input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: IRIS Citations Management Tool - (Authenticated) Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PDFunite 0.41.0 - '.pdf' Local Buffer Overflow
|
This is a dos exploit for linux platform. Description: PDFunite 0.41.0 - '.pdf' Local Buffer Overflow. Author: Hamm3r.py
|
Analyze the security implications of: PDFunite 0.41.0 - '.pdf' Local Buffer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component JE Photo Gallery 1.1 - 'categoryid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component JE Photo Gallery 1.1 - 'categoryid' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component JE Photo Gallery 1.1 - 'categoryid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple macOS/iOS - Memory Corruption Due to Bad Bounds Checking in NSCharacterSet Coding for NSKeyedUnarchiver
|
This is a dos exploit for multiple platform. Description: Apple macOS/iOS - Memory Corruption Due to Bad Bounds Checking in NSCharacterSet Coding for NSKeyedUnarchiver. Author: Google Security Research
|
Analyze the security implications of: Apple macOS/iOS - Memory Corruption Due to Bad Bounds Checking in NSCharacterSet Coding for NSKeyedUnarchiver
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: NetBSD 5.0 - Hack GENOCIDE Environment Overflow (PoC)
|
This is a dos exploit for netbsd_x86 platform. Description: NetBSD 5.0 - Hack GENOCIDE Environment Overflow (PoC). Author: JMIT
|
Analyze the security implications of: NetBSD 5.0 - Hack GENOCIDE Environment Overflow (PoC)
|
This exploit targets netbsd_x86 systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets netbsd_x86 platform
|
What is this exploit about: FS OLX Clone - 'catg_id' SQL Injection
|
This is a webapps exploit for php platform. Description: FS OLX Clone - 'catg_id' SQL Injection. Author: 8bitsec
|
Analyze the security implications of: FS OLX Clone - 'catg_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: lustig.cms Beta 2.5 - 'forum.php?view' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: lustig.cms Beta 2.5 - 'forum.php?view' Remote File Inclusion. Author: GoLd_M
|
Analyze the security implications of: lustig.cms Beta 2.5 - 'forum.php?view' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Freenews 1.1 - 'Aff_News.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Freenews 1.1 - 'Aff_News.php' Remote File Inclusion. Author: MoHaNdKo
|
Analyze the security implications of: Freenews 1.1 - 'Aff_News.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Foojan Wms 1.0 - 'story' SQL Injection
|
This is a webapps exploit for php platform. Description: Foojan Wms 1.0 - 'story' SQL Injection. Author: Khashayar Fereidani
|
Analyze the security implications of: Foojan Wms 1.0 - 'story' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AWStats 5.x/6.x - Debug Remote Information Disclosure
|
This is a webapps exploit for cgi platform. Description: AWStats 5.x/6.x - Debug Remote Information Disclosure. Author: GHC
|
Analyze the security implications of: AWStats 5.x/6.x - Debug Remote Information Disclosure
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: LiteSpeed Web Server Enterprise 5.4.11 - Command Injection (Authenticated)
|
This is a webapps exploit for php platform. Description: LiteSpeed Web Server Enterprise 5.4.11 - Command Injection (Authenticated). Author: SunCSR
|
Analyze the security implications of: LiteSpeed Web Server Enterprise 5.4.11 - Command Injection (Authenticated)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HP OpenView Network Node Manager 7.53 - Multiple Vulnerabilities
|
This is a remote exploit for multiple platform. Description: HP OpenView Network Node Manager 7.53 - Multiple Vulnerabilities. Author: Luigi Auriemma
|
Analyze the security implications of: HP OpenView Network Node Manager 7.53 - Multiple Vulnerabilities
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Cisco Firepower Threat Management Console 6.0.1 - Remote Command Execution
|
This is a webapps exploit for cgi platform. Description: Cisco Firepower Threat Management Console 6.0.1 - Remote Command Execution. Author: KoreLogic
|
Analyze the security implications of: Cisco Firepower Threat Management Console 6.0.1 - Remote Command Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: LoveCMS 1.6.2 Final (Download Manager 1.0) - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: LoveCMS 1.6.2 Final (Download Manager 1.0) - Arbitrary File Upload. Author: cOndemned
|
Analyze the security implications of: LoveCMS 1.6.2 Final (Download Manager 1.0) - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cisco Catalyst 3500 XL - Arbitrary Command Execution
|
This is a remote exploit for hardware platform. Description: Cisco Catalyst 3500 XL - Arbitrary Command Execution. Author: blackangels
|
Analyze the security implications of: Cisco Catalyst 3500 XL - Arbitrary Command Execution
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Mambo 4.6.5 - 'index.php' Cross-Site Request Forgery
|
This is a webapps exploit for php platform. Description: Mambo 4.6.5 - 'index.php' Cross-Site Request Forgery. Author: Caddy-Dz
|
Analyze the security implications of: Mambo 4.6.5 - 'index.php' Cross-Site Request Forgery
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mozilla Firefox 2.0.9 - 'view-source:' Scheme Information Disclosure
|
This is a remote exploit for linux platform. Description: Mozilla Firefox 2.0.9 - 'view-source:' Scheme Information Disclosure. Author: Ronald van den Heetkamp
|
Analyze the security implications of: Mozilla Firefox 2.0.9 - 'view-source:' Scheme Information Disclosure
