input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: bitweaver 1.x - '/newsletters/edition.php?tk' SQL Injection
|
This is a webapps exploit for php platform. Description: bitweaver 1.x - '/newsletters/edition.php?tk' SQL Injection. Author: laurent gaffie
|
Analyze the security implications of: bitweaver 1.x - '/newsletters/edition.php?tk' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Python smtplib 2.7.11 / 3.4.4 / 3.5.1 - Man In The Middle StartTLS Stripping
|
This is a local exploit for multiple platform. Description: Python smtplib 2.7.11 / 3.4.4 / 3.5.1 - Man In The Middle StartTLS Stripping. Author: tintinweb
|
Analyze the security implications of: Python smtplib 2.7.11 / 3.4.4 / 3.5.1 - Man In The Middle StartTLS Stripping
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: LibTIFF - 'tif_jbig.c' Denial of Service
|
This is a dos exploit for linux platform. Description: LibTIFF - 'tif_jbig.c' Denial of Service. Author: team OWL337
|
Analyze the security implications of: LibTIFF - 'tif_jbig.c' Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: PHP 5.2.0 / PHP with PECL ZIP 1.8.3 - 'zip://' URL Wrapper Buffer Overflow
|
This is a local exploit for linux platform. Description: PHP 5.2.0 / PHP with PECL ZIP 1.8.3 - 'zip://' URL Wrapper Buffer Overflow. Author: Stefan Esser
|
Analyze the security implications of: PHP 5.2.0 / PHP with PECL ZIP 1.8.3 - 'zip://' URL Wrapper Buffer Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Boelter Blue System Management 1.3 - SQL Injection
|
This is a webapps exploit for php platform. Description: Boelter Blue System Management 1.3 - SQL Injection. Author: CBKB
|
Analyze the security implications of: Boelter Blue System Management 1.3 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CSZ CMS 1.2.7 - 'title' HTML Injection
|
This is a webapps exploit for php platform. Description: CSZ CMS 1.2.7 - 'title' HTML Injection. Author: Metin Yunus Kandemir
|
Analyze the security implications of: CSZ CMS 1.2.7 - 'title' HTML Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Oracle PeopleSoft Enterprise PeopleTools < 8.55 - Remote Code Execution Via Blind XML External Entity
|
This is a webapps exploit for java platform. Description: Oracle PeopleSoft Enterprise PeopleTools < 8.55 - Remote Code Execution Via Blind XML External Entity. Author: Charles Fol
|
Analyze the security implications of: Oracle PeopleSoft Enterprise PeopleTools < 8.55 - Remote Code Execution Via Blind XML External Entity
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Microsoft Remote Desktop 10.2.4(134) - Denial of Service (PoC)
|
This is a dos exploit for macos platform. Description: Microsoft Remote Desktop 10.2.4(134) - Denial of Service (PoC). Author: Saeed Hasanzadeh
|
Analyze the security implications of: Microsoft Remote Desktop 10.2.4(134) - Denial of Service (PoC)
|
This exploit targets macos systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets macos platform
|
What is this exploit about: Oracle 9i/10g DBMS_METADATA.GET_DDL - SQL Injection (2)
|
This is a remote exploit for multiple platform. Description: Oracle 9i/10g DBMS_METADATA.GET_DDL - SQL Injection (2). Author: bunker
|
Analyze the security implications of: Oracle 9i/10g DBMS_METADATA.GET_DDL - SQL Injection (2)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Manic Web MWGuest 2.1 - 'MWguest.php' HTML Injection
|
This is a webapps exploit for php platform. Description: Manic Web MWGuest 2.1 - 'MWguest.php' HTML Injection. Author: Aliaksandr Hartsuyeu
|
Analyze the security implications of: Manic Web MWGuest 2.1 - 'MWguest.php' HTML Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Android Janus - APK Signature Bypass (Metasploit)
|
This is a local exploit for android platform. Description: Android Janus - APK Signature Bypass (Metasploit). Author: Metasploit
|
Analyze the security implications of: Android Janus - APK Signature Bypass (Metasploit)
|
This exploit targets android systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: Xangati - '/servlet/Installer?file' Directory Traversal
|
This is a webapps exploit for jsp platform. Description: Xangati - '/servlet/Installer?file' Directory Traversal. Author: Jan Kadijk
|
Analyze the security implications of: Xangati - '/servlet/Installer?file' Directory Traversal
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Glossword 1.8.8 < 1.8.12 - Arbitrary File Upload (Metasploit)
|
This is a remote exploit for php platform. Description: Glossword 1.8.8 < 1.8.12 - Arbitrary File Upload (Metasploit). Author: Metasploit
|
Analyze the security implications of: Glossword 1.8.8 < 1.8.12 - Arbitrary File Upload (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Auerswald COMpact 8.0B - Privilege Escalation
|
This is a remote exploit for hardware platform. Description: Auerswald COMpact 8.0B - Privilege Escalation. Author: RedTeam Pentesting GmbH
|
Analyze the security implications of: Auerswald COMpact 8.0B - Privilege Escalation
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: FRticket Ticket System - Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: FRticket Ticket System - Persistent Cross-Site Scripting. Author: Hamit Abis
|
Analyze the security implications of: FRticket Ticket System - Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AsusWRT LAN - Remote Code Execution (Metasploit)
|
This is a remote exploit for hardware platform. Description: AsusWRT LAN - Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: AsusWRT LAN - Remote Code Execution (Metasploit)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: NullLogic Null HTTPd 0.5 - Error Page Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: NullLogic Null HTTPd 0.5 - Error Page Cross-Site Scripting. Author: Matthew Murphy
