input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Sybase EAServer 6.3.1 - Multiple Vulnerabilities
|
This is a webapps exploit for jsp platform. Description: Sybase EAServer 6.3.1 - Multiple Vulnerabilities. Author: SEC Consult
|
Analyze the security implications of: Sybase EAServer 6.3.1 - Multiple Vulnerabilities
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: AWF CMS 1.11 - 'spaw_root' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: AWF CMS 1.11 - 'spaw_root' Remote File Inclusion. Author: Federico Fazzi
|
Analyze the security implications of: AWF CMS 1.11 - 'spaw_root' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HP ProCurve Switch 4000M - SNMP Write Denial of Service
|
This is a dos exploit for hardware platform. Description: HP ProCurve Switch 4000M - SNMP Write Denial of Service. Author: FX
|
Analyze the security implications of: HP ProCurve Switch 4000M - SNMP Write Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Getsimple CMS 2.01 - 'changedata.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Getsimple CMS 2.01 - 'changedata.php' Cross-Site Scripting. Author: High-Tech Bridge SA
|
Analyze the security implications of: Getsimple CMS 2.01 - 'changedata.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cisco WLC 2504 8.9 - Denial of Service (PoC)
|
This is a dos exploit for hardware platform. Description: Cisco WLC 2504 8.9 - Denial of Service (PoC). Author: SecuNinja
|
Analyze the security implications of: Cisco WLC 2504 8.9 - Denial of Service (PoC)
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Limny 2.0 - Cross-Site Request Forgery (Create Admin User)
|
This is a webapps exploit for php platform. Description: Limny 2.0 - Cross-Site Request Forgery (Create Admin User). Author: Luis Santana
|
Analyze the security implications of: Limny 2.0 - Cross-Site Request Forgery (Create Admin User)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 04webserver 1.42 - Multiple Vulnerabilities
|
This is a remote exploit for multiple platform. Description: 04webserver 1.42 - Multiple Vulnerabilities. Author: Tan Chew Keong
|
Analyze the security implications of: 04webserver 1.42 - Multiple Vulnerabilities
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: HPE iLO 4 < 2.53 - Add New Administrator User
|
This is a remote exploit for multiple platform. Description: HPE iLO 4 < 2.53 - Add New Administrator User. Author: skelsec
|
Analyze the security implications of: HPE iLO 4 < 2.53 - Add New Administrator User
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: DynaTracker 1.5.1 - 'includes_handler.php?base_path' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: DynaTracker 1.5.1 - 'includes_handler.php?base_path' Remote File Inclusion. Author: alijsb
|
Analyze the security implications of: DynaTracker 1.5.1 - 'includes_handler.php?base_path' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: eFront 3.6.9 - 'scripts.php' Local File Inclusion
|
This is a webapps exploit for php platform. Description: eFront 3.6.9 - 'scripts.php' Local File Inclusion. Author: AutoSec Tools
|
Analyze the security implications of: eFront 3.6.9 - 'scripts.php' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_xevidmegahd - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_xevidmegahd - SQL Injection. Author: EcHoLL
|
Analyze the security implications of: Joomla! Component com_xevidmegahd - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Sun ONE Starter Kit 2.0 / ASTAware SearchDisc 3.1 - Search Engine Directory Traversal
|
This is a webapps exploit for java platform. Description: Sun ONE Starter Kit 2.0 / ASTAware SearchDisc 3.1 - Search Engine Directory Traversal. Author: ET LoWNOISE
|
Analyze the security implications of: Sun ONE Starter Kit 2.0 / ASTAware SearchDisc 3.1 - Search Engine Directory Traversal
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Joomla! Component JTM Reseller 1.9 Beta - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component JTM Reseller 1.9 Beta - SQL Injection. Author: kaMtiEz
|
Analyze the security implications of: Joomla! Component JTM Reseller 1.9 Beta - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Achievo 1.4.5 - Multiple Vulnerabilities (2)
|
This is a webapps exploit for php platform. Description: Achievo 1.4.5 - Multiple Vulnerabilities (2). Author: High-Tech Bridge SA
|
Analyze the security implications of: Achievo 1.4.5 - Multiple Vulnerabilities (2)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Atlassian Confluence 6.15.1 - Directory Traversal
|
This is a webapps exploit for jsp platform. Description: Atlassian Confluence 6.15.1 - Directory Traversal. Author: max7253
|
Analyze the security implications of: Atlassian Confluence 6.15.1 - Directory Traversal
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Blackboard LMS 9.1 SP14 - Cross-Site Scripting
|
This is a webapps exploit for java platform. Description: Blackboard LMS 9.1 SP14 - Cross-Site Scripting. Author: Vulnerability-Lab
|
Analyze the security implications of: Blackboard LMS 9.1 SP14 - Cross-Site Scripting
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: MySQL 6.0.4 - Empty Binary String Literal Remote Denial of Service
|
This is a dos exploit for linux platform. Description: MySQL 6.0.4 - Empty Binary String Literal Remote Denial of Service. Author: Kay Roepke
|
Analyze the security implications of: MySQL 6.0.4 - Empty Binary String Literal Remote Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ATutor 1.x - 'forum.inc.php' Arbitrary Command Execution
|
