input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Joomla! Component Music Manager - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: VTENEXT 19 CE - Remote Code Execution
|
This is a webapps exploit for multiple platform. Description: VTENEXT 19 CE - Remote Code Execution. Author: Marco Ruela
|
Analyze the security implications of: VTENEXT 19 CE - Remote Code Execution
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Def_Blog 1.0.3 - 'comlook.php?article' SQL Injection
|
This is a webapps exploit for php platform. Description: Def_Blog 1.0.3 - 'comlook.php?article' SQL Injection. Author: CWH Underground
|
Analyze the security implications of: Def_Blog 1.0.3 - 'comlook.php?article' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Webmin 1.962 - 'Package Updates' Escape Bypass RCE (Metasploit)
|
This is a webapps exploit for linux platform. Description: Webmin 1.962 - 'Package Updates' Escape Bypass RCE (Metasploit). Author: AkkuS
|
Analyze the security implications of: Webmin 1.962 - 'Package Updates' Escape Bypass RCE (Metasploit)
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: D-Link DWL Series Access-Point 2.10na - Config Disclosure
|
This is a remote exploit for hardware platform. Description: D-Link DWL Series Access-Point 2.10na - Config Disclosure. Author: INTRUDERS
|
Analyze the security implications of: D-Link DWL Series Access-Point 2.10na - Config Disclosure
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: BPRealestate Real Estate - Authentication Bypass
|
This is a webapps exploit for asp platform. Description: BPRealestate Real Estate - Authentication Bypass. Author: v3n0m
|
Analyze the security implications of: BPRealestate Real Estate - Authentication Bypass
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: SpinetiX Fusion Digital Signage 3.4.8 - Username Enumeration
|
This is a webapps exploit for hardware platform. Description: SpinetiX Fusion Digital Signage 3.4.8 - Username Enumeration. Author: LiquidWorm
|
Analyze the security implications of: SpinetiX Fusion Digital Signage 3.4.8 - Username Enumeration
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Grocery crud 1.6.4 - 'order_by' SQL Injection
|
This is a webapps exploit for multiple platform. Description: Grocery crud 1.6.4 - 'order_by' SQL Injection. Author: TonyShavez
|
Analyze the security implications of: Grocery crud 1.6.4 - 'order_by' SQL Injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CMS Lokomedia - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities
|
This is a webapps exploit for php platform. Description: CMS Lokomedia - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities. Author: the_cyber_nuxbie
|
Analyze the security implications of: CMS Lokomedia - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Calendarix 0.7.20070307 - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Calendarix 0.7.20070307 - Multiple SQL Injections. Author: Jesper Jurcenoks
|
Analyze the security implications of: Calendarix 0.7.20070307 - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: rsync 2.5.1 - Remote (2)
|
This is a remote exploit for linux platform. Description: rsync 2.5.1 - Remote (2). Author: Teso
|
Analyze the security implications of: rsync 2.5.1 - Remote (2)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Ipswitch IMail 5.0 - LDAP Buffer Overflow (Denial of Service) (PoC)
|
This is a dos exploit for multiple platform. Description: Ipswitch IMail 5.0 - LDAP Buffer Overflow (Denial of Service) (PoC). Author: Marc of eEye
|
Analyze the security implications of: Ipswitch IMail 5.0 - LDAP Buffer Overflow (Denial of Service) (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: HP JetDirect PJL - Interface Universal Directory Traversal (Metasploit)
|
This is a remote exploit for hardware platform. Description: HP JetDirect PJL - Interface Universal Directory Traversal (Metasploit). Author: Myo Soe
|
Analyze the security implications of: HP JetDirect PJL - Interface Universal Directory Traversal (Metasploit)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component eXtroForms 2.1.5 - 'filter_type_id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component eXtroForms 2.1.5 - 'filter_type_id' SQL Injection. Author: AkkuS
|
Analyze the security implications of: Joomla! Component eXtroForms 2.1.5 - 'filter_type_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_stat_ports.php?base_path' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_stat_ports.php?base_path' Remote File Inclusion. Author: indoushka
|
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_stat_ports.php?base_path' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Totemomail 4.x/5.x - Persistent Cross-Site Scripting
|
This is a webapps exploit for jsp platform. Description: Totemomail 4.x/5.x - Persistent Cross-Site Scripting. Author: Vulnerability-Lab
|
Analyze the security implications of: Totemomail 4.x/5.x - Persistent Cross-Site Scripting
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Computalynx CProxy Server 3.3 SP2 - Buffer Overflow (Denial of Service) (PoC)
|
This is a dos exploit for multiple platform. Description: Computalynx CProxy Server 3.3 SP2 - Buffer Overflow (Denial of Service) (PoC). Author: HaCk-13 TeaM
|
