input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: PHP 4.3.x - Microsoft Windows Shell Escape functions Command Execution | This exploit targets php systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ektron CMS 9.10 SP1 (Build 9.1.0.184.1.114) - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: Ektron CMS 9.10 SP1 (Build 9.1.0.184.1.114) - Cross-Site Request Forgery. Author: Jerold Hoong |
Analyze the security implications of: Ektron CMS 9.10 SP1 (Build 9.1.0.184.1.114) - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Zope 2.11.2 - PythonScript Multiple Remote Denial of Service Vulnerabilities | This is a dos exploit for multiple platform. Description: Zope 2.11.2 - PythonScript Multiple Remote Denial of Service Vulnerabilities. Author: Marc-Andre Lemburg |
Analyze the security implications of: Zope 2.11.2 - PythonScript Multiple Remote Denial of Service Vulnerabilities | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: PA168 Chipset IP Phones - Weak Session Management | This is a remote exploit for hardware platform. Description: PA168 Chipset IP Phones - Weak Session Management. Author: Adrian _pagvac_ Pastor |
Analyze the security implications of: PA168 Chipset IP Phones - Weak Session Management | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Contenido 4.8.4 - Remote File Inclusion / Cross-Site Scripting | This is a webapps exploit for php platform. Description: Contenido 4.8.4 - Remote File Inclusion / Cross-Site Scripting. Author: RoMaNcYxHaCkEr |
Analyze the security implications of: Contenido 4.8.4 - Remote File Inclusion / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Clinic Management System 1.0 - SQL injection to Remote Code Execution | This is a webapps exploit for php platform. Description: Clinic Management System 1.0 - SQL injection to Remote Code Execution. Author: Pablo Santiago |
Analyze the security implications of: Clinic Management System 1.0 - SQL injection to Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass) | This is a remote exploit for multiple platform. Description: Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass). Author: allyshka |
Analyze the security implications of: Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: X-Skipper-Proxy v0.13.237 - Server Side Request Forgery (SSRF) | This is a remote exploit for multiple platform. Description: X-Skipper-Proxy v0.13.237 - Server Side Request Forgery (SSRF). Author: Hosein Vita |
Analyze the security implications of: X-Skipper-Proxy v0.13.237 - Server Side Request Forgery (SSRF) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Sophos Web Protection Appliance - clear_keys.pl Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: Sophos Web Protection Appliance - clear_keys.pl Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: Sophos Web Protection Appliance - clear_keys.pl Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Linux BSD-derived Telnet Service Encryption Key ID - Remote Buffer Overflow (Metasploit) | This is a remote exploit for linux platform. Description: Linux BSD-derived Telnet Service Encryption Key ID - Remote Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: Linux BSD-derived Telnet Service Encryption Key ID - Remote Buffer Overflow (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Symantec Brightmail 10.6.0-7 - LDAP Credentials Disclosure (Metasploit) | This is a webapps exploit for java platform. Description: Symantec Brightmail 10.6.0-7 - LDAP Credentials Disclosure (Metasploit). Author: Fakhir Karim Reda |
Analyze the security implications of: Symantec Brightmail 10.6.0-7 - LDAP Credentials Disclosure (Metasploit) | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: AIX 4.2/4.3 - netstat -Z Statistic Clearing | This is a local exploit for aix platform. Description: AIX 4.2/4.3 - netstat -Z Statistic Clearing. Author: alex medvedev |
Analyze the security implications of: AIX 4.2/4.3 - netstat -Z Statistic Clearing | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: Alienvault Open Source SIEM (OSSIM) < 4.8.0 - 'get_file' Information Disclosure (Metasploit) | This is a remote exploit for linux platform. Description: Alienvault Open Source SIEM (OSSIM) < 4.8.0 - 'get_file' Information Disclosure (Metasploit). Author: James Fitts |
Analyze the security implications of: Alienvault Open Source SIEM (OSSIM) < 4.8.0 - 'get_file' Information Disclosure (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: SGI IRIX 6.4 - 'login' Local Privilege Escalation | This is a local exploit for irix platform. Description: SGI IRIX 6.4 - 'login' Local Privilege Escalation. Author: David Hedley |
Analyze the security implications of: SGI IRIX 6.4 - 'login' Local Privilege Escalation | This exploit targets irix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: ContentNow 1.30 - Local File Inclusion / Arbitrary File Upload/Delete | This is a webapps exploit for php platform. Description: ContentNow 1.30 - Local File Inclusion / Arbitrary File Upload/Delete. Author: r0ut3r |
Analyze the security implications of: ContentNow 1.30 - Local File Inclusion / Arbitrary File Upload/Delete | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Graphite2 - TtfUtil::CmapSubtable4NextCodepoint Heap Overread | This is a dos exploit for multiple platform. Description: Graphite2 - TtfUtil::CmapSubtable4NextCodepoint Heap Overread. Author: Google Security Research |
