input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Salim Gasmi GLD (Greylisting Daemon) - Postfix Buffer Overflow (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Xiaomi browser 10.2.4.g - Browser Search History Disclosure
|
This is a local exploit for android platform. Description: Xiaomi browser 10.2.4.g - Browser Search History Disclosure. Author: Vishwaraj Bhattrai
|
Analyze the security implications of: Xiaomi browser 10.2.4.g - Browser Search History Disclosure
|
This exploit targets android systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: Joomla! Component GMapFP 3.30 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Joomla! Component GMapFP 3.30 - Arbitrary File Upload. Author: ThelastVvV
|
Analyze the security implications of: Joomla! Component GMapFP 3.30 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Berlios GPSD 2.7.x - Remote Format String
|
This is a remote exploit for linux platform. Description: Berlios GPSD 2.7.x - Remote Format String. Author: JohnH
|
Analyze the security implications of: Berlios GPSD 2.7.x - Remote Format String
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: IPFire < 2.19 Core Update 101 - Remote Command Execution
|
This is a webapps exploit for cgi platform. Description: IPFire < 2.19 Core Update 101 - Remote Command Execution. Author: Yann CAM
|
Analyze the security implications of: IPFire < 2.19 Core Update 101 - Remote Command Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: vTiger CRM 5.3.0 5.4.0 - (Authenticated) Remote Code Execution (Metasploit)
|
This is a remote exploit for php platform. Description: vTiger CRM 5.3.0 5.4.0 - (Authenticated) Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: vTiger CRM 5.3.0 5.4.0 - (Authenticated) Remote Code Execution (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Courier Business Website Script - Authentication Bypass
|
This is a webapps exploit for php platform. Description: Courier Business Website Script - Authentication Bypass. Author: Ihsan Sencan
|
Analyze the security implications of: Courier Business Website Script - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: NoMachine 5.3.9 - Local Privilege Escalation
|
This is a local exploit for osx platform. Description: NoMachine 5.3.9 - Local Privilege Escalation. Author: Daniele Linguaglossa
|
Analyze the security implications of: NoMachine 5.3.9 - Local Privilege Escalation
|
This exploit targets osx systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: CreaCMS - '/edition_article/edition_article.php?cfg[document_uri]' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: CreaCMS - '/edition_article/edition_article.php?cfg[document_uri]' Remote File Inclusion. Author: Ciph3r
|
Analyze the security implications of: CreaCMS - '/edition_article/edition_article.php?cfg[document_uri]' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Best Support System 3.0.4 - 'ticket_body' Persistent XSS (Authenticated)
|
This is a webapps exploit for php platform. Description: Best Support System 3.0.4 - 'ticket_body' Persistent XSS (Authenticated). Author: Ex.Mi
|
Analyze the security implications of: Best Support System 3.0.4 - 'ticket_body' Persistent XSS (Authenticated)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component ds-syndicate - 'feed_id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component ds-syndicate - 'feed_id' SQL Injection. Author: boom3rang
|
Analyze the security implications of: Joomla! Component ds-syndicate - 'feed_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IPeakCMS 3.5 - Boolean-based blind SQLi
|
This is a webapps exploit for multiple platform. Description: IPeakCMS 3.5 - Boolean-based blind SQLi. Author: MoeAlBarbari
|
Analyze the security implications of: IPeakCMS 3.5 - Boolean-based blind SQLi
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Clinic Management System 1.0 - Authentication Bypass
|
This is a webapps exploit for php platform. Description: Clinic Management System 1.0 - Authentication Bypass. Author: BKpatron
|
Analyze the security implications of: Clinic Management System 1.0 - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: weborf 0.12.2 - Directory Traversal
|
This is a remote exploit for linux platform. Description: weborf 0.12.2 - Directory Traversal. Author: Rew
|
Analyze the security implications of: weborf 0.12.2 - Directory Traversal
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Oracle - SYS.LT.REMOVEWORKSPACE Evil Cursor
|
This is a local exploit for multiple platform. Description: Oracle - SYS.LT.REMOVEWORKSPACE Evil Cursor. Author: Andrea Purificato
|
Analyze the security implications of: Oracle - SYS.LT.REMOVEWORKSPACE Evil Cursor
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Neptune Web Server 3.0 - 404 Error Page Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: Neptune Web Server 3.0 - 404 Error Page Cross-Site Scripting. Author: NetJackal
|
Analyze the security implications of: Neptune Web Server 3.0 - 404 Error Page Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Lucent Access Point 300/600/1500 IP Services Router - Long HTTP Request Denial of Service
|
This is a dos exploit for hardware platform. Description: Lucent Access Point 300/600/1500 IP Services Router - Long HTTP Request Denial of Service. Author: FX
|
