input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Cacti 0.8.7 - 'graph_xport.php?local_graph_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Clone Script Directory Script 1.1.0 - 'cid' SQL Injection | This is a webapps exploit for php platform. Description: Clone Script Directory Script 1.1.0 - 'cid' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Clone Script Directory Script 1.1.0 - 'cid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Boa 0.93.15 - Administrator Password Overwrite Authentication Bypass | This is a dos exploit for linux platform. Description: Boa 0.93.15 - Administrator Password Overwrite Authentication Bypass. Author: Luca Carettoni |
Analyze the security implications of: Boa 0.93.15 - Administrator Password Overwrite Authentication Bypass | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Zdaemon 1.8.1 - Multiple Vulnerabilities | This is a dos exploit for multiple platform. Description: Zdaemon 1.8.1 - Multiple Vulnerabilities. Author: Luigi Auriemma |
Analyze the security implications of: Zdaemon 1.8.1 - Multiple Vulnerabilities | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Jaws 0.6.2 - Search gadget SQL Injection | This is a webapps exploit for php platform. Description: Jaws 0.6.2 - Search gadget SQL Injection. Author: rgod |
Analyze the security implications of: Jaws 0.6.2 - Search gadget SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Site2Ntite Vacation Rental (VRBO) Listings - SQL Injection | This is a webapps exploit for asp platform. Description: Site2Ntite Vacation Rental (VRBO) Listings - SQL Injection. Author: L0rd CrusAd3r |
Analyze the security implications of: Site2Ntite Vacation Rental (VRBO) Listings - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: creLoaded 6.15 - 'HTMLAREA' Automated Perl | This is a webapps exploit for php platform. Description: creLoaded 6.15 - 'HTMLAREA' Automated Perl. Author: kaneda |
Analyze the security implications of: creLoaded 6.15 - 'HTMLAREA' Automated Perl | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link DI-524 V2.06RU - Multiple Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: D-Link DI-524 V2.06RU - Multiple Cross-Site Scripting. Author: Semen Alexandrovich Lyhin |
Analyze the security implications of: D-Link DI-524 V2.06RU - Multiple Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Lootan - 'login.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Lootan - 'login.asp' SQL Injection. Author: Arash Setayeshi |
Analyze the security implications of: Lootan - 'login.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: I-Rater Pro/Plantinum 4.0 - Authentication Bypass | This is a webapps exploit for php platform. Description: I-Rater Pro/Plantinum 4.0 - Authentication Bypass. Author: Hakxer |
Analyze the security implications of: I-Rater Pro/Plantinum 4.0 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Network Manager VPNC 1.2.6 - 'Username' Local Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: Network Manager VPNC 1.2.6 - 'Username' Local Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: Network Manager VPNC 1.2.6 - 'Username' Local Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: glibc-2.2 / openssh-2.3.0p1 / glibc 2.1.9x - File Read | This is a local exploit for linux platform. Description: glibc-2.2 / openssh-2.3.0p1 / glibc 2.1.9x - File Read. Author: krochos |
Analyze the security implications of: glibc-2.2 / openssh-2.3.0p1 / glibc 2.1.9x - File Read | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Mambo Component MambAds - SQL Injection | This is a webapps exploit for php platform. Description: Mambo Component MambAds - SQL Injection. Author: Dreadful |
Analyze the security implications of: Mambo Component MambAds - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component DT Register - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component DT Register - SQL Injection. Author: His0k4 |
Analyze the security implications of: Joomla! Component DT Register - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Walla TeleSite 3.0 - 'ts.cgi' File Existence Enumeration | This is a webapps exploit for cgi platform. Description: Walla TeleSite 3.0 - 'ts.cgi' File Existence Enumeration. Author: Rafi Nahum |
Analyze the security implications of: Walla TeleSite 3.0 - 'ts.cgi' File Existence Enumeration | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Ad Management Java - Authentication Bypass | This is a webapps exploit for asp platform. Description: Ad Management Java - Authentication Bypass. Author: R3d-D3V!L |
Analyze the security implications of: Ad Management Java - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ABB Cylon Aspect 3.08.03 - Hard-coded Secrets | This is a webapps exploit for multiple platform. Description: ABB Cylon Aspect 3.08.03 - Hard-coded Secrets. Author: LiquidWorm |
Analyze the security implications of: ABB Cylon Aspect 3.08.03 - Hard-coded Secrets | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: emuCMS 0.3 - 'cat_id' SQL Injection | This is a webapps exploit for php platform. Description: emuCMS 0.3 - 'cat_id' SQL Injection. Author: TurkishWarriorr |
