input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Spring Cloud Config 2.1.x - Path Traversal (Metasploit)
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Zoho ManageEngine ServiceDesk Plus MSP 9.4 - User Enumeration
|
This is a webapps exploit for java platform. Description: Zoho ManageEngine ServiceDesk Plus MSP 9.4 - User Enumeration. Author: Ricardo Ruiz
|
Analyze the security implications of: Zoho ManageEngine ServiceDesk Plus MSP 9.4 - User Enumeration
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: FAQ System 1.1 - 'index.php?category_id' SQL Injection
|
This is a webapps exploit for php platform. Description: FAQ System 1.1 - 'index.php?category_id' SQL Injection. Author: r0t
|
Analyze the security implications of: FAQ System 1.1 - 'index.php?category_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Classic FTP 1.02 - 'LIST' Directory Traversal
|
This is a remote exploit for multiple platform. Description: Classic FTP 1.02 - 'LIST' Directory Traversal. Author: Tan Chew Keong
|
Analyze the security implications of: Classic FTP 1.02 - 'LIST' Directory Traversal
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component NS Download Shop 2.2.6 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component NS Download Shop 2.2.6 - 'id' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component NS Download Shop 2.2.6 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ReyeeOS 1.204.1614 - MITM Remote Code Execution (RCE)
|
This is a remote exploit for hardware platform. Description: ReyeeOS 1.204.1614 - MITM Remote Code Execution (RCE). Author: Riyan Firmansyah of Seclab
|
Analyze the security implications of: ReyeeOS 1.204.1614 - MITM Remote Code Execution (RCE)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Linux - 'userfaultfd' Bypasses tmpfs File Permissions
|
This is a dos exploit for linux platform. Description: Linux - 'userfaultfd' Bypasses tmpfs File Permissions. Author: Google Security Research
|
Analyze the security implications of: Linux - 'userfaultfd' Bypasses tmpfs File Permissions
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component AlphaUserPoints - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component AlphaUserPoints - SQL Injection. Author: jdc
|
Analyze the security implications of: Joomla! Component AlphaUserPoints - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Laundry CMS - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Laundry CMS - Multiple Vulnerabilities. Author: Mehmet EMIROGLU
|
Analyze the security implications of: Laundry CMS - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Hospitals Patient Records Management System 1.0 - 'id' SQL Injection (Authenticated)
|
This is a webapps exploit for php platform. Description: Hospitals Patient Records Management System 1.0 - 'id' SQL Injection (Authenticated). Author: twseptian
|
Analyze the security implications of: Hospitals Patient Records Management System 1.0 - 'id' SQL Injection (Authenticated)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: e107 Website System 0.6 - Nested BBCode URL Tag Script Injection
|
This is a webapps exploit for php platform. Description: e107 Website System 0.6 - Nested BBCode URL Tag Script Injection. Author: Nick Griffin
|
Analyze the security implications of: e107 Website System 0.6 - Nested BBCode URL Tag Script Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: reNgine 2.2.0 - Command Injection (Authenticated)
|
This is a webapps exploit for multiple platform. Description: reNgine 2.2.0 - Command Injection (Authenticated). Author: Caner Tercan
|
Analyze the security implications of: reNgine 2.2.0 - Command Injection (Authenticated)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: KGB 1.9 - 'sesskglogadmin.php' Local File Inclusion
|
This is a webapps exploit for php platform. Description: KGB 1.9 - 'sesskglogadmin.php' Local File Inclusion. Author: Kacper
|
Analyze the security implications of: KGB 1.9 - 'sesskglogadmin.php' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Snom IP Phone Web Interface < 8 - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: Snom IP Phone Web Interface < 8 - Multiple Vulnerabilities. Author: Yakir Wizman
|
Analyze the security implications of: Snom IP Phone Web Interface < 8 - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: DCI-Designs Dawaween 1.03 - 'Poems.php' SQL Injection
|
This is a webapps exploit for php platform. Description: DCI-Designs Dawaween 1.03 - 'Poems.php' SQL Injection. Author: sherba
|
Analyze the security implications of: DCI-Designs Dawaween 1.03 - 'Poems.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Siemens ADSL SL2-141 - Cross-Site Request Forgery
|
This is a remote exploit for hardware platform. Description: Siemens ADSL SL2-141 - Cross-Site Request Forgery. Author: spdr
|
Analyze the security implications of: Siemens ADSL SL2-141 - Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Tenda W316R Wireless Router 5.07.50 - Remote DNS Change
|
This is a webapps exploit for asp platform. Description: Tenda W316R Wireless Router 5.07.50 - Remote DNS Change. Author: Todor Donev
|
Analyze the security implications of: Tenda W316R Wireless Router 5.07.50 - Remote DNS Change
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Netgear Wireless Management System 2.1.4.15 (Build 1236) - Privilege Escalation
