input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: FreeStyle Wiki 3.6.2 - 'user.dat' Password Disclosure | This is a webapps exploit for php platform. Description: FreeStyle Wiki 3.6.2 - 'user.dat' Password Disclosure. Author: bd0rk |
Analyze the security implications of: FreeStyle Wiki 3.6.2 - 'user.dat' Password Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ManageEngine Application Manager 14.2 - Privilege Escalation / Remote Command Execution (Metasploit) | This is a remote exploit for multiple platform. Description: ManageEngine Application Manager 14.2 - Privilege Escalation / Remote Command Execution (Metasploit). Author: AkkuS |
Analyze the security implications of: ManageEngine Application Manager 14.2 - Privilege Escalation / Remote Command Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Bitweaver 1.1.1 Beta - 'list_galleries.php?sort_mode' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Bitweaver 1.1.1 Beta - 'list_galleries.php?sort_mode' Cross-Site Scripting. Author: r0t |
Analyze the security implications of: Bitweaver 1.1.1 Beta - 'list_galleries.php?sort_mode' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MOTIONBORG Web Real Estate 2.1 - SQL Injection | This is a webapps exploit for asp platform. Description: MOTIONBORG Web Real Estate 2.1 - SQL Injection. Author: ajann |
Analyze the security implications of: MOTIONBORG Web Real Estate 2.1 - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: IBM Lotus Notes 6.5.6 - 'names.nsf' Open Redirection | This is a remote exploit for multiple platform. Description: IBM Lotus Notes 6.5.6 - 'names.nsf' Open Redirection. Author: Lament |
Analyze the security implications of: IBM Lotus Notes 6.5.6 - 'names.nsf' Open Redirection | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_carman - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joomla! Component com_carman - Cross-Site Scripting. Author: FL0RiX |
Analyze the security implications of: Joomla! Component com_carman - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ipswitch IMail 5.0 - Whois32 Daemon Buffer Overflow (Denial of Service) (PoC) | This is a dos exploit for multiple platform. Description: Ipswitch IMail 5.0 - Whois32 Daemon Buffer Overflow (Denial of Service) (PoC). Author: Marc of eEye |
Analyze the security implications of: Ipswitch IMail 5.0 - Whois32 Daemon Buffer Overflow (Denial of Service) (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: JSPMyAdmin 1.1 - Multiple Vulnerabilities | This is a webapps exploit for jsp platform. Description: JSPMyAdmin 1.1 - Multiple Vulnerabilities. Author: hyp3rlinx |
Analyze the security implications of: JSPMyAdmin 1.1 - Multiple Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Apache 0.8.x/1.0.x / NCSA HTTPd 1.x - 'test-cgi' Directory Listing | This is a remote exploit for cgi platform. Description: Apache 0.8.x/1.0.x / NCSA HTTPd 1.x - 'test-cgi' Directory Listing. Author: @stake |
Analyze the security implications of: Apache 0.8.x/1.0.x / NCSA HTTPd 1.x - 'test-cgi' Directory Listing | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Open-Xchange Guard 2.4.2 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for linux platform. Description: Open-Xchange Guard 2.4.2 - Multiple Cross-Site Scripting Vulnerabilities. Author: Benjamin Daniel Mussler |
Analyze the security implications of: Open-Xchange Guard 2.4.2 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component MyContent 1.1.13 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component MyContent 1.1.13 - Blind SQL Injection. Author: His0k4 |
Analyze the security implications of: Joomla! Component MyContent 1.1.13 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ethereal 10.x - AFP Protocol Dissector Remote Format String | This is a remote exploit for linux platform. Description: Ethereal 10.x - AFP Protocol Dissector Remote Format String. Author: vade79 |
Analyze the security implications of: Ethereal 10.x - AFP Protocol Dissector Remote Format String | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: xsplumber - 'strcpy()' Local Buffer Overflow | This is a local exploit for linux platform. Description: xsplumber - 'strcpy()' Local Buffer Overflow. Author: vade79 |
Analyze the security implications of: xsplumber - 'strcpy()' Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Fantastic Blog CMS 1.0 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Fantastic Blog CMS 1.0 - 'id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Fantastic Blog CMS 1.0 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ghostscript - executeonly Bypass with errorhandler Setup | This is a local exploit for linux platform. Description: ghostscript - executeonly Bypass with errorhandler Setup. Author: Google Security Research |
Analyze the security implications of: ghostscript - executeonly Bypass with errorhandler Setup | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component My Projects 2.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component My Projects 2.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component My Projects 2.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM AIX 5.3/6.1/7.1/7.2 - 'lquerylv' Local Privilege Escalation | This is a local exploit for aix platform. Description: IBM AIX 5.3/6.1/7.1/7.2 - 'lquerylv' Local Privilege Escalation. Author: Hector X. Monsegur |
