input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WePresent WiPG-1000 - Command Injection (Metasploit) | This is a remote exploit for hardware platform. Description: WePresent WiPG-1000 - Command Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: WePresent WiPG-1000 - Command Injection (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Bagisto 1.3.3 - Client-Side Template Injection | This is a webapps exploit for multiple platform. Description: Bagisto 1.3.3 - Client-Side Template Injection. Author: Mohamed Abdellatif Jaber |
Analyze the security implications of: Bagisto 1.3.3 - Client-Side Template Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: NetSupport Manager Agent - Remote Buffer Overflow (Metasploit) (2) | This is a remote exploit for linux platform. Description: NetSupport Manager Agent - Remote Buffer Overflow (Metasploit) (2). Author: Metasploit |
Analyze the security implications of: NetSupport Manager Agent - Remote Buffer Overflow (Metasploit) (2) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ECOA Building Automation System - Hard-coded Credentials SSH Access | This is a remote exploit for hardware platform. Description: ECOA Building Automation System - Hard-coded Credentials SSH Access. Author: Neurogenesia |
Analyze the security implications of: ECOA Building Automation System - Hard-coded Credentials SSH Access | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: FoxCMS 1.2.5 - Remote Code Execution (RCE) | This is a webapps exploit for multiple platform. Description: FoxCMS 1.2.5 - Remote Code Execution (RCE). Author: VeryLazyTech |
Analyze the security implications of: FoxCMS 1.2.5 - Remote Code Execution (RCE) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CmsFaethon 2.2.0 (ultimate.7z) - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: CmsFaethon 2.2.0 (ultimate.7z) - Multiple Vulnerabilities. Author: eidelweiss |
Analyze the security implications of: CmsFaethon 2.2.0 (ultimate.7z) - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cofax 2.0 - search.htm Cross-Site Scripting | This is a webapps exploit for php platform. Description: Cofax 2.0 - search.htm Cross-Site Scripting. Author: r0t3d3Vil |
Analyze the security implications of: Cofax 2.0 - search.htm Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Web-APP.Org WebAPP 0.8/0.9.x - Directory Traversal | This is a webapps exploit for cgi platform. Description: Web-APP.Org WebAPP 0.8/0.9.x - Directory Traversal. Author: Jerome Athias |
Analyze the security implications of: Web-APP.Org WebAPP 0.8/0.9.x - Directory Traversal | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: SW-HTTPD Server 0.x - Remote Denial of Service | This is a dos exploit for multiple platform. Description: SW-HTTPD Server 0.x - Remote Denial of Service. Author: Jonathan Salwan |
Analyze the security implications of: SW-HTTPD Server 0.x - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: JAF CMS 4.0 RC1 - 'forum.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: JAF CMS 4.0 RC1 - 'forum.php' Remote File Inclusion. Author: Kacper |
Analyze the security implications of: JAF CMS 4.0 RC1 - 'forum.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SGI Performance Co-Pilot 2.1.x/2.2 - pmpost Symbolic Link | This is a local exploit for irix platform. Description: SGI Performance Co-Pilot 2.1.x/2.2 - pmpost Symbolic Link. Author: IhaQueR |
Analyze the security implications of: SGI Performance Co-Pilot 2.1.x/2.2 - pmpost Symbolic Link | This exploit targets irix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: Sony/Ericsson Bluetooth - Reset Display Denial of Service | This is a dos exploit for hardware platform. Description: Sony/Ericsson Bluetooth - Reset Display Denial of Service. Author: Pierre Betouin |
Analyze the security implications of: Sony/Ericsson Bluetooth - Reset Display Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: GIMP 2.8.0 - '.FIT' File Format Denial of Service | This is a dos exploit for multiple platform. Description: GIMP 2.8.0 - '.FIT' File Format Denial of Service. Author: Joseph Sheridan |
Analyze the security implications of: GIMP 2.8.0 - '.FIT' File Format Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: KDPics 1.11 - 'exif.php?lib_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: KDPics 1.11 - 'exif.php?lib_path' Remote File Inclusion. Author: AsTrex |
Analyze the security implications of: KDPics 1.11 - 'exif.php?lib_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Aardvark Topsites PHP 5.2 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Aardvark Topsites PHP 5.2 - 'index.php' Cross-Site Scripting. Author: anonymous |
Analyze the security implications of: Aardvark Topsites PHP 5.2 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MicroNetSoft RV Dealer Website - 'search.asp' / showAlllistings.asp' SQL Injection | This is a webapps exploit for asp platform. Description: MicroNetSoft RV Dealer Website - 'search.asp' / showAlllistings.asp' SQL Injection. Author: underground-stockholm.com |
Analyze the security implications of: MicroNetSoft RV Dealer Website - 'search.asp' / showAlllistings.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: kon2 - Local Buffer Overflow (1) | This is a local exploit for linux platform. Description: kon2 - Local Buffer Overflow (1). Author: wsxz |
