input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Sybase EAServer 6.3.1 - Multiple Vulnerabilities | This is a webapps exploit for jsp platform. Description: Sybase EAServer 6.3.1 - Multiple Vulnerabilities. Author: SEC Consult |
Analyze the security implications of: Sybase EAServer 6.3.1 - Multiple Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: AWF CMS 1.11 - 'spaw_root' Remote File Inclusion | This is a webapps exploit for php platform. Description: AWF CMS 1.11 - 'spaw_root' Remote File Inclusion. Author: Federico Fazzi |
Analyze the security implications of: AWF CMS 1.11 - 'spaw_root' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP ProCurve Switch 4000M - SNMP Write Denial of Service | This is a dos exploit for hardware platform. Description: HP ProCurve Switch 4000M - SNMP Write Denial of Service. Author: FX |
Analyze the security implications of: HP ProCurve Switch 4000M - SNMP Write Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Getsimple CMS 2.01 - 'changedata.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Getsimple CMS 2.01 - 'changedata.php' Cross-Site Scripting. Author: High-Tech Bridge SA |
Analyze the security implications of: Getsimple CMS 2.01 - 'changedata.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco WLC 2504 8.9 - Denial of Service (PoC) | This is a dos exploit for hardware platform. Description: Cisco WLC 2504 8.9 - Denial of Service (PoC). Author: SecuNinja |
Analyze the security implications of: Cisco WLC 2504 8.9 - Denial of Service (PoC) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Limny 2.0 - Cross-Site Request Forgery (Create Admin User) | This is a webapps exploit for php platform. Description: Limny 2.0 - Cross-Site Request Forgery (Create Admin User). Author: Luis Santana |
Analyze the security implications of: Limny 2.0 - Cross-Site Request Forgery (Create Admin User) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 04webserver 1.42 - Multiple Vulnerabilities | This is a remote exploit for multiple platform. Description: 04webserver 1.42 - Multiple Vulnerabilities. Author: Tan Chew Keong |
Analyze the security implications of: 04webserver 1.42 - Multiple Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: HPE iLO 4 < 2.53 - Add New Administrator User | This is a remote exploit for multiple platform. Description: HPE iLO 4 < 2.53 - Add New Administrator User. Author: skelsec |
Analyze the security implications of: HPE iLO 4 < 2.53 - Add New Administrator User | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DynaTracker 1.5.1 - 'includes_handler.php?base_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: DynaTracker 1.5.1 - 'includes_handler.php?base_path' Remote File Inclusion. Author: alijsb |
Analyze the security implications of: DynaTracker 1.5.1 - 'includes_handler.php?base_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eFront 3.6.9 - 'scripts.php' Local File Inclusion | This is a webapps exploit for php platform. Description: eFront 3.6.9 - 'scripts.php' Local File Inclusion. Author: AutoSec Tools |
Analyze the security implications of: eFront 3.6.9 - 'scripts.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_xevidmegahd - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_xevidmegahd - SQL Injection. Author: EcHoLL |
Analyze the security implications of: Joomla! Component com_xevidmegahd - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sun ONE Starter Kit 2.0 / ASTAware SearchDisc 3.1 - Search Engine Directory Traversal | This is a webapps exploit for java platform. Description: Sun ONE Starter Kit 2.0 / ASTAware SearchDisc 3.1 - Search Engine Directory Traversal. Author: ET LoWNOISE |
Analyze the security implications of: Sun ONE Starter Kit 2.0 / ASTAware SearchDisc 3.1 - Search Engine Directory Traversal | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Joomla! Component JTM Reseller 1.9 Beta - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JTM Reseller 1.9 Beta - SQL Injection. Author: kaMtiEz |
Analyze the security implications of: Joomla! Component JTM Reseller 1.9 Beta - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Achievo 1.4.5 - Multiple Vulnerabilities (2) | This is a webapps exploit for php platform. Description: Achievo 1.4.5 - Multiple Vulnerabilities (2). Author: High-Tech Bridge SA |
Analyze the security implications of: Achievo 1.4.5 - Multiple Vulnerabilities (2) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Atlassian Confluence 6.15.1 - Directory Traversal | This is a webapps exploit for jsp platform. Description: Atlassian Confluence 6.15.1 - Directory Traversal. Author: max7253 |
Analyze the security implications of: Atlassian Confluence 6.15.1 - Directory Traversal | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Blackboard LMS 9.1 SP14 - Cross-Site Scripting | This is a webapps exploit for java platform. Description: Blackboard LMS 9.1 SP14 - Cross-Site Scripting. Author: Vulnerability-Lab |
Analyze the security implications of: Blackboard LMS 9.1 SP14 - Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: MySQL 6.0.4 - Empty Binary String Literal Remote Denial of Service | This is a dos exploit for linux platform. Description: MySQL 6.0.4 - Empty Binary String Literal Remote Denial of Service. Author: Kay Roepke |
Analyze the security implications of: MySQL 6.0.4 - Empty Binary String Literal Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ATutor 1.x - 'forum.inc.php' Arbitrary Command Execution | This is a webapps exploit for php platform. Description: ATutor 1.x - 'forum.inc.php' Arbitrary Command Execution. Author: Andreas Sandblad |
