input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Sparta Systems TrackWise EQms - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: MagpieRSS 0.72 - 'url' Command Injection
|
This is a webapps exploit for php platform. Description: MagpieRSS 0.72 - 'url' Command Injection. Author: bl4ckh4ck5
|
Analyze the security implications of: MagpieRSS 0.72 - 'url' Command Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FreeBSD 9.1 - 'ftpd' Remote Denial of Service
|
This is a dos exploit for freebsd platform. Description: FreeBSD 9.1 - 'ftpd' Remote Denial of Service. Author: Maksymilian Arciemowicz
|
Analyze the security implications of: FreeBSD 9.1 - 'ftpd' Remote Denial of Service
|
This exploit targets freebsd systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets freebsd platform
|
What is this exploit about: Dell EMC RecoverPoint < 5.1.2 - Local Root Command Execution
|
This is a local exploit for linux platform. Description: Dell EMC RecoverPoint < 5.1.2 - Local Root Command Execution. Author: Paul Taylor
|
Analyze the security implications of: Dell EMC RecoverPoint < 5.1.2 - Local Root Command Execution
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Linux Kernel < 4.4.0-21 (Ubuntu 16.04 x64) - 'netfilter target_offset' Local Privilege Escalation
|
This is a local exploit for linux_x86-64 platform. Description: Linux Kernel < 4.4.0-21 (Ubuntu 16.04 x64) - 'netfilter target_offset' Local Privilege Escalation. Author: Vitaly Nikolenko
|
Analyze the security implications of: Linux Kernel < 4.4.0-21 (Ubuntu 16.04 x64) - 'netfilter target_offset' Local Privilege Escalation
|
This exploit targets linux_x86-64 systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux_x86-64 platform
|
What is this exploit about: ATutor 2.2.1 - SQL Injection / Remote Code Execution (Metasploit)
|
This is a remote exploit for php platform. Description: ATutor 2.2.1 - SQL Injection / Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: ATutor 2.2.1 - SQL Injection / Remote Code Execution (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: cmreams CMS 1.3.1.1 beta2 - Local File Inclusion / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: cmreams CMS 1.3.1.1 beta2 - Local File Inclusion / Cross-Site Scripting. Author: CraCkEr
|
Analyze the security implications of: cmreams CMS 1.3.1.1 beta2 - Local File Inclusion / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Keycloak 12.0.1 - 'request_uri ' Blind Server-Side Request Forgery (SSRF) (Unauthenticated)
|
This is a webapps exploit for java platform. Description: Keycloak 12.0.1 - 'request_uri ' Blind Server-Side Request Forgery (SSRF) (Unauthenticated). Author: Mayank Deshmukh
|
Analyze the security implications of: Keycloak 12.0.1 - 'request_uri ' Blind Server-Side Request Forgery (SSRF) (Unauthenticated)
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Joomla! Component Advertisement Board 3.1.0 - 'catname' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Advertisement Board 3.1.0 - 'catname' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component Advertisement Board 3.1.0 - 'catname' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Xerox AltaLink C8035 Printer - Cross-Site Request Forgery (Add Admin)
|
This is a webapps exploit for hardware platform. Description: Xerox AltaLink C8035 Printer - Cross-Site Request Forgery (Add Admin). Author: Ismail Tasdelen
|
Analyze the security implications of: Xerox AltaLink C8035 Printer - Cross-Site Request Forgery (Add Admin)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: CS-Cart 2.0.5 - 'reward_points.post.php' SQL Injection
|
This is a webapps exploit for php platform. Description: CS-Cart 2.0.5 - 'reward_points.post.php' SQL Injection. Author: Ryan Dewhurst
|
Analyze the security implications of: CS-Cart 2.0.5 - 'reward_points.post.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Jara 1.6 - Multiple SQL Injections / Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Jara 1.6 - Multiple SQL Injections / Multiple Cross-Site Scripting Vulnerabilities. Author: Canberk BOLAT
|
Analyze the security implications of: Jara 1.6 - Multiple SQL Injections / Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: OP5 5.3.5/5.4.0/5.4.2/5.5.0/5.5.1 - 'welcome' Remote Command Execution (Metasploit)
|
This is a webapps exploit for multiple platform. Description: OP5 5.3.5/5.4.0/5.4.2/5.5.0/5.5.1 - 'welcome' Remote Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: OP5 5.3.5/5.4.0/5.4.2/5.5.0/5.5.1 - 'welcome' Remote Command Execution (Metasploit)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Discuz 1.03 - SQL Injection
|
This is a webapps exploit for php platform. Description: Discuz 1.03 - SQL Injection. Author: indoushka
|
Analyze the security implications of: Discuz 1.03 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: cyberhost - 'default.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: cyberhost - 'default.asp' SQL Injection. Author: redst0rm
|
Analyze the security implications of: cyberhost - 'default.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: D-Link DSL-2730B Modem - 'Lancfg2get.cgi Persistent Cross-Site Scripting
|
This is a webapps exploit for hardware platform. Description: D-Link DSL-2730B Modem - 'Lancfg2get.cgi Persistent Cross-Site Scripting. Author: XLabs Security
|
Analyze the security implications of: D-Link DSL-2730B Modem - 'Lancfg2get.cgi Persistent Cross-Site Scripting
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: bbPress 1.0.2 - Cross-Site Request Forgery (Change Admin Password)
|
This is a webapps exploit for php platform. Description: bbPress 1.0.2 - Cross-Site Request Forgery (Change Admin Password). Author: saudi0hacker
