input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Crafty Syntax Live Help 3.1.2 - Remote File Inclusion / Full Path Disclosure
|
This is a webapps exploit for php platform. Description: Crafty Syntax Live Help 3.1.2 - Remote File Inclusion / Full Path Disclosure. Author: ITTIHACK
|
Analyze the security implications of: Crafty Syntax Live Help 3.1.2 - Remote File Inclusion / Full Path Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Daily Habit Tracker 1.0 - Broken Access Control
|
This is a webapps exploit for php platform. Description: Daily Habit Tracker 1.0 - Broken Access Control. Author: Yevhenii Butenko
|
Analyze the security implications of: Daily Habit Tracker 1.0 - Broken Access Control
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FOSS Gallery Public 1.0 - Arbitrary File Upload (PoC)
|
This is a webapps exploit for php platform. Description: FOSS Gallery Public 1.0 - Arbitrary File Upload (PoC). Author: Pepelux
|
Analyze the security implications of: FOSS Gallery Public 1.0 - Arbitrary File Upload (PoC)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ProFTPd 1.2 pre1/pre2/pre3/pre4/pre5 - Remote Buffer Overflow (1)
|
This is a remote exploit for linux platform. Description: ProFTPd 1.2 pre1/pre2/pre3/pre4/pre5 - Remote Buffer Overflow (1). Author: babcia padlina ltd
|
Analyze the security implications of: ProFTPd 1.2 pre1/pre2/pre3/pre4/pre5 - Remote Buffer Overflow (1)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apache2Triad 1.5.4 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Apache2Triad 1.5.4 - Multiple Vulnerabilities. Author: hyp3rlinx
|
Analyze the security implications of: Apache2Triad 1.5.4 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AdminLTE PiHole 5.18 - Broken Access Control
|
This is a webapps exploit for php platform. Description: AdminLTE PiHole 5.18 - Broken Access Control. Author: kv1to
|
Analyze the security implications of: AdminLTE PiHole 5.18 - Broken Access Control
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Oracle 9.x - 'Database' / Statement Buffer Overflow
|
This is a dos exploit for multiple platform. Description: Oracle 9.x - 'Database' / Statement Buffer Overflow. Author: NGSSoftware
|
Analyze the security implications of: Oracle 9.x - 'Database' / Statement Buffer Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Delta Industrial Automation COMMGR 1.08 - Stack Buffer Overflow (PoC)
|
This is a dos exploit for hardware platform. Description: Delta Industrial Automation COMMGR 1.08 - Stack Buffer Overflow (PoC). Author: t4rkd3vilz
|
Analyze the security implications of: Delta Industrial Automation COMMGR 1.08 - Stack Buffer Overflow (PoC)
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Cisco UCS Director_ Cisco Integrated Management Controller Supervisor and Cisco UCS Director Express for Big Data - Multiple Vulnerabilities
|
This is a remote exploit for multiple platform. Description: Cisco UCS Director_ Cisco Integrated Management Controller Supervisor and Cisco UCS Director Express for Big Data - Multiple Vulnerabilities. Author: Pedro Ribeiro
|
Analyze the security implications of: Cisco UCS Director_ Cisco Integrated Management Controller Supervisor and Cisco UCS Director Express for Big Data - Multiple Vulnerabilities
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Bs Events_Locator Script - SQL Injection
|
This is a webapps exploit for php platform. Description: Bs Events_Locator Script - SQL Injection. Author: Sid3^effects
|
Analyze the security implications of: Bs Events_Locator Script - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Site2Nite Business eListings - SQL Injection
|
This is a webapps exploit for asp platform. Description: Site2Nite Business eListings - SQL Injection. Author: L0rd CrusAd3r
|
Analyze the security implications of: Site2Nite Business eListings - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: ZTE ZXHN H168N 3.1 - Remote Code Execution (RCE) via authentication bypass
|
This is a hardware exploit for multiple platform. Description: ZTE ZXHN H168N 3.1 - Remote Code Execution (RCE) via authentication bypass. Author: tasos meletlidis
|
Analyze the security implications of: ZTE ZXHN H168N 3.1 - Remote Code Execution (RCE) via authentication bypass
|
This exploit targets multiple systems. Type: hardware. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Kartris 1.6 - Arbitrary File Upload
|
This is a webapps exploit for aspx platform. Description: Kartris 1.6 - Arbitrary File Upload. Author: Nhat Ha
|
Analyze the security implications of: Kartris 1.6 - Arbitrary File Upload
|
This exploit targets aspx systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aspx platform
|
What is this exploit about: Atlassian Tempo 6.4.3 / JIRA 5.0.0 / Gliffy 3.7.0 - XML Parsing Denial of Service
|
This is a dos exploit for jsp platform. Description: Atlassian Tempo 6.4.3 / JIRA 5.0.0 / Gliffy 3.7.0 - XML Parsing Denial of Service. Author: anonymous
|
Analyze the security implications of: Atlassian Tempo 6.4.3 / JIRA 5.0.0 / Gliffy 3.7.0 - XML Parsing Denial of Service
|
This exploit targets jsp systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Joomla! Component OS Property 3.0.8 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component OS Property 3.0.8 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component OS Property 3.0.8 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BlogEngine.NET 1.6 - Directory Traversal / Information Disclosure
|
This is a webapps exploit for asp platform. Description: BlogEngine.NET 1.6 - Directory Traversal / Information Disclosure. Author: Deniz Cevik
|
Analyze the security implications of: BlogEngine.NET 1.6 - Directory Traversal / Information Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: GNU C library dynamic linker - '$ORIGIN' Expansion
|