Analyze the security implications of: IBM AIX 5.3/6.1/7.1/7.2 - 'lquerylv' Local Privilege Escalation | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: Joomla! Component com_rokdownloads - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_rokdownloads - Local File Inclusion. Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: Joomla! Component com_rokdownloads - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Advanced Poll 2.0.2/2.0.3 - 'popup.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Advanced Poll 2.0.2/2.0.3 - 'popup.php' Cross-Site Scripting. Author: [GB] |
Analyze the security implications of: Advanced Poll 2.0.2/2.0.3 - 'popup.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FretsWeb 1.2 - 'name' Blind SQL Injection | This is a webapps exploit for php platform. Description: FretsWeb 1.2 - 'name' Blind SQL Injection. Author: YEnH4ckEr |
Analyze the security implications of: FretsWeb 1.2 - 'name' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: python-feedparser 5.0 - '/feedparser/feedparser.py' Cross-Site Scripting | This is a remote exploit for multiple platform. Description: python-feedparser 5.0 - '/feedparser/feedparser.py' Cross-Site Scripting. Author: fazalmajid |
Analyze the security implications of: python-feedparser 5.0 - '/feedparser/feedparser.py' Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: lionmax software www file share pro 2.4x - Multiple Vulnerabilities (1) | This is a remote exploit for multiple platform. Description: lionmax software www file share pro 2.4x - Multiple Vulnerabilities (1). Author: Luigi Auriemma |
Analyze the security implications of: lionmax software www file share pro 2.4x - Multiple Vulnerabilities (1) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Xine-Lib 1.1.9 - 'rmff_dump_cont()' Remote Heap Buffer Overflow (PoC) | This is a dos exploit for linux platform. Description: Xine-Lib 1.1.9 - 'rmff_dump_cont()' Remote Heap Buffer Overflow (PoC). Author: Luigi Auriemma |
Analyze the security implications of: Xine-Lib 1.1.9 - 'rmff_dump_cont()' Remote Heap Buffer Overflow (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Qualcomm Eudora Internet Mail Server 1.2 - Remote Buffer Overflow | This is a remote exploit for linux platform. Description: Qualcomm Eudora Internet Mail Server 1.2 - Remote Buffer Overflow. Author: Netstat Webmaster |
Analyze the security implications of: Qualcomm Eudora Internet Mail Server 1.2 - Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: WU-FTPD 2.4.2/2.5 .0/2.6.0 - Remote Format String Stack Overwrite (3) | This is a remote exploit for linux_x86 platform. Description: WU-FTPD 2.4.2/2.5 .0/2.6.0 - Remote Format String Stack Overwrite (3). Author: justme |
Analyze the security implications of: WU-FTPD 2.4.2/2.5 .0/2.6.0 - Remote Format String Stack Overwrite (3) | This exploit targets linux_x86 systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux_x86 platform |
What is this exploit about: WebKit - 'WebCore::RenderTreeBuilder::removeAnonymousWrappersForInlineChildrenIfNeeded' Use-After-Free | This is a dos exploit for multiple platform. Description: WebKit - 'WebCore::RenderTreeBuilder::removeAnonymousWrappersForInlineChildrenIfNeeded' Use-After-Free. Author: Google Security Research |
Analyze the security implications of: WebKit - 'WebCore::RenderTreeBuilder::removeAnonymousWrappersForInlineChildrenIfNeeded' Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_extcalendar - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_extcalendar - Blind SQL Injection. Author: Lagripe-Dz |
Analyze the security implications of: Joomla! Component com_extcalendar - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: A-Blog 1.0 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: A-Blog 1.0 - Cross-Site Scripting. Author: Fukumori |
Analyze the security implications of: A-Blog 1.0 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CM68 News 12.02.06 - 'addpth' Remote File Inclusion | This is a webapps exploit for php platform. Description: CM68 News 12.02.06 - 'addpth' Remote File Inclusion. Author: Paul Bakoyiannis |
Analyze the security implications of: CM68 News 12.02.06 - 'addpth' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Itech Classifieds Script 7.27 - 'scat' SQL Injection | This is a webapps exploit for php platform. Description: Itech Classifieds Script 7.27 - 'scat' SQL Injection. Author: Kaan KAMIS |
Analyze the security implications of: Itech Classifieds Script 7.27 - 'scat' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Advanced Guestbook 2.4.0 - 'phpBB' Remote File Inclusion | This is a webapps exploit for php platform. Description: Advanced Guestbook 2.4.0 - 'phpBB' Remote File Inclusion. Author: n0m3rcy |
Analyze the security implications of: Advanced Guestbook 2.4.0 - 'phpBB' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fantastic News 2.1.3 - 'script_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Fantastic News 2.1.3 - 'script_path' Remote File Inclusion. Author: SHiKaA |
Analyze the security implications of: Fantastic News 2.1.3 - 'script_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Collabtive 0.65 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Collabtive 0.65 - Multiple Vulnerabilities. Author: Anatolia Security |
Analyze the security implications of: Collabtive 0.65 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JE Form Creator 1.8 - 'Itemid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JE Form Creator 1.8 - 'Itemid' SQL Injection. Author: Ihsan Sencan |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.