Analyze the security implications of: kon2 - Local Buffer Overflow (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Data/File - upload and Management Arbitrary File Upload | This is a webapps exploit for php platform. Description: Data/File - upload and Management Arbitrary File Upload. Author: saudi0hacker |
Analyze the security implications of: Data/File - upload and Management Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Batalla Naval 1.0 4 - Remote Buffer Overflow (1) | This is a remote exploit for linux platform. Description: Batalla Naval 1.0 4 - Remote Buffer Overflow (1). Author: wsxz |
Analyze the security implications of: Batalla Naval 1.0 4 - Remote Buffer Overflow (1) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.2 - 'Base_qry_main.php' SQL Injection | This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.2 - 'Base_qry_main.php' SQL Injection. Author: Remco Verhoef |
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.2 - 'Base_qry_main.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cyrus IMSPD 1.7 - 'abook_dbname' Remote Code Execution | This is a remote exploit for linux platform. Description: Cyrus IMSPD 1.7 - 'abook_dbname' Remote Code Execution. Author: SpikE |
Analyze the security implications of: Cyrus IMSPD 1.7 - 'abook_dbname' Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: BRS Webweaver 1.0 4 - POST / HEAD Denial of Service | This is a dos exploit for multiple platform. Description: BRS Webweaver 1.0 4 - POST / HEAD Denial of Service. Author: euronymous |
Analyze the security implications of: BRS Webweaver 1.0 4 - POST / HEAD Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: JBook 1.3 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: JBook 1.3 - 'index.php' Cross-Site Scripting. Author: Psych0 |
Analyze the security implications of: JBook 1.3 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.6.24_16-23/2.6.27_7-10/2.6.28.3 (Ubuntu 8.04/8.10 / Fedora Core 10 x86-64) - 'set_selection()' UTF-8 Off-by-One Privilege Escalation | This is a local exploit for linux_x86-64 platform. Description: Linux Kernel 2.6.24_16-23/2.6.27_7-10/2.6.28.3 (Ubuntu 8.04/8.10 / Fedora Core 10 x86-64) - 'set_selection()' UTF-8 Off-by-One Privilege Escalation. Author: sgrakkyu |
Analyze the security implications of: Linux Kernel 2.6.24_16-23/2.6.27_7-10/2.6.28.3 (Ubuntu 8.04/8.10 / Fedora Core 10 x86-64) - 'set_selection()' UTF-8 Off-by-One Privilege Escalation | This exploit targets linux_x86-64 systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux_x86-64 platform |
What is this exploit about: MultiHTML 1.5 - File Disclosure | This is a webapps exploit for cgi platform. Description: MultiHTML 1.5 - File Disclosure. Author: Niels Heinen |
Analyze the security implications of: MultiHTML 1.5 - File Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Maian Uploader 4.0 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Maian Uploader 4.0 - 'index.php' Cross-Site Scripting. Author: Khashayar Fereidani |
Analyze the security implications of: Maian Uploader 4.0 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: nph-maillist 3.0/3.5 - Arbitrary Code Execution | This is a remote exploit for cgi platform. Description: nph-maillist 3.0/3.5 - Arbitrary Code Execution. Author: Kanedaaa |
Analyze the security implications of: nph-maillist 3.0/3.5 - Arbitrary Code Execution | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Legend Perl IRC Bot - Remote Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Legend Perl IRC Bot - Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Legend Perl IRC Bot - Remote Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AdaptCMS 2.0.0 Beta - 'init.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: AdaptCMS 2.0.0 Beta - 'init.php' Remote File Inclusion. Author: v3n0m |
Analyze the security implications of: AdaptCMS 2.0.0 Beta - 'init.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: webConductor - 'default.asp' SQL Injection | This is a webapps exploit for asp platform. Description: webConductor - 'default.asp' SQL Injection. Author: Th3 RDX |
Analyze the security implications of: webConductor - 'default.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ACGVannu 1.3 - 'index2.php' Remote User Pass Change | This is a webapps exploit for php platform. Description: ACGVannu 1.3 - 'index2.php' Remote User Pass Change. Author: ajann |
Analyze the security implications of: ACGVannu 1.3 - 'index2.php' Remote User Pass Change | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HiveMail 1.3 - 'addressbook.add.php' Remote Code Execution | This is a webapps exploit for php platform. Description: HiveMail 1.3 - 'addressbook.add.php' Remote Code Execution. Author: [Oo] |
Analyze the security implications of: HiveMail 1.3 - 'addressbook.add.php' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Lithium CMS 4.04c - '/classes/index.php' Local File Inclusion | This is a webapps exploit for php platform. Description: Lithium CMS 4.04c - '/classes/index.php' Local File Inclusion. Author: Kacper |
Analyze the security implications of: Lithium CMS 4.04c - '/classes/index.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.