input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: MaxiSepet 1.0 - 'link' SQL Injection | This is a webapps exploit for asp platform. Description: MaxiSepet 1.0 - 'link' SQL Injection. Author: nukedx |
Analyze the security implications of: MaxiSepet 1.0 - 'link' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: CentOS 7.6 - 'ptrace_scope' Privilege Escalation | This is a local exploit for linux platform. Description: CentOS 7.6 - 'ptrace_scope' Privilege Escalation. Author: s4vitar |
Analyze the security implications of: CentOS 7.6 - 'ptrace_scope' Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Fortinet FortiOS < 5.6.0 - Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: Fortinet FortiOS < 5.6.0 - Cross-Site Scripting. Author: patryk_bogdan |
Analyze the security implications of: Fortinet FortiOS < 5.6.0 - Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: (GREEZLE) Global Real Estate Agent Login - Multiple SQL Injections | This is a webapps exploit for multiple platform. Description: (GREEZLE) Global Real Estate Agent Login - Multiple SQL Injections. Author: L0rd CrusAd3r |
Analyze the security implications of: (GREEZLE) Global Real Estate Agent Login - Multiple SQL Injections | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: RASPcalendar 1.01 (ASP) - Admin Login | This is a webapps exploit for asp platform. Description: RASPcalendar 1.01 (ASP) - Admin Login. Author: Hackeri-AL UAH-Crew |
Analyze the security implications of: RASPcalendar 1.01 (ASP) - Admin Login | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Active Web Mail 4 - Blind SQL Injection | This is a webapps exploit for asp platform. Description: Active Web Mail 4 - Blind SQL Injection. Author: R3d-D3V!L |
Analyze the security implications of: Active Web Mail 4 - Blind SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: eCom Cart 1.3 - SQL Injection | This is a webapps exploit for php platform. Description: eCom Cart 1.3 - SQL Injection. Author: Alperen Eymen Ozcan |
Analyze the security implications of: eCom Cart 1.3 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DataEase 2.4.0 - Database Configuration Information Exposure | This is a webapps exploit for java platform. Description: DataEase 2.4.0 - Database Configuration Information Exposure. Author: ByteHunter |
Analyze the security implications of: DataEase 2.4.0 - Database Configuration Information Exposure | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: EZPX Photoblog 1.2 Beta - Remote File Inclusion | This is a webapps exploit for php platform. Description: EZPX Photoblog 1.2 Beta - Remote File Inclusion. Author: sh00t0ut |
Analyze the security implications of: EZPX Photoblog 1.2 Beta - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenBSD 4.2 - 'rtlabel_id2name()' Local Null Pointer Dereference Denial of Service | This is a dos exploit for bsd platform. Description: OpenBSD 4.2 - 'rtlabel_id2name()' Local Null Pointer Dereference Denial of Service. Author: Hunger |
Analyze the security implications of: OpenBSD 4.2 - 'rtlabel_id2name()' Local Null Pointer Dereference Denial of Service | This exploit targets bsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: ImageVue 0.16.1 - 'readfolder.php?path' Arbitrary Directory Listing | This is a webapps exploit for php platform. Description: ImageVue 0.16.1 - 'readfolder.php?path' Arbitrary Directory Listing. Author: zjieb |
Analyze the security implications of: ImageVue 0.16.1 - 'readfolder.php?path' Arbitrary Directory Listing | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ClicShopping v3.402 - Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: ClicShopping v3.402 - Cross-Site Scripting (XSS). Author: nu11secur1ty |
Analyze the security implications of: ClicShopping v3.402 - Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: cPanel 11.x - 'fileop' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: cPanel 11.x - 'fileop' Multiple Cross-Site Scripting Vulnerabilities. Author: RENO |
Analyze the security implications of: cPanel 11.x - 'fileop' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SolarWinds Orion Network Performance Monitor (NPM) 10.1 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for asp platform. Description: SolarWinds Orion Network Performance Monitor (NPM) 10.1 - Multiple Cross-Site Scripting Vulnerabilities. Author: x0skel |
Analyze the security implications of: SolarWinds Orion Network Performance Monitor (NPM) 10.1 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: WebKit JSC - 'arrayProtoFuncSplice' Uninitialized Memory Reference | This is a dos exploit for multiple platform. Description: WebKit JSC - 'arrayProtoFuncSplice' Uninitialized Memory Reference. Author: Google Security Research |
Analyze the security implications of: WebKit JSC - 'arrayProtoFuncSplice' Uninitialized Memory Reference | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: eyeos 1.9.0.2 - Persistent Cross-Site Scripting Using Image Files | This is a webapps exploit for php platform. Description: eyeos 1.9.0.2 - Persistent Cross-Site Scripting Using Image Files. Author: Alberto Ortega |
Analyze the security implications of: eyeos 1.9.0.2 - Persistent Cross-Site Scripting Using Image Files | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sickbeard 0.1 - Cross-Site Request Forgery (Disable Authentication) | This is a webapps exploit for multiple platform. Description: Sickbeard 0.1 - Cross-Site Request Forgery (Disable Authentication). Author: bdrake |
Analyze the security implications of: Sickbeard 0.1 - Cross-Site Request Forgery (Disable Authentication) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Google Android - libstagefright Integer Overflow Remote Code Execution | This is a remote exploit for android platform. Description: Google Android - libstagefright Integer Overflow Remote Code Execution. Author: Google Security Research |
