input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ACE Stream Media 2.1 - 'acestream://' Format String | This is a local exploit for multiple platform. Description: ACE Stream Media 2.1 - 'acestream://' Format String. Author: LiquidWorm |
Analyze the security implications of: ACE Stream Media 2.1 - 'acestream://' Format String | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DataLife Engine 8.3 - '/engine/ajax/pm.php?config[lang]' Remote File Inclusion | This is a webapps exploit for php platform. Description: DataLife Engine 8.3 - '/engine/ajax/pm.php?config[lang]' Remote File Inclusion. Author: indoushka |
Analyze the security implications of: DataLife Engine 8.3 - '/engine/ajax/pm.php?config[lang]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Umbraco CMS 7.12.4 - Remote Code Execution (Authenticated) | This is a webapps exploit for aspx platform. Description: Umbraco CMS 7.12.4 - Remote Code Execution (Authenticated). Author: Alexandre ZANNI |
Analyze the security implications of: Umbraco CMS 7.12.4 - Remote Code Execution (Authenticated) | This exploit targets aspx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aspx platform |
What is this exploit about: LG NAS 3718.510.a0 - Remote Command Execution | This is a webapps exploit for hardware platform. Description: LG NAS 3718.510.a0 - Remote Command Execution. Author: 0x616163 |
Analyze the security implications of: LG NAS 3718.510.a0 - Remote Command Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Horde Webmail 1.0.6 - 'addevent.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Horde Webmail 1.0.6 - 'addevent.php' Cross-Site Scripting. Author: Aria-Security Team |
Analyze the security implications of: Horde Webmail 1.0.6 - 'addevent.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CommodityRentals CD Rental Software - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: CommodityRentals CD Rental Software - 'index.php' SQL Injection. Author: Don Tukulesto |
Analyze the security implications of: CommodityRentals CD Rental Software - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Multi-Threaded HTTP Server 1.1 - Directory Traversal (1) | This is a remote exploit for multiple platform. Description: Multi-Threaded HTTP Server 1.1 - Directory Traversal (1). Author: chr1x |
Analyze the security implications of: Multi-Threaded HTTP Server 1.1 - Directory Traversal (1) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: National Science Foundation Squid Web Proxy 1.0/1.1/2.1 - Authentication Failure | This is a remote exploit for linux platform. Description: National Science Foundation Squid Web Proxy 1.0/1.1/2.1 - Authentication Failure. Author: Oezguer Kesim |
Analyze the security implications of: National Science Foundation Squid Web Proxy 1.0/1.1/2.1 - Authentication Failure | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: MiniDVBLinux 5.4 - Arbitrary File Read | This is a remote exploit for hardware platform. Description: MiniDVBLinux 5.4 - Arbitrary File Read. Author: LiquidWorm |
Analyze the security implications of: MiniDVBLinux 5.4 - Arbitrary File Read | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: E-topbiz ADManager 4 - 'group' Blind SQL Injection | This is a webapps exploit for php platform. Description: E-topbiz ADManager 4 - 'group' Blind SQL Injection. Author: Hussin X |
Analyze the security implications of: E-topbiz ADManager 4 - 'group' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Rifatron Intelligent Digital Security System - 'animate.cgi' Stream Disclosure | This is a webapps exploit for cgi platform. Description: Rifatron Intelligent Digital Security System - 'animate.cgi' Stream Disclosure. Author: LiquidWorm |
Analyze the security implications of: Rifatron Intelligent Digital Security System - 'animate.cgi' Stream Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: OpenSSH < 7.7 - User Enumeration (2) | This is a remote exploit for linux platform. Description: OpenSSH < 7.7 - User Enumeration (2). Author: Leap Security |
Analyze the security implications of: OpenSSH < 7.7 - User Enumeration (2) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Webmin 1.973 - 'run.cgi' Cross-Site Request Forgery (CSRF) | This is a webapps exploit for linux platform. Description: Webmin 1.973 - 'run.cgi' Cross-Site Request Forgery (CSRF). Author: Mesh3l_911 |
Analyze the security implications of: Webmin 1.973 - 'run.cgi' Cross-Site Request Forgery (CSRF) | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Mambo Component Security Images 3.0.5 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Mambo Component Security Images 3.0.5 - Remote File Inclusion. Author: Drago84 |
Analyze the security implications of: Mambo Component Security Images 3.0.5 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Galaxy Forces MMORPG 0.5.8 - 'type' SQL Injection | This is a webapps exploit for php platform. Description: Galaxy Forces MMORPG 0.5.8 - 'type' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Galaxy Forces MMORPG 0.5.8 - 'type' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DGNews 3.0 Beta - 'id' SQL Injection | This is a webapps exploit for php platform. Description: DGNews 3.0 Beta - 'id' SQL Injection. Author: Cyber-Zone |
