input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Prodder 0.4 - Arbitrary Shell Command Execution | This is a remote exploit for linux platform. Description: Prodder 0.4 - Arbitrary Shell Command Execution. Author: RedTeam Pentesting |
Analyze the security implications of: Prodder 0.4 - Arbitrary Shell Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: OpenSSH < 7.4 - 'UsePrivilegeSeparation Disabled' Forwarded Unix Domain Sockets Privilege Escalation | This is a local exploit for linux platform. Description: OpenSSH < 7.4 - 'UsePrivilegeSeparation Disabled' Forwarded Unix Domain Sockets Privilege Escalation. Author: Google Security Research |
Analyze the security implications of: OpenSSH < 7.4 - 'UsePrivilegeSeparation Disabled' Forwarded Unix Domain Sockets Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Boozt Standard 0.9.8 - 'index.cgi' Buffer Overrun | This is a remote exploit for cgi platform. Description: Boozt Standard 0.9.8 - 'index.cgi' Buffer Overrun. Author: BrainStorm |
Analyze the security implications of: Boozt Standard 0.9.8 - 'index.cgi' Buffer Overrun | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Ahhp Portal - 'page.php' Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: Ahhp Portal - 'page.php' Multiple Remote File Inclusions. Author: CodeXpLoder'tq |
Analyze the security implications of: Ahhp Portal - 'page.php' Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Android - Signature Verification Security Bypass | This is a remote exploit for android platform. Description: Google Android - Signature Verification Security Bypass. Author: Jay Freeman |
Analyze the security implications of: Google Android - Signature Verification Security Bypass | This exploit targets android systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Apache Struts 2 - DefaultActionMapper Prefixes OGNL Code Execution | This is a webapps exploit for java platform. Description: Apache Struts 2 - DefaultActionMapper Prefixes OGNL Code Execution. Author: Jonatas Fil |
Analyze the security implications of: Apache Struts 2 - DefaultActionMapper Prefixes OGNL Code Execution | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: ManageEngine Desktop Central 10 Build 100087 - Remote Code Execution (Metasploit) | This is a webapps exploit for java platform. Description: ManageEngine Desktop Central 10 Build 100087 - Remote Code Execution (Metasploit). Author: Kacper Szurek |
Analyze the security implications of: ManageEngine Desktop Central 10 Build 100087 - Remote Code Execution (Metasploit) | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Cisco Adaptive Security Appliance - Path Traversal | This is a webapps exploit for hardware platform. Description: Cisco Adaptive Security Appliance - Path Traversal. Author: Yassine Aboukir |
Analyze the security implications of: Cisco Adaptive Security Appliance - Path Traversal | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Hotel Booking Script 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Hotel Booking Script 1.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Hotel Booking Script 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Multiple Vendor Calendar Manager - Remote Code Execution | This is a remote exploit for multiple platform. Description: Multiple Vendor Calendar Manager - Remote Code Execution. Author: Rodrigo Rubira Branco |
Analyze the security implications of: Multiple Vendor Calendar Manager - Remote Code Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: doorGets CMS 5.2 - SQL Injection | This is a webapps exploit for php platform. Description: doorGets CMS 5.2 - SQL Injection. Author: High-Tech Bridge SA |
Analyze the security implications of: doorGets CMS 5.2 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Hikvision IP Camera 5.4.0 - User Enumeration (Metasploit) | This is a webapps exploit for hardware platform. Description: Hikvision IP Camera 5.4.0 - User Enumeration (Metasploit). Author: Alfie |
Analyze the security implications of: Hikvision IP Camera 5.4.0 - User Enumeration (Metasploit) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: libao 1.2.0 - Denial of Service | This is a dos exploit for linux platform. Description: libao 1.2.0 - Denial of Service. Author: qflb.wu |
Analyze the security implications of: libao 1.2.0 - Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: OS4E - 'login.asp' SQL Injection | This is a webapps exploit for asp platform. Description: OS4E - 'login.asp' SQL Injection. Author: Dj romty |
Analyze the security implications of: OS4E - 'login.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Invision Gallery 2.0.3 - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: Invision Gallery 2.0.3 - 'index.php' SQL Injection. Author: almaster |
Analyze the security implications of: Invision Gallery 2.0.3 - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: cityadmin - 'links.php' Blind SQL Injection | This is a webapps exploit for php platform. Description: cityadmin - 'links.php' Blind SQL Injection. Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: cityadmin - 'links.php' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Application Enhancer (APE) 2.0.2 - Local Privilege Escalation | This is a local exploit for osx platform. Description: Application Enhancer (APE) 2.0.2 - Local Privilege Escalation. Author: MoAB |
