input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Xpient - Cash Drawer Operation | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Cemetry Mapping and Information System 1.0 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Cemetry Mapping and Information System 1.0 - Multiple SQL Injections. Author: Mesut Cetin |
Analyze the security implications of: Cemetry Mapping and Information System 1.0 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Simple Student Attendance System v1.0 - 'classid' Time Based Blind & Union Based SQL Injection | This is a remote exploit for php platform. Description: Simple Student Attendance System v1.0 - 'classid' Time Based Blind & Union Based SQL Injection. Author: Gnanaraj Mauviel |
Analyze the security implications of: Simple Student Attendance System v1.0 - 'classid' Time Based Blind & Union Based SQL Injection | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Flash Player - ShaderJob Buffer Overflow (Metasploit) | This is a remote exploit for multiple platform. Description: Adobe Flash Player - ShaderJob Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: Adobe Flash Player - ShaderJob Buffer Overflow (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: LogoStore - 'query' SQL Injection | This is a webapps exploit for php platform. Description: LogoStore - 'query' SQL Injection. Author: Kaan KAMIS |
Analyze the security implications of: LogoStore - 'query' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Easy-Clanpage 2.2 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Easy-Clanpage 2.2 - 'id' SQL Injection. Author: n3w7u |
Analyze the security implications of: Easy-Clanpage 2.2 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JE Guestbook 1.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Joomla! Component JE Guestbook 1.0 - Multiple Vulnerabilities. Author: Salvatore Fresta |
Analyze the security implications of: Joomla! Component JE Guestbook 1.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sophos Web Protection Appliance - 'sblistpack' Arbitrary Command Execution (Metasploit) | This is a remote exploit for linux platform. Description: Sophos Web Protection Appliance - 'sblistpack' Arbitrary Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Sophos Web Protection Appliance - 'sblistpack' Arbitrary Command Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: JFFNms 0.8.3 - 'auth.php?user' Cross-Site Scripting | This is a webapps exploit for php platform. Description: JFFNms 0.8.3 - 'auth.php?user' Cross-Site Scripting. Author: Tim Brown |
Analyze the security implications of: JFFNms 0.8.3 - 'auth.php?user' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: e-pay 1.55 - Remote File Inclusion | This is a webapps exploit for php platform. Description: e-pay 1.55 - Remote File Inclusion. Author: indoushka |
Analyze the security implications of: e-pay 1.55 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Code Widgets DataBound Index Style Menu - 'category.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Code Widgets DataBound Index Style Menu - 'category.asp' SQL Injection. Author: Inj3ct0r |
Analyze the security implications of: Code Widgets DataBound Index Style Menu - 'category.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: PHP 7.0 - 'AppendIterator::append' Local Denial of Service | This is a dos exploit for php platform. Description: PHP 7.0 - 'AppendIterator::append' Local Denial of Service. Author: Yakir Wizman |
Analyze the security implications of: PHP 7.0 - 'AppendIterator::append' Local Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo 4.x - 'Zorder' SQL Injection | This is a webapps exploit for php platform. Description: Mambo 4.x - 'Zorder' SQL Injection. Author: KraL BeNiM |
Analyze the security implications of: Mambo 4.x - 'Zorder' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: cftp 0.12 - Banner Parsing Buffer Overflow | This is a remote exploit for freebsd platform. Description: cftp 0.12 - Banner Parsing Buffer Overflow. Author: inv[at]dtors |
Analyze the security implications of: cftp 0.12 - Banner Parsing Buffer Overflow | This exploit targets freebsd systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: Sudo 1.9.5p1 - 'Baron Samedit ' Heap-Based Buffer Overflow Privilege Escalation (2) | This is a local exploit for multiple platform. Description: Sudo 1.9.5p1 - 'Baron Samedit ' Heap-Based Buffer Overflow Privilege Escalation (2). Author: nu11secur1ty |
Analyze the security implications of: Sudo 1.9.5p1 - 'Baron Samedit ' Heap-Based Buffer Overflow Privilege Escalation (2) | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: eDContainer 2.22 - Local File Inclusion | This is a webapps exploit for php platform. Description: eDContainer 2.22 - Local File Inclusion. Author: GoLd_M |
Analyze the security implications of: eDContainer 2.22 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NTPd ntp-4.2.6p5 - 'ctl_putdata()' Buffer Overflow (PoC) | This is a dos exploit for linux platform. Description: NTPd ntp-4.2.6p5 - 'ctl_putdata()' Buffer Overflow (PoC). Author: Marcin Kozlowski |
