input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Jurpopage 0.2.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Siemens Simatic S7-1200 - CPU START/STOP Module (Metasploit)
|
This is a remote exploit for hardware platform. Description: Siemens Simatic S7-1200 - CPU START/STOP Module (Metasploit). Author: Dillon Beresford
|
Analyze the security implications of: Siemens Simatic S7-1200 - CPU START/STOP Module (Metasploit)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component Team Display 1.2.1 - 'filter_category' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Team Display 1.2.1 - 'filter_category' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component Team Display 1.2.1 - 'filter_category' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Jettweb PHP Hazır Haber Sitesi Scripti V3 - SQL Injection
|
This is a webapps exploit for php platform. Description: Jettweb PHP Hazır Haber Sitesi Scripti V3 - SQL Injection. Author: Ahmet Ümit BAYRAM
|
Analyze the security implications of: Jettweb PHP Hazır Haber Sitesi Scripti V3 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Beehive Forum - Account Takeover
|
This is a webapps exploit for php platform. Description: Beehive Forum - Account Takeover. Author: Pablo Santiago
|
Analyze the security implications of: Beehive Forum - Account Takeover
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: EQ Enterprise management system v2.2.0 - SQL Injection
|
This is a webapps exploit for asp platform. Description: EQ Enterprise management system v2.2.0 - SQL Injection. Author: TLF
|
Analyze the security implications of: EQ Enterprise management system v2.2.0 - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: EWay 4 - Default.APSX Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: EWay 4 - Default.APSX Cross-Site Scripting. Author: BLacK ZeRo
|
Analyze the security implications of: EWay 4 - Default.APSX Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Component RWCards 3.0.11 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component RWCards 3.0.11 - Local File Inclusion. Author: Vrs-hCk
|
Analyze the security implications of: Joomla! Component RWCards 3.0.11 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: JGS-Portal 3.0.1/3.0.2 - 'jgs_portal_statistik.php?year' SQL Injection
|
This is a webapps exploit for php platform. Description: JGS-Portal 3.0.1/3.0.2 - 'jgs_portal_statistik.php?year' SQL Injection. Author: deluxe@security-project.org
|
Analyze the security implications of: JGS-Portal 3.0.1/3.0.2 - 'jgs_portal_statistik.php?year' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: macOS / iOS JavaScriptCore - Loop-Invariant Code Motion (LICM) Leaves Object Property Access Unguarded
|
This is a dos exploit for multiple platform. Description: macOS / iOS JavaScriptCore - Loop-Invariant Code Motion (LICM) Leaves Object Property Access Unguarded. Author: Google Security Research
|
Analyze the security implications of: macOS / iOS JavaScriptCore - Loop-Invariant Code Motion (LICM) Leaves Object Property Access Unguarded
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: iLister Listing Software - Local File Inclusion
|
This is a webapps exploit for php platform. Description: iLister Listing Software - Local File Inclusion. Author: Sid3^effects
|
Analyze the security implications of: iLister Listing Software - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Kerio MailServer 5.6.3 do_map Module - Overflow
|
This is a dos exploit for linux platform. Description: Kerio MailServer 5.6.3 do_map Module - Overflow. Author: David F.Madrid
|
Analyze the security implications of: Kerio MailServer 5.6.3 do_map Module - Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Cezanne 7 - 'cflookup.asp?FUNID' SQL Injection
|
This is a webapps exploit for asp platform. Description: Cezanne 7 - 'cflookup.asp?FUNID' SQL Injection. Author: Juan de la Fuente Costa
|
Analyze the security implications of: Cezanne 7 - 'cflookup.asp?FUNID' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Linksys WRT54GL Firmware 4.30.15 build 2 - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: Linksys WRT54GL Firmware 4.30.15 build 2 - Multiple Vulnerabilities. Author: m-1-k-3
|
Analyze the security implications of: Linksys WRT54GL Firmware 4.30.15 build 2 - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Mambo Component 'com_mamml' - 'listid' SQL Injection
|
This is a webapps exploit for php platform. Description: Mambo Component 'com_mamml' - 'listid' SQL Injection. Author: S@BUN
|
Analyze the security implications of: Mambo Component 'com_mamml' - 'listid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AiOPMSD Final 1.0.0 - 'q' SQL Injection
|
This is a webapps exploit for php platform. Description: AiOPMSD Final 1.0.0 - 'q' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: AiOPMSD Final 1.0.0 - 'q' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HP LaserJet Pro P1606dn - Webadmin Password Reset
|
This is a webapps exploit for hardware platform. Description: HP LaserJet Pro P1606dn - Webadmin Password Reset. Author: m3tamantra
|
Analyze the security implications of: HP LaserJet Pro P1606dn - Webadmin Password Reset
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Creative Software UK Community Portal 1.1 - 'Discussions.php?forum_id' SQL Injection
|
This is a webapps exploit for php platform. Description: Creative Software UK Community Portal 1.1 - 'Discussions.php?forum_id' SQL Injection. Author: r0t