Analyze the security implications of: Application Enhancer (APE) 2.0.2 - Local Privilege Escalation | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Dragoon 0.1 - 'root' Remote File Inclusion | This is a webapps exploit for php platform. Description: Dragoon 0.1 - 'root' Remote File Inclusion. Author: RoMaNcYxHaCkEr |
Analyze the security implications of: Dragoon 0.1 - 'root' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: I-Vision CMS - Cross-Site Scripting / SQL Injection | This is a webapps exploit for php platform. Description: I-Vision CMS - Cross-Site Scripting / SQL Injection. Author: Ariko-Security |
Analyze the security implications of: I-Vision CMS - Cross-Site Scripting / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GetSimple CMS 3.3.13 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: GetSimple CMS 3.3.13 - Cross-Site Scripting. Author: Sureshbabu Narvaneni |
Analyze the security implications of: GetSimple CMS 3.3.13 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! / Mambo Component com_sg - 'pid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! / Mambo Component com_sg - 'pid' SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! / Mambo Component com_sg - 'pid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ipswitch WS_FTP Server 6 - '/WSFTPSVR/FTPLogServer/LogViewer.asp' Authentication Bypass | This is a webapps exploit for asp platform. Description: Ipswitch WS_FTP Server 6 - '/WSFTPSVR/FTPLogServer/LogViewer.asp' Authentication Bypass. Author: Luigi Auriemma |
Analyze the security implications of: Ipswitch WS_FTP Server 6 - '/WSFTPSVR/FTPLogServer/LogViewer.asp' Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! 3.0.3 - 'remember.php' PHP Object Injection | This is a webapps exploit for php platform. Description: Joomla! 3.0.3 - 'remember.php' PHP Object Injection. Author: EgiX |
Analyze the security implications of: Joomla! 3.0.3 - 'remember.php' PHP Object Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ability Mail Server 3.3.2 - Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Ability Mail Server 3.3.2 - Cross-Site Scripting. Author: Aloyce J. Makalanga |
Analyze the security implications of: Ability Mail Server 3.3.2 - Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DUportal Pro 3.4 - 'default.asp' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: DUportal Pro 3.4 - 'default.asp' Multiple SQL Injections. Author: Dcrab |
Analyze the security implications of: DUportal Pro 3.4 - 'default.asp' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Cisco Phone 7940 - Remote Denial of Service | This is a dos exploit for hardware platform. Description: Cisco Phone 7940 - Remote Denial of Service. Author: MADYNES |
Analyze the security implications of: Cisco Phone 7940 - Remote Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: RedHat Linux 7.0 - Roaring Penguin PPPoE Denial of Service | This is a dos exploit for linux platform. Description: RedHat Linux 7.0 - Roaring Penguin PPPoE Denial of Service. Author: dethy |
Analyze the security implications of: RedHat Linux 7.0 - Roaring Penguin PPPoE Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PHP 5.2 - FOpen 'Safe_mode' Restriction Bypass | This is a local exploit for php platform. Description: PHP 5.2 - FOpen 'Safe_mode' Restriction Bypass. Author: Maksymilian Arciemowicz |
Analyze the security implications of: PHP 5.2 - FOpen 'Safe_mode' Restriction Bypass | This exploit targets php systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Quate CMS 0.3.5 - Local/Remote File Inclusion | This is a webapps exploit for linux platform. Description: Quate CMS 0.3.5 - Local/Remote File Inclusion. Author: cr4wl3r |
Analyze the security implications of: Quate CMS 0.3.5 - Local/Remote File Inclusion | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Ktools Photostore 3.5.1 - 'gid' SQL Injection | This is a webapps exploit for php platform. Description: Ktools Photostore 3.5.1 - 'gid' SQL Injection. Author: Mr.SQL |
Analyze the security implications of: Ktools Photostore 3.5.1 - 'gid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component TweetLA 1.0.1 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component TweetLA 1.0.1 - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component TweetLA 1.0.1 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RemotelyAnywhere 8.0.668 - 'Accept-Charset' Null Pointer Denial of Service | This is a dos exploit for multiple platform. Description: RemotelyAnywhere 8.0.668 - 'Accept-Charset' Null Pointer Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: RemotelyAnywhere 8.0.668 - 'Accept-Charset' Null Pointer Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ScadaBR 1.0 - Arbitrary File Upload (Authenticated) (2) | This is a webapps exploit for linux platform. Description: ScadaBR 1.0 - Arbitrary File Upload (Authenticated) (2). Author: Fellipe Oliveira |
Analyze the security implications of: ScadaBR 1.0 - Arbitrary File Upload (Authenticated) (2) | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.