input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Joomla! Component JomSocial 1.6.288 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Gym Management System 1.0 - Unauthenticated Remote Code Execution
|
This is a webapps exploit for php platform. Description: Gym Management System 1.0 - Unauthenticated Remote Code Execution. Author: boku
|
Analyze the security implications of: Gym Management System 1.0 - Unauthenticated Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GNU inetutils < 1.9.4 - 'telnet.c' Multiple Overflows (PoC)
|
This is a dos exploit for linux platform. Description: GNU inetutils < 1.9.4 - 'telnet.c' Multiple Overflows (PoC). Author: Hacker Fantastic
|
Analyze the security implications of: GNU inetutils < 1.9.4 - 'telnet.c' Multiple Overflows (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: iRZ Mobile Router - CSRF to RCE
|
This is a remote exploit for hardware platform. Description: iRZ Mobile Router - CSRF to RCE. Author: John Jackson
|
Analyze the security implications of: iRZ Mobile Router - CSRF to RCE
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Expert Advisior - 'index.php?id' SQL Injection
|
This is a webapps exploit for php platform. Description: Expert Advisior - 'index.php?id' SQL Injection. Author: t0pP8uZz
|
Analyze the security implications of: Expert Advisior - 'index.php?id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PineApp Mail-SeCure - 'test_li_connection.php' Arbitrary Command Execution (Metasploit)
|
This is a remote exploit for php platform. Description: PineApp Mail-SeCure - 'test_li_connection.php' Arbitrary Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: PineApp Mail-SeCure - 'test_li_connection.php' Arbitrary Command Execution (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: merlix educate servert - Authentication Bypass / File Disclosure
|
This is a webapps exploit for asp platform. Description: merlix educate servert - Authentication Bypass / File Disclosure. Author: ZoRLu
|
Analyze the security implications of: merlix educate servert - Authentication Bypass / File Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Netgear DGN1000 1.1.00.48 - 'Setup.cgi' Remote Code Execution (Metasploit)
|
This is a remote exploit for hardware platform. Description: Netgear DGN1000 1.1.00.48 - 'Setup.cgi' Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Netgear DGN1000 1.1.00.48 - 'Setup.cgi' Remote Code Execution (Metasploit)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: RedHat 6.1 - 'man' Local Overflow / Local Privilege Escalation
|
This is a local exploit for linux platform. Description: RedHat 6.1 - 'man' Local Overflow / Local Privilege Escalation. Author: teleh0r
|
Analyze the security implications of: RedHat 6.1 - 'man' Local Overflow / Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Linux Kernel 2.6.x - AppleTalk ATalk_Sum_SKB Function Denial of Service
|
This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - AppleTalk ATalk_Sum_SKB Function Denial of Service. Author: Jean Delvare
|
Analyze the security implications of: Linux Kernel 2.6.x - AppleTalk ATalk_Sum_SKB Function Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Chamilo Lms 1.9.6 - 'profile.php?password' SQL Injection
|
This is a webapps exploit for php platform. Description: Chamilo Lms 1.9.6 - 'profile.php?password' SQL Injection. Author: High-Tech Bridge SA
|
Analyze the security implications of: Chamilo Lms 1.9.6 - 'profile.php?password' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IT!CMS 0.2 - 'titletext-ed.php?wndtitle' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: IT!CMS 0.2 - 'titletext-ed.php?wndtitle' Cross-Site Scripting. Author: Aria-Security Team
|
Analyze the security implications of: IT!CMS 0.2 - 'titletext-ed.php?wndtitle' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dream Gallery 1.0 - Cross-Site Request Forgery (Add Admin)
|
This is a webapps exploit for php platform. Description: Dream Gallery 1.0 - Cross-Site Request Forgery (Add Admin). Author: Ali Ghanbari
|
Analyze the security implications of: Dream Gallery 1.0 - Cross-Site Request Forgery (Add Admin)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GetSimple CMS 3.3.4 - Information Disclosure
|
This is a webapps exploit for php platform. Description: GetSimple CMS 3.3.4 - Information Disclosure. Author: Ron Jost
|
Analyze the security implications of: GetSimple CMS 3.3.4 - Information Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apache Tomcat 6/7/8/9 - Information Disclosure
|
This is a remote exploit for multiple platform. Description: Apache Tomcat 6/7/8/9 - Information Disclosure. Author: justpentest
|
Analyze the security implications of: Apache Tomcat 6/7/8/9 - Information Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Cisco Unified Operations Manager 8.5 - 'iptm/advancedfind.do?extn' Cross-Site Scripting
|
This is a remote exploit for hardware platform. Description: Cisco Unified Operations Manager 8.5 - 'iptm/advancedfind.do?extn' Cross-Site Scripting. Author: Sense of Security
|
Analyze the security implications of: Cisco Unified Operations Manager 8.5 - 'iptm/advancedfind.do?extn' Cross-Site Scripting
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: BKWorks ProPHP 0.50b1 - Authentication Bypass
|
This is a webapps exploit for php platform. Description: BKWorks ProPHP 0.50b1 - Authentication Bypass. Author: SirGod
|
