input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Active Bids 3.5 - 'itemID' Blind SQL Injection | This is a webapps exploit for php platform. Description: Active Bids 3.5 - 'itemID' Blind SQL Injection. Author: Stack |
Analyze the security implications of: Active Bids 3.5 - 'itemID' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Campsite 2.6.1 - 'IssuePublish.php?g_documentRoot' Remote File Inclusion | This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'IssuePublish.php?g_documentRoot' Remote File Inclusion. Author: anonymous |
Analyze the security implications of: Campsite 2.6.1 - 'IssuePublish.php?g_documentRoot' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fixit iDms Pro Image Gallery - 'showfile.asp?fid' SQL Injection | This is a webapps exploit for asp platform. Description: Fixit iDms Pro Image Gallery - 'showfile.asp?fid' SQL Injection. Author: Aria-Security Team |
Analyze the security implications of: Fixit iDms Pro Image Gallery - 'showfile.asp?fid' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Visale 1.0 - 'pblsmb.cgi?listno' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: Visale 1.0 - 'pblsmb.cgi?listno' Cross-Site Scripting. Author: r0t |
Analyze the security implications of: Visale 1.0 - 'pblsmb.cgi?listno' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Microsoft Windows - 'gdi32.dll' Heap Buffer Overflow in ExtEscape() Triggerable via EMR_EXTESCAPE EMF Record (MS16-055) | This is a dos exploit for multiple platform. Description: Microsoft Windows - 'gdi32.dll' Heap Buffer Overflow in ExtEscape() Triggerable via EMR_EXTESCAPE EMF Record (MS16-055). Author: Google Security Research |
Analyze the security implications of: Microsoft Windows - 'gdi32.dll' Heap Buffer Overflow in ExtEscape() Triggerable via EMR_EXTESCAPE EMF Record (MS16-055) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Milesight Routers UR5X_ UR32L_ UR32_ UR35_ UR41 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption | This is a remote exploit for hardware platform. Description: Milesight Routers UR5X_ UR32L_ UR32_ UR35_ UR41 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption. Author: Bipin Jitiya |
Analyze the security implications of: Milesight Routers UR5X_ UR32L_ UR32_ UR35_ UR41 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: DragDropCart - 'search.php?search' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DragDropCart - 'search.php?search' Cross-Site Scripting. Author: Moudi |
Analyze the security implications of: DragDropCart - 'search.php?search' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache Tomcat 5 - Information Disclosure | This is a remote exploit for multiple platform. Description: Apache Tomcat 5 - Information Disclosure. Author: ScanAlert Security |
Analyze the security implications of: Apache Tomcat 5 - Information Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Dokeos 1.x - 'viewtopic.php' SQL Injection | This is a webapps exploit for php platform. Description: Dokeos 1.x - 'viewtopic.php' SQL Injection. Author: Alvaro Olavarria |
Analyze the security implications of: Dokeos 1.x - 'viewtopic.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX Software Update - Command Execution (Metasploit) | This is a remote exploit for osx platform. Description: Apple Mac OSX Software Update - Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Apple Mac OSX Software Update - Command Execution (Metasploit) | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Joomla! Component Cookex Agency CKForms - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Cookex Agency CKForms - Local File Inclusion. Author: ALTBTA |
Analyze the security implications of: Joomla! Component Cookex Agency CKForms - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RedStar 3.0 Desktop - Enable sudo Privilege Escalation | This is a local exploit for linux platform. Description: RedStar 3.0 Desktop - Enable sudo Privilege Escalation. Author: prdelka & sfan55 |
Analyze the security implications of: RedStar 3.0 Desktop - Enable sudo Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component Jobads - 'type' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Jobads - 'type' SQL Injection. Author: N0KT4 |
Analyze the security implications of: Joomla! Component Jobads - 'type' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DO-CMS 3.0 - 'p' Multiple SQL Injections | This is a webapps exploit for php platform. Description: DO-CMS 3.0 - 'p' Multiple SQL Injections. Author: crash over |
Analyze the security implications of: DO-CMS 3.0 - 'p' Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MySQL 4/5/6 - UDF for Command Execution | This is a local exploit for linux platform. Description: MySQL 4/5/6 - UDF for Command Execution. Author: Bernardo Damele |
Analyze the security implications of: MySQL 4/5/6 - UDF for Command Execution | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Chipmunk Blog - 'archive.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Chipmunk Blog - 'archive.php' Cross-Site Scripting. Author: sl4xUz |
Analyze the security implications of: Chipmunk Blog - 'archive.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Clantools 1.2.3 - Multiple Blind SQL Injections | This is a webapps exploit for php platform. Description: Joomla! Component Clantools 1.2.3 - Multiple Blind SQL Injections. Author: Solidmedia |