Analyze the security implications of: NTPd ntp-4.2.6p5 - 'ctl_putdata()' Buffer Overflow (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Allomani Super MultiMedia 2.5 - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: Allomani Super MultiMedia 2.5 - Cross-Site Request Forgery (Add Admin). Author: G0D-F4Th3r |
Analyze the security implications of: Allomani Super MultiMedia 2.5 - Cross-Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Seowon SlC 130 Router - Remote Code Execution | This is a webapps exploit for hardware platform. Description: Seowon SlC 130 Router - Remote Code Execution. Author: maj0rmil4d |
Analyze the security implications of: Seowon SlC 130 Router - Remote Code Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: GDL 4.x - 'node' SQL Injection | This is a webapps exploit for php platform. Description: GDL 4.x - 'node' SQL Injection. Author: g4t3w4y |
Analyze the security implications of: GDL 4.x - 'node' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EsContacts 1.0 - 'importer.php?msg' Cross-Site Scripting | This is a webapps exploit for php platform. Description: EsContacts 1.0 - 'importer.php?msg' Cross-Site Scripting. Author: ZoRLu |
Analyze the security implications of: EsContacts 1.0 - 'importer.php?msg' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dolibarr ERP/CRM 3 - (Authenticated) OS Command Injection (Metasploit) | This is a webapps exploit for php platform. Description: Dolibarr ERP/CRM 3 - (Authenticated) OS Command Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Dolibarr ERP/CRM 3 - (Authenticated) OS Command Injection (Metasploit) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Calibre E-Book Reader - Local Privilege Escalation (1) | This is a local exploit for linux platform. Description: Calibre E-Book Reader - Local Privilege Escalation (1). Author: zx2c4 |
Analyze the security implications of: Calibre E-Book Reader - Local Privilege Escalation (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Innovate Portal 2.0 - 'acp.php' Remote Code Execution | This is a webapps exploit for php platform. Description: Innovate Portal 2.0 - 'acp.php' Remote Code Execution. Author: Kacper |
Analyze the security implications of: Innovate Portal 2.0 - 'acp.php' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ab Web CMS 1.35 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: ab Web CMS 1.35 - Multiple Vulnerabilities. Author: Dr.0rYX & Cr3W-DZ |
Analyze the security implications of: ab Web CMS 1.35 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JE CMS 1.0.0 - Authentication Bypass | This is a webapps exploit for php platform. Description: JE CMS 1.0.0 - Authentication Bypass. Author: Abysssec |
Analyze the security implications of: JE CMS 1.0.0 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Angelo-Emlak 1.0 - Multiple SQL Injections | This is a webapps exploit for asp platform. Description: Angelo-Emlak 1.0 - Multiple SQL Injections. Author: U238 |
Analyze the security implications of: Angelo-Emlak 1.0 - Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: SIPS 0.2.2 - User Information Disclosure | This is a remote exploit for multiple platform. Description: SIPS 0.2.2 - User Information Disclosure. Author: dwcgr0up |
Analyze the security implications of: SIPS 0.2.2 - User Information Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Escon SupportPortal Pro 3.0 - 'tid' Blind SQL Injection | This is a webapps exploit for php platform. Description: Escon SupportPortal Pro 3.0 - 'tid' Blind SQL Injection. Author: OzX |
Analyze the security implications of: Escon SupportPortal Pro 3.0 - 'tid' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AJ HYIP ACME - 'readarticle.php' SQL Injection | This is a webapps exploit for php platform. Description: AJ HYIP ACME - 'readarticle.php' SQL Injection. Author: InjEctOr5 |
Analyze the security implications of: AJ HYIP ACME - 'readarticle.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel < 2.6.37-rc2 - 'TCP_MAXSEG' Kernel Panic (Denial of Service) (2) | This is a dos exploit for linux platform. Description: Linux Kernel < 2.6.37-rc2 - 'TCP_MAXSEG' Kernel Panic (Denial of Service) (2). Author: zx2c4 |
Analyze the security implications of: Linux Kernel < 2.6.37-rc2 - 'TCP_MAXSEG' Kernel Panic (Denial of Service) (2) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Cerberus Helpdesk 2.649 - 'display_ticket_thread.php?ticket' SQL Injection | This is a webapps exploit for php platform. Description: Cerberus Helpdesk 2.649 - 'display_ticket_thread.php?ticket' SQL Injection. Author: A. Ramos |
Analyze the security implications of: Cerberus Helpdesk 2.649 - 'display_ticket_thread.php?ticket' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FS Freelancer Clone - 'sk' SQL Injection | This is a webapps exploit for php platform. Description: FS Freelancer Clone - 'sk' SQL Injection. Author: 8bitsec |
Analyze the security implications of: FS Freelancer Clone - 'sk' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Inside Systems Mail 2.0 - 'error.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Inside Systems Mail 2.0 - 'error.php' Cross-Site Scripting. Author: Vicente Aguilera Diaz |
Analyze the security implications of: Inside Systems Mail 2.0 - 'error.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.