Analyze the security implications of: BKWorks ProPHP 0.50b1 - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 2DayBiz Matrimonial Script - 'smartresult.php' SQL Injection
|
This is a webapps exploit for php platform. Description: 2DayBiz Matrimonial Script - 'smartresult.php' SQL Injection. Author: Easy Laster
|
Analyze the security implications of: 2DayBiz Matrimonial Script - 'smartresult.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cisco PIX Firewall 5.2 - PASV Mode FTP Internal Address Disclosure
|
This is a remote exploit for hardware platform. Description: Cisco PIX Firewall 5.2 - PASV Mode FTP Internal Address Disclosure. Author: Fabio Pietrosanti
|
Analyze the security implications of: Cisco PIX Firewall 5.2 - PASV Mode FTP Internal Address Disclosure
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: DMCounter 0.9.2 -b - 'Kopf.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: DMCounter 0.9.2 -b - 'Kopf.php' Remote File Inclusion. Author: beford
|
Analyze the security implications of: DMCounter 0.9.2 -b - 'Kopf.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dodocool DC38 N300 - Cross-site Request Forgery
|
This is a webapps exploit for hardware platform. Description: Dodocool DC38 N300 - Cross-site Request Forgery. Author: Raffaele Sabato
|
Analyze the security implications of: Dodocool DC38 N300 - Cross-site Request Forgery
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: DXFScope 0.2 - Remote Client-Side Buffer Overflow
|
This is a remote exploit for multiple platform. Description: DXFScope 0.2 - Remote Client-Side Buffer Overflow. Author: Ariel Berkman
|
Analyze the security implications of: DXFScope 0.2 - Remote Client-Side Buffer Overflow
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Mozilla Firefox - Simplified Memory Corruption (PoC)
|
This is a dos exploit for multiple platform. Description: Mozilla Firefox - Simplified Memory Corruption (PoC). Author: extraexploit
|
Analyze the security implications of: Mozilla Firefox - Simplified Memory Corruption (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: EveryAuction 1.53 - Auction.pl Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: EveryAuction 1.53 - Auction.pl Cross-Site Scripting. Author: $um$id
|
Analyze the security implications of: EveryAuction 1.53 - Auction.pl Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: ManageEngine Applications Manager 14.0 - Authentication Bypass / Remote Command Execution (Metasploit)
|
This is a remote exploit for multiple platform. Description: ManageEngine Applications Manager 14.0 - Authentication Bypass / Remote Command Execution (Metasploit). Author: AkkuS
|
Analyze the security implications of: ManageEngine Applications Manager 14.0 - Authentication Bypass / Remote Command Execution (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component BF Quiz 1.0 - SQL Injection (2)
|
This is a webapps exploit for php platform. Description: Joomla! Component BF Quiz 1.0 - SQL Injection (2). Author: Valentin Hoebel
|
Analyze the security implications of: Joomla! Component BF Quiz 1.0 - SQL Injection (2)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Gradman 0.1.3 - 'agregar_info.php' Local File Inclusion
|
This is a webapps exploit for php platform. Description: Gradman 0.1.3 - 'agregar_info.php' Local File Inclusion. Author: JosS
|
Analyze the security implications of: Gradman 0.1.3 - 'agregar_info.php' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Atar2b CMS 4.0.1 - 'pageE.php?id' SQL Injection
|
This is a webapps exploit for php platform. Description: Atar2b CMS 4.0.1 - 'pageE.php?id' SQL Injection. Author: BHG Security Center
|
Analyze the security implications of: Atar2b CMS 4.0.1 - 'pageE.php?id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_digifolio 1.52 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_digifolio 1.52 - 'id' SQL Injection. Author: v3n0m
|
Analyze the security implications of: Joomla! Component com_digifolio 1.52 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Alibaba Clone B2B Script - Arbitrary File Disclosure
|
This is a webapps exploit for php platform. Description: Alibaba Clone B2B Script - Arbitrary File Disclosure. Author: Meisam Monsef
|
Analyze the security implications of: Alibaba Clone B2B Script - Arbitrary File Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Geo++ GNCASTER 1.4.0.7 NMEA-data - Denial of Service
|
This is a dos exploit for linux platform. Description: Geo++ GNCASTER 1.4.0.7 NMEA-data - Denial of Service. Author: RedTeam Pentesting GmbH
|
Analyze the security implications of: Geo++ GNCASTER 1.4.0.7 NMEA-data - Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component JE Story Submit - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component JE Story Submit - Local File Inclusion. Author: v3n0m
|
Analyze the security implications of: Joomla! Component JE Story Submit - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: webMathematica 3 - 'MSP' Script Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: webMathematica 3 - 'MSP' Script Cross-Site Scripting. Author: Floyd Fuh
|
Analyze the security implications of: webMathematica 3 - 'MSP' Script Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Injader CMS 2.1.1 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Injader CMS 2.1.1 - 'id' SQL Injection. Author: fuzion
|
Analyze the security implications of: Injader CMS 2.1.1 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.