input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: CodoForum 2.5.1 - Arbitrary File Download
|
This is a webapps exploit for php platform. Description: CodoForum 2.5.1 - Arbitrary File Download. Author: Kacper Szurek
|
Analyze the security implications of: CodoForum 2.5.1 - Arbitrary File Download
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dolphin 7.0.7 - 'member_menu_queries.php' Remote PHP Code Injection
|
This is a webapps exploit for php platform. Description: Dolphin 7.0.7 - 'member_menu_queries.php' Remote PHP Code Injection. Author: EgiX
|
Analyze the security implications of: Dolphin 7.0.7 - 'member_menu_queries.php' Remote PHP Code Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: lineaCMS - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: lineaCMS - Cross-Site Scripting. Author: Phenom
|
Analyze the security implications of: lineaCMS - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WebKit - 'parent/top' Cross Domain Scripting
|
This is a remote exploit for multiple platform. Description: WebKit - 'parent/top' Cross Domain Scripting. Author: Gareth Hayes
|
Analyze the security implications of: WebKit - 'parent/top' Cross Domain Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Car Rental Project 2.0 - Arbitrary File Upload to Remote Code Execution
|
This is a webapps exploit for php platform. Description: Car Rental Project 2.0 - Arbitrary File Upload to Remote Code Execution. Author: Jannick Tiger
|
Analyze the security implications of: Car Rental Project 2.0 - Arbitrary File Upload to Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Exporia 0.3 - 'Common.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Exporia 0.3 - 'Common.php' Remote File Inclusion. Author: Root3r_H3ll
|
Analyze the security implications of: Exporia 0.3 - 'Common.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BolinOS 4.6.1 - Local File Inclusion / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: BolinOS 4.6.1 - Local File Inclusion / Cross-Site Scripting. Author: DSecRG
|
Analyze the security implications of: BolinOS 4.6.1 - Local File Inclusion / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CoSoSys Endpoint Protector 4.5.0.1 - (Authenticated) Remote Root Command Injection
|
This is a webapps exploit for php platform. Description: CoSoSys Endpoint Protector 4.5.0.1 - (Authenticated) Remote Root Command Injection. Author: 0x09AL
|
Analyze the security implications of: CoSoSys Endpoint Protector 4.5.0.1 - (Authenticated) Remote Root Command Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: macOS LaunchDaemon iOS 17.2 - Privilege Escalation
|
This is a local exploit for macos platform. Description: macOS LaunchDaemon iOS 17.2 - Privilege Escalation. Author: Mohammed Idrees Banyamer
|
Analyze the security implications of: macOS LaunchDaemon iOS 17.2 - Privilege Escalation
|
This exploit targets macos systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets macos platform
|
What is this exploit about: Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 - Multiple Vulnerabilities. Author: SlidingWindow
|
Analyze the security implications of: Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: SaLICru -SLC-20-cube3(5) - HTML Injection
|
This is a webapps exploit for hardware platform. Description: SaLICru -SLC-20-cube3(5) - HTML Injection. Author: Ramikan
|
Analyze the security implications of: SaLICru -SLC-20-cube3(5) - HTML Injection
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: LG G4 MRA58K - 'liblg_parser_mkv.so' Bad Allocation Calls
|
This is a dos exploit for android platform. Description: LG G4 MRA58K - 'liblg_parser_mkv.so' Bad Allocation Calls. Author: Google Security Research
|
Analyze the security implications of: LG G4 MRA58K - 'liblg_parser_mkv.so' Bad Allocation Calls
|
This exploit targets android systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: e107 website system 0.7.5 - 'news.php?PATH_INFO' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: e107 website system 0.7.5 - 'news.php?PATH_INFO' Cross-Site Scripting. Author: zark0vac
|
Analyze the security implications of: e107 website system 0.7.5 - 'news.php?PATH_INFO' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: SIPp 3.3.990 - Local Buffer Overflow (PoC)
|
This is a dos exploit for linux platform. Description: SIPp 3.3.990 - Local Buffer Overflow (PoC). Author: Nawaf Alkeraithe
|
Analyze the security implications of: SIPp 3.3.990 - Local Buffer Overflow (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ollama 0.6.4 - Server Side Request Forgery (SSRF)
|
This is a local exploit for multiple platform. Description: ollama 0.6.4 - Server Side Request Forgery (SSRF). Author: sud0
|
Analyze the security implications of: ollama 0.6.4 - Server Side Request Forgery (SSRF)
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: labwiki 1.1 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: labwiki 1.1 - Multiple Vulnerabilities. Author: muuratsalo
|
Analyze the security implications of: labwiki 1.1 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ElasticSearch < 1.4.5 / < 1.5.2 - Directory Traversal
|
This is a webapps exploit for php platform. Description: ElasticSearch < 1.4.5 / < 1.5.2 - Directory Traversal. Author: pandujar
|
Analyze the security implications of: ElasticSearch < 1.4.5 / < 1.5.2 - Directory Traversal
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_clan - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_clan - SQL Injection. Author: AtT4CKxT3rR0r1ST
|