Analyze the security implications of: emuCMS 0.3 - 'cat_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: KwsPHP - 'Upload' Remote Code Execution | This is a webapps exploit for php platform. Description: KwsPHP - 'Upload' Remote Code Execution. Author: Ajax |
Analyze the security implications of: KwsPHP - 'Upload' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX 10.6.5 / iOS 4.3.3 Mail - Denial of Service | This is a dos exploit for osx platform. Description: Apple Mac OSX 10.6.5 / iOS 4.3.3 Mail - Denial of Service. Author: shebang42 |
Analyze the security implications of: Apple Mac OSX 10.6.5 / iOS 4.3.3 Mail - Denial of Service | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Multiple CCTV-DVR Vendors - Remote Code Execution | This is a remote exploit for hardware platform. Description: Multiple CCTV-DVR Vendors - Remote Code Execution. Author: K1P0D |
Analyze the security implications of: Multiple CCTV-DVR Vendors - Remote Code Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Chimera Web Portal 0.2 - 'linkcategory.php?id' SQL Injection | This is a webapps exploit for php platform. Description: Chimera Web Portal 0.2 - 'linkcategory.php?id' SQL Injection. Author: Aliaksandr Hartsuyeu |
Analyze the security implications of: Chimera Web Portal 0.2 - 'linkcategory.php?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! / Mambo Component Datsogallery 1.3.1 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! / Mambo Component Datsogallery 1.3.1 - 'id' SQL Injection. Author: Cr@zy_King |
Analyze the security implications of: Joomla! / Mambo Component Datsogallery 1.3.1 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Axis2 - (Authenticated) Code Execution (via REST) (Metasploit) | This is a remote exploit for multiple platform. Description: Axis2 - (Authenticated) Code Execution (via REST) (Metasploit). Author: Metasploit |
Analyze the security implications of: Axis2 - (Authenticated) Code Execution (via REST) (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component OrgChart 1.0.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component OrgChart 1.0.0 - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component OrgChart 1.0.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Endian Firewall - Password Change Command Injection (Metasploit) | This is a remote exploit for linux platform. Description: Endian Firewall - Password Change Command Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Endian Firewall - Password Change Command Injection (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ISPConfig 2.2.3 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: ISPConfig 2.2.3 - Multiple Remote File Inclusions. Author: Federico Fazzi |
Analyze the security implications of: ISPConfig 2.2.3 - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Calendar MX BASIC 1.0.2 - 'ID' SQL Injection | This is a webapps exploit for asp platform. Description: Calendar MX BASIC 1.0.2 - 'ID' SQL Injection. Author: ajann |
Analyze the security implications of: Calendar MX BASIC 1.0.2 - 'ID' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Jevonweb Guestbook - Remote Admin Access | This is a webapps exploit for php platform. Description: Jevonweb Guestbook - Remote Admin Access. Author: Sora |
Analyze the security implications of: Jevonweb Guestbook - Remote Admin Access | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Webvizyon - 'SayfalaAltList.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Webvizyon - 'SayfalaAltList.asp' SQL Injection. Author: StorMBoY |
Analyze the security implications of: Webvizyon - 'SayfalaAltList.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: BOLDfx Recipe Script 5.0 - Multiple Remote Vulnerabilities | This is a webapps exploit for php platform. Description: BOLDfx Recipe Script 5.0 - Multiple Remote Vulnerabilities. Author: Milos Zivanovic |
Analyze the security implications of: BOLDfx Recipe Script 5.0 - Multiple Remote Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iTech Image Sharing Script 4.13 - SQL Injection | This is a webapps exploit for php platform. Description: iTech Image Sharing Script 4.13 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: iTech Image Sharing Script 4.13 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Deluge 1.3.15 - 'URL' Denial of Service (PoC) | This is a dos exploit for multiple platform. Description: Deluge 1.3.15 - 'URL' Denial of Service (PoC). Author: Victor Mondragón |
Analyze the security implications of: Deluge 1.3.15 - 'URL' Denial of Service (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ActiveBuyandSell 6.2 - 'buyersend.asp?catid' Blind SQL Injection | This is a webapps exploit for asp platform. Description: ActiveBuyandSell 6.2 - 'buyersend.asp?catid' Blind SQL Injection. Author: R3d-D3V!L |
Analyze the security implications of: ActiveBuyandSell 6.2 - 'buyersend.asp?catid' Blind SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.