input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: bcoos 1.0.10 - 'ratefile.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Werkzeug - 'Debug Shell' Command Execution
|
This is a remote exploit for multiple platform. Description: Werkzeug - 'Debug Shell' Command Execution. Author: Ali BawazeEer
|
Analyze the security implications of: Werkzeug - 'Debug Shell' Command Execution
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component Brightcode Weblinks - 'catid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Brightcode Weblinks - 'catid' SQL Injection. Author: His0k4
|
Analyze the security implications of: Joomla! Component Brightcode Weblinks - 'catid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IBM AIX 6.1/7.1 - Local Privilege Escalation
|
This is a local exploit for aix platform. Description: IBM AIX 6.1/7.1 - Local Privilege Escalation. Author: Kristian Erik Hermansen
|
Analyze the security implications of: IBM AIX 6.1/7.1 - Local Privilege Escalation
|
This exploit targets aix systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aix platform
|
What is this exploit about: Pinnacle ShowCenter 1.51 - Web Interface Skin Denial of Service
|
This is a dos exploit for php platform. Description: Pinnacle ShowCenter 1.51 - Web Interface Skin Denial of Service. Author: Marc Ruef
|
Analyze the security implications of: Pinnacle ShowCenter 1.51 - Web Interface Skin Denial of Service
|
This exploit targets php systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AWStats < 6.4 - 'referer' Remote Command Execution
|
This is a webapps exploit for cgi platform. Description: AWStats < 6.4 - 'referer' Remote Command Execution. Author: RusH
|
Analyze the security implications of: AWStats < 6.4 - 'referer' Remote Command Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Amber Script 1.0 - 'show_content.php?id' Local File Inclusion
|
This is a webapps exploit for php platform. Description: Amber Script 1.0 - 'show_content.php?id' Local File Inclusion. Author: Crackers_Child
|
Analyze the security implications of: Amber Script 1.0 - 'show_content.php?id' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Edimax EW-7206-APg and EW-7209APg - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: Edimax EW-7206-APg and EW-7209APg - Multiple Vulnerabilities. Author: m-1-k-3
|
Analyze the security implications of: Edimax EW-7206-APg and EW-7209APg - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: FreeWebShop 2.1/2.2 - 'index.php?cat' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: FreeWebShop 2.1/2.2 - 'index.php?cat' Cross-Site Scripting. Author: laurent gaffie
|
Analyze the security implications of: FreeWebShop 2.1/2.2 - 'index.php?cat' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DubSite CMS 1.0 - Cross-Site Request Forgery
|
This is a webapps exploit for php platform. Description: DubSite CMS 1.0 - Cross-Site Request Forgery. Author: Connection
|
Analyze the security implications of: DubSite CMS 1.0 - Cross-Site Request Forgery
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Giveaway Manager - 'members.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Giveaway Manager - 'members.php' Cross-Site Scripting. Author: Am!r
|
Analyze the security implications of: Giveaway Manager - 'members.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Gallery WD 1.3.6 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Gallery WD 1.3.6 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component Gallery WD 1.3.6 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Newgen Correspondence Management System (corms) eGov 12.0 - IDOR
|
This is a webapps exploit for multiple platform. Description: Newgen Correspondence Management System (corms) eGov 12.0 - IDOR. Author: ALI AL SINAN
|
Analyze the security implications of: Newgen Correspondence Management System (corms) eGov 12.0 - IDOR
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Sybase MobiLink 10.0.1.3629 - Multiple Heap Buffer Overflow Vulnerabilities
|
This is a dos exploit for multiple platform. Description: Sybase MobiLink 10.0.1.3629 - Multiple Heap Buffer Overflow Vulnerabilities. Author: Luigi Auriemma
|
Analyze the security implications of: Sybase MobiLink 10.0.1.3629 - Multiple Heap Buffer Overflow Vulnerabilities
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Adobe Flash - H264 File Stack Corruption
|
This is a dos exploit for multiple platform. Description: Adobe Flash - H264 File Stack Corruption. Author: Google Security Research
|
Analyze the security implications of: Adobe Flash - H264 File Stack Corruption
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: uc-http Daemon - Local File Inclusion / Directory Traversal
|
This is a webapps exploit for hardware platform. Description: uc-http Daemon - Local File Inclusion / Directory Traversal. Author: Project Insecurity
|
Analyze the security implications of: uc-http Daemon - Local File Inclusion / Directory Traversal
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Hasura GraphQL 1.3.3 - Remote Code Execution
|
This is a webapps exploit for multiple platform. Description: Hasura GraphQL 1.3.3 - Remote Code Execution. Author: Dolev Farhi
|
Analyze the security implications of: Hasura GraphQL 1.3.3 - Remote Code Execution
