input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Kayako SupportSuite 3.x - '/staff/index.php?customfieldlinkid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Command School Student Management System - '/sw/admin_infraction_codes.php?id' SQL Injection
|
This is a webapps exploit for php platform. Description: Command School Student Management System - '/sw/admin_infraction_codes.php?id' SQL Injection. Author: AtT4CKxT3rR0r1ST
|
Analyze the security implications of: Command School Student Management System - '/sw/admin_infraction_codes.php?id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Claus Muus Spitfire 1.0.336 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Claus Muus Spitfire 1.0.336 - Multiple Cross-Site Scripting Vulnerabilities. Author: High-Tech Bridge SA
|
Analyze the security implications of: Claus Muus Spitfire 1.0.336 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Zeus Web Server 3.x - Null Terminated Strings
|
This is a remote exploit for cgi platform. Description: Zeus Web Server 3.x - Null Terminated Strings. Author: Vanja Hrustic
|
Analyze the security implications of: Zeus Web Server 3.x - Null Terminated Strings
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Kados R10 GreenBee - Multiple SQL Injection
|
This is a webapps exploit for php platform. Description: Kados R10 GreenBee - Multiple SQL Injection. Author: Mehmet EMIROGLU
|
Analyze the security implications of: Kados R10 GreenBee - Multiple SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Active Auction House 3.6 - Blind SQL Injection
|
This is a webapps exploit for asp platform. Description: Active Auction House 3.6 - Blind SQL Injection. Author: R3d-D3V!L
|
Analyze the security implications of: Active Auction House 3.6 - Blind SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Cherry Music 0.35.1 - Arbitrary File Disclosure
|
This is a webapps exploit for php platform. Description: Cherry Music 0.35.1 - Arbitrary File Disclosure. Author: feedersec
|
Analyze the security implications of: Cherry Music 0.35.1 - Arbitrary File Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple Mac OSX 10.4.8 - 'UserNotificationCenter' Local Privilege Escalation
|
This is a local exploit for osx platform. Description: Apple Mac OSX 10.4.8 - 'UserNotificationCenter' Local Privilege Escalation. Author: MoAB
|
Analyze the security implications of: Apple Mac OSX 10.4.8 - 'UserNotificationCenter' Local Privilege Escalation
|
This exploit targets osx systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: DataCube3 v1.0 - Unrestricted file upload 'RCE'
|
This is a webapps exploit for php platform. Description: DataCube3 v1.0 - Unrestricted file upload 'RCE'. Author: Samy Younsi - NS Labs
|
Analyze the security implications of: DataCube3 v1.0 - Unrestricted file upload 'RCE'
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GlassFish Enterprise Server 2.1 - Admin Console /configuration/configuration.jsf URI Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: GlassFish Enterprise Server 2.1 - Admin Console /configuration/configuration.jsf URI Cross-Site Scripting. Author: DSecRG
|
Analyze the security implications of: GlassFish Enterprise Server 2.1 - Admin Console /configuration/configuration.jsf URI Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component com_mytube (user_id) 1.0 Beta - Blind SQL Injection
|
This is a webapps exploit for multiple platform. Description: Joomla! Component com_mytube (user_id) 1.0 Beta - Blind SQL Injection. Author: Chip d3 bi0s
|
Analyze the security implications of: Joomla! Component com_mytube (user_id) 1.0 Beta - Blind SQL Injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Mantis Bug Tracker 0.19.2/1.0 - 'Bug_sponsorship_list_view_inc.php' File Inclusion
|
This is a webapps exploit for php platform. Description: Mantis Bug Tracker 0.19.2/1.0 - 'Bug_sponsorship_list_view_inc.php' File Inclusion. Author: Andreas Sandblad
|
Analyze the security implications of: Mantis Bug Tracker 0.19.2/1.0 - 'Bug_sponsorship_list_view_inc.php' File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Trivum Multiroom Setup Tool 8.76 - Corss-Site Request Forgery (Admin Bypass)
|
This is a webapps exploit for hardware platform. Description: Trivum Multiroom Setup Tool 8.76 - Corss-Site Request Forgery (Admin Bypass). Author: vulnc0d3
|
Analyze the security implications of: Trivum Multiroom Setup Tool 8.76 - Corss-Site Request Forgery (Admin Bypass)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: IRAN N.E.T E-Commerce Group - SQL Injection
|
This is a webapps exploit for php platform. Description: IRAN N.E.T E-Commerce Group - SQL Injection. Author: Dr.0rYX & Cr3W-DZ
|
Analyze the security implications of: IRAN N.E.T E-Commerce Group - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_dailymeals - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component com_dailymeals - Local File Inclusion. Author: FL0RiX
|
Analyze the security implications of: Joomla! Component com_dailymeals - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Concept E-Commerce - SQL Injection
|
This is a webapps exploit for php platform. Description: Concept E-Commerce - SQL Injection. Author: gendenk
|
Analyze the security implications of: Concept E-Commerce - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Macromedia ColdFusion MX 6.0 - Remote Development Service File Disclosure
|
This is a remote exploit for multiple platform. Description: Macromedia ColdFusion MX 6.0 - Remote Development Service File Disclosure. Author: rs2112
|
Analyze the security implications of: Macromedia ColdFusion MX 6.0 - Remote Development Service File Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: devolo dLAN 550 duo+ Starter Kit - Cross-Site Request Forgery
