input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Invision Gallery 2.0.7 - 'index.php?IMG' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cobub Razor 0.7.2 - Add New Superuser Account | This is a webapps exploit for php platform. Description: Cobub Razor 0.7.2 - Add New Superuser Account. Author: ppb |
Analyze the security implications of: Cobub Razor 0.7.2 - Add New Superuser Account | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX Server 10.0 - Overload | This is a local exploit for osx platform. Description: Apple Mac OSX Server 10.0 - Overload. Author: Juergen Schmidt |
Analyze the security implications of: Apple Mac OSX Server 10.0 - Overload | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: AJ Shopping Cart 1.0 (maincatid) - SQL Injection | This is a webapps exploit for php platform. Description: AJ Shopping Cart 1.0 (maincatid) - SQL Injection. Author: v3n0m |
Analyze the security implications of: AJ Shopping Cart 1.0 (maincatid) - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FuseTalk Forum 4.0 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for cfm platform. Description: FuseTalk Forum 4.0 - Multiple Cross-Site Scripting Vulnerabilities. Author: steven |
Analyze the security implications of: FuseTalk Forum 4.0 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets cfm systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cfm platform |
What is this exploit about: audioCMS arash 0.1.4 - 'arashlib_dir' Remote File Inclusion | This is a webapps exploit for php platform. Description: audioCMS arash 0.1.4 - 'arashlib_dir' Remote File Inclusion. Author: GoLd_M |
Analyze the security implications of: audioCMS arash 0.1.4 - 'arashlib_dir' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Liquid War 5.4.5/5.5.6 - HOME Environment Variable Buffer Overflow | This is a remote exploit for linux platform. Description: Liquid War 5.4.5/5.5.6 - HOME Environment Variable Buffer Overflow. Author: Angelo Rosiello |
Analyze the security implications of: Liquid War 5.4.5/5.5.6 - HOME Environment Variable Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Cisco Firepower Threat Management Console 6.0.1 - Local File Inclusion | This is a webapps exploit for cgi platform. Description: Cisco Firepower Threat Management Console 6.0.1 - Local File Inclusion. Author: KoreLogic |
Analyze the security implications of: Cisco Firepower Threat Management Console 6.0.1 - Local File Inclusion | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Booking Centre 2.01 - 'HotelID' SQL Injection | This is a webapps exploit for php platform. Description: Booking Centre 2.01 - 'HotelID' SQL Injection. Author: R3d-D3V!L |
Analyze the security implications of: Booking Centre 2.01 - 'HotelID' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MiniUPnPd 1.0 - Remote Stack Buffer Overflow Remote Code Execution (Metasploit) | This is a remote exploit for linux platform. Description: MiniUPnPd 1.0 - Remote Stack Buffer Overflow Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: MiniUPnPd 1.0 - Remote Stack Buffer Overflow Remote Code Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: glossword 1.8.12 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: glossword 1.8.12 - Multiple Vulnerabilities. Author: AkaStep |
Analyze the security implications of: glossword 1.8.12 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Azeno CMS - SQL Injection | This is a webapps exploit for php platform. Description: Azeno CMS - SQL Injection. Author: DevilZ TM |
Analyze the security implications of: Azeno CMS - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Excitemedia CMS - SQL Injection | This is a webapps exploit for php platform. Description: Excitemedia CMS - SQL Injection. Author: Dr.0rYX & Cr3W-DZ |
Analyze the security implications of: Excitemedia CMS - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Collabtive 1.1 - 'managetimetracker.php' SQL Injection | This is a webapps exploit for php platform. Description: Collabtive 1.1 - 'managetimetracker.php' SQL Injection. Author: Yogesh Phadtare |
Analyze the security implications of: Collabtive 1.1 - 'managetimetracker.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DotCMS 20.11 - Stored Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: DotCMS 20.11 - Stored Cross-Site Scripting. Author: Hardik Solanki |
Analyze the security implications of: DotCMS 20.11 - Stored Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Anchor CMS 0.12.7 - Stored Cross Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Anchor CMS 0.12.7 - Stored Cross Site Scripting (XSS). Author: /bin/neko |
Analyze the security implications of: Anchor CMS 0.12.7 - Stored Cross Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: KodExplorer 4.49 - CSRF to Arbitrary File Upload | This is a webapps exploit for php platform. Description: KodExplorer 4.49 - CSRF to Arbitrary File Upload. Author: Mr Empy |
Analyze the security implications of: KodExplorer 4.49 - CSRF to Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: cPanel 5.0 - 'Openwebmail' Local Privilege Escalation | This is a local exploit for linux platform. Description: cPanel 5.0 - 'Openwebmail' Local Privilege Escalation. Author: deadbeat |
Analyze the security implications of: cPanel 5.0 - 'Openwebmail' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ISC BIND 8.3.x - OPT Record Large UDP Denial of Service | This is a dos exploit for linux platform. Description: ISC BIND 8.3.x - OPT Record Large UDP Denial of Service. Author: spybreak |