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: AskPert - Authentication Bypass
|
This is a webapps exploit for php platform. Description: AskPert - Authentication Bypass. Author: TR-ShaRk
|
Analyze the security implications of: AskPert - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: D-Link DIR-8xx Routers - Local Firmware Upload
|
This is a webapps exploit for hardware platform. Description: D-Link DIR-8xx Routers - Local Firmware Upload. Author: embedi
|
Analyze the security implications of: D-Link DIR-8xx Routers - Local Firmware Upload
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: T-Soft E-Commerce 4 - SQLi (Authenticated)
|
This is a webapps exploit for multiple platform. Description: T-Soft E-Commerce 4 - SQLi (Authenticated). Author: Alperen Ergel
|
Analyze the security implications of: T-Soft E-Commerce 4 - SQLi (Authenticated)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Manage Engine Exchange Reporter Plus - Remote Code Execution (Metasploit)
|
This is a remote exploit for java platform. Description: Manage Engine Exchange Reporter Plus - Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Manage Engine Exchange Reporter Plus - Remote Code Execution (Metasploit)
|
This exploit targets java systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Dokeos 1.x - '/work/work.php?display_upload_form Action origin' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Dokeos 1.x - '/work/work.php?display_upload_form Action origin' Cross-Site Scripting. Author: Doz
|
Analyze the security implications of: Dokeos 1.x - '/work/work.php?display_upload_form Action origin' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 6rbScript - 'cat.php' SQL Injection
|
This is a webapps exploit for php platform. Description: 6rbScript - 'cat.php' SQL Injection. Author: Karar Alshami
|
Analyze the security implications of: 6rbScript - 'cat.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Belkin N150 Wireless Router - Password Disclosure
|
This is a webapps exploit for hardware platform. Description: Belkin N150 Wireless Router - Password Disclosure. Author: Avinash Tangirala
|
Analyze the security implications of: Belkin N150 Wireless Router - Password Disclosure
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: GeometriX Download Portal - 'down_indir.asp?id' SQL Injection
|
This is a webapps exploit for asp platform. Description: GeometriX Download Portal - 'down_indir.asp?id' SQL Injection. Author: CyberGhost
|
Analyze the security implications of: GeometriX Download Portal - 'down_indir.asp?id' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Samba 2.2.8 (OSX/PPC) - 'trans2open' Remote Overflow (Metasploit)
|
This is a remote exploit for osx_ppc platform. Description: Samba 2.2.8 (OSX/PPC) - 'trans2open' Remote Overflow (Metasploit). Author: Metasploit
|
Analyze the security implications of: Samba 2.2.8 (OSX/PPC) - 'trans2open' Remote Overflow (Metasploit)
|
This exploit targets osx_ppc systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets osx_ppc platform
|
What is this exploit about: PHP 4.x/5.0 - 'Strip_Tags()' Function Bypass
|
This is a remote exploit for php platform. Description: PHP 4.x/5.0 - 'Strip_Tags()' Function Bypass. Author: Stefan Esser
|
Analyze the security implications of: PHP 4.x/5.0 - 'Strip_Tags()' Function Bypass
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Fuel CMS 1.4.7 - 'col' SQL Injection (Authenticated)
|
This is a webapps exploit for php platform. Description: Fuel CMS 1.4.7 - 'col' SQL Injection (Authenticated). Author: Roel van Beurden
|
Analyze the security implications of: Fuel CMS 1.4.7 - 'col' SQL Injection (Authenticated)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Built2go News Manager 1.0 Blog - 'news.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Built2go News Manager 1.0 Blog - 'news.php' Multiple Cross-Site Scripting Vulnerabilities. Author: the_Edit0r
|
Analyze the security implications of: Built2go News Manager 1.0 Blog - 'news.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ADODB < 4.70 (PHPOpenChat 3.0.x) - 'Server.php' SQL Injection
|
This is a webapps exploit for php platform. Description: ADODB < 4.70 (PHPOpenChat 3.0.x) - 'Server.php' SQL Injection. Author: rgod
|
Analyze the security implications of: ADODB < 4.70 (PHPOpenChat 3.0.x) - 'Server.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Indeed Job Search 2.5 iOS API - Multiple Vulnerabilities
|
This is a webapps exploit for ios platform. Description: Indeed Job Search 2.5 iOS API - Multiple Vulnerabilities. Author: Vulnerability-Lab
|
Analyze the security implications of: Indeed Job Search 2.5 iOS API - Multiple Vulnerabilities
|
This exploit targets ios systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: Kloxo 6.1.18 Stable - Cross-Site Request Forgery
|
This is a webapps exploit for php platform. Description: Kloxo 6.1.18 Stable - Cross-Site Request Forgery. Author: Necmettin COSKUN
|
Analyze the security implications of: Kloxo 6.1.18 Stable - Cross-Site Request Forgery
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: STUNSHELL (Web Shell) - Remote Code Execution (Metasploit)
|
This is a remote exploit for php platform. Description: STUNSHELL (Web Shell) - Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: STUNSHELL (Web Shell) - Remote Code Execution (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Inout Adserver - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Inout Adserver - 'id' SQL Injection. Author: boom3rang
|
Analyze the security implications of: Inout Adserver - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.