input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PHP < 4.4.5/5.2.1 - '_SESSION' Deserialization Overwrite | This is a local exploit for linux platform. Description: PHP < 4.4.5/5.2.1 - '_SESSION' Deserialization Overwrite. Author: Stefan Esser |
Analyze the security implications of: PHP < 4.4.5/5.2.1 - '_SESSION' Deserialization Overwrite | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PHP < 4.5.0 - Unserialize Overflow (Metasploit) | This is a remote exploit for php platform. Description: PHP < 4.5.0 - Unserialize Overflow (Metasploit). Author: sesser |
Analyze the security implications of: PHP < 4.5.0 - Unserialize Overflow (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dream4 Koobi CMS 4.2.3 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Dream4 Koobi CMS 4.2.3 - 'index.php' Cross-Site Scripting. Author: mircia |
Analyze the security implications of: Dream4 Koobi CMS 4.2.3 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Injader 2.1.1 - SQL Injection / HTML Injection | This is a webapps exploit for php platform. Description: Injader 2.1.1 - SQL Injection / HTML Injection. Author: anonymous |
Analyze the security implications of: Injader 2.1.1 - SQL Injection / HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM Tivoli Continuous Data Protection for Files 3.1.4.0 - Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: IBM Tivoli Continuous Data Protection for Files 3.1.4.0 - Cross-Site Scripting. Author: Abdul-Aziz Hariri |
Analyze the security implications of: IBM Tivoli Continuous Data Protection for Files 3.1.4.0 - Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: cPanel 5.0 - 'Guestbook.cgi' Remote Command Execution (1) | This is a webapps exploit for cgi platform. Description: cPanel 5.0 - 'Guestbook.cgi' Remote Command Execution (1). Author: bob |
Analyze the security implications of: cPanel 5.0 - 'Guestbook.cgi' Remote Command Execution (1) | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Samba 2.2.8 - Brute Force Method Remote Command Execution | This is a remote exploit for linux platform. Description: Samba 2.2.8 - Brute Force Method Remote Command Execution. Author: Schizoprenic |
Analyze the security implications of: Samba 2.2.8 - Brute Force Method Remote Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Adobe Acrobat Reader and Flash - 'newfunction' Remote Code Execution | This is a dos exploit for multiple platform. Description: Adobe Acrobat Reader and Flash - 'newfunction' Remote Code Execution. Author: Abysssec |
Analyze the security implications of: Adobe Acrobat Reader and Flash - 'newfunction' Remote Code Execution | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Hashicorp vagrant-vmware-fusion < 4.0.20 - Local Privilege Escalation | This is a local exploit for macos platform. Description: Hashicorp vagrant-vmware-fusion < 4.0.20 - Local Privilege Escalation. Author: Mark Wadham |
Analyze the security implications of: Hashicorp vagrant-vmware-fusion < 4.0.20 - Local Privilege Escalation | This exploit targets macos systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Cisco IOS 12.3 - Show IP BGP Regexp Remote Denial of Service | This is a dos exploit for hardware platform. Description: Cisco IOS 12.3 - Show IP BGP Regexp Remote Denial of Service. Author: anonymous |
Analyze the security implications of: Cisco IOS 12.3 - Show IP BGP Regexp Remote Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Kmita FAQ 1.0 - 'index.php?catid' SQL Injection | This is a webapps exploit for php platform. Description: Kmita FAQ 1.0 - 'index.php?catid' SQL Injection. Author: Luny |
Analyze the security implications of: Kmita FAQ 1.0 - 'index.php?catid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WhatsUpGold 21.0.3 - Stored Cross-Site Scripting (XSS) | This is a webapps exploit for multiple platform. Description: WhatsUpGold 21.0.3 - Stored Cross-Site Scripting (XSS). Author: Andreas Finstad |
Analyze the security implications of: WhatsUpGold 21.0.3 - Stored Cross-Site Scripting (XSS) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_ranking - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_ranking - SQL Injection. Author: DevilZ TM |
Analyze the security implications of: Joomla! Component com_ranking - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CONTENTCustomizer 3.1 - 'Dialog.php' Unauthorized Access | This is a webapps exploit for php platform. Description: CONTENTCustomizer 3.1 - 'Dialog.php' Unauthorized Access. Author: d3hydr8 |
Analyze the security implications of: CONTENTCustomizer 3.1 - 'Dialog.php' Unauthorized Access | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AT Contenator 1.0 - 'Root_To_Script' Remote File Inclusion | This is a webapps exploit for php platform. Description: AT Contenator 1.0 - 'Root_To_Script' Remote File Inclusion. Author: ajann |
Analyze the security implications of: AT Contenator 1.0 - 'Root_To_Script' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AdvertisementManager 3.1 - 'req' Local/Remote File Inclusion | This is a webapps exploit for php platform. Description: AdvertisementManager 3.1 - 'req' Local/Remote File Inclusion. Author: indoushka |
