input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Foreman (RedHat OpenStack/Satellite) - bookmarks/create Code Injection (Metasploit) | This is a remote exploit for linux platform. Description: Foreman (RedHat OpenStack/Satellite) - bookmarks/create Code Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Foreman (RedHat OpenStack/Satellite) - bookmarks/create Code Injection (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Libuser Library - Multiple Vulnerabilities | This is a dos exploit for linux platform. Description: Libuser Library - Multiple Vulnerabilities. Author: Qualys Corporation |
Analyze the security implications of: Libuser Library - Multiple Vulnerabilities | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Magic Photo Storage Website - '/admin/admin_paypal_email.php?_config[site_path]' Remote File Inclusion | This is a webapps exploit for php platform. Description: Magic Photo Storage Website - '/admin/admin_paypal_email.php?_config[site_path]' Remote File Inclusion. Author: IbnuSina |
Analyze the security implications of: Magic Photo Storage Website - '/admin/admin_paypal_email.php?_config[site_path]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Lulieblog 1.2 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Lulieblog 1.2 - Multiple Vulnerabilities. Author: Cod3rZ |
Analyze the security implications of: Lulieblog 1.2 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Muhammad M. Saggaf Seyon 2.14b - Relative Path | This is a local exploit for freebsd platform. Description: Muhammad M. Saggaf Seyon 2.14b - Relative Path. Author: Shawn Hillis |
Analyze the security implications of: Muhammad M. Saggaf Seyon 2.14b - Relative Path | This exploit targets freebsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: Cabron Connector 1.1.0-Full - Remote File Inclusion | This is a webapps exploit for php platform. Description: Cabron Connector 1.1.0-Full - Remote File Inclusion. Author: Dj7xpl |
Analyze the security implications of: Cabron Connector 1.1.0-Full - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: aFAQ 1.0 - 'faqDsp.asp?catcode' SQL Injection | This is a webapps exploit for asp platform. Description: aFAQ 1.0 - 'faqDsp.asp?catcode' SQL Injection. Author: ajann |
Analyze the security implications of: aFAQ 1.0 - 'faqDsp.asp?catcode' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: DornCMS Application 1.4 - Multiple Web Vulnerabilities | This is a webapps exploit for linux platform. Description: DornCMS Application 1.4 - Multiple Web Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: DornCMS Application 1.4 - Multiple Web Vulnerabilities | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: dotProject 2.1.x - 'index.php' Multiple SQL Injections | This is a webapps exploit for php platform. Description: dotProject 2.1.x - 'index.php' Multiple SQL Injections. Author: High-Tech Bridge |
Analyze the security implications of: dotProject 2.1.x - 'index.php' Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: InselPhoto 1.1 - 'query' SQL Injection | This is a webapps exploit for php platform. Description: InselPhoto 1.1 - 'query' SQL Injection. Author: Osirys |
Analyze the security implications of: InselPhoto 1.1 - 'query' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AShop Deluxe 4.5 - 'shipping.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: AShop Deluxe 4.5 - 'shipping.php' Cross-Site Scripting. Author: Hackers Center Security |
Analyze the security implications of: AShop Deluxe 4.5 - 'shipping.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component MosReporter 0.9.3 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component MosReporter 0.9.3 - Remote File Inclusion. Author: Crackers_Child |
Analyze the security implications of: Joomla! Component MosReporter 0.9.3 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 4.15.x < 4.19.2 - 'map_write() CAP_SYS_ADMIN' Local Privilege Escalation (dbus Method) | This is a local exploit for linux platform. Description: Linux Kernel 4.15.x < 4.19.2 - 'map_write() CAP_SYS_ADMIN' Local Privilege Escalation (dbus Method). Author: bcoles |
Analyze the security implications of: Linux Kernel 4.15.x < 4.19.2 - 'map_write() CAP_SYS_ADMIN' Local Privilege Escalation (dbus Method) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: NRPE 2.15 - Remote Command Execution | This is a remote exploit for multiple platform. Description: NRPE 2.15 - Remote Command Execution. Author: Dawid Golunski |
