input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: CyberPanel 2.1 - Remote Code Execution (RCE) (Authenticated) | This is a webapps exploit for multiple platform. Description: CyberPanel 2.1 - Remote Code Execution (RCE) (Authenticated). Author: numan türle |
Analyze the security implications of: CyberPanel 2.1 - Remote Code Execution (RCE) (Authenticated) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: 9 Network Linkedin Clone Script - Improper Access Restrictions | This is a webapps exploit for php platform. Description: 9 Network Linkedin Clone Script - Improper Access Restrictions. Author: Ihsan Sencan |
Analyze the security implications of: 9 Network Linkedin Clone Script - Improper Access Restrictions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: QNAP - Web Server Remote Code Execution via Bash Environment Variable Code Injection (Metasploit) | This is a remote exploit for hardware platform. Description: QNAP - Web Server Remote Code Execution via Bash Environment Variable Code Injection (Metasploit). Author: Patrick Pellegrino |
Analyze the security implications of: QNAP - Web Server Remote Code Execution via Bash Environment Variable Code Injection (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Sudo 1.6.3 - Unclean Environment Variable Privilege Escalation | This is a local exploit for linux platform. Description: Sudo 1.6.3 - Unclean Environment Variable Privilege Escalation. Author: Charles Stevenson |
Analyze the security implications of: Sudo 1.6.3 - Unclean Environment Variable Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ClanSphere 2009 - 'text' Cross-Site Scripting | This is a webapps exploit for php platform. Description: ClanSphere 2009 - 'text' Cross-Site Scripting. Author: 599eme Man |
Analyze the security implications of: ClanSphere 2009 - 'text' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: joelz bulletin board 0.9.9rc3 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: joelz bulletin board 0.9.9rc3 - Multiple SQL Injections. Author: Easy Laster |
Analyze the security implications of: joelz bulletin board 0.9.9rc3 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Invision Power Services Invision Board 2.0.4 - Members Action Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Invision Power Services Invision Board 2.0.4 - Members Action Multiple Cross-Site Scripting Vulnerabilities. Author: Mr.SNAKE |
Analyze the security implications of: Invision Power Services Invision Board 2.0.4 - Members Action Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! 1.5/1.6 - JFilterInput Cross-Site Scripting Bypass | This is a webapps exploit for php platform. Description: Joomla! 1.5/1.6 - JFilterInput Cross-Site Scripting Bypass. Author: Jeff Channell |
Analyze the security implications of: Joomla! 1.5/1.6 - JFilterInput Cross-Site Scripting Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GQ File Manager 0.2.5 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: GQ File Manager 0.2.5 - Multiple Vulnerabilities. Author: TaurusOmar |
Analyze the security implications of: GQ File Manager 0.2.5 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CyBoards PHP Lite 1.21/1.25 - 'Common.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: CyBoards PHP Lite 1.21/1.25 - 'Common.php' Remote File Inclusion. Author: SpC-x |
Analyze the security implications of: CyBoards PHP Lite 1.21/1.25 - 'Common.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ay Computer (Multiple Products) - Multiple SQL Injections | This is a webapps exploit for asp platform. Description: Ay Computer (Multiple Products) - Multiple SQL Injections. Author: m3rciL3Ss |
Analyze the security implications of: Ay Computer (Multiple Products) - Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ManageEngine ServiceDesk Plus 9.2 Build 9207 - Unauthorized Information Disclosure | This is a webapps exploit for java platform. Description: ManageEngine ServiceDesk Plus 9.2 Build 9207 - Unauthorized Information Disclosure. Author: p0z |
Analyze the security implications of: ManageEngine ServiceDesk Plus 9.2 Build 9207 - Unauthorized Information Disclosure | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Infinity CGI Exploit Scanner 3.11 - Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: Infinity CGI Exploit Scanner 3.11 - Cross-Site Scripting. Author: badpack3t |
Analyze the security implications of: Infinity CGI Exploit Scanner 3.11 - Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: binutils 2.37 - Objdump Segmentation Fault | This is a local exploit for linux platform. Description: binutils 2.37 - Objdump Segmentation Fault. Author: Marlon Petry |
Analyze the security implications of: binutils 2.37 - Objdump Segmentation Fault | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Campaign Enterprise 11.0.421 - SQL Injection | This is a webapps exploit for multiple platform. Description: Campaign Enterprise 11.0.421 - SQL Injection. Author: Craig Freyman |
Analyze the security implications of: Campaign Enterprise 11.0.421 - SQL Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Sitecom WLM-2501 - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: Sitecom WLM-2501 - Cross-Site Request Forgery. Author: Ivano Binetti |
Analyze the security implications of: Sitecom WLM-2501 - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Magic Winmail Server 4.0 (Build 1112) - 'download.php' Traversal Arbitrary File Access | This is a webapps exploit for php platform. Description: Magic Winmail Server 4.0 (Build 1112) - 'download.php' Traversal Arbitrary File Access. Author: Tan Chew Keong |
