input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: DotBr 0.1 - 'System.php3' Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Coppermine Photo Gallery 1.3.x - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Coppermine Photo Gallery 1.3.x - Blind SQL Injection. Author: s0cratex
|
Analyze the security implications of: Coppermine Photo Gallery 1.3.x - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Flatnuke3 File Manager Module - Unauthorized Access
|
This is a webapps exploit for php platform. Description: Flatnuke3 File Manager Module - Unauthorized Access. Author: KiNgOfThEwOrLd
|
Analyze the security implications of: Flatnuke3 File Manager Module - Unauthorized Access
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component FocalPoint 1.2.3 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component FocalPoint 1.2.3 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component FocalPoint 1.2.3 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: b2evolution 4.0.3 - Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: b2evolution 4.0.3 - Persistent Cross-Site Scripting. Author: AutoSec Tools
|
Analyze the security implications of: b2evolution 4.0.3 - Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: TPC-110W - Missing Authentication for Critical Function
|
This is a remote exploit for hardware platform. Description: TPC-110W - Missing Authentication for Critical Function. Author: Amirhossein Bahramizadeh
|
Analyze the security implications of: TPC-110W - Missing Authentication for Critical Function
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: PSnews - Database Disclosure
|
This is a webapps exploit for asp platform. Description: PSnews - Database Disclosure. Author: indoushka
|
Analyze the security implications of: PSnews - Database Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Trlinux Postaci Webmail 1.1.3 - Password Disclosure
|
This is a remote exploit for multiple platform. Description: Trlinux Postaci Webmail 1.1.3 - Password Disclosure. Author: Michael R. Rudel
|
Analyze the security implications of: Trlinux Postaci Webmail 1.1.3 - Password Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: C2 WebResource - 'File' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: C2 WebResource - 'File' Cross-Site Scripting. Author: anonymous
|
Analyze the security implications of: C2 WebResource - 'File' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Adobe Flash - Metadata Parsing Out-of-Bounds Read
|
This is a dos exploit for multiple platform. Description: Adobe Flash - Metadata Parsing Out-of-Bounds Read. Author: Google Security Research
|
Analyze the security implications of: Adobe Flash - Metadata Parsing Out-of-Bounds Read
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: SIPP 3.3 - Stack-Based Buffer Overflow
|
This is a local exploit for linux platform. Description: SIPP 3.3 - Stack-Based Buffer Overflow. Author: Juan Sacco
|
Analyze the security implications of: SIPP 3.3 - Stack-Based Buffer Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Jasmin Ransomware - SQL Injection Login Bypass
|
This is a webapps exploit for php platform. Description: Jasmin Ransomware - SQL Injection Login Bypass. Author: Buğra Enis Dönmez
|
Analyze the security implications of: Jasmin Ransomware - SQL Injection Login Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Download Center Lite (DCL) 1.5 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Download Center Lite (DCL) 1.5 - Remote File Inclusion. Author: Filip Groszynski
|
Analyze the security implications of: Download Center Lite (DCL) 1.5 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: EasyDynamicPages 1.0 - 'config_page.php' PHP Remote File Inclusion
|
This is a webapps exploit for php platform. Description: EasyDynamicPages 1.0 - 'config_page.php' PHP Remote File Inclusion. Author: tsbeginnervn
|
Analyze the security implications of: EasyDynamicPages 1.0 - 'config_page.php' PHP Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Oracle HTTP Server 8.1.7/9.0.1/9.2 - isqlplus Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: Oracle HTTP Server 8.1.7/9.0.1/9.2 - isqlplus Cross-Site Scripting. Author: Rafel Ivgi The-Insider
|
Analyze the security implications of: Oracle HTTP Server 8.1.7/9.0.1/9.2 - isqlplus Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: OpenFiler 2.99.1 - Multiple Persistent Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: OpenFiler 2.99.1 - Multiple Persistent Cross-Site Scripting Vulnerabilities. Author: Dolev Farhi
|
Analyze the security implications of: OpenFiler 2.99.1 - Multiple Persistent Cross-Site Scripting Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! 3.7.0 - 'com_fields' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! 3.7.0 - 'com_fields' SQL Injection. Author: Mateus Lino
|
Analyze the security implications of: Joomla! 3.7.0 - 'com_fields' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ASPNuke 0.80 - 'forgot_password.asp?email' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: ASPNuke 0.80 - 'forgot_password.asp?email' Cross-Site Scripting. Author: Alberto Trivero
|
