input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: CMScout 2.05 - 'bit' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ntpd 4.2.8p10 - Out-of-Bounds Read (PoC) | This is a local exploit for linux platform. Description: ntpd 4.2.8p10 - Out-of-Bounds Read (PoC). Author: Magnus Klaaborg Stubman |
Analyze the security implications of: ntpd 4.2.8p10 - Out-of-Bounds Read (PoC) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Anuko Time Tracker 1.19.23.5311 - Password Reset leading to Account Takeover | This is a webapps exploit for php platform. Description: Anuko Time Tracker 1.19.23.5311 - Password Reset leading to Account Takeover. Author: Mufaddal Masalawala |
Analyze the security implications of: Anuko Time Tracker 1.19.23.5311 - Password Reset leading to Account Takeover | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Photo Contest 1.0.2 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Photo Contest 1.0.2 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Photo Contest 1.0.2 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MasterWeb Script 1.0 - 'details&newsID' SQL Injection | This is a webapps exploit for asp platform. Description: MasterWeb Script 1.0 - 'details&newsID' SQL Injection. Author: Red-D3v1L |
Analyze the security implications of: MasterWeb Script 1.0 - 'details&newsID' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component Vik Real Estate 1.0 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Joomla! Component Vik Real Estate 1.0 - Multiple SQL Injections. Author: the_cyber_nuxbie |
Analyze the security implications of: Joomla! Component Vik Real Estate 1.0 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AirOS NanoStation M2 5.6-beta - Multiple Vulnerabilities | This is a webapps exploit for cgi platform. Description: AirOS NanoStation M2 5.6-beta - Multiple Vulnerabilities. Author: Pablo Rebolini |
Analyze the security implications of: AirOS NanoStation M2 5.6-beta - Multiple Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: NeoSys Neon Webmail for Java 5.06/5.07 - 'addrlist' Servlet Multiple SQL Injections | This is a webapps exploit for jsp platform. Description: NeoSys Neon Webmail for Java 5.06/5.07 - 'addrlist' Servlet Multiple SQL Injections. Author: Tan Chew Keong |
Analyze the security implications of: NeoSys Neon Webmail for Java 5.06/5.07 - 'addrlist' Servlet Multiple SQL Injections | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: TP-Link TL-PS110U Print Server - 'tplink-enum.py' Security Bypass | This is a remote exploit for hardware platform. Description: TP-Link TL-PS110U Print Server - 'tplink-enum.py' Security Bypass. Author: SANTHO |
Analyze the security implications of: TP-Link TL-PS110U Print Server - 'tplink-enum.py' Security Bypass | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component Odudeprofile 2.8 - 'profession' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Odudeprofile 2.8 - 'profession' SQL Injection. Author: Daniel Barragan |
Analyze the security implications of: Joomla! Component Odudeprofile 2.8 - 'profession' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apartment Visitors Management System 1.0 - 'email' SQL Injection | This is a webapps exploit for php platform. Description: Apartment Visitors Management System 1.0 - 'email' SQL Injection. Author: CANKAT ÇAKMAK |
Analyze the security implications of: Apartment Visitors Management System 1.0 - 'email' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JBS 2.0 / JBSX - Administration Panel Bypass / Arbitrary File Upload | This is a webapps exploit for asp platform. Description: JBS 2.0 / JBSX - Administration Panel Bypass / Arbitrary File Upload. Author: blackenedsecurity |
Analyze the security implications of: JBS 2.0 / JBSX - Administration Panel Bypass / Arbitrary File Upload | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Froxlor 2.0.3 Stable - Remote Code Execution (RCE) | This is a webapps exploit for php platform. Description: Froxlor 2.0.3 Stable - Remote Code Execution (RCE). Author: Askar |
Analyze the security implications of: Froxlor 2.0.3 Stable - Remote Code Execution (RCE) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sagem Routers - Remote Reset | This is a dos exploit for hardware platform. Description: Sagem Routers - Remote Reset. Author: AlpHaNiX |
Analyze the security implications of: Sagem Routers - Remote Reset | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Ezyhelpdesk 1.0 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Ezyhelpdesk 1.0 - Multiple SQL Injections. Author: r0t |
Analyze the security implications of: Ezyhelpdesk 1.0 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Thecus N5200Pro NAS Server Control Panel - Remote File Inclusion | This is a remote exploit for hardware platform. Description: Thecus N5200Pro NAS Server Control Panel - Remote File Inclusion. Author: Crackers_Child |
Analyze the security implications of: Thecus N5200Pro NAS Server Control Panel - Remote File Inclusion | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Sophos Web Appliance 4.3.0.2 - 'trafficType' Remote Command Injection (Metasploit) | This is a webapps exploit for json platform. Description: Sophos Web Appliance 4.3.0.2 - 'trafficType' Remote Command Injection (Metasploit). Author: xort |
Analyze the security implications of: Sophos Web Appliance 4.3.0.2 - 'trafficType' Remote Command Injection (Metasploit) | This exploit targets json systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets json platform |