|
Analyze the security implications of: Creative Software UK Community Portal 1.1 - 'Discussions.php?forum_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: cPanel WebHost Manager 3.1 - 'domts2?domain' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: cPanel WebHost Manager 3.1 - 'domts2?domain' Cross-Site Scripting. Author: Aria-Security Team
|
Analyze the security implications of: cPanel WebHost Manager 3.1 - 'domts2?domain' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Bludit 3.9.2 - Authentication Bruteforce Mitigation Bypass
|
This is a webapps exploit for php platform. Description: Bludit 3.9.2 - Authentication Bruteforce Mitigation Bypass. Author: Alexandre ZANNI
|
Analyze the security implications of: Bludit 3.9.2 - Authentication Bruteforce Mitigation Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: NetBSD 1.x - 'TalkD' User Validation
|
This is a remote exploit for netbsd_x86 platform. Description: NetBSD 1.x - 'TalkD' User Validation. Author: Tekno pHReak
|
Analyze the security implications of: NetBSD 1.x - 'TalkD' User Validation
|
This exploit targets netbsd_x86 systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets netbsd_x86 platform
|
What is this exploit about: Joomla! Component com_zoomportfolio - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_zoomportfolio - SQL Injection. Author: Chip d3 bi0s
|
Analyze the security implications of: Joomla! Component com_zoomportfolio - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AwindInc SNMP Service - Command Injection (Metasploit)
|
This is a remote exploit for linux platform. Description: AwindInc SNMP Service - Command Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: AwindInc SNMP Service - Command Injection (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Atmail Webmail 7.2 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Atmail Webmail 7.2 - Multiple Vulnerabilities. Author: smash
|
Analyze the security implications of: Atmail Webmail 7.2 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Clipbucket 2.5 - Directory Traversal
|
This is a webapps exploit for php platform. Description: Clipbucket 2.5 - Directory Traversal. Author: loneferret
|
Analyze the security implications of: Clipbucket 2.5 - Directory Traversal
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PHP Hash Table Collision - Denial of Service (PoC)
|
This is a dos exploit for php platform. Description: PHP Hash Table Collision - Denial of Service (PoC). Author: Christian Mehlmauer
|
Analyze the security implications of: PHP Hash Table Collision - Denial of Service (PoC)
|
This exploit targets php systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Auction RSS Content Script - 'search.php?id' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Auction RSS Content Script - 'search.php?id' Cross-Site Scripting. Author: Moudi
|
Analyze the security implications of: Auction RSS Content Script - 'search.php?id' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ISPConfig < 3.1.13 - Remote Command Execution
|
This is a webapps exploit for php platform. Description: ISPConfig < 3.1.13 - Remote Command Execution. Author: 0x09AL
|
Analyze the security implications of: ISPConfig < 3.1.13 - Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Google Chrome - 'layout' Out-of-Bounds Read
|
This is a dos exploit for multiple platform. Description: Google Chrome - 'layout' Out-of-Bounds Read. Author: Google Security Research
|
Analyze the security implications of: Google Chrome - 'layout' Out-of-Bounds Read
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Ralf S. Engelschall ePerl 2.2.12 - Handling of ISINDEX Query
|
This is a remote exploit for multiple platform. Description: Ralf S. Engelschall ePerl 2.2.12 - Handling of ISINDEX Query. Author: Luz Pinto
|
Analyze the security implications of: Ralf S. Engelschall ePerl 2.2.12 - Handling of ISINDEX Query
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Daily Expenses Management System 1.0 - 'username' SQL Injection
|
This is a webapps exploit for php platform. Description: Daily Expenses Management System 1.0 - 'username' SQL Injection. Author: Daniel Ortiz
|
Analyze the security implications of: Daily Expenses Management System 1.0 - 'username' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Personify360 7.5.2/7.6.1 - Improper Access Restrictions
|
This is a webapps exploit for aspx platform. Description: Personify360 7.5.2/7.6.1 - Improper Access Restrictions. Author: Pesach Zirkind
|
Analyze the security implications of: Personify360 7.5.2/7.6.1 - Improper Access Restrictions
|
This exploit targets aspx systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aspx platform
|
What is this exploit about: AsusWRT RT-AC750GF - Cross-Site Request Forgery (Change Admin Password)
|
This is a webapps exploit for hardware platform. Description: AsusWRT RT-AC750GF - Cross-Site Request Forgery (Change Admin Password). Author: Wadeek
|
Analyze the security implications of: AsusWRT RT-AC750GF - Cross-Site Request Forgery (Change Admin Password)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Touchpad / Trivum WebTouch Setup 2.53 build 13163 - Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: Touchpad / Trivum WebTouch Setup 2.53 build 13163 - Authentication Bypass. Author: vulnc0d3
|
Analyze the security implications of: Touchpad / Trivum WebTouch Setup 2.53 build 13163 - Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.