Analyze the security implications of: Computalynx CProxy Server 3.3 SP2 - Buffer Overflow (Denial of Service) (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: IBM Tivoli Access Manager Plugin - Directory Traversal
|
This is a webapps exploit for cgi platform. Description: IBM Tivoli Access Manager Plugin - Directory Traversal. Author: Timothy D. Morgan
|
Analyze the security implications of: IBM Tivoli Access Manager Plugin - Directory Traversal
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Athttpd 0.4b - GET Remote Buffer Overrun
|
This is a remote exploit for linux platform. Description: Athttpd 0.4b - GET Remote Buffer Overrun. Author: r-code
|
Analyze the security implications of: Athttpd 0.4b - GET Remote Buffer Overrun
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Ruby 1.9 dl - Module DL.dlopen Arbitrary Library Access
|
This is a remote exploit for multiple platform. Description: Ruby 1.9 dl - Module DL.dlopen Arbitrary Library Access. Author: Keita Yamaguchi
|
Analyze the security implications of: Ruby 1.9 dl - Module DL.dlopen Arbitrary Library Access
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: iXmail 0.2/0.3 - 'iXmail_NetAttach.php' File Deletion
|
This is a webapps exploit for php platform. Description: iXmail 0.2/0.3 - 'iXmail_NetAttach.php' File Deletion. Author: leseulfrog
|
Analyze the security implications of: iXmail 0.2/0.3 - 'iXmail_NetAttach.php' File Deletion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Highwood Design hwdVideoShare - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Highwood Design hwdVideoShare - SQL Injection. Author: S@BUN
|
Analyze the security implications of: Joomla! Component Highwood Design hwdVideoShare - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cory Jobs Search - 'cid' SQL Injection
|
This is a webapps exploit for php platform. Description: Cory Jobs Search - 'cid' SQL Injection. Author: Slotleet
|
Analyze the security implications of: Cory Jobs Search - 'cid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GS Foto Uebertraeger 3.0 iOS - Local File Inclusion
|
This is a webapps exploit for ios platform. Description: GS Foto Uebertraeger 3.0 iOS - Local File Inclusion. Author: Vulnerability-Lab
|
Analyze the security implications of: GS Foto Uebertraeger 3.0 iOS - Local File Inclusion
|
This exploit targets ios systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: GIF Collection 2.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: GIF Collection 2.0 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: GIF Collection 2.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Moeditor 0.2.0 - Persistent Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: Moeditor 0.2.0 - Persistent Cross-Site Scripting. Author: TaurusOmar
|
Analyze the security implications of: Moeditor 0.2.0 - Persistent Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Oracle CTI Web Service - 'EBS_ASSET_HISTORY_OPERATIONS' XML Entity Injection
|
This is a webapps exploit for java platform. Description: Oracle CTI Web Service - 'EBS_ASSET_HISTORY_OPERATIONS' XML Entity Injection. Author: omurugur
|
Analyze the security implications of: Oracle CTI Web Service - 'EBS_ASSET_HISTORY_OPERATIONS' XML Entity Injection
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Joomla! Component RD-Autos 1.5.5 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component RD-Autos 1.5.5 - SQL Injection. Author: H!tm@N
|
Analyze the security implications of: Joomla! Component RD-Autos 1.5.5 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cisco IP Phone 7940 - 10 SIP Messages Remote Denial of Service
|
This is a dos exploit for hardware platform. Description: Cisco IP Phone 7940 - 10 SIP Messages Remote Denial of Service. Author: MADYNES
|
Analyze the security implications of: Cisco IP Phone 7940 - 10 SIP Messages Remote Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Glossword 1.8.1 - 'custom_vars.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Glossword 1.8.1 - 'custom_vars.php' Remote File Inclusion. Author: BeyazKurt
|
Analyze the security implications of: Glossword 1.8.1 - 'custom_vars.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_zcalendar - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_zcalendar - Blind SQL Injection. Author: FL0RiX
|
Analyze the security implications of: Joomla! Component com_zcalendar - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BeroFTPD 1.3.4(1) (Linux x86) - Remote Code Execution
|
This is a remote exploit for linux_x86 platform. Description: BeroFTPD 1.3.4(1) (Linux x86) - Remote Code Execution. Author: qitest1
|
Analyze the security implications of: BeroFTPD 1.3.4(1) (Linux x86) - Remote Code Execution
|
This exploit targets linux_x86 systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux_x86 platform
|
What is this exploit about: lanewsfactory - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: lanewsfactory - Multiple Vulnerabilities. Author: Salvatore Fresta
|
Analyze the security implications of: lanewsfactory - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Swann DVR4 SecuraNet - Directory Traversal
|
This is a remote exploit for linux platform. Description: Swann DVR4 SecuraNet - Directory Traversal. Author: Terry Froy
|
Analyze the security implications of: Swann DVR4 SecuraNet - Directory Traversal
|
This exploit targets linux systems. Type: remote. Risk level: High
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.