input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Western Digital MyCloud - 'multi_uploadify' File Upload (Metasploit) | This is a remote exploit for php platform. Description: Western Digital MyCloud - 'multi_uploadify' File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: Western Digital MyCloud - 'multi_uploadify' File Upload (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP Insight Diagnostics - Remote Code Injection | This is a webapps exploit for php platform. Description: HP Insight Diagnostics - Remote Code Injection. Author: Markus Wulftange |
Analyze the security implications of: HP Insight Diagnostics - Remote Code Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Saflok - Key Derication Function Exploit | This is a local exploit for hardware platform. Description: Saflok - Key Derication Function Exploit. Author: planthopper3301 |
Analyze the security implications of: Saflok - Key Derication Function Exploit | This exploit targets hardware systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: LiSK CMS 4.4 - SQL Injection | This is a webapps exploit for php platform. Description: LiSK CMS 4.4 - SQL Injection. Author: High-Tech Bridge SA |
Analyze the security implications of: LiSK CMS 4.4 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenSSH/PAM 3.6.1p1 - 'gossh.sh' Remote Users Ident | This is a remote exploit for linux platform. Description: OpenSSH/PAM 3.6.1p1 - 'gossh.sh' Remote Users Ident. Author: Nicolas Couture |
Analyze the security implications of: OpenSSH/PAM 3.6.1p1 - 'gossh.sh' Remote Users Ident | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: aeDating 4.1 - dir[inc] Remote File Inclusion | This is a webapps exploit for php platform. Description: aeDating 4.1 - dir[inc] Remote File Inclusion. Author: NeXtMaN |
Analyze the security implications of: aeDating 4.1 - dir[inc] Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Grandstream UCM6200 Series WebSocket 1.0.20.20 - 'user_password' SQL Injection | This is a webapps exploit for hardware platform. Description: Grandstream UCM6200 Series WebSocket 1.0.20.20 - 'user_password' SQL Injection. Author: Jacob Baines |
Analyze the security implications of: Grandstream UCM6200 Series WebSocket 1.0.20.20 - 'user_password' SQL Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: FileBrowser 2.17.2 - Cross Site Request Forgery (CSRF) to Remote Code Execution (RCE) | This is a webapps exploit for multiple platform. Description: FileBrowser 2.17.2 - Cross Site Request Forgery (CSRF) to Remote Code Execution (RCE). Author: FEBIN MON SAJI |
Analyze the security implications of: FileBrowser 2.17.2 - Cross Site Request Forgery (CSRF) to Remote Code Execution (RCE) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Bravo Tejari Web Portal - Cross-Site Request Forgery | This is a webapps exploit for multiple platform. Description: Bravo Tejari Web Portal - Cross-Site Request Forgery. Author: Arvind V |
Analyze the security implications of: Bravo Tejari Web Portal - Cross-Site Request Forgery | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Froxlor 0.10.29.1 - SQL Injection (Authenticated) | This is a webapps exploit for php platform. Description: Froxlor 0.10.29.1 - SQL Injection (Authenticated). Author: Martin Cernac |
Analyze the security implications of: Froxlor 0.10.29.1 - SQL Injection (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Coppermine Photo Gallery 1.3.2 - File Retrieval / SQL Injection | This is a webapps exploit for php platform. Description: Coppermine Photo Gallery 1.3.2 - File Retrieval / SQL Injection. Author: DiGiTAL_MiDWAY |
Analyze the security implications of: Coppermine Photo Gallery 1.3.2 - File Retrieval / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Martin Hamilton ROADS 2.3 - File Disclosure | This is a remote exploit for cgi platform. Description: Martin Hamilton ROADS 2.3 - File Disclosure. Author: cuctema |
Analyze the security implications of: Martin Hamilton ROADS 2.3 - File Disclosure | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Joomla! Component com_intuit - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_intuit - Local File Inclusion. Author: FL0RiX |
Analyze the security implications of: Joomla! Component com_intuit - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Active Calendar 1.2 - '/data/y_2.php?css' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Active Calendar 1.2 - '/data/y_2.php?css' Cross-Site Scripting. Author: Simon Bonnard |
Analyze the security implications of: Active Calendar 1.2 - '/data/y_2.php?css' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Hotel Booking Portal 0.1 - Multiple SQL Injections / Cross-Site Scripting | This is a webapps exploit for php platform. Description: Hotel Booking Portal 0.1 - Multiple SQL Injections / Cross-Site Scripting. Author: Yakir Wizman |
Analyze the security implications of: Hotel Booking Portal 0.1 - Multiple SQL Injections / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CmsMadeSimple v2.2.17 - session hijacking via Server-Side Template Injection (SSTI) | This is a webapps exploit for php platform. Description: CmsMadeSimple v2.2.17 - session hijacking via Server-Side Template Injection (SSTI). Author: Mirabbas Ağalarov |
Analyze the security implications of: CmsMadeSimple v2.2.17 - session hijacking via Server-Side Template Injection (SSTI) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo Component EstateAgent 1.0.2 - MosConfig_absolute_path Remote File Inclusion | This is a webapps exploit for php platform. Description: Mambo Component EstateAgent 1.0.2 - MosConfig_absolute_path Remote File Inclusion. Author: O.U.T.L.A.W |