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Apache < 1.3.37/2.0.59/2.2.3 mod_rewrite - Remote Overflow
|
This is a remote exploit for multiple platform. Description: Apache < 1.3.37/2.0.59/2.2.3 mod_rewrite - Remote Overflow. Author: Jacobo Avariento
|
Analyze the security implications of: Apache < 1.3.37/2.0.59/2.2.3 mod_rewrite - Remote Overflow
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: SimpleTransfer 2.2.1 - Command Injection
|
This is a webapps exploit for hardware platform. Description: SimpleTransfer 2.2.1 - Command Injection. Author: Vulnerability-Lab
|
Analyze the security implications of: SimpleTransfer 2.2.1 - Command Injection
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Google Chrome < M73 - Data Race in ExtensionsGuestViewMessageFilter
|
This is a dos exploit for multiple platform. Description: Google Chrome < M73 - Data Race in ExtensionsGuestViewMessageFilter. Author: Google Security Research
|
Analyze the security implications of: Google Chrome < M73 - Data Race in ExtensionsGuestViewMessageFilter
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Jedox 2022.4.2 - Code Execution via RPC Interfaces
|
This is a webapps exploit for php platform. Description: Jedox 2022.4.2 - Code Execution via RPC Interfaces. Author: Team Syslifters
|
Analyze the security implications of: Jedox 2022.4.2 - Code Execution via RPC Interfaces
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DreamNews Manager - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: DreamNews Manager - 'id' SQL Injection. Author: Hussin X
|
Analyze the security implications of: DreamNews Manager - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component SP Movie Database 1.3 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component SP Movie Database 1.3 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component SP Movie Database 1.3 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: gencms 2006 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: gencms 2006 - Multiple Vulnerabilities. Author: eLwaux
|
Analyze the security implications of: gencms 2006 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_simpleimageupload - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Joomla! Component com_simpleimageupload - Arbitrary File Upload. Author: CrashBandicot
|
Analyze the security implications of: Joomla! Component com_simpleimageupload - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CGI City CC Whois 1.0 - MetaCharacter
|
This is a remote exploit for cgi platform. Description: CGI City CC Whois 1.0 - MetaCharacter. Author: Cody T. - hhp
|
Analyze the security implications of: CGI City CC Whois 1.0 - MetaCharacter
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Oracle 8 - oratclsh Suid
|
This is a local exploit for linux platform. Description: Oracle 8 - oratclsh Suid. Author: Dan Sugalski
|
Analyze the security implications of: Oracle 8 - oratclsh Suid
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component com_cbcontact - 'contact_id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_cbcontact - 'contact_id' SQL Injection. Author: KedAns-Dz
|
Analyze the security implications of: Joomla! Component com_cbcontact - 'contact_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Magic Photo Storage Website - '/user/user_catelog_password.php?_config[site_path]' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Magic Photo Storage Website - '/user/user_catelog_password.php?_config[site_path]' Remote File Inclusion. Author: IbnuSina
|
Analyze the security implications of: Magic Photo Storage Website - '/user/user_catelog_password.php?_config[site_path]' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ManageEngine OPutils 8.0 - Multiple Vulnerabilities
|
This is a webapps exploit for multiple platform. Description: ManageEngine OPutils 8.0 - Multiple Vulnerabilities. Author: Kaustubh G. Padwad
|
Analyze the security implications of: ManageEngine OPutils 8.0 - Multiple Vulnerabilities
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CubeCart 3.0.20 - 'switch.php?r' Arbitrary Site Redirect
|
This is a webapps exploit for php platform. Description: CubeCart 3.0.20 - 'switch.php?r' Arbitrary Site Redirect. Author: Aung Khant
|
Analyze the security implications of: CubeCart 3.0.20 - 'switch.php?r' Arbitrary Site Redirect
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ProjectApp 3.3 - 'login.asp?ret_page' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: ProjectApp 3.3 - 'login.asp?ret_page' Cross-Site Scripting. Author: r0t
|
Analyze the security implications of: ProjectApp 3.3 - 'login.asp?ret_page' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: dB Masters Curium CMS 1.03 - 'c_id' SQL Injection
|
This is a webapps exploit for php platform. Description: dB Masters Curium CMS 1.03 - 'c_id' SQL Injection. Author: ajann
|
Analyze the security implications of: dB Masters Curium CMS 1.03 - 'c_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ContentNow 1.4.1 - Arbitrary File Upload / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: ContentNow 1.4.1 - Arbitrary File Upload / Cross-Site Scripting. Author: CWH Underground
|
Analyze the security implications of: ContentNow 1.4.1 - Arbitrary File Upload / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.