input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: CMScout 2.05 - 'bit' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ntpd 4.2.8p10 - Out-of-Bounds Read (PoC)
|
This is a local exploit for linux platform. Description: ntpd 4.2.8p10 - Out-of-Bounds Read (PoC). Author: Magnus Klaaborg Stubman
|
Analyze the security implications of: ntpd 4.2.8p10 - Out-of-Bounds Read (PoC)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Anuko Time Tracker 1.19.23.5311 - Password Reset leading to Account Takeover
|
This is a webapps exploit for php platform. Description: Anuko Time Tracker 1.19.23.5311 - Password Reset leading to Account Takeover. Author: Mufaddal Masalawala
|
Analyze the security implications of: Anuko Time Tracker 1.19.23.5311 - Password Reset leading to Account Takeover
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Photo Contest 1.0.2 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Photo Contest 1.0.2 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component Photo Contest 1.0.2 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MasterWeb Script 1.0 - 'details&newsID' SQL Injection
|
This is a webapps exploit for asp platform. Description: MasterWeb Script 1.0 - 'details&newsID' SQL Injection. Author: Red-D3v1L
|
Analyze the security implications of: MasterWeb Script 1.0 - 'details&newsID' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Component Vik Real Estate 1.0 - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Joomla! Component Vik Real Estate 1.0 - Multiple SQL Injections. Author: the_cyber_nuxbie
|
Analyze the security implications of: Joomla! Component Vik Real Estate 1.0 - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AirOS NanoStation M2 5.6-beta - Multiple Vulnerabilities
|
This is a webapps exploit for cgi platform. Description: AirOS NanoStation M2 5.6-beta - Multiple Vulnerabilities. Author: Pablo Rebolini
|
Analyze the security implications of: AirOS NanoStation M2 5.6-beta - Multiple Vulnerabilities
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: NeoSys Neon Webmail for Java 5.06/5.07 - 'addrlist' Servlet Multiple SQL Injections
|
This is a webapps exploit for jsp platform. Description: NeoSys Neon Webmail for Java 5.06/5.07 - 'addrlist' Servlet Multiple SQL Injections. Author: Tan Chew Keong
|
Analyze the security implications of: NeoSys Neon Webmail for Java 5.06/5.07 - 'addrlist' Servlet Multiple SQL Injections
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: TP-Link TL-PS110U Print Server - 'tplink-enum.py' Security Bypass
|
This is a remote exploit for hardware platform. Description: TP-Link TL-PS110U Print Server - 'tplink-enum.py' Security Bypass. Author: SANTHO
|
Analyze the security implications of: TP-Link TL-PS110U Print Server - 'tplink-enum.py' Security Bypass
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component Odudeprofile 2.8 - 'profession' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Odudeprofile 2.8 - 'profession' SQL Injection. Author: Daniel Barragan
|
Analyze the security implications of: Joomla! Component Odudeprofile 2.8 - 'profession' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apartment Visitors Management System 1.0 - 'email' SQL Injection
|
This is a webapps exploit for php platform. Description: Apartment Visitors Management System 1.0 - 'email' SQL Injection. Author: CANKAT ÇAKMAK
|
Analyze the security implications of: Apartment Visitors Management System 1.0 - 'email' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: JBS 2.0 / JBSX - Administration Panel Bypass / Arbitrary File Upload
|
This is a webapps exploit for asp platform. Description: JBS 2.0 / JBSX - Administration Panel Bypass / Arbitrary File Upload. Author: blackenedsecurity
|
Analyze the security implications of: JBS 2.0 / JBSX - Administration Panel Bypass / Arbitrary File Upload
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Froxlor 2.0.3 Stable - Remote Code Execution (RCE)
|
This is a webapps exploit for php platform. Description: Froxlor 2.0.3 Stable - Remote Code Execution (RCE). Author: Askar
|
Analyze the security implications of: Froxlor 2.0.3 Stable - Remote Code Execution (RCE)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Sagem Routers - Remote Reset
|
This is a dos exploit for hardware platform. Description: Sagem Routers - Remote Reset. Author: AlpHaNiX
|
Analyze the security implications of: Sagem Routers - Remote Reset
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Ezyhelpdesk 1.0 - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Ezyhelpdesk 1.0 - Multiple SQL Injections. Author: r0t
|
Analyze the security implications of: Ezyhelpdesk 1.0 - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Thecus N5200Pro NAS Server Control Panel - Remote File Inclusion
|
This is a remote exploit for hardware platform. Description: Thecus N5200Pro NAS Server Control Panel - Remote File Inclusion. Author: Crackers_Child
|
Analyze the security implications of: Thecus N5200Pro NAS Server Control Panel - Remote File Inclusion
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Sophos Web Appliance 4.3.0.2 - 'trafficType' Remote Command Injection (Metasploit)
|
This is a webapps exploit for json platform. Description: Sophos Web Appliance 4.3.0.2 - 'trafficType' Remote Command Injection (Metasploit). Author: xort
|
Analyze the security implications of: Sophos Web Appliance 4.3.0.2 - 'trafficType' Remote Command Injection (Metasploit)
|
This exploit targets json systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets json platform
|