Analyze the security implications of: Mambo Component EstateAgent 1.0.2 - MosConfig_absolute_path Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AddressSanitizer (ASan) - SUID Executable Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: AddressSanitizer (ASan) - SUID Executable Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: AddressSanitizer (ASan) - SUID Executable Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_joomgalaxy 1.2.0.4 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Joomla! Component com_joomgalaxy 1.2.0.4 - Multiple Vulnerabilities. Author: D4NB4R |
Analyze the security implications of: Joomla! Component com_joomgalaxy 1.2.0.4 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache Tomcat 3.2.3/3.2.4 - Example Files Web Root Full Path Disclosure | This is a remote exploit for multiple platform. Description: Apache Tomcat 3.2.3/3.2.4 - Example Files Web Root Full Path Disclosure. Author: Richard Brain |
Analyze the security implications of: Apache Tomcat 3.2.3/3.2.4 - Example Files Web Root Full Path Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Site Tanitimlari Scripti - Multiple SQL Injections | This is a webapps exploit for asp platform. Description: Site Tanitimlari Scripti - Multiple SQL Injections. Author: fahn zichler |
Analyze the security implications of: Site Tanitimlari Scripti - Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: TW-WebServer 1.0 - Denial of Service (1) | This is a dos exploit for multiple platform. Description: TW-WebServer 1.0 - Denial of Service (1). Author: badpack3t |
Analyze the security implications of: TW-WebServer 1.0 - Denial of Service (1) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Active CMS 1.2 - 'mod' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Active CMS 1.2 - 'mod' Cross-Site Scripting. Author: Stefan Schurtz |
Analyze the security implications of: Active CMS 1.2 - 'mod' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BuzzyWall 1.3.1 - 'search' SQL Injection | This is a webapps exploit for php platform. Description: BuzzyWall 1.3.1 - 'search' SQL Injection. Author: ~!Dok_tOR!~ |
Analyze the security implications of: BuzzyWall 1.3.1 - 'search' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sun xVM VirtualBox < 1.6.4 - Privilege Escalation (PoC) | This is a dos exploit for multiple platform. Description: Sun xVM VirtualBox < 1.6.4 - Privilege Escalation (PoC). Author: Core Security |
Analyze the security implications of: Sun xVM VirtualBox < 1.6.4 - Privilege Escalation (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: orangescrum 1.8.0 - 'Multiple' Cross-Site Scripting (XSS) (Authenticated) | This is a webapps exploit for multiple platform. Description: orangescrum 1.8.0 - 'Multiple' Cross-Site Scripting (XSS) (Authenticated). Author: Hubert Wojciechowski |
Analyze the security implications of: orangescrum 1.8.0 - 'Multiple' Cross-Site Scripting (XSS) (Authenticated) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: IBM RICOH InfoPrint 6500 Printer - HTML Injection | This is a webapps exploit for hardware platform. Description: IBM RICOH InfoPrint 6500 Printer - HTML Injection. Author: Ismail Tasdelen |
Analyze the security implications of: IBM RICOH InfoPrint 6500 Printer - HTML Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Backup and Staging by WP Time Capsule 1.22.21 - Unauthenticated Arbitrary File Upload | This is a webapps exploit for php platform. Description: Backup and Staging by WP Time Capsule 1.22.21 - Unauthenticated Arbitrary File Upload. Author: Al Baradi Joy |
Analyze the security implications of: Backup and Staging by WP Time Capsule 1.22.21 - Unauthenticated Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Berty Forum 1.4 - 'index.php' Blind SQL Injection | This is a webapps exploit for asp platform. Description: Berty Forum 1.4 - 'index.php' Blind SQL Injection. Author: ajann |
Analyze the security implications of: Berty Forum 1.4 - 'index.php' Blind SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: DUclassmate 1.x - 'account.asp?MM-recordId' Arbitrary Password Modification | This is a webapps exploit for asp platform. Description: DUclassmate 1.x - 'account.asp?MM-recordId' Arbitrary Password Modification. Author: Soroosh Dalili |
Analyze the security implications of: DUclassmate 1.x - 'account.asp?MM-recordId' Arbitrary Password Modification | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Mozilla Firefox 2.0.0.2 - '.GIF' Handling Denial of Service | This is a dos exploit for linux platform. Description: Mozilla Firefox 2.0.0.2 - '.GIF' Handling Denial of Service. Author: Samuel |
Analyze the security implications of: Mozilla Firefox 2.0.0.2 - '.GIF' Handling Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: D-Link DAP-1325 - Broken Access Control | This is a webapps exploit for hardware platform. Description: D-Link DAP-1325 - Broken Access Control. Author: ieduardogoncalves |
Analyze the security implications of: D-Link DAP-1325 - Broken Access Control | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: GWExtranet 3.0 - 'Scp.dll' Multiple HTML Injection Vulnerabilities | This is a webapps exploit for cgi platform. Description: GWExtranet 3.0 - 'Scp.dll' Multiple HTML Injection Vulnerabilities. Author: Doz |
Analyze the security implications of: GWExtranet 3.0 - 'Scp.dll' Multiple HTML Injection Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Basic Forum 1.1 - 'edit.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Basic Forum 1.1 - 'edit.asp' SQL Injection. Author: bolivar |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.