input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Quest Privilege Manager 6.0.0 - Arbitrary File Write | This is a remote exploit for linux platform. Description: Quest Privilege Manager 6.0.0 - Arbitrary File Write. Author: m0t |
Analyze the security implications of: Quest Privilege Manager 6.0.0 - Arbitrary File Write | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: October CMS - Upload Protection Bypass Code Execution (Metasploit) | This is a remote exploit for php platform. Description: October CMS - Upload Protection Bypass Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: October CMS - Upload Protection Bypass Code Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AstroSoft HelpDesk - '/operator/article/article_search_results.asp?txtSearch' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: AstroSoft HelpDesk - '/operator/article/article_search_results.asp?txtSearch' Cross-Site Scripting. Author: Alexandr Polyakov |
Analyze the security implications of: AstroSoft HelpDesk - '/operator/article/article_search_results.asp?txtSearch' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Mail Machine 3.989 - Local File Inclusion | This is a webapps exploit for php platform. Description: Mail Machine 3.989 - Local File Inclusion. Author: H4 / XPK |
Analyze the security implications of: Mail Machine 3.989 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_webeecomment 2.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_webeecomment 2.0 - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component com_webeecomment 2.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Aanval 7.1 build 70151 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Aanval 7.1 build 70151 - Multiple Vulnerabilities. Author: xistence |
Analyze the security implications of: Aanval 7.1 build 70151 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CuteNews 0.88/1.3 - 'show_archives.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: CuteNews 0.88/1.3 - 'show_archives.php' Cross-Site Scripting. Author: DarkBicho |
Analyze the security implications of: CuteNews 0.88/1.3 - 'show_archives.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: gCards 1.45 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: gCards 1.45 - Multiple Vulnerabilities. Author: rgod |
Analyze the security implications of: gCards 1.45 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenBSD ftpd 2.6/2.7 - Remote Overflow | This is a remote exploit for bsd platform. Description: OpenBSD ftpd 2.6/2.7 - Remote Overflow. Author: Scrippie |
Analyze the security implications of: OpenBSD ftpd 2.6/2.7 - Remote Overflow | This exploit targets bsd systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Lilac-Reloaded for Nagios 2.0.8 - Remote Code Execution (RCE) | This is a webapps exploit for php platform. Description: Lilac-Reloaded for Nagios 2.0.8 - Remote Code Execution (RCE). Author: max / Zoltan Padanyi |
Analyze the security implications of: Lilac-Reloaded for Nagios 2.0.8 - Remote Code Execution (RCE) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bloq 0.5.4 - 'admin.php?page[path]' Remote File Inclusion | This is a webapps exploit for php platform. Description: Bloq 0.5.4 - 'admin.php?page[path]' Remote File Inclusion. Author: KorsaN |
Analyze the security implications of: Bloq 0.5.4 - 'admin.php?page[path]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dell SonicWALL Gms 7.2.x - Code Injection | This is a webapps exploit for hardware platform. Description: Dell SonicWALL Gms 7.2.x - Code Injection. Author: Vulnerability-Lab |
Analyze the security implications of: Dell SonicWALL Gms 7.2.x - Code Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: macOS < 10.14.3 / iOS < 12.1.3 XNU - 'vm_map_copy' Optimization which Requires Atomicity isn't Atomic | This is a dos exploit for multiple platform. Description: macOS < 10.14.3 / iOS < 12.1.3 XNU - 'vm_map_copy' Optimization which Requires Atomicity isn't Atomic. Author: Google Security Research |
Analyze the security implications of: macOS < 10.14.3 / iOS < 12.1.3 XNU - 'vm_map_copy' Optimization which Requires Atomicity isn't Atomic | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: SPIP - 'connect' PHP Injection (Metasploit) | This is a remote exploit for php platform. Description: SPIP - 'connect' PHP Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: SPIP - 'connect' PHP Injection (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Drupal 4.5.3 < 4.6.1 - Comments PHP Injection | This is a webapps exploit for php platform. Description: Drupal 4.5.3 < 4.6.1 - Comments PHP Injection. Author: dab |
Analyze the security implications of: Drupal 4.5.3 < 4.6.1 - Comments PHP Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple iOS/macOS - Sandbox Escape due to mach Message sent from Shared Memory | This is a dos exploit for multiple platform. Description: Apple iOS/macOS - Sandbox Escape due to mach Message sent from Shared Memory. Author: Google Security Research |
Analyze the security implications of: Apple iOS/macOS - Sandbox Escape due to mach Message sent from Shared Memory | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Geeklog 1.4 - Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: Geeklog 1.4 - Multiple Input Validation Vulnerabilities. Author: trueend5 |
