input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: MaxiSepet 1.0 - 'link' SQL Injection
|
This is a webapps exploit for asp platform. Description: MaxiSepet 1.0 - 'link' SQL Injection. Author: nukedx
|
Analyze the security implications of: MaxiSepet 1.0 - 'link' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: CentOS 7.6 - 'ptrace_scope' Privilege Escalation
|
This is a local exploit for linux platform. Description: CentOS 7.6 - 'ptrace_scope' Privilege Escalation. Author: s4vitar
|
Analyze the security implications of: CentOS 7.6 - 'ptrace_scope' Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Fortinet FortiOS < 5.6.0 - Cross-Site Scripting
|
This is a webapps exploit for hardware platform. Description: Fortinet FortiOS < 5.6.0 - Cross-Site Scripting. Author: patryk_bogdan
|
Analyze the security implications of: Fortinet FortiOS < 5.6.0 - Cross-Site Scripting
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: (GREEZLE) Global Real Estate Agent Login - Multiple SQL Injections
|
This is a webapps exploit for multiple platform. Description: (GREEZLE) Global Real Estate Agent Login - Multiple SQL Injections. Author: L0rd CrusAd3r
|
Analyze the security implications of: (GREEZLE) Global Real Estate Agent Login - Multiple SQL Injections
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: RASPcalendar 1.01 (ASP) - Admin Login
|
This is a webapps exploit for asp platform. Description: RASPcalendar 1.01 (ASP) - Admin Login. Author: Hackeri-AL UAH-Crew
|
Analyze the security implications of: RASPcalendar 1.01 (ASP) - Admin Login
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Active Web Mail 4 - Blind SQL Injection
|
This is a webapps exploit for asp platform. Description: Active Web Mail 4 - Blind SQL Injection. Author: R3d-D3V!L
|
Analyze the security implications of: Active Web Mail 4 - Blind SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: eCom Cart 1.3 - SQL Injection
|
This is a webapps exploit for php platform. Description: eCom Cart 1.3 - SQL Injection. Author: Alperen Eymen Ozcan
|
Analyze the security implications of: eCom Cart 1.3 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DataEase 2.4.0 - Database Configuration Information Exposure
|
This is a webapps exploit for java platform. Description: DataEase 2.4.0 - Database Configuration Information Exposure. Author: ByteHunter
|
Analyze the security implications of: DataEase 2.4.0 - Database Configuration Information Exposure
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: EZPX Photoblog 1.2 Beta - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: EZPX Photoblog 1.2 Beta - Remote File Inclusion. Author: sh00t0ut
|
Analyze the security implications of: EZPX Photoblog 1.2 Beta - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: OpenBSD 4.2 - 'rtlabel_id2name()' Local Null Pointer Dereference Denial of Service
|
This is a dos exploit for bsd platform. Description: OpenBSD 4.2 - 'rtlabel_id2name()' Local Null Pointer Dereference Denial of Service. Author: Hunger
|
Analyze the security implications of: OpenBSD 4.2 - 'rtlabel_id2name()' Local Null Pointer Dereference Denial of Service
|
This exploit targets bsd systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets bsd platform
|
What is this exploit about: ImageVue 0.16.1 - 'readfolder.php?path' Arbitrary Directory Listing
|
This is a webapps exploit for php platform. Description: ImageVue 0.16.1 - 'readfolder.php?path' Arbitrary Directory Listing. Author: zjieb
|
Analyze the security implications of: ImageVue 0.16.1 - 'readfolder.php?path' Arbitrary Directory Listing
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ClicShopping v3.402 - Cross-Site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: ClicShopping v3.402 - Cross-Site Scripting (XSS). Author: nu11secur1ty
|
Analyze the security implications of: ClicShopping v3.402 - Cross-Site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: cPanel 11.x - 'fileop' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: cPanel 11.x - 'fileop' Multiple Cross-Site Scripting Vulnerabilities. Author: RENO
|
Analyze the security implications of: cPanel 11.x - 'fileop' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: SolarWinds Orion Network Performance Monitor (NPM) 10.1 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for asp platform. Description: SolarWinds Orion Network Performance Monitor (NPM) 10.1 - Multiple Cross-Site Scripting Vulnerabilities. Author: x0skel
|
Analyze the security implications of: SolarWinds Orion Network Performance Monitor (NPM) 10.1 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: WebKit JSC - 'arrayProtoFuncSplice' Uninitialized Memory Reference
|
This is a dos exploit for multiple platform. Description: WebKit JSC - 'arrayProtoFuncSplice' Uninitialized Memory Reference. Author: Google Security Research
|
Analyze the security implications of: WebKit JSC - 'arrayProtoFuncSplice' Uninitialized Memory Reference
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: eyeos 1.9.0.2 - Persistent Cross-Site Scripting Using Image Files
|
This is a webapps exploit for php platform. Description: eyeos 1.9.0.2 - Persistent Cross-Site Scripting Using Image Files. Author: Alberto Ortega
|
Analyze the security implications of: eyeos 1.9.0.2 - Persistent Cross-Site Scripting Using Image Files
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Sickbeard 0.1 - Cross-Site Request Forgery (Disable Authentication)
|
This is a webapps exploit for multiple platform. Description: Sickbeard 0.1 - Cross-Site Request Forgery (Disable Authentication). Author: bdrake
|
Analyze the security implications of: Sickbeard 0.1 - Cross-Site Request Forgery (Disable Authentication)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Google Android - libstagefright Integer Overflow Remote Code Execution
|
