input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: e107 0.7.23 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Invision Power Top Site List < 1.1 RC 2 - SQL Injection
|
This is a webapps exploit for php platform. Description: Invision Power Top Site List < 1.1 RC 2 - SQL Injection. Author: GulfTech Security
|
Analyze the security implications of: Invision Power Top Site List < 1.1 RC 2 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: glFusion 1.1.2 - 'COM_applyFilter()/order' SQL Injection
|
This is a webapps exploit for php platform. Description: glFusion 1.1.2 - 'COM_applyFilter()/order' SQL Injection. Author: Nine:Situations:Group
|
Analyze the security implications of: glFusion 1.1.2 - 'COM_applyFilter()/order' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WDMyCloud < 2.30.165 - Multiple Vulnerabilities
|
This is a remote exploit for hardware platform. Description: WDMyCloud < 2.30.165 - Multiple Vulnerabilities. Author: GulfTech Security
|
Analyze the security implications of: WDMyCloud < 2.30.165 - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Telesquare SDT-CW3B1 1.1.0 - OS Command Injection
|
This is a remote exploit for hardware platform. Description: Telesquare SDT-CW3B1 1.1.0 - OS Command Injection. Author: Bryan Leong
|
Analyze the security implications of: Telesquare SDT-CW3B1 1.1.0 - OS Command Injection
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Azucar CMS 1.3 - '/admin/index_sitios.php' File Inclusion
|
This is a webapps exploit for php platform. Description: Azucar CMS 1.3 - '/admin/index_sitios.php' File Inclusion. Author: nuffsaid
|
Analyze the security implications of: Azucar CMS 1.3 - '/admin/index_sitios.php' File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Clipbucket 2.6 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Clipbucket 2.6 - Multiple Vulnerabilities. Author: YaDoY666
|
Analyze the security implications of: Clipbucket 2.6 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Invision Community Blog Mod 1.2.4 - SQL Injection
|
This is a webapps exploit for php platform. Description: Invision Community Blog Mod 1.2.4 - SQL Injection. Author: anonymous
|
Analyze the security implications of: Invision Community Blog Mod 1.2.4 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BosClassifieds 3.0 - 'index.php' SQL Injection
|
This is a webapps exploit for php platform. Description: BosClassifieds 3.0 - 'index.php' SQL Injection. Author: SoSo H H
|
Analyze the security implications of: BosClassifieds 3.0 - 'index.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: sirang web-based d-control - Multiple Vulnerabilities
|
This is a webapps exploit for asp platform. Description: sirang web-based d-control - Multiple Vulnerabilities. Author: Abysssec
|
Analyze the security implications of: sirang web-based d-control - Multiple Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Be BeOS 4.5/5.0 - Invalid System Call
|
This is a local exploit for beos platform. Description: Be BeOS 4.5/5.0 - Invalid System Call. Author: Konstantin Boldyshev
|
Analyze the security implications of: Be BeOS 4.5/5.0 - Invalid System Call
|
This exploit targets beos systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets beos platform
|
What is this exploit about: eLabFTW 1.8.5 - Arbitrary File Upload / Remote Code Execution
|
This is a webapps exploit for php platform. Description: eLabFTW 1.8.5 - Arbitrary File Upload / Remote Code Execution. Author: liquidsky
|
Analyze the security implications of: eLabFTW 1.8.5 - Arbitrary File Upload / Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Invision Power Board (IP.Board) 2.1.7 - 'ACTIVE' Cross-Site Scripting / SQL Injection
|
This is a webapps exploit for php platform. Description: Invision Power Board (IP.Board) 2.1.7 - 'ACTIVE' Cross-Site Scripting / SQL Injection. Author: Eugene Minaev
|
Analyze the security implications of: Invision Power Board (IP.Board) 2.1.7 - 'ACTIVE' Cross-Site Scripting / SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ILIAS 3.7.4 - 'ref_id' Blind SQL Injection
|
This is a webapps exploit for php platform. Description: ILIAS 3.7.4 - 'ref_id' Blind SQL Injection. Author: Lidloses_Auge
|
Analyze the security implications of: ILIAS 3.7.4 - 'ref_id' Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Lightweight facebook-styled blog 1.3 - Remote Code Execution (RCE) (Authenticated) (Metasploit)
|
This is a webapps exploit for php platform. Description: Lightweight facebook-styled blog 1.3 - Remote Code Execution (RCE) (Authenticated) (Metasploit). Author: Maide Ilkay Aydogdu
|
Analyze the security implications of: Lightweight facebook-styled blog 1.3 - Remote Code Execution (RCE) (Authenticated) (Metasploit)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component xfaq 1.2 - 'aid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component xfaq 1.2 - 'aid' SQL Injection. Author: S@BUN
|
Analyze the security implications of: Joomla! Component xfaq 1.2 - 'aid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: OpenBSD 3.x/4.x - ICMPv6 Packet Handling Remote Buffer Overflow
|
This is a remote exploit for openbsd platform. Description: OpenBSD 3.x/4.x - ICMPv6 Packet Handling Remote Buffer Overflow. Author: Alfredo Ortega
|
Analyze the security implications of: OpenBSD 3.x/4.x - ICMPv6 Packet Handling Remote Buffer Overflow
|
This exploit targets openbsd systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets openbsd platform
|
What is this exploit about: Apple iChat 3.1.6 441 - 'aim://' URL Handler Format String (PoC)
|