Analyze the security implications of: Lucent Access Point 300/600/1500 IP Services Router - Long HTTP Request Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: FlatnuX CMS - Cross-Site Request Forgery (Add Admin)
|
This is a webapps exploit for php platform. Description: FlatnuX CMS - Cross-Site Request Forgery (Add Admin). Author: Vulnerability Laboratory
|
Analyze the security implications of: FlatnuX CMS - Cross-Site Request Forgery (Add Admin)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Getsimple CMS Items Manager Plugin - 'PHP.php' Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Getsimple CMS Items Manager Plugin - 'PHP.php' Arbitrary File Upload. Author: Sammy FORGIT
|
Analyze the security implications of: Getsimple CMS Items Manager Plugin - 'PHP.php' Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Grundig Smart Inter@ctive 3.0 - Cross-Site Request Forgery
|
This is a webapps exploit for hardware platform. Description: Grundig Smart Inter@ctive 3.0 - Cross-Site Request Forgery. Author: t4rkd3vilz
|
Analyze the security implications of: Grundig Smart Inter@ctive 3.0 - Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: IPFire - 'proxy.cgi' Remote Code Execution (Metasploit)
|
This is a remote exploit for cgi platform. Description: IPFire - 'proxy.cgi' Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: IPFire - 'proxy.cgi' Remote Code Execution (Metasploit)
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Joomla! Component FacileForms - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Joomla! Component FacileForms - Cross-Site Scripting. Author: Pyske
|
Analyze the security implications of: Joomla! Component FacileForms - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GitList 0.6.0 - Argument Injection (Metasploit)
|
This is a remote exploit for php platform. Description: GitList 0.6.0 - Argument Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: GitList 0.6.0 - Argument Injection (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Car Workshop System - SQL Injection
|
This is a webapps exploit for php platform. Description: Car Workshop System - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Car Workshop System - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: XLineSoft ASPRunner 1.0/2.x - Database Direct Request Information Disclosure
|
This is a webapps exploit for asp platform. Description: XLineSoft ASPRunner 1.0/2.x - Database Direct Request Information Disclosure. Author: Ferruh Mavituna
|
Analyze the security implications of: XLineSoft ASPRunner 1.0/2.x - Database Direct Request Information Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Apple Mac OSX / iOS - Unsandboxable Kernel Use-After-Free in Mach Vouchers
|
This is a dos exploit for multiple platform. Description: Apple Mac OSX / iOS - Unsandboxable Kernel Use-After-Free in Mach Vouchers. Author: Google Security Research
|
Analyze the security implications of: Apple Mac OSX / iOS - Unsandboxable Kernel Use-After-Free in Mach Vouchers
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: aoop CMS 0.3.6 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: aoop CMS 0.3.6 - Multiple Vulnerabilities. Author: Julien Ahrens
|
Analyze the security implications of: aoop CMS 0.3.6 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: contentserver 5.6.2929 - '/errors/rights.asp?msg' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: contentserver 5.6.2929 - '/errors/rights.asp?msg' Cross-Site Scripting. Author: RedTeam Pentesting
|
Analyze the security implications of: contentserver 5.6.2929 - '/errors/rights.asp?msg' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Drupal Module RESTWS 7.x - PHP Remote Code Execution (Metasploit)
|
This is a remote exploit for php platform. Description: Drupal Module RESTWS 7.x - PHP Remote Code Execution (Metasploit). Author: Mehmet Ince
|
Analyze the security implications of: Drupal Module RESTWS 7.x - PHP Remote Code Execution (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DUware DUpaypal 3.0/3.1 - 'sub.asp?iSub' SQL Injection
|
This is a webapps exploit for asp platform. Description: DUware DUpaypal 3.0/3.1 - 'sub.asp?iSub' SQL Injection. Author: Dedi Dwianto
|
Analyze the security implications of: DUware DUpaypal 3.0/3.1 - 'sub.asp?iSub' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Codiad 2.4.3 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Codiad 2.4.3 - Multiple Vulnerabilities. Author: TaurusOmar
|
Analyze the security implications of: Codiad 2.4.3 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MegaBBS 1.5.14b - 'upload.asp' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: MegaBBS 1.5.14b - 'upload.asp' Cross-Site Scripting. Author: Doz
|
Analyze the security implications of: MegaBBS 1.5.14b - 'upload.asp' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Atmail WebAdmin and Webmail Control Panel - SQL Root Password Disclosure
|
This is a webapps exploit for linux platform. Description: Atmail WebAdmin and Webmail Control Panel - SQL Root Password Disclosure. Author: Ciph3r
|
Analyze the security implications of: Atmail WebAdmin and Webmail Control Panel - SQL Root Password Disclosure
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Spooky 2.7 - 'login/register.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: Spooky 2.7 - 'login/register.asp' SQL Injection. Author: Doz
|
Analyze the security implications of: Spooky 2.7 - 'login/register.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.