|
This is a webapps exploit for hardware platform. Description: devolo dLAN 550 duo+ Starter Kit - Cross-Site Request Forgery. Author: sm
|
Analyze the security implications of: devolo dLAN 550 duo+ Starter Kit - Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: CUPS < 2.0.3 - Remote Command Execution
|
This is a remote exploit for linux platform. Description: CUPS < 2.0.3 - Remote Command Execution. Author: @0x00string
|
Analyze the security implications of: CUPS < 2.0.3 - Remote Command Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Logaholic - 'index.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Logaholic - 'index.php' SQL Injection. Author: malibu.r
|
Analyze the security implications of: Logaholic - 'index.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FreeBSD - 'mbufs()' sendfile Cache Poisoning Privilege Escalation
|
This is a local exploit for freebsd platform. Description: FreeBSD - 'mbufs()' sendfile Cache Poisoning Privilege Escalation. Author: kingcope
|
Analyze the security implications of: FreeBSD - 'mbufs()' sendfile Cache Poisoning Privilege Escalation
|
This exploit targets freebsd systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets freebsd platform
|
What is this exploit about: Real Estate Website 1.0 - 'location.asp' Multiple Input Validation Vulnerabilities
|
This is a webapps exploit for asp platform. Description: Real Estate Website 1.0 - 'location.asp' Multiple Input Validation Vulnerabilities. Author: JosS
|
Analyze the security implications of: Real Estate Website 1.0 - 'location.asp' Multiple Input Validation Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Crysis 1.21/1.5 - HTTP/XML-RPC Service Access Violation Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: Crysis 1.21/1.5 - HTTP/XML-RPC Service Access Violation Remote Denial of Service. Author: Luigi Auriemma
|
Analyze the security implications of: Crysis 1.21/1.5 - HTTP/XML-RPC Service Access Violation Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Google Android Web Browser - '.GIF' File Heap Buffer Overflow
|
This is a dos exploit for android platform. Description: Google Android Web Browser - '.GIF' File Heap Buffer Overflow. Author: Alfredo Ortega
|
Analyze the security implications of: Google Android Web Browser - '.GIF' File Heap Buffer Overflow
|
This exploit targets android systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: PolarPearCMS - Arbitrary '.PHP' File Upload (Metasploit)
|
This is a remote exploit for php platform. Description: PolarPearCMS - Arbitrary '.PHP' File Upload (Metasploit). Author: Metasploit
|
Analyze the security implications of: PolarPearCMS - Arbitrary '.PHP' File Upload (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Grestul 1.2 - Remote Add Administrator Account
|
This is a webapps exploit for php platform. Description: Grestul 1.2 - Remote Add Administrator Account. Author: ThE g0bL!N
|
Analyze the security implications of: Grestul 1.2 - Remote Add Administrator Account
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Samba 3.3.5 - Format String / Security Bypass
|
This is a remote exploit for linux platform. Description: Samba 3.3.5 - Format String / Security Bypass. Author: Jeremy Allison
|
Analyze the security implications of: Samba 3.3.5 - Format String / Security Bypass
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Mandriva Linux Mandrake 7.0 - Local Buffer Overflow
|
This is a local exploit for linux platform. Description: Mandriva Linux Mandrake 7.0 - Local Buffer Overflow. Author: noir
|
Analyze the security implications of: Mandriva Linux Mandrake 7.0 - Local Buffer Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Adobe Acrobat Reader DC 15.016.20045 - Invalid Font '.ttf' Memory Corruption (6)
|
This is a dos exploit for multiple platform. Description: Adobe Acrobat Reader DC 15.016.20045 - Invalid Font '.ttf' Memory Corruption (6). Author: COSIG
|
Analyze the security implications of: Adobe Acrobat Reader DC 15.016.20045 - Invalid Font '.ttf' Memory Corruption (6)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: OneWorldStore - 'OWAddItem.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: OneWorldStore - 'OWAddItem.asp' SQL Injection. Author: Dcrab
|
Analyze the security implications of: OneWorldStore - 'OWAddItem.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Wireshark - memcpy 'get_value / dissect_btatt' SIGSEGV
|
This is a dos exploit for multiple platform. Description: Wireshark - memcpy 'get_value / dissect_btatt' SIGSEGV. Author: Google Security Research
|
Analyze the security implications of: Wireshark - memcpy 'get_value / dissect_btatt' SIGSEGV
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Alt-N WebAdmin 2.0.x - Remote File Disclosure
|
This is a remote exploit for cgi platform. Description: Alt-N WebAdmin 2.0.x - Remote File Disclosure. Author: david@kamborio.net
|
Analyze the security implications of: Alt-N WebAdmin 2.0.x - Remote File Disclosure
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Pserv 2.0 - HTTP Request Parsing Buffer Overflow
|
This is a dos exploit for linux platform. Description: Pserv 2.0 - HTTP Request Parsing Buffer Overflow. Author: Matthew Murphy
|
Analyze the security implications of: Pserv 2.0 - HTTP Request Parsing Buffer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Microsoft SharePoint Server 2019 - Remote Code Execution (2)
|
This is a webapps exploit for aspx platform. Description: Microsoft SharePoint Server 2019 - Remote Code Execution (2). Author: Podalirius
|
Analyze the security implications of: Microsoft SharePoint Server 2019 - Remote Code Execution (2)
|
This exploit targets aspx systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.