input
stringlengths 39
228
| output
stringlengths 32
324
|
|---|---|
What is this exploit about: Community Link Pro - 'login.cgi?File' Remote Command Execution
|
This is a webapps exploit for cgi platform. Description: Community Link Pro - 'login.cgi?File' Remote Command Execution. Author: spher3
|
Analyze the security implications of: Community Link Pro - 'login.cgi?File' Remote Command Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Ivanti Connect Secure 22.7R2.5 - Remote Code Execution (RCE)
|
This is a remote exploit for multiple platform. Description: Ivanti Connect Secure 22.7R2.5 - Remote Code Execution (RCE). Author: Abdualhadi khalifa
|
Analyze the security implications of: Ivanti Connect Secure 22.7R2.5 - Remote Code Execution (RCE)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: dotDefender 4.02 - 'clave' Cross-Site Scripting
|
This is a webapps exploit for java platform. Description: dotDefender 4.02 - 'clave' Cross-Site Scripting. Author: David K
|
Analyze the security implications of: dotDefender 4.02 - 'clave' Cross-Site Scripting
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: JioFi 4G M2S 1.0.2 - 'mask' Cross-Site Scripting
|
This is a webapps exploit for hardware platform. Description: JioFi 4G M2S 1.0.2 - 'mask' Cross-Site Scripting. Author: Vikas Chaudhary
|
Analyze the security implications of: JioFi 4G M2S 1.0.2 - 'mask' Cross-Site Scripting
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: ISDN4Linux 3.1 - IPPPD Device String SysLog Format String (2)
|
This is a local exploit for linux platform. Description: ISDN4Linux 3.1 - IPPPD Device String SysLog Format String (2). Author: TESO Security
|
Analyze the security implications of: ISDN4Linux 3.1 - IPPPD Device String SysLog Format String (2)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: SGI IRIX 6.2 - '/usr/lib/netaddpr' Local Privilege Escalation
|
This is a local exploit for irix platform. Description: SGI IRIX 6.2 - '/usr/lib/netaddpr' Local Privilege Escalation. Author: Jaechul Choe
|
Analyze the security implications of: SGI IRIX 6.2 - '/usr/lib/netaddpr' Local Privilege Escalation
|
This exploit targets irix systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets irix platform
|
What is this exploit about: Joomla! Component PAX Gallery 0.1 - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component PAX Gallery 0.1 - Blind SQL Injection. Author: XaDoS
|
Analyze the security implications of: Joomla! Component PAX Gallery 0.1 - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Portable OpenSSH 3.6.1p-PAM/4.1-SuSE - Timing Attack
|
This is a remote exploit for multiple platform. Description: Portable OpenSSH 3.6.1p-PAM/4.1-SuSE - Timing Attack. Author: Marco Ivaldi
|
Analyze the security implications of: Portable OpenSSH 3.6.1p-PAM/4.1-SuSE - Timing Attack
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Article Friendly Pro/Standard - SQL Injection
|
This is a webapps exploit for php platform. Description: Article Friendly Pro/Standard - SQL Injection. Author: Mr.SQL
|
Analyze the security implications of: Article Friendly Pro/Standard - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Jenkins 2.235.3 - 'X-Forwarded-For' Stored XSS
|
This is a webapps exploit for java platform. Description: Jenkins 2.235.3 - 'X-Forwarded-For' Stored XSS. Author: gx1
|
Analyze the security implications of: Jenkins 2.235.3 - 'X-Forwarded-For' Stored XSS
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Libnemesi 0.6.4-rc1 - Multiple Remote Buffer Overflow Vulnerabilities
|
This is a dos exploit for multiple platform. Description: Libnemesi 0.6.4-rc1 - Multiple Remote Buffer Overflow Vulnerabilities. Author: Luigi Auriemma
|
Analyze the security implications of: Libnemesi 0.6.4-rc1 - Multiple Remote Buffer Overflow Vulnerabilities
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Serv-U FTP Server < 15.1.7 - Local Privilege Escalation (1)
|
This is a local exploit for linux platform. Description: Serv-U FTP Server < 15.1.7 - Local Privilege Escalation (1). Author: Guy Levin
|
Analyze the security implications of: Serv-U FTP Server < 15.1.7 - Local Privilege Escalation (1)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Invision Power Board 2.0 - 'index.php' Post Action SQL Injection
|
This is a webapps exploit for php platform. Description: Invision Power Board 2.0 - 'index.php' Post Action SQL Injection. Author: anonymous
|
Analyze the security implications of: Invision Power Board 2.0 - 'index.php' Post Action SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HelpDEZK 1.1.1 - Cross-Site Request Forgery / Code Execution
|
This is a webapps exploit for php platform. Description: HelpDEZK 1.1.1 - Cross-Site Request Forgery / Code Execution. Author: rungga_reksya
|
Analyze the security implications of: HelpDEZK 1.1.1 - Cross-Site Request Forgery / Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Back-End CMS 0.7.2.2 - 'BE_config.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Back-End CMS 0.7.2.2 - 'BE_config.php' Remote File Inclusion. Author: Kacper
|
Analyze the security implications of: Back-End CMS 0.7.2.2 - 'BE_config.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ONO Hitron CDE-30364 Router - Denial of Service
|