Analyze the security implications of: Joomla! Component com_clan - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: log1 CMS 2.0 - Session Handling Remote Security Bypass / Remote File Inclusion
|
This is a webapps exploit for php platform. Description: log1 CMS 2.0 - Session Handling Remote Security Bypass / Remote File Inclusion. Author: High-Tech Bridge SA
|
Analyze the security implications of: log1 CMS 2.0 - Session Handling Remote Security Bypass / Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DieselScripts Smart Traffic - 'index.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: DieselScripts Smart Traffic - 'index.php' Remote File Inclusion. Author: night_warrior771
|
Analyze the security implications of: DieselScripts Smart Traffic - 'index.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apache Struts - Dynamic Method Invocation Remote Code Execution (Metasploit)
|
This is a remote exploit for linux platform. Description: Apache Struts - Dynamic Method Invocation Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Apache Struts - Dynamic Method Invocation Remote Code Execution (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: LoudBlog 0.41 - 'index.php?template' Traversal Arbitrary File Access
|
This is a webapps exploit for php platform. Description: LoudBlog 0.41 - 'index.php?template' Traversal Arbitrary File Access. Author: tzitaroth
|
Analyze the security implications of: LoudBlog 0.41 - 'index.php?template' Traversal Arbitrary File Access
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: RoyalTSX 6.0.1 - RTSZ File Handling Heap Memory Corruption PoC
|
This is a remote exploit for macos platform. Description: RoyalTSX 6.0.1 - RTSZ File Handling Heap Memory Corruption PoC. Author: LiquidWorm
|
Analyze the security implications of: RoyalTSX 6.0.1 - RTSZ File Handling Heap Memory Corruption PoC
|
This exploit targets macos systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets macos platform
|
What is this exploit about: Microsoft IIS 3.0/4.0 / Microsoft Index Server 2.0 - Directory Traversal (MS00-006)
|
This is a remote exploit for multiple platform. Description: Microsoft IIS 3.0/4.0 / Microsoft Index Server 2.0 - Directory Traversal (MS00-006). Author: Mnemonix
|
Analyze the security implications of: Microsoft IIS 3.0/4.0 / Microsoft Index Server 2.0 - Directory Traversal (MS00-006)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: PHP 5.2.1 - 'hash_update_file()' Freed Resource Usage
|
This is a local exploit for linux platform. Description: PHP 5.2.1 - 'hash_update_file()' Freed Resource Usage. Author: Stefan Esser
|
Analyze the security implications of: PHP 5.2.1 - 'hash_update_file()' Freed Resource Usage
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Infoblox NetMRI 6.2.1 - Admin Login Page Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for java platform. Description: Infoblox NetMRI 6.2.1 - Admin Login Page Multiple Cross-Site Scripting Vulnerabilities. Author: Jose Carlos de Arriba
|
Analyze the security implications of: Infoblox NetMRI 6.2.1 - Admin Login Page Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Apple iOS 4.0.2 - Networking Packet Filter Rules Privilege Escalation
|
This is a local exploit for ios platform. Description: Apple iOS 4.0.2 - Networking Packet Filter Rules Privilege Escalation. Author: Apple
|
Analyze the security implications of: Apple iOS 4.0.2 - Networking Packet Filter Rules Privilege Escalation
|
This exploit targets ios systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: EZArticles - 'articles.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: EZArticles - 'articles.php' Cross-Site Scripting. Author: Moudi
|
Analyze the security implications of: EZArticles - 'articles.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Agora.CGI 3/4 - Debug Mode Full Path Disclosure
|
This is a remote exploit for cgi platform. Description: Agora.CGI 3/4 - Debug Mode Full Path Disclosure. Author: superpetz
|
Analyze the security implications of: Agora.CGI 3/4 - Debug Mode Full Path Disclosure
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Apache OFBiz 18.12.12 - Directory Traversal
|
This is a webapps exploit for java platform. Description: Apache OFBiz 18.12.12 - Directory Traversal. Author: Abdualhadi khalifa
|
Analyze the security implications of: Apache OFBiz 18.12.12 - Directory Traversal
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Gumbo CMS 0.99 - SQL Injection
|
This is a webapps exploit for php platform. Description: Gumbo CMS 0.99 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Gumbo CMS 0.99 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Devalcms 1.4a - 'currentfile' Local File Inclusion
|
This is a webapps exploit for php platform. Description: Devalcms 1.4a - 'currentfile' Local File Inclusion. Author: CWH Underground
|
Analyze the security implications of: Devalcms 1.4a - 'currentfile' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ZyXEL PK5001Z Modem - Backdoor Account
|
This is a remote exploit for hardware platform. Description: ZyXEL PK5001Z Modem - Backdoor Account. Author: Matthew Sheimo
|
Analyze the security implications of: ZyXEL PK5001Z Modem - Backdoor Account
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: PostgreSQL 8.3.6 - Low Cost Function Information Disclosure
|
This is a local exploit for multiple platform. Description: PostgreSQL 8.3.6 - Low Cost Function Information Disclosure. Author: Andres Freund
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.