 802.11 Probe Response Kernel Memory Corruption (PoC) (Metasploit) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: W3Mail 1.0.6 - File Disclosure | This is a webapps exploit for cgi platform. Description: W3Mail 1.0.6 - File Disclosure. Author: Tim Brown |
Analyze the security implications of: W3Mail 1.0.6 - File Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: CMS Tovar - 'tovar.php' SQL Injection | This is a webapps exploit for php platform. Description: CMS Tovar - 'tovar.php' SQL Injection. Author: jos_ali_joe |
Analyze the security implications of: CMS Tovar - 'tovar.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GetSimple CMS 3.3.16 - Persistent Cross-Site Scripting (Authenticated) | This is a webapps exploit for php platform. Description: GetSimple CMS 3.3.16 - Persistent Cross-Site Scripting (Authenticated). Author: Roel van Beurden |
Analyze the security implications of: GetSimple CMS 3.3.16 - Persistent Cross-Site Scripting (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Active News Manager - 'catID' SQL Injection | This is a webapps exploit for asp platform. Description: Active News Manager - 'catID' SQL Injection. Author: laurent gaffie |
Analyze the security implications of: Active News Manager - 'catID' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Fred N. van Kempen dip 3.3.7 - Local Buffer Overflow (2) | This is a local exploit for linux platform. Description: Fred N. van Kempen dip 3.3.7 - Local Buffer Overflow (2). Author: pr10n |
Analyze the security implications of: Fred N. van Kempen dip 3.3.7 - Local Buffer Overflow (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Escort und Begleitservice Agentur Script - SQL Injection | This is a webapps exploit for php platform. Description: Escort und Begleitservice Agentur Script - SQL Injection. Author: NoNameMT |
Analyze the security implications of: Escort und Begleitservice Agentur Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Internet Software Sciences Web+Center 4.0.1 - Cookie Object SQL Injection | This is a webapps exploit for asp platform. Description: Internet Software Sciences Web+Center 4.0.1 - Cookie Object SQL Injection. Author: Noam Rathaus |
Analyze the security implications of: Internet Software Sciences Web+Center 4.0.1 - Cookie Object SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Netscape Enterprise Server 4.1 - HTTP Method Name Buffer Overflow | This is a dos exploit for multiple platform. Description: Netscape Enterprise Server 4.1 - HTTP Method Name Buffer Overflow. Author: Robert Cardona |
Analyze the security implications of: Netscape Enterprise Server 4.1 - HTTP Method Name Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_stat_alerts.php?base_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_stat_alerts.php?base_path' Remote File Inclusion. Author: indoushka |
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_stat_alerts.php?base_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SystemTap - Local Privilege Escalation | This is a local exploit for linux platform. Description: SystemTap - Local Privilege Escalation. Author: Tavis Ormandy |
Analyze the security implications of: SystemTap - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Ajax Availability Calendar 3.x - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Ajax Availability Calendar 3.x - Multiple Vulnerabilities. Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: Ajax Availability Calendar 3.x - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GuppY 2.4 - HTML Injection | This is a webapps exploit for php platform. Description: GuppY 2.4 - HTML Injection. Author: David Suzanne |
Analyze the security implications of: GuppY 2.4 - HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 321soft PHP-Gallery 0.9 - 'index.php?path' Cross-Site Scripting | This is a webapps exploit for php platform. Description: 321soft PHP-Gallery 0.9 - 'index.php?path' Cross-Site Scripting. Author: d4igoro |
Analyze the security implications of: 321soft PHP-Gallery 0.9 - 'index.php?path' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Total.js CMS 12 - Widget JavaScript Code Injection (Metasploit) | This is a remote exploit for multiple platform. Description: Total.js CMS 12 - Widget JavaScript Code Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Total.js CMS 12 - Widget JavaScript Code Injection (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AVideo Platform 8.1 - Cross Site Request Forgery (Password Reset) | This is a webapps exploit for json platform. Description: AVideo Platform 8.1 - Cross Site Request Forgery (Password Reset). Author: Ihsan Sencan |
Analyze the security implications of: AVideo Platform 8.1 - Cross Site Request Forgery (Password Reset) | This exploit targets json systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets json platform |
What is this exploit about: EZGenerator - Local File Disclosure / Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: EZGenerator - Local File Disclosure / Cross-Site Request Forgery. Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: EZGenerator - Local File Disclosure / Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BackLinkSpider 1.1 - 'cat_id' SQL Injection | This is a webapps exploit for php platform. Description: BackLinkSpider 1.1 - 'cat_id' SQL Injection. Author: K-159 |
Analyze the security implications of: BackLinkSpider 1.1 - 'cat_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FVWM 2.4.17/2.5.8 - fvwm_make_browse_menu.sh Scripts Command Execution | This is a local exploit for linux platform. Description: FVWM 2.4.17/2.5.8 - fvwm_make_browse_menu.sh Scripts Command Execution. Author: Dominik Vogt |
Analyze the security implications of: FVWM 2.4.17/2.5.8 - fvwm_make_browse_menu.sh Scripts Command Execution | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CPCommerce 1.2.x - 'GLOBALS[prefix]' Arbitrary File Inclusion | This is a webapps exploit for php platform. Description: CPCommerce 1.2.x - 'GLOBALS[prefix]' Arbitrary File Inclusion. Author: StAkeR |
Analyze the security implications of: CPCommerce 1.2.x - 'GLOBALS[prefix]' Arbitrary File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.