Analyze the security implications of: DGNews 3.0 Beta - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ipswitch WhatsUp Professional 2006 - '/NmConsole/Navigation.asp?sDeviceView' Cross-Site Scripting | This is a remote exploit for asp platform. Description: Ipswitch WhatsUp Professional 2006 - '/NmConsole/Navigation.asp?sDeviceView' Cross-Site Scripting. Author: David Maciejak |
Analyze the security implications of: Ipswitch WhatsUp Professional 2006 - '/NmConsole/Navigation.asp?sDeviceView' Cross-Site Scripting | This exploit targets asp systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Oracle Supply Chain Products Suite - Remote Security | This is a remote exploit for multiple platform. Description: Oracle Supply Chain Products Suite - Remote Security. Author: Oracle |
Analyze the security implications of: Oracle Supply Chain Products Suite - Remote Security | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Dnsmasq < 2.78 - Information Leak | This is a dos exploit for multiple platform. Description: Dnsmasq < 2.78 - Information Leak. Author: Google Security Research |
Analyze the security implications of: Dnsmasq < 2.78 - Information Leak | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: HP-UX 11.0 - 'pppd' Local Stack Buffer Overflow | This is a local exploit for hp-ux platform. Description: HP-UX 11.0 - 'pppd' Local Stack Buffer Overflow. Author: K2 |
Analyze the security implications of: HP-UX 11.0 - 'pppd' Local Stack Buffer Overflow | This exploit targets hp-ux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hp-ux platform |
What is this exploit about: AJ Classifieds - 'listingid' SQL Injection | This is a webapps exploit for php platform. Description: AJ Classifieds - 'listingid' SQL Injection. Author: Lazmania61 |
Analyze the security implications of: AJ Classifieds - 'listingid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMSimple 3.3 - Cross-Site Scripting / Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: CMSimple 3.3 - Cross-Site Scripting / Cross-Site Request Forgery. Author: High-Tech Bridge SA |
Analyze the security implications of: CMSimple 3.3 - Cross-Site Scripting / Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: QNX 6.5.0 / QCONN 1.4.207944 - Remote Command Execution | This is a remote exploit for linux platform. Description: QNX 6.5.0 / QCONN 1.4.207944 - Remote Command Execution. Author: Mor!p3r |
Analyze the security implications of: QNX 6.5.0 / QCONN 1.4.207944 - Remote Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FreePBX 2.8.0 - Recordings Interface Allows Remote Code Execution | This is a webapps exploit for php platform. Description: FreePBX 2.8.0 - Recordings Interface Allows Remote Code Execution. Author: Trustwave's SpiderLabs |
Analyze the security implications of: FreePBX 2.8.0 - Recordings Interface Allows Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! paGO Commerce 2.5.9.0 - SQL Injection (Authenticated) | This is a webapps exploit for php platform. Description: Joomla! paGO Commerce 2.5.9.0 - SQL Injection (Authenticated). Author: Mehmet Kelepçe |
Analyze the security implications of: Joomla! paGO Commerce 2.5.9.0 - SQL Injection (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Minix 3.1.2a - Psuedo Terminal Denial of Service | This is a dos exploit for linux platform. Description: Minix 3.1.2a - Psuedo Terminal Denial of Service. Author: kokanin |
Analyze the security implications of: Minix 3.1.2a - Psuedo Terminal Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Family Connections CMS 1.4 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Family Connections CMS 1.4 - Multiple SQL Injections. Author: CWH Underground |
Analyze the security implications of: Family Connections CMS 1.4 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo Component Portfolio Manager 1.0 - 'categoryId' SQL Injection | This is a webapps exploit for php platform. Description: Mambo Component Portfolio Manager 1.0 - 'categoryId' SQL Injection. Author: it's my |
Analyze the security implications of: Mambo Component Portfolio Manager 1.0 - 'categoryId' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Battle Blog 1.25 - 'uploadform.asp' Arbitrary File Upload | This is a webapps exploit for php platform. Description: Battle Blog 1.25 - 'uploadform.asp' Arbitrary File Upload. Author: Cyber-Zone |
Analyze the security implications of: Battle Blog 1.25 - 'uploadform.asp' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ACollab - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: ACollab - Multiple Vulnerabilities. Author: AmnPardaz |
Analyze the security implications of: ACollab - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AJ Auction Pro - 'subcat.php' SQL Injection | This is a webapps exploit for php platform. Description: AJ Auction Pro - 'subcat.php' SQL Injection. Author: ajann |
Analyze the security implications of: AJ Auction Pro - 'subcat.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Freeside SelfService CGI/API 2.3.3 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Freeside SelfService CGI/API 2.3.3 - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: Freeside SelfService CGI/API 2.3.3 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Happymall E-Commerce Software 4.3/4.4 - 'Normal_HTML.cgi' File Disclosure | This is a webapps exploit for cgi platform. Description: Happymall E-Commerce Software 4.3/4.4 - 'Normal_HTML.cgi' File Disclosure. Author: Julio Cesar |
Analyze the security implications of: Happymall E-Commerce Software 4.3/4.4 - 'Normal_HTML.cgi' File Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.