|
This is a webapps exploit for hardware platform. Description: Netgear Wireless Management System 2.1.4.15 (Build 1236) - Privilege Escalation. Author: Elliott Lewis
|
Analyze the security implications of: Netgear Wireless Management System 2.1.4.15 (Build 1236) - Privilege Escalation
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Dating Pro Genie 2015.7 - Cross-Site Request Forgery
|
This is a webapps exploit for php platform. Description: Dating Pro Genie 2015.7 - Cross-Site Request Forgery. Author: High-Tech Bridge SA
|
Analyze the security implications of: Dating Pro Genie 2015.7 - Cross-Site Request Forgery
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BlueSoft Social Networking CMS - SQL Injection
|
This is a webapps exploit for php platform. Description: BlueSoft Social Networking CMS - SQL Injection. Author: Lazmania61
|
Analyze the security implications of: BlueSoft Social Networking CMS - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: eSyndiCat Directory Software - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: eSyndiCat Directory Software - Multiple SQL Injections. Author: d3v1l
|
Analyze the security implications of: eSyndiCat Directory Software - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel < 2.6.31-rc7 - 'AF_IRDA' 29-Byte Stack Disclosure (2)
|
This is a local exploit for linux platform. Description: Linux Kernel < 2.6.31-rc7 - 'AF_IRDA' 29-Byte Stack Disclosure (2). Author: Jon Oberheide
|
Analyze the security implications of: Linux Kernel < 2.6.31-rc7 - 'AF_IRDA' 29-Byte Stack Disclosure (2)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Gazelle CMS 1.0 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Gazelle CMS 1.0 - Arbitrary File Upload. Author: RoMaNcYxHaCkEr
|
Analyze the security implications of: Gazelle CMS 1.0 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: TP-Link TL-WR741N / TL-WR741ND Routers - Multiple Denial of Service Vulnerabilities
|
This is a dos exploit for hardware platform. Description: TP-Link TL-WR741N / TL-WR741ND Routers - Multiple Denial of Service Vulnerabilities. Author: W1ckerMan
|
Analyze the security implications of: TP-Link TL-WR741N / TL-WR741ND Routers - Multiple Denial of Service Vulnerabilities
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: MySQL 5.0.18 - Query Logging Bypass
|
This is a remote exploit for linux platform. Description: MySQL 5.0.18 - Query Logging Bypass. Author: 1dt.w0lf
|
Analyze the security implications of: MySQL 5.0.18 - Query Logging Bypass
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Maian Search 1.1 - Insecure Cookie Handling
|
This is a webapps exploit for php platform. Description: Maian Search 1.1 - Insecure Cookie Handling. Author: S.W.A.T.
|
Analyze the security implications of: Maian Search 1.1 - Insecure Cookie Handling
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FreeBSD 3.3 - Seyon SetGID Dialer
|
This is a local exploit for freebsd platform. Description: FreeBSD 3.3 - Seyon SetGID Dialer. Author: Brock Tellier
|
Analyze the security implications of: FreeBSD 3.3 - Seyon SetGID Dialer
|
This exploit targets freebsd systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets freebsd platform
|
What is this exploit about: Ez Album - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Ez Album - Blind SQL Injection. Author: Red Security TEAM
|
Analyze the security implications of: Ez Album - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Barracuda Web Firewall 660 Firmware 7.3.1.007 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Barracuda Web Firewall 660 Firmware 7.3.1.007 - Multiple Vulnerabilities. Author: Global-Evolution
|
Analyze the security implications of: Barracuda Web Firewall 660 Firmware 7.3.1.007 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: snap - seccomp BBlacklist for TIOCSTI can be Circumvented
|
This is a dos exploit for linux platform. Description: snap - seccomp BBlacklist for TIOCSTI can be Circumvented. Author: Google Security Research
|
Analyze the security implications of: snap - seccomp BBlacklist for TIOCSTI can be Circumvented
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link - Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link - Authentication Bypass. Author: LiquidWorm
|
Analyze the security implications of: Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link - Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component com_vehiclemanager 1.0 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component com_vehiclemanager 1.0 - Remote File Inclusion. Author: Mehmet Ince
|
Analyze the security implications of: Joomla! Component com_vehiclemanager 1.0 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: SETI@home Clients - Remote Buffer Overflow
|
This is a remote exploit for linux platform. Description: SETI@home Clients - Remote Buffer Overflow. Author: zillion
|
Analyze the security implications of: SETI@home Clients - Remote Buffer Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: OpenSSH SCP Client - Write Arbitrary Files
|
This is a remote exploit for multiple platform. Description: OpenSSH SCP Client - Write Arbitrary Files. Author: Harry Sintonen
|
Analyze the security implications of: OpenSSH SCP Client - Write Arbitrary Files
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.