This is a dos exploit for hardware platform. Description: ONO Hitron CDE-30364 Router - Denial of Service. Author: Matias Mingorance Svensson
|
Analyze the security implications of: ONO Hitron CDE-30364 Router - Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: HIOX Banner Rotator 1.3 - 'hm' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: HIOX Banner Rotator 1.3 - 'hm' Remote File Inclusion. Author: Ghost Hacker
|
Analyze the security implications of: HIOX Banner Rotator 1.3 - 'hm' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Campsite 2.6.1 - 'ArticleType.php?g_documentRoot' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'ArticleType.php?g_documentRoot' Remote File Inclusion. Author: anonymous
|
Analyze the security implications of: Campsite 2.6.1 - 'ArticleType.php?g_documentRoot' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: eBlog 1.7 - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: eBlog 1.7 - Multiple SQL Injections. Author: Salvatore Fresta
|
Analyze the security implications of: eBlog 1.7 - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: iClone - SQL Injection
|
This is a webapps exploit for asp platform. Description: iClone - SQL Injection. Author: Sid3^effects
|
Analyze the security implications of: iClone - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Component Address Book 1.5.0 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component Address Book 1.5.0 - Local File Inclusion. Author: AntiSecurity
|
Analyze the security implications of: Joomla! Component Address Book 1.5.0 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Live Ticker 1.0 - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Live Ticker 1.0 - Blind SQL Injection. Author: boom3rang
|
Analyze the security implications of: Joomla! Component Live Ticker 1.0 - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: e-moBLOG 1.3 - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: e-moBLOG 1.3 - Multiple SQL Injections. Author: Aliaksandr Hartsuyeu
|
Analyze the security implications of: e-moBLOG 1.3 - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: oneSCHOOL - 'admin/login.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: oneSCHOOL - 'admin/login.asp' SQL Injection. Author: Guga360
|
Analyze the security implications of: oneSCHOOL - 'admin/login.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Igloo 0.1.9 - 'Wiki.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Igloo 0.1.9 - 'Wiki.php' Remote File Inclusion. Author: Kacper
|
Analyze the security implications of: Igloo 0.1.9 - 'Wiki.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Postbird 0.8.4 - Javascript Injection
|
This is a webapps exploit for multiple platform. Description: Postbird 0.8.4 - Javascript Injection. Author: Debshubra Chakraborty
|
Analyze the security implications of: Postbird 0.8.4 - Javascript Injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Bharat Mediratta Gallery 1.x - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Bharat Mediratta Gallery 1.x - Remote File Inclusion. Author: PowerTech
|
Analyze the security implications of: Bharat Mediratta Gallery 1.x - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dan Bernstein QMail 1.0 3 - RCPT Denial of Service (2)
|
This is a dos exploit for linux platform. Description: Dan Bernstein QMail 1.0 3 - RCPT Denial of Service (2). Author: Wietse Venema
|
Analyze the security implications of: Dan Bernstein QMail 1.0 3 - RCPT Denial of Service (2)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: calacode @mail webmail system 3.52 - Multiple Vulnerabilities
|
This is a webapps exploit for cgi platform. Description: calacode @mail webmail system 3.52 - Multiple Vulnerabilities. Author: Nick Gudov
|
Analyze the security implications of: calacode @mail webmail system 3.52 - Multiple Vulnerabilities
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Tenda HG6 v3.3.0 - Remote Command Injection
|
This is a remote exploit for hardware platform. Description: Tenda HG6 v3.3.0 - Remote Command Injection. Author: LiquidWorm
|
Analyze the security implications of: Tenda HG6 v3.3.0 - Remote Command Injection
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: X-Chat 1.2/1.3/1.4/1.5 - Command Execution via URLs
|
This is a remote exploit for linux platform. Description: X-Chat 1.2/1.3/1.4/1.5 - Command Execution via URLs. Author: zenith parsec
|
Analyze the security implications of: X-Chat 1.2/1.3/1.4/1.5 - Command Execution via URLs
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: DomainMod 4.09.03 - 'oid' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: DomainMod 4.09.03 - 'oid' Cross-Site Scripting. Author: longer
|
Analyze the security implications of: DomainMod 4.09.03 - 'oid' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mambo Componen phpBB 1.2.4 - Multiple Remote File Inclusions
|
This is a webapps exploit for php platform. Description: Mambo Componen phpBB 1.2.4 - Multiple Remote File Inclusions. Author: h4ntu
|
Analyze the security implications of: Mambo Componen phpBB 1.2.4 - Multiple Remote File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Codoforum 4.8.3 - 'input_txt' Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Codoforum 4.8.3 - 'input_txt' Persistent Cross-Site Scripting. Author: Vyshnav nk
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.