input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM Tivoli Access Manager for E-Business - '/ibm/wpm/gsogroup?method' Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: IBM Tivoli Access Manager for E-Business - '/ibm/wpm/gsogroup?method' Cross-Site Scripting. Author: IBM |
Analyze the security implications of: IBM Tivoli Access Manager for E-Business - '/ibm/wpm/gsogroup?method' Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GeoMoose < 2.9.2 - Directory Traversal | This is a webapps exploit for php platform. Description: GeoMoose < 2.9.2 - Directory Traversal. Author: Sander Ferdinand |
Analyze the security implications of: GeoMoose < 2.9.2 - Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DUportal Pro 3.4 - 'search.asp?iChannel' SQL Injection | This is a webapps exploit for asp platform. Description: DUportal Pro 3.4 - 'search.asp?iChannel' SQL Injection. Author: Dcrab |
Analyze the security implications of: DUportal Pro 3.4 - 'search.asp?iChannel' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Linux Kernel 2.6.x - 'AIO_Free_Ring' Local Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - 'AIO_Free_Ring' Local Denial of Service. Author: Darrick J. Wong |
Analyze the security implications of: Linux Kernel 2.6.x - 'AIO_Free_Ring' Local Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Xdh / LinuxNet Perlbot / fBot IRC Bot - Remote Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Xdh / LinuxNet Perlbot / fBot IRC Bot - Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Xdh / LinuxNet Perlbot / fBot IRC Bot - Remote Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Freeway CMS 1.4.3.210 - SQL Injection | This is a webapps exploit for php platform. Description: Freeway CMS 1.4.3.210 - SQL Injection. Author: **RoAd_KiLlEr** |
Analyze the security implications of: Freeway CMS 1.4.3.210 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX Kernel - AppleKeyStore Use-After-Free | This is a dos exploit for osx platform. Description: Apple Mac OSX Kernel - AppleKeyStore Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Apple Mac OSX Kernel - AppleKeyStore Use-After-Free | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Campsite 2.6.1 - 'SubscriptionSection.php?g_documentRoot' Remote File Inclusion | This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'SubscriptionSection.php?g_documentRoot' Remote File Inclusion. Author: anonymous |
Analyze the security implications of: Campsite 2.6.1 - 'SubscriptionSection.php?g_documentRoot' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: VideoLAN VLC Media Player 2.1.2 - '.asf' Crash (PoC) | This is a dos exploit for multiple platform. Description: VideoLAN VLC Media Player 2.1.2 - '.asf' Crash (PoC). Author: Saif |
Analyze the security implications of: VideoLAN VLC Media Player 2.1.2 - '.asf' Crash (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Light HTTPd 0.1 - 'GET' Buffer Overflow (1) | This is a remote exploit for linux platform. Description: Light HTTPd 0.1 - 'GET' Buffer Overflow (1). Author: Xpl017Elz |
Analyze the security implications of: Light HTTPd 0.1 - 'GET' Buffer Overflow (1) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: LocazoList 2.01a beta5 - 'subcatID' SQL Injection | This is a webapps exploit for asp platform. Description: LocazoList 2.01a beta5 - 'subcatID' SQL Injection. Author: ajann |
Analyze the security implications of: LocazoList 2.01a beta5 - 'subcatID' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: GeoVision (GeoHttpServer) Webcams - Remote File Disclosure | This is a webapps exploit for hardware platform. Description: GeoVision (GeoHttpServer) Webcams - Remote File Disclosure. Author: Viktor Minin |
Analyze the security implications of: GeoVision (GeoHttpServer) Webcams - Remote File Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_ag_main.php' Crafted Arbitrary File Upload / Arbitrary Code Execution | This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_ag_main.php' Crafted Arbitrary File Upload / Arbitrary Code Execution. Author: indoushka |
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_ag_main.php' Crafted Arbitrary File Upload / Arbitrary Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Budget and Expense Tracker System 1.0 - Remote Code Execution (RCE) (Unauthenticated) | This is a webapps exploit for php platform. Description: Budget and Expense Tracker System 1.0 - Remote Code Execution (RCE) (Unauthenticated). Author: Abdullah Khawaja |
Analyze the security implications of: Budget and Expense Tracker System 1.0 - Remote Code Execution (RCE) (Unauthenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LinPHA 0.9.x/1.0 - 'install.php' Local File Inclusion | This is a webapps exploit for php platform. Description: LinPHA 0.9.x/1.0 - 'install.php' Local File Inclusion. Author: rgod |
Analyze the security implications of: LinPHA 0.9.x/1.0 - 'install.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ViRobot Advanced Server 2.0 - 'addschup' Remote Cookie | This is a remote exploit for linux platform. Description: ViRobot Advanced Server 2.0 - 'addschup' Remote Cookie. Author: Kevin Finisterre |
Analyze the security implications of: ViRobot Advanced Server 2.0 - 'addschup' Remote Cookie | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ircd-hybrid 7.0.1 / ircd-ratbox 1.5.1/2.0 - Socket Dequeuing Denial of Service | This is a dos exploit for linux platform. Description: ircd-hybrid 7.0.1 / ircd-ratbox 1.5.1/2.0 - Socket Dequeuing Denial of Service. Author: Erik Sperling Johansen |