Analyze the security implications of: AdvertisementManager 3.1 - 'req' Local/Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Basilix Webmail 1.0 - File Disclosure | This is a webapps exploit for php platform. Description: Basilix Webmail 1.0 - File Disclosure. Author: karol _ |
Analyze the security implications of: Basilix Webmail 1.0 - File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WhatsApp 2.18.31 - Memory Corruption | This is a dos exploit for ios platform. Description: WhatsApp 2.18.31 - Memory Corruption. Author: Juan Sacco |
Analyze the security implications of: WhatsApp 2.18.31 - Memory Corruption | This exploit targets ios systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: IBM AIX 5.x - 'Diag' Local Privilege Escalation | This is a local exploit for aix platform. Description: IBM AIX 5.x - 'Diag' Local Privilege Escalation. Author: cees-bart |
Analyze the security implications of: IBM AIX 5.x - 'Diag' Local Privilege Escalation | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: OpenPanel 0.3.4 - Directory Traversal | This is a webapps exploit for multiple platform. Description: OpenPanel 0.3.4 - Directory Traversal. Author: Korn Chaisuwan_ Charanin Thongudom_ Pongtorn Angsuchotmetee |
Analyze the security implications of: OpenPanel 0.3.4 - Directory Traversal | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Free Hosting Manager 2.0 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Free Hosting Manager 2.0 - 'id' SQL Injection. Author: Yakir Wizman |
Analyze the security implications of: Free Hosting Manager 2.0 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Active Auction House - 'default.asp' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: Active Auction House - 'default.asp' Multiple SQL Injections. Author: Dcrab |
Analyze the security implications of: Active Auction House - 'default.asp' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Aprox CMS Engine 5.1.0.4 - Local File Inclusion | This is a webapps exploit for php platform. Description: Aprox CMS Engine 5.1.0.4 - Local File Inclusion. Author: SkyOut |
Analyze the security implications of: Aprox CMS Engine 5.1.0.4 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Anuko Time Tracker 1.19.23.5325 - CSV/Formula Injection | This is a webapps exploit for php platform. Description: Anuko Time Tracker 1.19.23.5325 - CSV/Formula Injection. Author: Mufaddal Masalawala |
Analyze the security implications of: Anuko Time Tracker 1.19.23.5325 - CSV/Formula Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BBaCE 3.5 - '/includes/functions.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: BBaCE 3.5 - '/includes/functions.php' Remote File Inclusion. Author: SpiderZ |
Analyze the security implications of: BBaCE 3.5 - '/includes/functions.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Flash - XMLSocket Destructor Not Cleared Before Setting User Data in connect | This is a dos exploit for linux_x86-64 platform. Description: Adobe Flash - XMLSocket Destructor Not Cleared Before Setting User Data in connect. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - XMLSocket Destructor Not Cleared Before Setting User Data in connect | This exploit targets linux_x86-64 systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux_x86-64 platform |
What is this exploit about: Omnidocs - Multiple Vulnerabilities | This is a webapps exploit for jsp platform. Description: Omnidocs - Multiple Vulnerabilities. Author: Sohil Garg |
Analyze the security implications of: Omnidocs - Multiple Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Calendar MX Professional 2.0.0 - Blind SQL Injection | This is a webapps exploit for asp platform. Description: Calendar MX Professional 2.0.0 - Blind SQL Injection. Author: R3d-D3V!L |
Analyze the security implications of: Calendar MX Professional 2.0.0 - Blind SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Amelia CMS - SQL Injection | This is a webapps exploit for php platform. Description: Amelia CMS - SQL Injection. Author: Ariko-Security |
Analyze the security implications of: Amelia CMS - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Reader 9.3.2 - 'CoolType.dll' Remote Memory Corruption / Denial of Service | This is a dos exploit for multiple platform. Description: Adobe Reader 9.3.2 - 'CoolType.dll' Remote Memory Corruption / Denial of Service. Author: LiquidWorm |
Analyze the security implications of: Adobe Reader 9.3.2 - 'CoolType.dll' Remote Memory Corruption / Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: cPassMan 1.82 - Remote Command Execution | This is a webapps exploit for php platform. Description: cPassMan 1.82 - Remote Command Execution. Author: ls |
Analyze the security implications of: cPassMan 1.82 - Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FAQ Manager 1.2 - 'header.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: FAQ Manager 1.2 - 'header.php' Remote File Inclusion. Author: ZoRLu |
Analyze the security implications of: FAQ Manager 1.2 - 'header.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GuppY 4.6.14 - 'lng' Multiple SQL Injections | This is a webapps exploit for php platform. Description: GuppY 4.6.14 - 'lng' Multiple SQL Injections. Author: kurdish hackers team |
Analyze the security implications of: GuppY 4.6.14 - 'lng' Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.