input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Aerohive HiveOS 5.1r5 < 6.1r5 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Aerohive HiveOS 5.1r5 < 6.1r5 - Multiple Vulnerabilities. Author: DearBytes |
Analyze the security implications of: Aerohive HiveOS 5.1r5 < 6.1r5 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache Struts - Developer Mode OGNL Execution (Metasploit) | This is a remote exploit for java platform. Description: Apache Struts - Developer Mode OGNL Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Apache Struts - Developer Mode OGNL Execution (Metasploit) | This exploit targets java systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Snitz Forum v1.0 - Blind SQL Injection | This is a webapps exploit for asp platform. Description: Snitz Forum v1.0 - Blind SQL Injection. Author: Emiliano Febbi |
Analyze the security implications of: Snitz Forum v1.0 - Blind SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ManageEngine ServiceDesk Plus 9.0 < Build 9031 - User Privileges Management | This is a webapps exploit for jsp platform. Description: ManageEngine ServiceDesk Plus 9.0 < Build 9031 - User Privileges Management. Author: Rewterz - Research Group |
Analyze the security implications of: ManageEngine ServiceDesk Plus 9.0 < Build 9031 - User Privileges Management | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: AlumniServer 1.0.1 - Authentication Bypass | This is a webapps exploit for php platform. Description: AlumniServer 1.0.1 - Authentication Bypass. Author: YEnH4ckEr |
Analyze the security implications of: AlumniServer 1.0.1 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dream4 Koobi Pro 6.1 Gallery - 'img_id' SQL Injection | This is a webapps exploit for php platform. Description: Dream4 Koobi Pro 6.1 Gallery - 'img_id' SQL Injection. Author: BILGE_KAGAN |
Analyze the security implications of: Dream4 Koobi Pro 6.1 Gallery - 'img_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Emil 2.x - Multiple Buffer Overrun / Format String Vulnerabilities | This is a remote exploit for linux platform. Description: Emil 2.x - Multiple Buffer Overrun / Format String Vulnerabilities. Author: Ulf Harnhammar |
Analyze the security implications of: Emil 2.x - Multiple Buffer Overrun / Format String Vulnerabilities | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Gallery 2.0 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Gallery 2.0 - Multiple Cross-Site Scripting Vulnerabilities. Author: sl4xUz |
Analyze the security implications of: Gallery 2.0 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: System V Derived /bin/login - Extraneous Arguments Buffer Overflow (Metasploit) | This is a remote exploit for linux platform. Description: System V Derived /bin/login - Extraneous Arguments Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: System V Derived /bin/login - Extraneous Arguments Buffer Overflow (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Expense Management System - 'description' Stored Cross Site Scripting | This is a webapps exploit for multiple platform. Description: Expense Management System - 'description' Stored Cross Site Scripting. Author: Nikhil Kumar |
Analyze the security implications of: Expense Management System - 'description' Stored Cross Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: SmartFoxServer 2X 2.17.0 - God Mode Console Remote Code Execution | This is a local exploit for multiple platform. Description: SmartFoxServer 2X 2.17.0 - God Mode Console Remote Code Execution. Author: LiquidWorm |
Analyze the security implications of: SmartFoxServer 2X 2.17.0 - God Mode Console Remote Code Execution | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple macOS High Sierra 10.13 - 'ctl_ctloutput-leak' Information Leak | This is a local exploit for macos platform. Description: Apple macOS High Sierra 10.13 - 'ctl_ctloutput-leak' Information Leak. Author: Brandon Azad |
Analyze the security implications of: Apple macOS High Sierra 10.13 - 'ctl_ctloutput-leak' Information Leak | This exploit targets macos systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Seowon Intech WiMAX SWC-9100 Router - '/cgi-bin/diagnostic.cgi?ping_ipaddr' Remote Code Execution | This is a remote exploit for cgi platform. Description: Seowon Intech WiMAX SWC-9100 Router - '/cgi-bin/diagnostic.cgi?ping_ipaddr' Remote Code Execution. Author: Josue Rojas |
Analyze the security implications of: Seowon Intech WiMAX SWC-9100 Router - '/cgi-bin/diagnostic.cgi?ping_ipaddr' Remote Code Execution | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Baldr Botnet Panel - Arbitrary Code Execution (Metasploit) | This is a remote exploit for php platform. Description: Baldr Botnet Panel - Arbitrary Code Execution (Metasploit). Author: Ege Balci |
Analyze the security implications of: Baldr Botnet Panel - Arbitrary Code Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenBSD HTTPd < 6.0 - Memory Exhaustion Denial of Service | This is a dos exploit for openbsd platform. Description: OpenBSD HTTPd < 6.0 - Memory Exhaustion Denial of Service. Author: PierreKimSec |
Analyze the security implications of: OpenBSD HTTPd < 6.0 - Memory Exhaustion Denial of Service | This exploit targets openbsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets openbsd platform |
What is this exploit about: BOCHS 2.6-5 - Local Buffer Overflow | This is a local exploit for linux platform. Description: BOCHS 2.6-5 - Local Buffer Overflow. Author: Juan Sacco |