Analyze the security implications of: ircd-hybrid 7.0.1 / ircd-ratbox 1.5.1/2.0 - Socket Dequeuing Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Edgewall Software Trac 0.9 Ticket Query Module - SQL Injection | This is a webapps exploit for php platform. Description: Edgewall Software Trac 0.9 Ticket Query Module - SQL Injection. Author: David Maciejak |
Analyze the security implications of: Edgewall Software Trac 0.9 Ticket Query Module - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 2DayBiz B2B Portal Script - 'selling_buy_leads1.php' SQL Injection | This is a webapps exploit for php platform. Description: 2DayBiz B2B Portal Script - 'selling_buy_leads1.php' SQL Injection. Author: r45c4l |
Analyze the security implications of: 2DayBiz B2B Portal Script - 'selling_buy_leads1.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RedHat Linux 5.0/5.1/5.2 / Slackware Linux 3.5 - 'klogd' Local Buffer Overflow (2) | This is a local exploit for linux platform. Description: RedHat Linux 5.0/5.1/5.2 / Slackware Linux 3.5 - 'klogd' Local Buffer Overflow (2). Author: Esa Etelavuori |
Analyze the security implications of: RedHat Linux 5.0/5.1/5.2 / Slackware Linux 3.5 - 'klogd' Local Buffer Overflow (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Comment IT 0.2 - 'PathToComment' Remote File Inclusion | This is a webapps exploit for php platform. Description: Comment IT 0.2 - 'PathToComment' Remote File Inclusion. Author: Cold Zero |
Analyze the security implications of: Comment IT 0.2 - 'PathToComment' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ABC2MTEX 1.6.1 - Command Line Stack Overflow | This is a dos exploit for linux platform. Description: ABC2MTEX 1.6.1 - Command Line Stack Overflow. Author: Carter Yagemann |
Analyze the security implications of: ABC2MTEX 1.6.1 - Command Line Stack Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component Percha Gallery 1.6 Beta - 'Controller' Traversal Arbitrary File Access | This is a webapps exploit for php platform. Description: Joomla! Component Percha Gallery 1.6 Beta - 'Controller' Traversal Arbitrary File Access. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component Percha Gallery 1.6 Beta - 'Controller' Traversal Arbitrary File Access | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Safari - 'file://' Arbitrary Code Execution (Metasploit) | This is a remote exploit for osx platform. Description: Apple Safari - 'file://' Arbitrary Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Apple Safari - 'file://' Arbitrary Code Execution (Metasploit) | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Instagram Clone 1.0 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Instagram Clone 1.0 - Arbitrary File Upload. Author: Ihsan Sencan |
Analyze the security implications of: Instagram Clone 1.0 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cerberus Helpdesk 2.649 - 'addresses_export.php?queues' SQL Injection | This is a webapps exploit for php platform. Description: Cerberus Helpdesk 2.649 - 'addresses_export.php?queues' SQL Injection. Author: A. Ramos |
Analyze the security implications of: Cerberus Helpdesk 2.649 - 'addresses_export.php?queues' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gazelle CMS - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Gazelle CMS - Multiple Vulnerabilities. Author: Sweet |
Analyze the security implications of: Gazelle CMS - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Xinetd 2.1.x/2.3.x - Rejected Connection Memory Leakage Denial of Service | This is a dos exploit for linux platform. Description: Xinetd 2.1.x/2.3.x - Rejected Connection Memory Leakage Denial of Service. Author: Steve Grubb |
Analyze the security implications of: Xinetd 2.1.x/2.3.x - Rejected Connection Memory Leakage Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: DirectAdmin 1.28/1.29 - 'CMD_EMAIL_VACATION_MODIFY' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DirectAdmin 1.28/1.29 - 'CMD_EMAIL_VACATION_MODIFY' Cross-Site Scripting. Author: Aria-Security Team |
Analyze the security implications of: DirectAdmin 1.28/1.29 - 'CMD_EMAIL_VACATION_MODIFY' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 5th Avenue Shopping Cart - 'category_id' SQL Injection | This is a webapps exploit for php platform. Description: 5th Avenue Shopping Cart - 'category_id' SQL Injection. Author: Aria-Security Team |
Analyze the security implications of: 5th Avenue Shopping Cart - 'category_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DotNetNuke 9.5 - File Upload Restrictions Bypass | This is a webapps exploit for aspx platform. Description: DotNetNuke 9.5 - File Upload Restrictions Bypass. Author: Sajjad Pourali |
Analyze the security implications of: DotNetNuke 9.5 - File Upload Restrictions Bypass | This exploit targets aspx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aspx platform |
What is this exploit about: ManageEngine ServiceDesk Plus 9.0 - User Enumeration | This is a webapps exploit for jsp platform. Description: ManageEngine ServiceDesk Plus 9.0 - User Enumeration. Author: Muhammad Ahmed Siddiqui |
Analyze the security implications of: ManageEngine ServiceDesk Plus 9.0 - User Enumeration | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Bloggie Lite 0.0.2 Beta - Insecure Cookie Handling / SQL Injection | This is a webapps exploit for php platform. Description: Bloggie Lite 0.0.2 Beta - Insecure Cookie Handling / SQL Injection. Author: JosS |
Analyze the security implications of: Bloggie Lite 0.0.2 Beta - Insecure Cookie Handling / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.