This is a dos exploit for osx platform. Description: Apple iChat 3.1.6 441 - 'aim://' URL Handler Format String (PoC). Author: MoAB
|
Analyze the security implications of: Apple iChat 3.1.6 441 - 'aim://' URL Handler Format String (PoC)
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Fortinet FortiAnalyzer - Cross-Site Request Forgery
|
This is a remote exploit for hardware platform. Description: Fortinet FortiAnalyzer - Cross-Site Request Forgery. Author: William Costa
|
Analyze the security implications of: Fortinet FortiAnalyzer - Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Evenzia Content Management Systems (CMS) - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Evenzia Content Management Systems (CMS) - Cross-Site Scripting. Author: Glafkos Charalambous
|
Analyze the security implications of: Evenzia Content Management Systems (CMS) - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: aiptek netcam WebServer 0.93.15 - Directory Traversal
|
This is a remote exploit for multiple platform. Description: aiptek netcam WebServer 0.93.15 - Directory Traversal. Author: Rafel Ivgi The-Insider
|
Analyze the security implications of: aiptek netcam WebServer 0.93.15 - Directory Traversal
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: OpenSSL TLS Heartbeat Extension - 'Heartbleed' Memory Disclosure
|
This is a remote exploit for multiple platform. Description: OpenSSL TLS Heartbeat Extension - 'Heartbleed' Memory Disclosure. Author: Jared Stafford
|
Analyze the security implications of: OpenSSL TLS Heartbeat Extension - 'Heartbleed' Memory Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: MVC-Web CMS 1.0/1.2 - 'newsid' SQL Injection
|
This is a webapps exploit for asp platform. Description: MVC-Web CMS 1.0/1.2 - 'newsid' SQL Injection. Author: Bl@ckbe@rD
|
Analyze the security implications of: MVC-Web CMS 1.0/1.2 - 'newsid' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: ZTE ZXHN H108N Router - Configuration Disclosure
|
This is a webapps exploit for hardware platform. Description: ZTE ZXHN H108N Router - Configuration Disclosure. Author: Todor Donev
|
Analyze the security implications of: ZTE ZXHN H108N Router - Configuration Disclosure
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Codigo Markdown Editor v1.0.1 (Electron) - Remote Code Execution
|
This is a local exploit for multiple platform. Description: Codigo Markdown Editor v1.0.1 (Electron) - Remote Code Execution. Author: 8bitsec
|
Analyze the security implications of: Codigo Markdown Editor v1.0.1 (Electron) - Remote Code Execution
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Adam Webb NukeJokes 1.7/2.0 Module - 'modules.php?jokeid' SQL Injection
|
This is a webapps exploit for php platform. Description: Adam Webb NukeJokes 1.7/2.0 Module - 'modules.php?jokeid' SQL Injection. Author: Janek Vind
|
Analyze the security implications of: Adam Webb NukeJokes 1.7/2.0 Module - 'modules.php?jokeid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AIX 4.3/5.1 - diagrpt Arbitrary Privileged Program Execution
|
This is a local exploit for aix platform. Description: AIX 4.3/5.1 - diagrpt Arbitrary Privileged Program Execution. Author: watercloud
|
Analyze the security implications of: AIX 4.3/5.1 - diagrpt Arbitrary Privileged Program Execution
|
This exploit targets aix systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aix platform
|
What is this exploit about: runawaysoft haber portal 1.0 - 'tr' Multiple Vulnerabilities
|
This is a webapps exploit for asp platform. Description: runawaysoft haber portal 1.0 - 'tr' Multiple Vulnerabilities. Author: kerem125
|
Analyze the security implications of: runawaysoft haber portal 1.0 - 'tr' Multiple Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: ILIAS < 5.2.4 - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: ILIAS < 5.2.4 - Cross-Site Scripting. Author: Florian Kunushevci
|
Analyze the security implications of: ILIAS < 5.2.4 - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CubeCart 3.0.x - 'view_order.php?order_id' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: CubeCart 3.0.x - 'view_order.php?order_id' Cross-Site Scripting. Author: HACKERS PAL
|
Analyze the security implications of: CubeCart 3.0.x - 'view_order.php?order_id' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Intelbras Router WRN150 1.0.18 - Cross-Site Request Forgery
|
This is a webapps exploit for hardware platform. Description: Intelbras Router WRN150 1.0.18 - Cross-Site Request Forgery. Author: Prof. Joas Antonio
|
Analyze the security implications of: Intelbras Router WRN150 1.0.18 - Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: EZRecipeZee CMS 91 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: EZRecipeZee CMS 91 - Remote File Inclusion. Author: kaMtiEz
|
Analyze the security implications of: EZRecipeZee CMS 91 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Perdition 1.17 - IMAPD __STR_VWRITE Remote Format String
|
This is a dos exploit for linux platform. Description: Perdition 1.17 - IMAPD __STR_VWRITE Remote Format String. Author: Bernhard Mueller
|
Analyze the security implications of: Perdition 1.17 - IMAPD __STR_VWRITE Remote Format String
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apache Struts < 1.3.10 / < 2.3.16.2 - ClassLoader Manipulation Remote Code Execution (Metasploit)
|
This is a remote exploit for multiple platform. Description: Apache Struts < 1.3.10 / < 2.3.16.2 - ClassLoader Manipulation Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Apache Struts < 1.3.10 / < 2.3.16.2 - ClassLoader Manipulation Remote Code Execution (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.