Analyze the security implications of: Joomla! Component Clantools 1.2.3 - Multiple Blind SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: e107 < 0.7.8 - 'photograph' Arbitrary File Upload | This is a webapps exploit for php platform. Description: e107 < 0.7.8 - 'photograph' Arbitrary File Upload. Author: g00ns |
Analyze the security implications of: e107 < 0.7.8 - 'photograph' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mobile USB Drive HD - Multiple Local File Inclusion / Arbitrary File Upload Vulnerabilities | This is a webapps exploit for hardware platform. Description: Mobile USB Drive HD - Multiple Local File Inclusion / Arbitrary File Upload Vulnerabilities. Author: Benjamin Kunz Mejri |
Analyze the security implications of: Mobile USB Drive HD - Multiple Local File Inclusion / Arbitrary File Upload Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Jax Petition 3.06 Book - 'smileys.php?languagepack' Local File Inclusion | This is a webapps exploit for php platform. Description: Jax Petition 3.06 Book - 'smileys.php?languagepack' Local File Inclusion. Author: ilker Kandemir |
Analyze the security implications of: Jax Petition 3.06 Book - 'smileys.php?languagepack' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Check Point Security Gateway - Information Disclosure (Unauthenticated) | This is a webapps exploit for hardware platform. Description: Check Point Security Gateway - Information Disclosure (Unauthenticated). Author: Yesith Alvarez |
Analyze the security implications of: Check Point Security Gateway - Information Disclosure (Unauthenticated) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Airia - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Airia - Arbitrary File Upload. Author: HaHwul |
Analyze the security implications of: Airia - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AMSN 0.96 - Malformed Message Denial of Service | This is a dos exploit for multiple platform. Description: AMSN 0.96 - Malformed Message Denial of Service. Author: Levent Kayan |
Analyze the security implications of: AMSN 0.96 - Malformed Message Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: eStara SoftPhone 3.0.1 SIP Packet - Multiple Malformed Field Denial of Service Vulnerabilities | This is a dos exploit for multiple platform. Description: eStara SoftPhone 3.0.1 SIP Packet - Multiple Malformed Field Denial of Service Vulnerabilities. Author: ZwelL |
Analyze the security implications of: eStara SoftPhone 3.0.1 SIP Packet - Multiple Malformed Field Denial of Service Vulnerabilities | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Genexis PLATINUM 4410 2.1 P4410-V2-1.28 - RCE | This is a webapps exploit for hardware platform. Description: Genexis PLATINUM 4410 2.1 P4410-V2-1.28 - RCE. Author: Jay Sharma |
Analyze the security implications of: Genexis PLATINUM 4410 2.1 P4410-V2-1.28 - RCE | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: PlaySms 0.7 - SQL Injection | This is a remote exploit for linux platform. Description: PlaySms 0.7 - SQL Injection. Author: Noam Rathaus |
Analyze the security implications of: PlaySms 0.7 - SQL Injection | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Qualcomm Android - Kernel Use-After-Free via Incorrect set_page_dirty() in KGSL | This is a dos exploit for android platform. Description: Qualcomm Android - Kernel Use-After-Free via Incorrect set_page_dirty() in KGSL. Author: Google Security Research |
Analyze the security implications of: Qualcomm Android - Kernel Use-After-Free via Incorrect set_page_dirty() in KGSL | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Totem Movie Player 3.4.3 (Ubuntu) - Stack Corruption | This is a dos exploit for linux platform. Description: Totem Movie Player 3.4.3 (Ubuntu) - Stack Corruption. Author: coolkaveh |
Analyze the security implications of: Totem Movie Player 3.4.3 (Ubuntu) - Stack Corruption | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: iGreeting Cards 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: iGreeting Cards 1.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: iGreeting Cards 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Logoshows BBS 2.0 - 'forumid' SQL Injection | This is a webapps exploit for php platform. Description: Logoshows BBS 2.0 - 'forumid' SQL Injection. Author: Ruzgarin_Oglu |
Analyze the security implications of: Logoshows BBS 2.0 - 'forumid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: glFusion 1.x - SQL Injection | This is a webapps exploit for php platform. Description: glFusion 1.x - SQL Injection. Author: KedAns-Dz |
Analyze the security implications of: glFusion 1.x - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GNU bash 4.3.11 - Environment Variable dhclient | This is a remote exploit for linux platform. Description: GNU bash 4.3.11 - Environment Variable dhclient. Author: @0x00string |
Analyze the security implications of: GNU bash 4.3.11 - Environment Variable dhclient | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Dolibarr ERP 11.0.4 - File Upload Restrictions Bypass (Authenticated RCE) | This is a webapps exploit for php platform. Description: Dolibarr ERP 11.0.4 - File Upload Restrictions Bypass (Authenticated RCE). Author: Andrea Gonzalez |
Analyze the security implications of: Dolibarr ERP 11.0.4 - File Upload Restrictions Bypass (Authenticated RCE) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iOS iFTPStorage 1.3 - Directory Traversal | This is a remote exploit for ios platform. Description: iOS iFTPStorage 1.3 - Directory Traversal. Author: XEL |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.