Analyze the security implications of: Graphite2 - TtfUtil::CmapSubtable4NextCodepoint Heap Overread | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Bludit 3-14-1 Plugin 'UploadPlugin' - Remote Code Execution (RCE) (Authenticated) | This is a webapps exploit for php platform. Description: Bludit 3-14-1 Plugin 'UploadPlugin' - Remote Code Execution (RCE) (Authenticated). Author: Alperen Ergel |
Analyze the security implications of: Bludit 3-14-1 Plugin 'UploadPlugin' - Remote Code Execution (RCE) (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ezcms 1.2 - Blind SQL Injection / Authentication Bypass | This is a webapps exploit for php platform. Description: ezcms 1.2 - Blind SQL Injection / Authentication Bypass. Author: t0pP8uZz |
Analyze the security implications of: ezcms 1.2 - Blind SQL Injection / Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GANTTy 1.0.3 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: GANTTy 1.0.3 - 'index.php' Cross-Site Scripting. Author: Luny |
Analyze the security implications of: GANTTy 1.0.3 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RecipePal 1.0 - SQL Injection | This is a webapps exploit for asp platform. Description: RecipePal 1.0 - SQL Injection. Author: R3d-D3V!L |
Analyze the security implications of: RecipePal 1.0 - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Opera 9.10 - 'alert()' Remote Denial of Service | This is a dos exploit for multiple platform. Description: Opera 9.10 - 'alert()' Remote Denial of Service. Author: Dj7xpl |
Analyze the security implications of: Opera 9.10 - 'alert()' Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: APT-webshop 3.0/4.0 - 'modules.php' Multiple SQL Injections | This is a webapps exploit for php platform. Description: APT-webshop 3.0/4.0 - 'modules.php' Multiple SQL Injections. Author: r0t |
Analyze the security implications of: APT-webshop 3.0/4.0 - 'modules.php' Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: XGalaga 2.0.34 (RedHat 9.0) - Local Game | This is a local exploit for linux platform. Description: XGalaga 2.0.34 (RedHat 9.0) - Local Game. Author: c0wboy |
Analyze the security implications of: XGalaga 2.0.34 (RedHat 9.0) - Local Game | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Chevereto 1.91 - '/Upload/engine.php?v' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Chevereto 1.91 - '/Upload/engine.php?v' Cross-Site Scripting. Author: AkaStep |
Analyze the security implications of: Chevereto 1.91 - '/Upload/engine.php?v' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NetWin DMail 2.7/2.8 - ETRN Buffer Overflow | This is a remote exploit for linux platform. Description: NetWin DMail 2.7/2.8 - ETRN Buffer Overflow. Author: noir |
Analyze the security implications of: NetWin DMail 2.7/2.8 - ETRN Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Zigurrat Farsi CMS - '/manager/textbox.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Zigurrat Farsi CMS - '/manager/textbox.asp' SQL Injection. Author: Isfahan |
Analyze the security implications of: Zigurrat Farsi CMS - '/manager/textbox.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: VMware Fusion - USB Arbitrator Setuid Privilege Escalation (Metasploit) | This is a local exploit for macos platform. Description: VMware Fusion - USB Arbitrator Setuid Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: VMware Fusion - USB Arbitrator Setuid Privilege Escalation (Metasploit) | This exploit targets macos systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Netgear R7000 / R6400 - 'cgi-bin' Command Injection (Metasploit) | This is a remote exploit for cgi platform. Description: Netgear R7000 / R6400 - 'cgi-bin' Command Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Netgear R7000 / R6400 - 'cgi-bin' Command Injection (Metasploit) | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: ClipShare 4.1.1 - Multiples Vulnerabilities | This is a webapps exploit for php platform. Description: ClipShare 4.1.1 - Multiples Vulnerabilities. Author: Esac |
Analyze the security implications of: ClipShare 4.1.1 - Multiples Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Thomson SpeedTouch 2030 - SIP Empty Message Remote Denial of Service | This is a dos exploit for hardware platform. Description: Thomson SpeedTouch 2030 - SIP Empty Message Remote Denial of Service. Author: Humberto J. Abdelnur |
Analyze the security implications of: Thomson SpeedTouch 2030 - SIP Empty Message Remote Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Belkin N150 Router 1.00.08/1.00.09 - Directory Traversal | This is a webapps exploit for hardware platform. Description: Belkin N150 Router 1.00.08/1.00.09 - Directory Traversal. Author: Rahul Pratap Singh |
Analyze the security implications of: Belkin N150 Router 1.00.08/1.00.09 - Directory Traversal | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apple iOS Safari - body alink Remote Crash | This is a dos exploit for hardware platform. Description: Apple iOS Safari - body alink Remote Crash. Author: Yakir Wizman |
Analyze the security implications of: Apple iOS Safari - body alink Remote Crash | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: File Thingie 2.5.5 - File Security Bypass | This is a webapps exploit for php platform. Description: File Thingie 2.5.5 - File Security Bypass. Author: Jeremiah Talamantes |
Analyze the security implications of: File Thingie 2.5.5 - File Security Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adive Framework 2.0.8 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Adive Framework 2.0.8 - Persistent Cross-Site Scripting. Author: Sarthak Saini |
Analyze the security implications of: Adive Framework 2.0.8 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.