Analyze the security implications of: ISC BIND 8.3.x - OPT Record Large UDP Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: XAMPP - Insecure Default Password Disclosure | This is a dos exploit for multiple platform. Description: XAMPP - Insecure Default Password Disclosure. Author: Morning Wood |
Analyze the security implications of: XAMPP - Insecure Default Password Disclosure | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: MySQL 4.1.18/5.0.20 - Local/Remote Information Leakage | This is a remote exploit for linux platform. Description: MySQL 4.1.18/5.0.20 - Local/Remote Information Leakage. Author: Stefano Di Paola |
Analyze the security implications of: MySQL 4.1.18/5.0.20 - Local/Remote Information Leakage | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: TP-Link TL-WR1043N Router - Cross-Site Request Forgery | This is a remote exploit for hardware platform. Description: TP-Link TL-WR1043N Router - Cross-Site Request Forgery. Author: Jacob Holcomb |
Analyze the security implications of: TP-Link TL-WR1043N Router - Cross-Site Request Forgery | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Oracle Application Server Portal 10g - Authentication Bypass | This is a remote exploit for multiple platform. Description: Oracle Application Server Portal 10g - Authentication Bypass. Author: Deniz Cevik |
Analyze the security implications of: Oracle Application Server Portal 10g - Authentication Bypass | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FreeBSD - Telnet Service Encryption Key ID Buffer Overflow (Metasploit) | This is a remote exploit for bsd platform. Description: FreeBSD - Telnet Service Encryption Key ID Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: FreeBSD - Telnet Service Encryption Key ID Buffer Overflow (Metasploit) | This exploit targets bsd systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: IBM Lotus Domino iCalendar - Email Address Stack Buffer Overflow | This is a remote exploit for multiple platform. Description: IBM Lotus Domino iCalendar - Email Address Stack Buffer Overflow. Author: A. Plaskett |
Analyze the security implications of: IBM Lotus Domino iCalendar - Email Address Stack Buffer Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: OSSEC 2.8 - 'hosts.deny' Local Privilege Escalation | This is a local exploit for linux platform. Description: OSSEC 2.8 - 'hosts.deny' Local Privilege Escalation. Author: skynet-13 |
Analyze the security implications of: OSSEC 2.8 - 'hosts.deny' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CentOS Control Web Panel 0.9.8.838 - User Enumeration | This is a webapps exploit for linux platform. Description: CentOS Control Web Panel 0.9.8.838 - User Enumeration. Author: Pongtorn Angsuchotmetee_ Nissana Sirijirakal_ Narin Boonwasanarak |
Analyze the security implications of: CentOS Control Web Panel 0.9.8.838 - User Enumeration | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Messagerie 1.0 - Arbitrary User Removal Denial of Service | This is a dos exploit for php platform. Description: Messagerie 1.0 - Arbitrary User Removal Denial of Service. Author: frog |
Analyze the security implications of: Messagerie 1.0 - Arbitrary User Removal Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Solaris /bin/login (SPARC/x86) - Remote Code Execution | This is a remote exploit for linux_sparc platform. Description: Solaris /bin/login (SPARC/x86) - Remote Code Execution. Author: Teso |
Analyze the security implications of: Solaris /bin/login (SPARC/x86) - Remote Code Execution | This exploit targets linux_sparc systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux_sparc platform |
What is this exploit about: ZKTeco ZKAccess Security System 5.3.1 - Persistent Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: ZKTeco ZKAccess Security System 5.3.1 - Persistent Cross-Site Scripting. Author: LiquidWorm |
Analyze the security implications of: ZKTeco ZKAccess Security System 5.3.1 - Persistent Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: ActiveTrade 2.0 - 'default.asp' Blind SQL Injection | This is a webapps exploit for asp platform. Description: ActiveTrade 2.0 - 'default.asp' Blind SQL Injection. Author: Hussin X |
Analyze the security implications of: ActiveTrade 2.0 - 'default.asp' Blind SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: AppSmith 1.47 - Remote Code Execution (RCE) | This is a webapps exploit for java platform. Description: AppSmith 1.47 - Remote Code Execution (RCE). Author: Nishanth Gaddam |
Analyze the security implications of: AppSmith 1.47 - Remote Code Execution (RCE) | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Cacti 0.8.7 (RedHat High Performance Computing [HPC]) - 'utilities.php?Filter' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Cacti 0.8.7 (RedHat High Performance Computing [HPC]) - 'utilities.php?Filter' Cross-Site Scripting. Author: Marc Schoenefeld |
Analyze the security implications of: Cacti 0.8.7 (RedHat High Performance Computing [HPC]) - 'utilities.php?Filter' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Newspost 2.0/2.1 - Remote Buffer Overflow | This is a dos exploit for linux platform. Description: Newspost 2.0/2.1 - Remote Buffer Overflow. Author: Niels Heinen |
Analyze the security implications of: Newspost 2.0/2.1 - Remote Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.