This is a remote exploit for android platform. Description: Google Android - libstagefright Integer Overflow Remote Code Execution. Author: Google Security Research
|
Analyze the security implications of: Google Android - libstagefright Integer Overflow Remote Code Execution
|
This exploit targets android systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: AdaptCMS 3.0.3 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: AdaptCMS 3.0.3 - Multiple Vulnerabilities. Author: LiquidWorm
|
Analyze the security implications of: AdaptCMS 3.0.3 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple QuickTime < 7.2 - SMIL Remote Integer Overflow
|
This is a dos exploit for multiple platform. Description: Apple QuickTime < 7.2 - SMIL Remote Integer Overflow. Author: David Vaartjes
|
Analyze the security implications of: Apple QuickTime < 7.2 - SMIL Remote Integer Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ProWeb Design - SQL Injection
|
This is a webapps exploit for multiple platform. Description: ProWeb Design - SQL Injection. Author: cyberlog
|
Analyze the security implications of: ProWeb Design - SQL Injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Aptis Software TotalBill 3.0 - Remote Command Execution
|
This is a remote exploit for linux platform. Description: Aptis Software TotalBill 3.0 - Remote Command Execution. Author: Brian Masney
|
Analyze the security implications of: Aptis Software TotalBill 3.0 - Remote Command Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Greg Matthews - 'Classifieds.cgi' 1.0 Hidden Variable
|
This is a remote exploit for cgi platform. Description: Greg Matthews - 'Classifieds.cgi' 1.0 Hidden Variable. Author: anonymous
|
Analyze the security implications of: Greg Matthews - 'Classifieds.cgi' 1.0 Hidden Variable
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: WebKit JSC - 'BytecodeGenerator::emitGetByVal' Incorrect Optimization (1)
|
This is a dos exploit for multiple platform. Description: WebKit JSC - 'BytecodeGenerator::emitGetByVal' Incorrect Optimization (1). Author: Google Security Research
|
Analyze the security implications of: WebKit JSC - 'BytecodeGenerator::emitGetByVal' Incorrect Optimization (1)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: PrinterOn Enterprise 4.1.4 - Arbitrary File Deletion
|
This is a webapps exploit for multiple platform. Description: PrinterOn Enterprise 4.1.4 - Arbitrary File Deletion. Author: bzyo
|
Analyze the security implications of: PrinterOn Enterprise 4.1.4 - Arbitrary File Deletion
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: IBM DB2 - 'db2start' Format String Arbitrary Code Execution
|
This is a local exploit for linux platform. Description: IBM DB2 - 'db2start' Format String Arbitrary Code Execution. Author: SNOSoft
|
Analyze the security implications of: IBM DB2 - 'db2start' Format String Arbitrary Code Execution
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Plugin XCloner Backup 3.5.3 - Local File Inclusion (Authenticated)
|
This is a webapps exploit for php platform. Description: Joomla! Plugin XCloner Backup 3.5.3 - Local File Inclusion (Authenticated). Author: Mehmet Kelepçe
|
Analyze the security implications of: Joomla! Plugin XCloner Backup 3.5.3 - Local File Inclusion (Authenticated)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel - 'AF_PACKET' Use-After-Free (2)
|
This is a dos exploit for linux platform. Description: Linux Kernel - 'AF_PACKET' Use-After-Free (2). Author: SecuriTeam
|
Analyze the security implications of: Linux Kernel - 'AF_PACKET' Use-After-Free (2)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Juniper Junos 8.5/9.0 J-Web Interface - 'scripter.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a remote exploit for hardware platform. Description: Juniper Junos 8.5/9.0 J-Web Interface - 'scripter.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Amir Azam
|
Analyze the security implications of: Juniper Junos 8.5/9.0 J-Web Interface - 'scripter.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Sterlite SAM300 AX Router - 'Stat_Radio' Cross-Site Scripting
|
This is a remote exploit for hardware platform. Description: Sterlite SAM300 AX Router - 'Stat_Radio' Cross-Site Scripting. Author: Karn Ganeshen
|
Analyze the security implications of: Sterlite SAM300 AX Router - 'Stat_Radio' Cross-Site Scripting
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Mantis Bug Tracker 0.x - New Account Signup Mass Emailing
|
This is a webapps exploit for php platform. Description: Mantis Bug Tracker 0.x - New Account Signup Mass Emailing. Author: Jose Antonio
|
Analyze the security implications of: Mantis Bug Tracker 0.x - New Account Signup Mass Emailing
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WordPress Plugin Ninja Forms 2.9.36 < 2.9.42 - File Upload (Metasploit)
|
This is a webapps exploit for multiple platform. Description: WordPress Plugin Ninja Forms 2.9.36 < 2.9.42 - File Upload (Metasploit). Author: Metasploit
|
Analyze the security implications of: WordPress Plugin Ninja Forms 2.9.36 < 2.9.42 - File Upload (Metasploit)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: EgavilanMedia User Registration & Login System with Admin Panel Exploit - SQLi Auth Bypass
|
This is a webapps exploit for php platform. Description: EgavilanMedia User Registration & Login System with Admin Panel Exploit - SQLi Auth Bypass. Author: Kislay Kumar
|
Analyze the security implications of: EgavilanMedia User Registration & Login System with Admin Panel Exploit - SQLi Auth Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Claroline 1.10 - Multiple HTML Injection Vulnerabilities
|
This is a webapps exploit for php platform. Description: Claroline 1.10 - Multiple HTML Injection Vulnerabilities. Author: AutoSec Tools
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.