Analyze the security implications of: BOCHS 2.6-5 - Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Asaancart Simple PHP Shopping Cart 0.9 - Arbitrary File Upload / SQL Injection | This is a webapps exploit for php platform. Description: Asaancart Simple PHP Shopping Cart 0.9 - Arbitrary File Upload / SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Asaancart Simple PHP Shopping Cart 0.9 - Arbitrary File Upload / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! 3.2.1 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! 3.2.1 - SQL Injection. Author: killall-9 |
Analyze the security implications of: Joomla! 3.2.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Roger Wilco 1.x - Client Data Buffer Overflow | This is a remote exploit for multiple platform. Description: Roger Wilco 1.x - Client Data Buffer Overflow. Author: Luigi Auriemma |
Analyze the security implications of: Roger Wilco 1.x - Client Data Buffer Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Command School Student Management System - '/sw/admin_generations.php?id' SQL Injection | This is a webapps exploit for php platform. Description: Command School Student Management System - '/sw/admin_generations.php?id' SQL Injection. Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: Command School Student Management System - '/sw/admin_generations.php?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Itech B2B Script 4.28 - SQL Injection | This is a webapps exploit for php platform. Description: Itech B2B Script 4.28 - SQL Injection. Author: Kaan KAMIS |
Analyze the security implications of: Itech B2B Script 4.28 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WzdFTPD 0.5.4 - 'SITE' Remote Command Execution (Metasploit) | This is a remote exploit for multiple platform. Description: WzdFTPD 0.5.4 - 'SITE' Remote Command Execution (Metasploit). Author: David Maciejak |
Analyze the security implications of: WzdFTPD 0.5.4 - 'SITE' Remote Command Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Easebay Resources Login Manager - Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: Easebay Resources Login Manager - Multiple Input Validation Vulnerabilities. Author: Doz |
Analyze the security implications of: Easebay Resources Login Manager - Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Half-Life ClanMod 1.80/1.81 Plugin - Remote Format String | This is a remote exploit for multiple platform. Description: Half-Life ClanMod 1.80/1.81 Plugin - Remote Format String. Author: greuff@void.at |
Analyze the security implications of: Half-Life ClanMod 1.80/1.81 Plugin - Remote Format String | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Kasseler CMS News Module - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Kasseler CMS News Module - 'id' SQL Injection. Author: Palyo34 |
Analyze the security implications of: Kasseler CMS News Module - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Chaussette 080706 - '_BASE' Remote File Inclusion | This is a webapps exploit for php platform. Description: Chaussette 080706 - '_BASE' Remote File Inclusion. Author: Drago84 |
Analyze the security implications of: Chaussette 080706 - '_BASE' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WWWISIS 7.1 - 'IsisScript' Local File Disclosure / Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: WWWISIS 7.1 - 'IsisScript' Local File Disclosure / Cross-Site Scripting. Author: JosS |
Analyze the security implications of: WWWISIS 7.1 - 'IsisScript' Local File Disclosure / Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: WU-FTPD 2.6.0 - Remote Command Execution | This is a remote exploit for multiple platform. Description: WU-FTPD 2.6.0 - Remote Command Execution. Author: venglin |
Analyze the security implications of: WU-FTPD 2.6.0 - Remote Command Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ManageEngine OpManager / Social IT Plus / IT360 - Multiple Vulnerabilities | This is a webapps exploit for multiple platform. Description: ManageEngine OpManager / Social IT Plus / IT360 - Multiple Vulnerabilities. Author: Pedro Ribeiro |
Analyze the security implications of: ManageEngine OpManager / Social IT Plus / IT360 - Multiple Vulnerabilities | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FlashGameScript 1.5.4 - 'index.php?func' Remote File Inclusion | This is a webapps exploit for php platform. Description: FlashGameScript 1.5.4 - 'index.php?func' Remote File Inclusion. Author: JuMp-Er |
Analyze the security implications of: FlashGameScript 1.5.4 - 'index.php?func' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BOA Web Server 0.94.x - Terminal Escape Sequence in Logs Command Injection | This is a remote exploit for multiple platform. Description: BOA Web Server 0.94.x - Terminal Escape Sequence in Logs Command Injection. Author: evilaliv3 |
Analyze the security implications of: BOA Web Server 0.94.x - Terminal Escape Sequence in Logs Command Injection | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Reptile Rootkit - reptile_cmd Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: Reptile Rootkit - reptile_cmd Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: Reptile Rootkit - reptile_cmd Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: reget deluxe 3.0 build 121 - Directory Traversal | This is a webapps exploit for jsp platform. Description: reget deluxe 3.0 build 121 - Directory Traversal. Author: snifer |
Analyze the security implications of: reget deluxe 3.0 build 121 - Directory Traversal | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.