|
Analyze the security implications of: bbPress 1.0.2 - Cross-Site Request Forgery (Change Admin Password)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apache Log4j2 2.14.1 - Information Disclosure
|
This is a remote exploit for java platform. Description: Apache Log4j2 2.14.1 - Information Disclosure. Author: leonjza
|
Analyze the security implications of: Apache Log4j2 2.14.1 - Information Disclosure
|
This exploit targets java systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Oracle WebLogic Server 12.2.1.0 - RCE (Unauthenticated)
|
This is a webapps exploit for java platform. Description: Oracle WebLogic Server 12.2.1.0 - RCE (Unauthenticated). Author: CHackA0101
|
Analyze the security implications of: Oracle WebLogic Server 12.2.1.0 - RCE (Unauthenticated)
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: CMSUno 1.6.2 - 'lang' Remote Code Execution (Authenticated)
|
This is a webapps exploit for php platform. Description: CMSUno 1.6.2 - 'lang' Remote Code Execution (Authenticated). Author: Alexandre ZANNI
|
Analyze the security implications of: CMSUno 1.6.2 - 'lang' Remote Code Execution (Authenticated)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ExBB Italiano 0.2 - exbb[home_path] Remote File Inclusion
|
This is a webapps exploit for php platform. Description: ExBB Italiano 0.2 - exbb[home_path] Remote File Inclusion. Author: SHiKaA
|
Analyze the security implications of: ExBB Italiano 0.2 - exbb[home_path] Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: D-Link DIR-600M Wireless - Cross-Site Scripting
|
This is a webapps exploit for hardware platform. Description: D-Link DIR-600M Wireless - Cross-Site Scripting. Author: Prasenjit Kanti Paul
|
Analyze the security implications of: D-Link DIR-600M Wireless - Cross-Site Scripting
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: DotNetNuke 9.5 - Persistent Cross-Site Scripting
|
This is a webapps exploit for aspx platform. Description: DotNetNuke 9.5 - Persistent Cross-Site Scripting. Author: Sajjad Pourali
|
Analyze the security implications of: DotNetNuke 9.5 - Persistent Cross-Site Scripting
|
This exploit targets aspx systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aspx platform
|
What is this exploit about: Nexpose Security Console - Cross-Site Request Forgery
|
This is a webapps exploit for multiple platform. Description: Nexpose Security Console - Cross-Site Request Forgery. Author: Robert Gilbert
|
Analyze the security implications of: Nexpose Security Console - Cross-Site Request Forgery
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Law Firm 1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: Law Firm 1.0 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Law Firm 1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Stem Innovation - 'IZON' Hard-Coded Credentials
|
This is a webapps exploit for hardware platform. Description: Stem Innovation - 'IZON' Hard-Coded Credentials. Author: Mark Stanislav
|
Analyze the security implications of: Stem Innovation - 'IZON' Hard-Coded Credentials
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component Content - 'year' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Content - 'year' SQL Injection. Author: E.Shahmohamadi
|
Analyze the security implications of: Joomla! Component Content - 'year' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component JS Jobs (com_jsjobs) 1.2.5 - 'cities.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component JS Jobs (com_jsjobs) 1.2.5 - 'cities.php' SQL Injection. Author: qw3rTyTy
|
Analyze the security implications of: Joomla! Component JS Jobs (com_jsjobs) 1.2.5 - 'cities.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Omnikey Cardman 4040 Driver - Local Buffer Overflow (PoC)
|
This is a dos exploit for linux platform. Description: Linux Omnikey Cardman 4040 Driver - Local Buffer Overflow (PoC). Author: Daniel Roethlisberger
|
Analyze the security implications of: Linux Omnikey Cardman 4040 Driver - Local Buffer Overflow (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: CMSimple - Default Administrator Credentials
|
This is a webapps exploit for php platform. Description: CMSimple - Default Administrator Credentials. Author: Govind Singh
|
Analyze the security implications of: CMSimple - Default Administrator Credentials
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 4Site CMS 2.6 - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: 4Site CMS 2.6 - Multiple SQL Injections. Author: D.Mortalov
|
Analyze the security implications of: 4Site CMS 2.6 - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: phpLinks < 2.1.2 - Multiple Vulnerabilities
|
This is a webapps exploit for multiple platform. Description: phpLinks < 2.1.2 - Multiple Vulnerabilities. Author: GulfTech Security
|
Analyze the security implications of: phpLinks < 2.1.2 - Multiple Vulnerabilities
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ASPMass Shopping Cart - Arbitrary File Upload / Cross-Site Request Forgery
|
This is a webapps exploit for asp platform. Description: ASPMass Shopping Cart - Arbitrary File Upload / Cross-Site Request Forgery. Author: Abysssec
|
Analyze the security implications of: ASPMass Shopping Cart - Arbitrary File Upload / Cross-Site Request Forgery
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Google Chrome 72 and 73 - Array.map Out-of-Bounds Write (Metasploit)
|
This is a remote exploit for multiple platform. Description: Google Chrome 72 and 73 - Array.map Out-of-Bounds Write (Metasploit). Author: Metasploit
|
Analyze the security implications of: Google Chrome 72 and 73 - Array.map Out-of-Bounds Write (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.