What is this exploit about: Foafgen 0.3 - 'redir.php' Local Source Disclosure
|
This is a webapps exploit for php platform. Description: Foafgen 0.3 - 'redir.php' Local Source Disclosure. Author: DarkFig
|
Analyze the security implications of: Foafgen 0.3 - 'redir.php' Local Source Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Advanced Guestbook 2.3.1/2.4 - 'index.php?Entry' SQL Injection
|
This is a webapps exploit for php platform. Description: Advanced Guestbook 2.3.1/2.4 - 'index.php?Entry' SQL Injection. Author: Spy Hat
|
Analyze the security implications of: Advanced Guestbook 2.3.1/2.4 - 'index.php?Entry' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component redSHOP 1.0 - 'pid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component redSHOP 1.0 - 'pid' SQL Injection. Author: v3n0m
|
Analyze the security implications of: Joomla! Component redSHOP 1.0 - 'pid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Comersus Cart 5.0/6.0 - Multiple Vulnerabilities
|
This is a webapps exploit for asp platform. Description: Comersus Cart 5.0/6.0 - Multiple Vulnerabilities. Author: raf somers
|
Analyze the security implications of: Comersus Cart 5.0/6.0 - Multiple Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Plugin JD-WordPress 2.0-1.0 RC2 - 'wp-trackback.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Plugin JD-WordPress 2.0-1.0 RC2 - 'wp-trackback.php' Remote File Inclusion. Author: Drago84
|
Analyze the security implications of: Joomla! Plugin JD-WordPress 2.0-1.0 RC2 - 'wp-trackback.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Boy Scout Advancement 0.3 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Boy Scout Advancement 0.3 - 'id' SQL Injection. Author: YEnH4ckEr
|
Analyze the security implications of: Joomla! Component Boy Scout Advancement 0.3 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dell iDRAC IPMI 1.5 - Insufficient Session ID Randomness
|
This is a webapps exploit for hardware platform. Description: Dell iDRAC IPMI 1.5 - Insufficient Session ID Randomness. Author: Yong Chuan_ Koh
|
Analyze the security implications of: Dell iDRAC IPMI 1.5 - Insufficient Session ID Randomness
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Novell Groupwise 5.5/6.0 Servlet Gateway - Default Authentication
|
This is a remote exploit for novell platform. Description: Novell Groupwise 5.5/6.0 Servlet Gateway - Default Authentication. Author: Adam Gray
|
Analyze the security implications of: Novell Groupwise 5.5/6.0 Servlet Gateway - Default Authentication
|
This exploit targets novell systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets novell platform
|
What is this exploit about: Benja CMS 0.1 - '/admin/admin_edit_submenu.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Benja CMS 0.1 - '/admin/admin_edit_submenu.php' Cross-Site Scripting. Author: CWH Underground
|
Analyze the security implications of: Benja CMS 0.1 - '/admin/admin_edit_submenu.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Pavuk Digest - Authentication Remote Buffer Overflow
|
This is a remote exploit for linux platform. Description: Pavuk Digest - Authentication Remote Buffer Overflow. Author: infamous41md
|
Analyze the security implications of: Pavuk Digest - Authentication Remote Buffer Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: awrate.com Message Board 1.0 - 'search.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: awrate.com Message Board 1.0 - 'search.php' Remote File Inclusion. Author: DeltahackingTEAM
|
Analyze the security implications of: awrate.com Message Board 1.0 - 'search.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Gitea 1.16.6 - Remote Code Execution (RCE) (Metasploit)
|
This is a webapps exploit for multiple platform. Description: Gitea 1.16.6 - Remote Code Execution (RCE) (Metasploit). Author: samguy
|
Analyze the security implications of: Gitea 1.16.6 - Remote Code Execution (RCE) (Metasploit)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: iManager Plugin 1.2.8 - 'd' Arbitrary File Deletion
|
This is a webapps exploit for php platform. Description: iManager Plugin 1.2.8 - 'd' Arbitrary File Deletion. Author: LiquidWorm
|
Analyze the security implications of: iManager Plugin 1.2.8 - 'd' Arbitrary File Deletion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component HD FLV Player - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component HD FLV Player - 'id' SQL Injection. Author: kaMtiEz
|
Analyze the security implications of: Joomla! Component HD FLV Player - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Compulsive Media CNU5 - 'News.mdb' Database Disclosure
|
This is a webapps exploit for asp platform. Description: Compulsive Media CNU5 - 'News.mdb' Database Disclosure. Author: Security .Net Information
|
Analyze the security implications of: Compulsive Media CNU5 - 'News.mdb' Database Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Hylafax 4.1.x - HFaxD Format String
|
This is a remote exploit for linux platform. Description: Hylafax 4.1.x - HFaxD Format String. Author: Sebastian Krahmer
|
Analyze the security implications of: Hylafax 4.1.x - HFaxD Format String
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: delpino73 Blue-Smiley-Organizer 1.32 - 'datetime' SQL Injection
|
This is a webapps exploit for php platform. Description: delpino73 Blue-Smiley-Organizer 1.32 - 'datetime' SQL Injection. Author: cakes
|
Analyze the security implications of: delpino73 Blue-Smiley-Organizer 1.32 - 'datetime' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.