What is this exploit about: Foafgen 0.3 - 'redir.php' Local Source Disclosure | This is a webapps exploit for php platform. Description: Foafgen 0.3 - 'redir.php' Local Source Disclosure. Author: DarkFig |
Analyze the security implications of: Foafgen 0.3 - 'redir.php' Local Source Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Advanced Guestbook 2.3.1/2.4 - 'index.php?Entry' SQL Injection | This is a webapps exploit for php platform. Description: Advanced Guestbook 2.3.1/2.4 - 'index.php?Entry' SQL Injection. Author: Spy Hat |
Analyze the security implications of: Advanced Guestbook 2.3.1/2.4 - 'index.php?Entry' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component redSHOP 1.0 - 'pid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component redSHOP 1.0 - 'pid' SQL Injection. Author: v3n0m |
Analyze the security implications of: Joomla! Component redSHOP 1.0 - 'pid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Comersus Cart 5.0/6.0 - Multiple Vulnerabilities | This is a webapps exploit for asp platform. Description: Comersus Cart 5.0/6.0 - Multiple Vulnerabilities. Author: raf somers |
Analyze the security implications of: Comersus Cart 5.0/6.0 - Multiple Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Plugin JD-WordPress 2.0-1.0 RC2 - 'wp-trackback.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Plugin JD-WordPress 2.0-1.0 RC2 - 'wp-trackback.php' Remote File Inclusion. Author: Drago84 |
Analyze the security implications of: Joomla! Plugin JD-WordPress 2.0-1.0 RC2 - 'wp-trackback.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Boy Scout Advancement 0.3 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Boy Scout Advancement 0.3 - 'id' SQL Injection. Author: YEnH4ckEr |
Analyze the security implications of: Joomla! Component Boy Scout Advancement 0.3 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dell iDRAC IPMI 1.5 - Insufficient Session ID Randomness | This is a webapps exploit for hardware platform. Description: Dell iDRAC IPMI 1.5 - Insufficient Session ID Randomness. Author: Yong Chuan_ Koh |
Analyze the security implications of: Dell iDRAC IPMI 1.5 - Insufficient Session ID Randomness | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Novell Groupwise 5.5/6.0 Servlet Gateway - Default Authentication | This is a remote exploit for novell platform. Description: Novell Groupwise 5.5/6.0 Servlet Gateway - Default Authentication. Author: Adam Gray |
Analyze the security implications of: Novell Groupwise 5.5/6.0 Servlet Gateway - Default Authentication | This exploit targets novell systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets novell platform |
What is this exploit about: Benja CMS 0.1 - '/admin/admin_edit_submenu.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Benja CMS 0.1 - '/admin/admin_edit_submenu.php' Cross-Site Scripting. Author: CWH Underground |
Analyze the security implications of: Benja CMS 0.1 - '/admin/admin_edit_submenu.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Pavuk Digest - Authentication Remote Buffer Overflow | This is a remote exploit for linux platform. Description: Pavuk Digest - Authentication Remote Buffer Overflow. Author: infamous41md |
Analyze the security implications of: Pavuk Digest - Authentication Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: awrate.com Message Board 1.0 - 'search.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: awrate.com Message Board 1.0 - 'search.php' Remote File Inclusion. Author: DeltahackingTEAM |
Analyze the security implications of: awrate.com Message Board 1.0 - 'search.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gitea 1.16.6 - Remote Code Execution (RCE) (Metasploit) | This is a webapps exploit for multiple platform. Description: Gitea 1.16.6 - Remote Code Execution (RCE) (Metasploit). Author: samguy |
Analyze the security implications of: Gitea 1.16.6 - Remote Code Execution (RCE) (Metasploit) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: iManager Plugin 1.2.8 - 'd' Arbitrary File Deletion | This is a webapps exploit for php platform. Description: iManager Plugin 1.2.8 - 'd' Arbitrary File Deletion. Author: LiquidWorm |
Analyze the security implications of: iManager Plugin 1.2.8 - 'd' Arbitrary File Deletion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component HD FLV Player - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component HD FLV Player - 'id' SQL Injection. Author: kaMtiEz |
Analyze the security implications of: Joomla! Component HD FLV Player - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Compulsive Media CNU5 - 'News.mdb' Database Disclosure | This is a webapps exploit for asp platform. Description: Compulsive Media CNU5 - 'News.mdb' Database Disclosure. Author: Security .Net Information |
Analyze the security implications of: Compulsive Media CNU5 - 'News.mdb' Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Hylafax 4.1.x - HFaxD Format String | This is a remote exploit for linux platform. Description: Hylafax 4.1.x - HFaxD Format String. Author: Sebastian Krahmer |
Analyze the security implications of: Hylafax 4.1.x - HFaxD Format String | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: delpino73 Blue-Smiley-Organizer 1.32 - 'datetime' SQL Injection | This is a webapps exploit for php platform. Description: delpino73 Blue-Smiley-Organizer 1.32 - 'datetime' SQL Injection. Author: cakes |
Analyze the security implications of: delpino73 Blue-Smiley-Organizer 1.32 - 'datetime' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.