Analyze the security implications of: Geeklog 1.4 - Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dolibarr ERP/CRM 3.5.3 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Dolibarr ERP/CRM 3.5.3 - Multiple Vulnerabilities. Author: Deepak Rathore |
Analyze the security implications of: Dolibarr ERP/CRM 3.5.3 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FirmWorX 0.1.2 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: FirmWorX 0.1.2 - Multiple Remote File Inclusions. Author: DeltahackingTEAM |
Analyze the security implications of: FirmWorX 0.1.2 - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DotNetNuke 07.04.00 - Administration Authentication Bypass | This is a webapps exploit for asp platform. Description: DotNetNuke 07.04.00 - Administration Authentication Bypass. Author: Marios Nicolaides |
Analyze the security implications of: DotNetNuke 07.04.00 - Administration Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Gitea 1.22.0 - Stored XSS | This is a webapps exploit for multiple platform. Description: Gitea 1.22.0 - Stored XSS. Author: Catalin Iovita_ Alexandru Postolache |
Analyze the security implications of: Gitea 1.22.0 - Stored XSS | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ExpressionEngine 1.6 - Avtaar Name HTML Injection | This is a webapps exploit for php platform. Description: ExpressionEngine 1.6 - Avtaar Name HTML Injection. Author: Adam Baldwin |
Analyze the security implications of: ExpressionEngine 1.6 - Avtaar Name HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 7.2 - 'imagecolormatch()' Out of Band Heap Write | This is a remote exploit for php platform. Description: PHP 7.2 - 'imagecolormatch()' Out of Band Heap Write. Author: cfreal |
Analyze the security implications of: PHP 7.2 - 'imagecolormatch()' Out of Band Heap Write | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Tcpdump 3.8.x - 'rt_routing_info' Infinite Loop Denial of Service | This is a dos exploit for linux platform. Description: Tcpdump 3.8.x - 'rt_routing_info' Infinite Loop Denial of Service. Author: vade79 |
Analyze the security implications of: Tcpdump 3.8.x - 'rt_routing_info' Infinite Loop Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: HotPlug CMS 1.0 - 'Login1.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: HotPlug CMS 1.0 - 'Login1.php' Cross-Site Scripting. Author: Federico Fazzi |
Analyze the security implications of: HotPlug CMS 1.0 - 'Login1.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Conceptronic CADSLR1 Router - Denial of Service | This is a dos exploit for hardware platform. Description: Conceptronic CADSLR1 Router - Denial of Service. Author: Seth Alan Woolley |
Analyze the security implications of: Conceptronic CADSLR1 Router - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ApPHP MicroCMS 3.9.5 - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: ApPHP MicroCMS 3.9.5 - Cross-Site Request Forgery (Add Admin). Author: Besim |
Analyze the security implications of: ApPHP MicroCMS 3.9.5 - Cross-Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cart Engine 3.0.0 - Database Backup Disclosure | This is a webapps exploit for php platform. Description: Cart Engine 3.0.0 - Database Backup Disclosure. Author: LiquidWorm |
Analyze the security implications of: Cart Engine 3.0.0 - Database Backup Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GFI Mail Archiver 15.1 - Telerik UI Component Arbitrary File Upload (Unauthenticated) | This is a webapps exploit for multiple platform. Description: GFI Mail Archiver 15.1 - Telerik UI Component Arbitrary File Upload (Unauthenticated). Author: Amin Bohio |
Analyze the security implications of: GFI Mail Archiver 15.1 - Telerik UI Component Arbitrary File Upload (Unauthenticated) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Novell NetWare - LSASS CIFS.NLM Driver Stack Buffer Overflow (Metasploit) | This is a remote exploit for netware platform. Description: Novell NetWare - LSASS CIFS.NLM Driver Stack Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: Novell NetWare - LSASS CIFS.NLM Driver Stack Buffer Overflow (Metasploit) | This exploit targets netware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets netware platform |
What is this exploit about: Bilder Galerie 1.0 - 'index.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Bilder Galerie 1.0 - 'index.php' Remote File Inclusion. Author: Rizgar |
Analyze the security implications of: Bilder Galerie 1.0 - 'index.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMS Made Simple 2.2.14 - Authenticated Arbitrary File Upload | This is a webapps exploit for php platform. Description: CMS Made Simple 2.2.14 - Authenticated Arbitrary File Upload. Author: Roel van Beurden |
Analyze the security implications of: CMS Made Simple 2.2.14 - Authenticated Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Allomani Songs & Clips 2.7.0 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Allomani Songs & Clips 2.7.0 - Blind SQL Injection. Author: Qabandi |
Analyze the security implications of: Allomani Songs & Clips 2.7.0 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: e-cart 3.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: e-cart 3.0 - Multiple Vulnerabilities. Author: indoushka |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.