This is a webapps exploit for php platform. Description: ATutor 1.x - 'forum.inc.php' Arbitrary Command Execution. Author: Andreas Sandblad
|
Analyze the security implications of: ATutor 1.x - 'forum.inc.php' Arbitrary Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: torrent-stats - 'httpd.c' Denial of Service
|
This is a dos exploit for linux platform. Description: torrent-stats - 'httpd.c' Denial of Service. Author: otr
|
Analyze the security implications of: torrent-stats - 'httpd.c' Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: CuteNews 1.3 - Comment HTML Injection
|
This is a webapps exploit for php platform. Description: CuteNews 1.3 - Comment HTML Injection. Author: DarkBicho
|
Analyze the security implications of: CuteNews 1.3 - Comment HTML Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CCBILL CGI - 'ccbillx.c' 'whereami.cgi' Remote Code Execution
|
This is a webapps exploit for cgi platform. Description: CCBILL CGI - 'ccbillx.c' 'whereami.cgi' Remote Code Execution. Author: knight420
|
Analyze the security implications of: CCBILL CGI - 'ccbillx.c' 'whereami.cgi' Remote Code Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: cPanel - (Authenticated) 'lastvisit.html Domain' Arbitrary File Disclosure
|
This is a remote exploit for multiple platform. Description: cPanel - (Authenticated) 'lastvisit.html Domain' Arbitrary File Disclosure. Author: SecurityRules
|
Analyze the security implications of: cPanel - (Authenticated) 'lastvisit.html Domain' Arbitrary File Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Dark Hart Portal - 'login.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Dark Hart Portal - 'login.php' Remote File Inclusion. Author: CoBRa_21
|
Analyze the security implications of: Dark Hart Portal - 'login.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Lotus Domino Server 5.0.x - Directory Traversal (1)
|
This is a remote exploit for multiple platform. Description: Lotus Domino Server 5.0.x - Directory Traversal (1). Author: Michael Smith
|
Analyze the security implications of: Lotus Domino Server 5.0.x - Directory Traversal (1)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Strapi CMS 3.0.0-beta.17.4 - Remote Code Execution (RCE) (Unauthenticated)
|
This is a webapps exploit for multiple platform. Description: Strapi CMS 3.0.0-beta.17.4 - Remote Code Execution (RCE) (Unauthenticated). Author: Musyoka Ian
|
Analyze the security implications of: Strapi CMS 3.0.0-beta.17.4 - Remote Code Execution (RCE) (Unauthenticated)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: GL.iNet AR300M v4.3.7 Arbitrary File Read - CVE-2023-46455 Exploit
|
This is a remote exploit for hardware platform. Description: GL.iNet AR300M v4.3.7 Arbitrary File Read - CVE-2023-46455 Exploit. Author: cyberaz0r
|
Analyze the security implications of: GL.iNet AR300M v4.3.7 Arbitrary File Read - CVE-2023-46455 Exploit
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: CodeIgniter 1.0 - 'BASEPATH' Multiple Remote File Inclusions
|
This is a webapps exploit for php platform. Description: CodeIgniter 1.0 - 'BASEPATH' Multiple Remote File Inclusions. Author: eidelweiss
|
Analyze the security implications of: CodeIgniter 1.0 - 'BASEPATH' Multiple Remote File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HP Data Protector (HP-UX) - Remote Shell
|
This is a remote exploit for hp-ux platform. Description: HP Data Protector (HP-UX) - Remote Shell. Author: Adrian Puente Z.
|
Analyze the security implications of: HP Data Protector (HP-UX) - Remote Shell
|
This exploit targets hp-ux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hp-ux platform
|
What is this exploit about: Sagem Fast 3304-V2 - Authentication Bypass (1)
|
This is a webapps exploit for hardware platform. Description: Sagem Fast 3304-V2 - Authentication Bypass (1). Author: Yassin Aboukir
|
Analyze the security implications of: Sagem Fast 3304-V2 - Authentication Bypass (1)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Wireshark 2.4.0 < 2.4.2 / 2.2.0 < 2.2.10 - CIP Safety Dissector Crash
|
This is a dos exploit for multiple platform. Description: Wireshark 2.4.0 < 2.4.2 / 2.2.0 < 2.2.10 - CIP Safety Dissector Crash. Author: Wireshark
|
Analyze the security implications of: Wireshark 2.4.0 < 2.4.2 / 2.2.0 < 2.2.10 - CIP Safety Dissector Crash
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: SAP Crystal Reports - Information Disclosure
|
This is a webapps exploit for multiple platform. Description: SAP Crystal Reports - Information Disclosure. Author: Mohamed M.Fouad
|
Analyze the security implications of: SAP Crystal Reports - Information Disclosure
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Budabot 4.0 - Denial of Service (PoC)
|
This is a dos exploit for linux platform. Description: Budabot 4.0 - Denial of Service (PoC). Author: Ryan Delaney
|
Analyze the security implications of: Budabot 4.0 - Denial of Service (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: VU Case Manager - Authentication Bypass
|
This is a webapps exploit for asp platform. Description: VU Case Manager - Authentication Bypass. Author: L0rd CrusAd3r
|
Analyze the security implications of: VU Case Manager - Authentication Bypass
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Sparta Systems TrackWise EQms - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for java platform. Description: Sparta Systems TrackWise EQms - Multiple Cross-Site Scripting Vulnerabilities. Author: Yaniv Miron
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.