|
Analyze the security implications of: NullLogic Null HTTPd 0.5 - Error Page Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Skia Graphics Library - Heap Overflow due to Rounding Error in SkEdge::setLine
|
This is a dos exploit for multiple platform. Description: Skia Graphics Library - Heap Overflow due to Rounding Error in SkEdge::setLine. Author: Google Security Research
|
Analyze the security implications of: Skia Graphics Library - Heap Overflow due to Rounding Error in SkEdge::setLine
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Cybershade CMS 0.2b - 'index.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Cybershade CMS 0.2b - 'index.php' Remote File Inclusion. Author: JosS
|
Analyze the security implications of: Cybershade CMS 0.2b - 'index.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component AMGallery 1.2.3 - 'filter_category_id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component AMGallery 1.2.3 - 'filter_category_id' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component AMGallery 1.2.3 - 'filter_category_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ocean12 ASP Guestbook Manager 1.0 - Information Disclosure
|
This is a webapps exploit for asp platform. Description: Ocean12 ASP Guestbook Manager 1.0 - Information Disclosure. Author: drG4njubas
|
Analyze the security implications of: Ocean12 ASP Guestbook Manager 1.0 - Information Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Jojo CMS - 'x-forwarded-for' HTTP header SQL Injection
|
This is a webapps exploit for php platform. Description: Jojo CMS - 'x-forwarded-for' HTTP header SQL Injection. Author: High-Tech Bridge SA
|
Analyze the security implications of: Jojo CMS - 'x-forwarded-for' HTTP header SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Les Visiteurs (Visitors) 2.0 - 'config.inc.php' File Inclusion
|
This is a webapps exploit for php platform. Description: Les Visiteurs (Visitors) 2.0 - 'config.inc.php' File Inclusion. Author: D_7J
|
Analyze the security implications of: Les Visiteurs (Visitors) 2.0 - 'config.inc.php' File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DUware Software - Multiple Vulnerabilities
|
This is a webapps exploit for asp platform. Description: DUware Software - Multiple Vulnerabilities. Author: Security Corporation
|
Analyze the security implications of: DUware Software - Multiple Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Electricks eCommerce 1.0 - Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Electricks eCommerce 1.0 - Persistent Cross-Site Scripting. Author: Nawaf Alkeraithe
|
Analyze the security implications of: Electricks eCommerce 1.0 - Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mozilla Firefox 1.0/1.5 XBL - MOZ-BINDING Property Cross-Domain Scripting
|
This is a remote exploit for linux platform. Description: Mozilla Firefox 1.0/1.5 XBL - MOZ-BINDING Property Cross-Domain Scripting. Author: Chris Thomas
|
Analyze the security implications of: Mozilla Firefox 1.0/1.5 XBL - MOZ-BINDING Property Cross-Domain Scripting
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: BlackBerry Enterprise Server 4.0/4.1 - MDS Connection Service Cross-Site Scripting
|
This is a webapps exploit for java platform. Description: BlackBerry Enterprise Server 4.0/4.1 - MDS Connection Service Cross-Site Scripting. Author: Ken Millar
|
Analyze the security implications of: BlackBerry Enterprise Server 4.0/4.1 - MDS Connection Service Cross-Site Scripting
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: SuSE Linux 9.0 - YaST Configuration Skribt Overwrite Files
|
This is a local exploit for linux platform. Description: SuSE Linux 9.0 - YaST Configuration Skribt Overwrite Files. Author: l0om
|
Analyze the security implications of: SuSE Linux 9.0 - YaST Configuration Skribt Overwrite Files
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: LeptonCMS 7.0.0 - Remote Code Execution (RCE) (Authenticated)
|
This is a webapps exploit for php platform. Description: LeptonCMS 7.0.0 - Remote Code Execution (RCE) (Authenticated). Author: tmrswrr
|
Analyze the security implications of: LeptonCMS 7.0.0 - Remote Code Execution (RCE) (Authenticated)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: KYOCERA Net Admin 3.4 - Cross-Site Request Forgery (Add Admin)
|
This is a webapps exploit for linux platform. Description: KYOCERA Net Admin 3.4 - Cross-Site Request Forgery (Add Admin). Author: LiquidWorm
|
Analyze the security implications of: KYOCERA Net Admin 3.4 - Cross-Site Request Forgery (Add Admin)
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: TVT TD-2308SS-B DVR - Directory Traversal
|
This is a webapps exploit for hardware platform. Description: TVT TD-2308SS-B DVR - Directory Traversal. Author: Cesar Neira
|
Analyze the security implications of: TVT TD-2308SS-B DVR - Directory Traversal
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: GitList 0.6 - Remote Code Execution
|
This is a webapps exploit for php platform. Description: GitList 0.6 - Remote Code Execution. Author: Kacper Szurek
|
Analyze the security implications of: GitList 0.6 - Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Axigen eMail Server 2.0.0b2 - 'pop3' Remote Format String
|
This is a remote exploit for linux platform. Description: Axigen eMail Server 2.0.0b2 - 'pop3' Remote Format String. Author: fuGich
|
Analyze the security implications of: Axigen eMail Server 2.0.0b2 - 'pop3' Remote Format String
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: bcoos 1.0.10 - 'ratefile.php' SQL Injection
|
This is a webapps exploit for php platform. Description: bcoos 1.0.10 - 'ratefile.php' SQL Injection. Author: Lostmon
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.