Analyze the security implications of: ATutor 1.x - 'forum.inc.php' Arbitrary Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: torrent-stats - 'httpd.c' Denial of Service | This is a dos exploit for linux platform. Description: torrent-stats - 'httpd.c' Denial of Service. Author: otr |
Analyze the security implications of: torrent-stats - 'httpd.c' Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CuteNews 1.3 - Comment HTML Injection | This is a webapps exploit for php platform. Description: CuteNews 1.3 - Comment HTML Injection. Author: DarkBicho |
Analyze the security implications of: CuteNews 1.3 - Comment HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CCBILL CGI - 'ccbillx.c' 'whereami.cgi' Remote Code Execution | This is a webapps exploit for cgi platform. Description: CCBILL CGI - 'ccbillx.c' 'whereami.cgi' Remote Code Execution. Author: knight420 |
Analyze the security implications of: CCBILL CGI - 'ccbillx.c' 'whereami.cgi' Remote Code Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: cPanel - (Authenticated) 'lastvisit.html Domain' Arbitrary File Disclosure | This is a remote exploit for multiple platform. Description: cPanel - (Authenticated) 'lastvisit.html Domain' Arbitrary File Disclosure. Author: SecurityRules |
Analyze the security implications of: cPanel - (Authenticated) 'lastvisit.html Domain' Arbitrary File Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Dark Hart Portal - 'login.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Dark Hart Portal - 'login.php' Remote File Inclusion. Author: CoBRa_21 |
Analyze the security implications of: Dark Hart Portal - 'login.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Lotus Domino Server 5.0.x - Directory Traversal (1) | This is a remote exploit for multiple platform. Description: Lotus Domino Server 5.0.x - Directory Traversal (1). Author: Michael Smith |
Analyze the security implications of: Lotus Domino Server 5.0.x - Directory Traversal (1) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Strapi CMS 3.0.0-beta.17.4 - Remote Code Execution (RCE) (Unauthenticated) | This is a webapps exploit for multiple platform. Description: Strapi CMS 3.0.0-beta.17.4 - Remote Code Execution (RCE) (Unauthenticated). Author: Musyoka Ian |
Analyze the security implications of: Strapi CMS 3.0.0-beta.17.4 - Remote Code Execution (RCE) (Unauthenticated) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GL.iNet AR300M v4.3.7 Arbitrary File Read - CVE-2023-46455 Exploit | This is a remote exploit for hardware platform. Description: GL.iNet AR300M v4.3.7 Arbitrary File Read - CVE-2023-46455 Exploit. Author: cyberaz0r |
Analyze the security implications of: GL.iNet AR300M v4.3.7 Arbitrary File Read - CVE-2023-46455 Exploit | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CodeIgniter 1.0 - 'BASEPATH' Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: CodeIgniter 1.0 - 'BASEPATH' Multiple Remote File Inclusions. Author: eidelweiss |
Analyze the security implications of: CodeIgniter 1.0 - 'BASEPATH' Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP Data Protector (HP-UX) - Remote Shell | This is a remote exploit for hp-ux platform. Description: HP Data Protector (HP-UX) - Remote Shell. Author: Adrian Puente Z. |
Analyze the security implications of: HP Data Protector (HP-UX) - Remote Shell | This exploit targets hp-ux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hp-ux platform |
What is this exploit about: Sagem Fast 3304-V2 - Authentication Bypass (1) | This is a webapps exploit for hardware platform. Description: Sagem Fast 3304-V2 - Authentication Bypass (1). Author: Yassin Aboukir |
Analyze the security implications of: Sagem Fast 3304-V2 - Authentication Bypass (1) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Wireshark 2.4.0 < 2.4.2 / 2.2.0 < 2.2.10 - CIP Safety Dissector Crash | This is a dos exploit for multiple platform. Description: Wireshark 2.4.0 < 2.4.2 / 2.2.0 < 2.2.10 - CIP Safety Dissector Crash. Author: Wireshark |
Analyze the security implications of: Wireshark 2.4.0 < 2.4.2 / 2.2.0 < 2.2.10 - CIP Safety Dissector Crash | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: SAP Crystal Reports - Information Disclosure | This is a webapps exploit for multiple platform. Description: SAP Crystal Reports - Information Disclosure. Author: Mohamed M.Fouad |
Analyze the security implications of: SAP Crystal Reports - Information Disclosure | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Budabot 4.0 - Denial of Service (PoC) | This is a dos exploit for linux platform. Description: Budabot 4.0 - Denial of Service (PoC). Author: Ryan Delaney |
Analyze the security implications of: Budabot 4.0 - Denial of Service (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: VU Case Manager - Authentication Bypass | This is a webapps exploit for asp platform. Description: VU Case Manager - Authentication Bypass. Author: L0rd CrusAd3r |
Analyze the security implications of: VU Case Manager - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Sparta Systems TrackWise EQms - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for java platform. Description: Sparta Systems TrackWise EQms - Multiple Cross-Site Scripting Vulnerabilities. Author: Yaniv Miron |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.