This is a local exploit for linux platform. Description: GNU C library dynamic linker - '$ORIGIN' Expansion. Author: Tavis Ormandy
|
Analyze the security implications of: GNU C library dynamic linker - '$ORIGIN' Expansion
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: QNAP Transcode Server - Command Execution (Metasploit)
|
This is a remote exploit for hardware platform. Description: QNAP Transcode Server - Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: QNAP Transcode Server - Command Execution (Metasploit)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Flirt-Projekt 4.8 - 'rub' SQL Injection
|
This is a webapps exploit for php platform. Description: Flirt-Projekt 4.8 - 'rub' SQL Injection. Author: Lazmania61
|
Analyze the security implications of: Flirt-Projekt 4.8 - 'rub' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Connect Daily 3.2.8/3.2.9 - 'ViewSearch.html' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Connect Daily 3.2.8/3.2.9 - 'ViewSearch.html' Multiple Cross-Site Scripting Vulnerabilities. Author: r0t
|
Analyze the security implications of: Connect Daily 3.2.8/3.2.9 - 'ViewSearch.html' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: autositephp 2.0.3 - Local File Inclusion / Cross-Site Request Forgery / Edit File
|
This is a webapps exploit for php platform. Description: autositephp 2.0.3 - Local File Inclusion / Cross-Site Request Forgery / Edit File. Author: SirGod
|
Analyze the security implications of: autositephp 2.0.3 - Local File Inclusion / Cross-Site Request Forgery / Edit File
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ERPNext 12.29 - Cross-Site Scripting (XSS)
|
This is a webapps exploit for java platform. Description: ERPNext 12.29 - Cross-Site Scripting (XSS). Author: Patrick Dean Ramos / Nathu Nandwani / Junnair Manla
|
Analyze the security implications of: ERPNext 12.29 - Cross-Site Scripting (XSS)
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Hosting Controller 1.4 - Import Root Directory Command Execution
|
This is a webapps exploit for asp platform. Description: Hosting Controller 1.4 - Import Root Directory Command Execution. Author: hdlkha
|
Analyze the security implications of: Hosting Controller 1.4 - Import Root Directory Command Execution
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Component Spider Calendar - 'date' Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Spider Calendar - 'date' Blind SQL Injection. Author: Red-D3v1L
|
Analyze the security implications of: Joomla! Component Spider Calendar - 'date' Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Shuttle Tech ADSL Modem/Router 915 WM - Remote DNS Change
|
This is a remote exploit for hardware platform. Description: Shuttle Tech ADSL Modem/Router 915 WM - Remote DNS Change. Author: Todor Donev
|
Analyze the security implications of: Shuttle Tech ADSL Modem/Router 915 WM - Remote DNS Change
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Kordil EDms 2.2.60rc3 - Arbitrary File Upload (Metasploit)
|
This is a remote exploit for php platform. Description: Kordil EDms 2.2.60rc3 - Arbitrary File Upload (Metasploit). Author: Metasploit
|
Analyze the security implications of: Kordil EDms 2.2.60rc3 - Arbitrary File Upload (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: iOS/macOS - 'task_swap_mach_voucher()' Use-After-Free
|
This is a dos exploit for multiple platform. Description: iOS/macOS - 'task_swap_mach_voucher()' Use-After-Free. Author: Google Security Research
|
Analyze the security implications of: iOS/macOS - 'task_swap_mach_voucher()' Use-After-Free
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Engineers Online Portal 1.0 - 'multiple' Stored Cross-Site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: Engineers Online Portal 1.0 - 'multiple' Stored Cross-Site Scripting (XSS). Author: Alon Leviev
|
Analyze the security implications of: Engineers Online Portal 1.0 - 'multiple' Stored Cross-Site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GeeCarts - 'show.php?id' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: GeeCarts - 'show.php?id' Cross-Site Scripting. Author: Ivan Sanchez
|
Analyze the security implications of: GeeCarts - 'show.php?id' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Blazix 1.2 - Special Character Handling Server Side Script Information Disclosure
|
This is a remote exploit for multiple platform. Description: Blazix 1.2 - Special Character Handling Server Side Script Information Disclosure. Author: Auriemma Luigi
|
Analyze the security implications of: Blazix 1.2 - Special Character Handling Server Side Script Information Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Slackware 7.0/7.1/8.0 - Manual Page Cache File Creation
|
This is a local exploit for linux platform. Description: Slackware 7.0/7.1/8.0 - Manual Page Cache File Creation. Author: josh
|
Analyze the security implications of: Slackware 7.0/7.1/8.0 - Manual Page Cache File Creation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Life Insurance Management System 1.0 - Multiple Stored XSS
|
This is a webapps exploit for php platform. Description: Life Insurance Management System 1.0 - Multiple Stored XSS. Author: Arnav Tripathy
|
Analyze the security implications of: Life Insurance Management System 1.0 - Multiple Stored XSS
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_niceajaxpoll 1.3.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_niceajaxpoll 1.3.0 - SQL Injection. Author: Patrick de Brouwer
|
Analyze the security implications of: Joomla! Component com_niceajaxpoll 1.3.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Siemens S55 - Cellular Telephone Sms Confirmation Message Bypass
|
This is a remote exploit for hardware platform. Description: Siemens S55 - Cellular Telephone Sms Confirmation Message Bypass. Author: FtR
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.