Analyze the security implications of: Google Android - libstagefright Integer Overflow Remote Code Execution | This exploit targets android systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: AdaptCMS 3.0.3 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: AdaptCMS 3.0.3 - Multiple Vulnerabilities. Author: LiquidWorm |
Analyze the security implications of: AdaptCMS 3.0.3 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple QuickTime < 7.2 - SMIL Remote Integer Overflow | This is a dos exploit for multiple platform. Description: Apple QuickTime < 7.2 - SMIL Remote Integer Overflow. Author: David Vaartjes |
Analyze the security implications of: Apple QuickTime < 7.2 - SMIL Remote Integer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ProWeb Design - SQL Injection | This is a webapps exploit for multiple platform. Description: ProWeb Design - SQL Injection. Author: cyberlog |
Analyze the security implications of: ProWeb Design - SQL Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Aptis Software TotalBill 3.0 - Remote Command Execution | This is a remote exploit for linux platform. Description: Aptis Software TotalBill 3.0 - Remote Command Execution. Author: Brian Masney |
Analyze the security implications of: Aptis Software TotalBill 3.0 - Remote Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Greg Matthews - 'Classifieds.cgi' 1.0 Hidden Variable | This is a remote exploit for cgi platform. Description: Greg Matthews - 'Classifieds.cgi' 1.0 Hidden Variable. Author: anonymous |
Analyze the security implications of: Greg Matthews - 'Classifieds.cgi' 1.0 Hidden Variable | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: WebKit JSC - 'BytecodeGenerator::emitGetByVal' Incorrect Optimization (1) | This is a dos exploit for multiple platform. Description: WebKit JSC - 'BytecodeGenerator::emitGetByVal' Incorrect Optimization (1). Author: Google Security Research |
Analyze the security implications of: WebKit JSC - 'BytecodeGenerator::emitGetByVal' Incorrect Optimization (1) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: PrinterOn Enterprise 4.1.4 - Arbitrary File Deletion | This is a webapps exploit for multiple platform. Description: PrinterOn Enterprise 4.1.4 - Arbitrary File Deletion. Author: bzyo |
Analyze the security implications of: PrinterOn Enterprise 4.1.4 - Arbitrary File Deletion | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: IBM DB2 - 'db2start' Format String Arbitrary Code Execution | This is a local exploit for linux platform. Description: IBM DB2 - 'db2start' Format String Arbitrary Code Execution. Author: SNOSoft |
Analyze the security implications of: IBM DB2 - 'db2start' Format String Arbitrary Code Execution | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Plugin XCloner Backup 3.5.3 - Local File Inclusion (Authenticated) | This is a webapps exploit for php platform. Description: Joomla! Plugin XCloner Backup 3.5.3 - Local File Inclusion (Authenticated). Author: Mehmet Kelepçe |
Analyze the security implications of: Joomla! Plugin XCloner Backup 3.5.3 - Local File Inclusion (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel - 'AF_PACKET' Use-After-Free (2) | This is a dos exploit for linux platform. Description: Linux Kernel - 'AF_PACKET' Use-After-Free (2). Author: SecuriTeam |
Analyze the security implications of: Linux Kernel - 'AF_PACKET' Use-After-Free (2) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Juniper Junos 8.5/9.0 J-Web Interface - 'scripter.php' Multiple Cross-Site Scripting Vulnerabilities | This is a remote exploit for hardware platform. Description: Juniper Junos 8.5/9.0 J-Web Interface - 'scripter.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Amir Azam |
Analyze the security implications of: Juniper Junos 8.5/9.0 J-Web Interface - 'scripter.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Sterlite SAM300 AX Router - 'Stat_Radio' Cross-Site Scripting | This is a remote exploit for hardware platform. Description: Sterlite SAM300 AX Router - 'Stat_Radio' Cross-Site Scripting. Author: Karn Ganeshen |
Analyze the security implications of: Sterlite SAM300 AX Router - 'Stat_Radio' Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Mantis Bug Tracker 0.x - New Account Signup Mass Emailing | This is a webapps exploit for php platform. Description: Mantis Bug Tracker 0.x - New Account Signup Mass Emailing. Author: Jose Antonio |
Analyze the security implications of: Mantis Bug Tracker 0.x - New Account Signup Mass Emailing | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WordPress Plugin Ninja Forms 2.9.36 < 2.9.42 - File Upload (Metasploit) | This is a webapps exploit for multiple platform. Description: WordPress Plugin Ninja Forms 2.9.36 < 2.9.42 - File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: WordPress Plugin Ninja Forms 2.9.36 < 2.9.42 - File Upload (Metasploit) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: EgavilanMedia User Registration & Login System with Admin Panel Exploit - SQLi Auth Bypass | This is a webapps exploit for php platform. Description: EgavilanMedia User Registration & Login System with Admin Panel Exploit - SQLi Auth Bypass. Author: Kislay Kumar |
Analyze the security implications of: EgavilanMedia User Registration & Login System with Admin Panel Exploit - SQLi Auth Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Claroline 1.10 - Multiple HTML Injection Vulnerabilities | This is a webapps exploit for php platform. Description: Claroline 1.10 - Multiple HTML Injection Vulnerabilities. Author: AutoSec Tools |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.