Analyze the security implications of: Magic Winmail Server 4.0 (Build 1112) - 'download.php' Traversal Arbitrary File Access | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle 10g Secure Enterprise Search - 'search_p_groups' Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Oracle 10g Secure Enterprise Search - 'search_p_groups' Cross-Site Scripting. Author: Alexandr Polyakov |
Analyze the security implications of: Oracle 10g Secure Enterprise Search - 'search_p_groups' Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: QiHang Media Web Digital Signage 3.0.9 - Unauthenticated Arbitrary File Deletion | This is a webapps exploit for hardware platform. Description: QiHang Media Web Digital Signage 3.0.9 - Unauthenticated Arbitrary File Deletion. Author: LiquidWorm |
Analyze the security implications of: QiHang Media Web Digital Signage 3.0.9 - Unauthenticated Arbitrary File Deletion | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Claroline E-Learning 1.5/1.6 - 'userInfo.php' Multiple SQL Injections | This is a webapps exploit for php platform. Description: Claroline E-Learning 1.5/1.6 - 'userInfo.php' Multiple SQL Injections. Author: Sieg Fried |
Analyze the security implications of: Claroline E-Learning 1.5/1.6 - 'userInfo.php' Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Auto Dealer Management System 1.0 - Broken Access Control Exploit | This is a webapps exploit for php platform. Description: Auto Dealer Management System 1.0 - Broken Access Control Exploit. Author: Muhammad Navaid Zafar Ansari |
Analyze the security implications of: Auto Dealer Management System 1.0 - Broken Access Control Exploit | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: vixie-cron - Local Privilege Escalation | This is a local exploit for linux platform. Description: vixie-cron - Local Privilege Escalation. Author: Michal Zalewski |
Analyze the security implications of: vixie-cron - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: IBM InfoPrint 4247-Z03 Impact Matrix Printer - Directory Traversal | This is a webapps exploit for hardware platform. Description: IBM InfoPrint 4247-Z03 Impact Matrix Printer - Directory Traversal. Author: Raif Berkay Dincel |
Analyze the security implications of: IBM InfoPrint 4247-Z03 Impact Matrix Printer - Directory Traversal | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: RobotStats 1.0 - HTML Injection | This is a dos exploit for aix platform. Description: RobotStats 1.0 - HTML Injection. Author: ZoRLu Bugrahan |
Analyze the security implications of: RobotStats 1.0 - HTML Injection | This exploit targets aix systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: Rumble Mail Server 0.51.3135 - 'domain and path' Stored XSS | This is a webapps exploit for multiple platform. Description: Rumble Mail Server 0.51.3135 - 'domain and path' Stored XSS. Author: Mohammed Alshehri |
Analyze the security implications of: Rumble Mail Server 0.51.3135 - 'domain and path' Stored XSS | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Dragonfly CMS 9.0.6.1 Coppermine Module - 'album' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Dragonfly CMS 9.0.6.1 Coppermine Module - 'album' Cross-Site Scripting. Author: Lostmon |
Analyze the security implications of: Dragonfly CMS 9.0.6.1 Coppermine Module - 'album' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Chrome 3.0 - Style Sheet redirection Information Disclosure | This is a remote exploit for multiple platform. Description: Google Chrome 3.0 - Style Sheet redirection Information Disclosure. Author: Cesar Cerrudo |
Analyze the security implications of: Google Chrome 3.0 - Style Sheet redirection Information Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Darkwet Network WebcamXP 1.6.945 - Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Darkwet Network WebcamXP 1.6.945 - Cross-Site Scripting. Author: Rafel Ivgi The-Insider |
Analyze the security implications of: Darkwet Network WebcamXP 1.6.945 - Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Claroline 1.x - RootSys Remote File Inclusion | This is a webapps exploit for php platform. Description: Claroline 1.x - RootSys Remote File Inclusion. Author: MoHaNdKo |
Analyze the security implications of: Claroline 1.x - RootSys Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Zoom VoIP Phone Adapater ATA1+1 1.2.5 - Cross-Site Request Forgery | This is a remote exploit for hardware platform. Description: Zoom VoIP Phone Adapater ATA1+1 1.2.5 - Cross-Site Request Forgery. Author: Michael Brooks |
Analyze the security implications of: Zoom VoIP Phone Adapater ATA1+1 1.2.5 - Cross-Site Request Forgery | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Black Lily 2007 - 'products.php?class' SQL Injection | This is a webapps exploit for php platform. Description: Black Lily 2007 - 'products.php?class' SQL Injection. Author: VerY-SecReT |
Analyze the security implications of: Black Lily 2007 - 'products.php?class' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Web Wiz Rich Text Editor 4.0 - Multiple Vulnerabilities | This is a webapps exploit for asp platform. Description: Web Wiz Rich Text Editor 4.0 - Multiple Vulnerabilities. Author: BugReport.IR |
Analyze the security implications of: Web Wiz Rich Text Editor 4.0 - Multiple Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Linux Kernel 2.6.x - 'net/core/filter.c' Local Information Disclosure | This is a local exploit for linux platform. Description: Linux Kernel 2.6.x - 'net/core/filter.c' Local Information Disclosure. Author: Dan Rosenberg |
Analyze the security implications of: Linux Kernel 2.6.x - 'net/core/filter.c' Local Information Disclosure | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: LiveZilla 3.1.8.3 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: LiveZilla 3.1.8.3 - Cross-Site Scripting. Author: MaXe |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.