Analyze the security implications of: ASPNuke 0.80 - 'forgot_password.asp?email' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Docker based datastores for IBM Instana 241-2 243-0 - No Authentication
|
This is a remote exploit for multiple platform. Description: Docker based datastores for IBM Instana 241-2 243-0 - No Authentication. Author: Shahid Parvez (zippon)
|
Analyze the security implications of: Docker based datastores for IBM Instana 241-2 243-0 - No Authentication
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Auto CMS 1.6 - 'autocms.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Auto CMS 1.6 - 'autocms.php' Cross-Site Scripting. Author: High-Tech Bridge SA
|
Analyze the security implications of: Auto CMS 1.6 - 'autocms.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Azureus HTML WebUI 0.7.6 - Cross-Site Request Forgery
|
This is a webapps exploit for multiple platform. Description: Azureus HTML WebUI 0.7.6 - Cross-Site Request Forgery. Author: th3.r00k
|
Analyze the security implications of: Azureus HTML WebUI 0.7.6 - Cross-Site Request Forgery
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Bedeng PSP 1.1 - 'index.php?a.nsub' SQL Injection
|
This is a webapps exploit for php platform. Description: Bedeng PSP 1.1 - 'index.php?a.nsub' SQL Injection. Author: r0t
|
Analyze the security implications of: Bedeng PSP 1.1 - 'index.php?a.nsub' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dolibarr ERP-CRM 12.0.3 - Remote Code Execution (Authenticated)
|
This is a webapps exploit for php platform. Description: Dolibarr ERP-CRM 12.0.3 - Remote Code Execution (Authenticated). Author: Yilmaz Degirmenci
|
Analyze the security implications of: Dolibarr ERP-CRM 12.0.3 - Remote Code Execution (Authenticated)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IBM Notes 8.5.x/9.0.x - Denial of Service
|
This is a dos exploit for multiple platform. Description: IBM Notes 8.5.x/9.0.x - Denial of Service. Author: Dhiraj Mishra
|
Analyze the security implications of: IBM Notes 8.5.x/9.0.x - Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: iTech Dating Script 3.40 - SQL Injection
|
This is a webapps exploit for php platform. Description: iTech Dating Script 3.40 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: iTech Dating Script 3.40 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Magic News Plus 1.0.2 - 'n_layouts.php?link_parameters' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Magic News Plus 1.0.2 - 'n_layouts.php?link_parameters' Cross-Site Scripting. Author: HACKERS PAL
|
Analyze the security implications of: Magic News Plus 1.0.2 - 'n_layouts.php?link_parameters' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Discuz! 6.0.1 - 'searchid' SQL Injection
|
This is a webapps exploit for php platform. Description: Discuz! 6.0.1 - 'searchid' SQL Injection. Author: james
|
Analyze the security implications of: Discuz! 6.0.1 - 'searchid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple macOS/iOS - Kernel Double Free due to IOSurfaceRootUserClient not Respecting MIG Ownership Rules
|
This is a dos exploit for multiple platform. Description: Apple macOS/iOS - Kernel Double Free due to IOSurfaceRootUserClient not Respecting MIG Ownership Rules. Author: Google Security Research
|
Analyze the security implications of: Apple macOS/iOS - Kernel Double Free due to IOSurfaceRootUserClient not Respecting MIG Ownership Rules
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: e-Vision CMS 2.02 - SQL Injection / Remote Code Execution
|
This is a webapps exploit for php platform. Description: e-Vision CMS 2.02 - SQL Injection / Remote Code Execution. Author: Silentz
|
Analyze the security implications of: e-Vision CMS 2.02 - SQL Injection / Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Getsimple CMS 3.3.10 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Getsimple CMS 3.3.10 - Arbitrary File Upload. Author: s0nk3y
|
Analyze the security implications of: Getsimple CMS 3.3.10 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 1024 CMS 1.4.4 - Remote Command Execution / Remote File Inclusion
|
This is a webapps exploit for php platform. Description: 1024 CMS 1.4.4 - Remote Command Execution / Remote File Inclusion. Author: JosS
|
Analyze the security implications of: 1024 CMS 1.4.4 - Remote Command Execution / Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_jashowcase - 'catid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_jashowcase - 'catid' SQL Injection. Author: EcHoLL
|
Analyze the security implications of: Joomla! Component com_jashowcase - 'catid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DocMGR 1.1.2 - 'history.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: DocMGR 1.1.2 - 'history.php' Cross-Site Scripting. Author: AutoSec Tools
|
Analyze the security implications of: DocMGR 1.1.2 - 'history.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: H-Sphere WebShell 2.4 - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: H-Sphere WebShell 2.4 - Local Privilege Escalation. Author: Carl Livitt
|
Analyze the security implications of: H-Sphere WebShell 2.4 - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.