input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DConnect Daemon - Listen Thread UDP Remote Buffer Overflow | This is a remote exploit for multiple platform. Description: DConnect Daemon - Listen Thread UDP Remote Buffer Overflow. Author: Luigi Auriemma |
Analyze the security implications of: DConnect Daemon - Listen Thread UDP Remote Buffer Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: EasyGallery - 'catid' Blind SQL Injection | This is a webapps exploit for php platform. Description: EasyGallery - 'catid' Blind SQL Injection. Author: Hussin X |
Analyze the security implications of: EasyGallery - 'catid' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Intellinet IP Camera INT-L100M20N - Unauthorized Admin Credential Change | This is a webapps exploit for cgi platform. Description: Intellinet IP Camera INT-L100M20N - Unauthorized Admin Credential Change. Author: Todor Donev |
Analyze the security implications of: Intellinet IP Camera INT-L100M20N - Unauthorized Admin Credential Change | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Imagick 3.3.0 (PHP 5.4) - disable_functions Bypass | This is a webapps exploit for php platform. Description: Imagick 3.3.0 (PHP 5.4) - disable_functions Bypass. Author: RicterZ |
Analyze the security implications of: Imagick 3.3.0 (PHP 5.4) - disable_functions Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP Advanced Transfer Manager 1.21 - Arbitrary File Upload | This is a remote exploit for php platform. Description: PHP Advanced Transfer Manager 1.21 - Arbitrary File Upload. Author: tjomi4 |
Analyze the security implications of: PHP Advanced Transfer Manager 1.21 - Arbitrary File Upload | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Blahz-DNS 0.2 - Direct Script Call Authentication Bypass | This is a webapps exploit for php platform. Description: Blahz-DNS 0.2 - Direct Script Call Authentication Bypass. Author: ppp-design |
Analyze the security implications of: Blahz-DNS 0.2 - Direct Script Call Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation | This is a webapps exploit for linux platform. Description: Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation. Author: r4wd3r |
Analyze the security implications of: Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: JSPWiki 2.5.139 - 'Comment.jsp' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for jsp platform. Description: JSPWiki 2.5.139 - 'Comment.jsp' Multiple Cross-Site Scripting Vulnerabilities. Author: Jason Kratzer |
Analyze the security implications of: JSPWiki 2.5.139 - 'Comment.jsp' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Hard coded Credentials Shell Access | This is a remote exploit for hardware platform. Description: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Hard coded Credentials Shell Access. Author: LiquidWorm |
Analyze the security implications of: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Hard coded Credentials Shell Access | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CuteNews 1.4.6 - 'result' Cross-Site Scripting | This is a webapps exploit for php platform. Description: CuteNews 1.4.6 - 'result' Cross-Site Scripting. Author: Andrew Horton |
Analyze the security implications of: CuteNews 1.4.6 - 'result' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 4.x/5 - cURL 'open_basedir' Restriction Bypass | This is a remote exploit for php platform. Description: PHP 4.x/5 - cURL 'open_basedir' Restriction Bypass. Author: FraMe |
Analyze the security implications of: PHP 4.x/5 - cURL 'open_basedir' Restriction Bypass | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sonicwall SonicOS 6.5.4 - 'Common Name' Cross-Site Scripting (XSS) | This is a webapps exploit for hardware platform. Description: Sonicwall SonicOS 6.5.4 - 'Common Name' Cross-Site Scripting (XSS). Author: Vulnerability-Lab |
Analyze the security implications of: Sonicwall SonicOS 6.5.4 - 'Common Name' Cross-Site Scripting (XSS) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Comcast DOCSIS 3.0 Business Gateways - Multiple Vulnerabilities | This is a remote exploit for hardware platform. Description: Comcast DOCSIS 3.0 Business Gateways - Multiple Vulnerabilities. Author: Trustwave's SpiderLabs |
Analyze the security implications of: Comcast DOCSIS 3.0 Business Gateways - Multiple Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: BlogTorrent 0.92 - Remote Password Disclosure | This is a webapps exploit for php platform. Description: BlogTorrent 0.92 - Remote Password Disclosure. Author: LazyCrs |
Analyze the security implications of: BlogTorrent 0.92 - Remote Password Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache OFBiz 16.11.04 - XML External Entity Injection | This is a webapps exploit for java platform. Description: Apache OFBiz 16.11.04 - XML External Entity Injection. Author: Jamie Parfet |
Analyze the security implications of: Apache OFBiz 16.11.04 - XML External Entity Injection | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Arcadem 2.01 - SQL Injection / Remote File Inclusion | This is a webapps exploit for php platform. Description: Arcadem 2.01 - SQL Injection / Remote File Inclusion. Author: SmOk3 |
Analyze the security implications of: Arcadem 2.01 - SQL Injection / Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WordPress Digits Plugin 8.4.6.1 - Authentication Bypass via OTP Bruteforcing | This is a webapps exploit for multiple platform. Description: WordPress Digits Plugin 8.4.6.1 - Authentication Bypass via OTP Bruteforcing. Author: Saleh Tarawneh |
Analyze the security implications of: WordPress Digits Plugin 8.4.6.1 - Authentication Bypass via OTP Bruteforcing | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ISC BIND 8.2.x - 'TSIG' Remote Stack Overflow (2) | This is a remote exploit for linux platform. Description: ISC BIND 8.2.x - 'TSIG' Remote Stack Overflow (2). Author: LSD-PLaNET |
Analyze the security implications of: ISC BIND 8.2.x - 'TSIG' Remote Stack Overflow (2) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: RealPlayer/Helix Player (Linux) - Remote Format String | This is a remote exploit for linux platform. Description: RealPlayer/Helix Player (Linux) - Remote Format String. Author: c0ntex |
Analyze the security implications of: RealPlayer/Helix Player (Linux) - Remote Format String | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Grid Pro Big Data 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Grid Pro Big Data 1.0 - SQL Injection. Author: Kağan Çapar |
Analyze the security implications of: Grid Pro Big Data 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Kleophatra CMS 0.1.1 - 'module' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Kleophatra CMS 0.1.1 - 'module' Cross-Site Scripting. Author: anT!-Tr0J4n |
Analyze the security implications of: Kleophatra CMS 0.1.1 - 'module' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Firebird 1.0 - Remote Database Name Buffer Overrun | This is a remote exploit for linux platform. Description: Firebird 1.0 - Remote Database Name Buffer Overrun. Author: wsxz |
Analyze the security implications of: Firebird 1.0 - Remote Database Name Buffer Overrun | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: E-Uploader Pro 1.0 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: E-Uploader Pro 1.0 - Multiple SQL Injections. Author: ~!Dok_tOR!~ |
Analyze the security implications of: E-Uploader Pro 1.0 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Lot Reservation Management System 1.0 - Authentication Bypass | This is a webapps exploit for php platform. Description: Lot Reservation Management System 1.0 - Authentication Bypass. Author: Ankita Pal |
Analyze the security implications of: Lot Reservation Management System 1.0 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Skype for Linux 2.1 Beta - Multiple Strange Behaviour Vulnerabilities | This is a remote exploit for linux platform. Description: Skype for Linux 2.1 Beta - Multiple Strange Behaviour Vulnerabilities. Author: emgent |
Analyze the security implications of: Skype for Linux 2.1 Beta - Multiple Strange Behaviour Vulnerabilities | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AIX 5.2 - 'netpmon' Local Privilege Escalation | This is a local exploit for aix platform. Description: AIX 5.2 - 'netpmon' Local Privilege Escalation. Author: intropy |
Analyze the security implications of: AIX 5.2 - 'netpmon' Local Privilege Escalation | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: DeluxeBB 1.0 - 'pm.php' SQL Injection | This is a webapps exploit for php platform. Description: DeluxeBB 1.0 - 'pm.php' SQL Injection. Author: abducter |
Analyze the security implications of: DeluxeBB 1.0 - 'pm.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 5.2.9 cURL - 'Safe_mode' / 'open_basedir' Restriction Bypass | This is a local exploit for php platform. Description: PHP 5.2.9 cURL - 'Safe_mode' / 'open_basedir' Restriction Bypass. Author: Maksymilian Arciemowicz |
Analyze the security implications of: PHP 5.2.9 cURL - 'Safe_mode' / 'open_basedir' Restriction Bypass | This exploit targets php systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component jesubmit 1.4 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component jesubmit 1.4 - SQL Injection. Author: L0rd CrusAd3r |
Analyze the security implications of: Joomla! Component jesubmit 1.4 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP-UX 10.20/11.0 - crontab '/tmp' File | This is a local exploit for hp-ux platform. Description: HP-UX 10.20/11.0 - crontab '/tmp' File. Author: Kyong-won Cho |
Analyze the security implications of: HP-UX 10.20/11.0 - crontab '/tmp' File | This exploit targets hp-ux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hp-ux platform |
What is this exploit about: Exim Sender 3.35 - Verification Remote Stack Buffer Overrun | This is a remote exploit for linux platform. Description: Exim Sender 3.35 - Verification Remote Stack Buffer Overrun. Author: newroot |
Analyze the security implications of: Exim Sender 3.35 - Verification Remote Stack Buffer Overrun | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: A2billing 2.x - SQL Injection | This is a webapps exploit for php platform. Description: A2billing 2.x - SQL Injection. Author: 0x4148 |
Analyze the security implications of: A2billing 2.x - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ajax Chat 1.0 - 'ajax-chat.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Ajax Chat 1.0 - 'ajax-chat.php' Cross-Site Scripting. Author: High-Tech Bridge SA |
Analyze the security implications of: Ajax Chat 1.0 - 'ajax-chat.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.