Analyze the security implications of: NRPE 2.15 - Remote Command Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: mcrypt 2.5.8 - Local Stack Overflow | This is a local exploit for linux platform. Description: mcrypt 2.5.8 - Local Stack Overflow. Author: Tosh |
Analyze the security implications of: mcrypt 2.5.8 - Local Stack Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Claroline 1.8.9 - '/claroline/redirector.php?url' Arbitrary Site Redirect | This is a webapps exploit for php platform. Description: Claroline 1.8.9 - '/claroline/redirector.php?url' Arbitrary Site Redirect. Author: Digital Security Research Group |
Analyze the security implications of: Claroline 1.8.9 - '/claroline/redirector.php?url' Arbitrary Site Redirect | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Garbage Collection Management System 1.0 - SQL Injection (Unauthenticated) | This is a webapps exploit for php platform. Description: Garbage Collection Management System 1.0 - SQL Injection (Unauthenticated). Author: ircashem |
Analyze the security implications of: Garbage Collection Management System 1.0 - SQL Injection (Unauthenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Macs Framework 1.14f CMS - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Macs Framework 1.14f CMS - Persistent Cross-Site Scripting. Author: Vulnerability-Lab |
Analyze the security implications of: Macs Framework 1.14f CMS - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Nokia Symbian 60 - 'BlueTooth Nickname' Remote Restart (2) | This is a dos exploit for hardware platform. Description: Nokia Symbian 60 - 'BlueTooth Nickname' Remote Restart (2). Author: Qnix |
Analyze the security implications of: Nokia Symbian 60 - 'BlueTooth Nickname' Remote Restart (2) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: MetaCart2 - 'SearchAction.asp' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: MetaCart2 - 'SearchAction.asp' Multiple SQL Injections. Author: Dcrab |
Analyze the security implications of: MetaCart2 - 'SearchAction.asp' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: glibc < 2.26 - 'getcwd()' Local Privilege Escalation | This is a local exploit for linux platform. Description: glibc < 2.26 - 'getcwd()' Local Privilege Escalation. Author: halfdog |
Analyze the security implications of: glibc < 2.26 - 'getcwd()' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Cisco Prime Infrastructure Health Monitor - TarArchive Directory Traversal (Metasploit) | This is a remote exploit for linux platform. Description: Cisco Prime Infrastructure Health Monitor - TarArchive Directory Traversal (Metasploit). Author: Metasploit |
Analyze the security implications of: Cisco Prime Infrastructure Health Monitor - TarArchive Directory Traversal (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Convert-UUlib 1.04/1.05 Perl Module - Remote Buffer Overflow | This is a remote exploit for linux platform. Description: Convert-UUlib 1.04/1.05 Perl Module - Remote Buffer Overflow. Author: CorryL |
Analyze the security implications of: Convert-UUlib 1.04/1.05 Perl Module - Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: UML_Utilities User-Mode Linux - uml_utilities 20030903 UML_Net Slip Network Interface Denial of Service | This is a dos exploit for linux platform. Description: UML_Utilities User-Mode Linux - uml_utilities 20030903 UML_Net Slip Network Interface Denial of Service. Author: Danny Lungstrom |
Analyze the security implications of: UML_Utilities User-Mode Linux - uml_utilities 20030903 UML_Net Slip Network Interface Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: OpenSSHd 7.2p2 - Username Enumeration | This is a remote exploit for linux platform. Description: OpenSSHd 7.2p2 - Username Enumeration. Author: Eddie Harari |
Analyze the security implications of: OpenSSHd 7.2p2 - Username Enumeration | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: The Matt Wright Guestbook.pl 2.3.1 - Server-Side Include | This is a webapps exploit for cgi platform. Description: The Matt Wright Guestbook.pl 2.3.1 - Server-Side Include. Author: patrick |
Analyze the security implications of: The Matt Wright Guestbook.pl 2.3.1 - Server-Side Include | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: IPCop 2.1.9 - Remote Code Execution (RCE) (Authenticated) | This is a webapps exploit for cgi platform. Description: IPCop 2.1.9 - Remote Code Execution (RCE) (Authenticated). Author: Mücahit Saratar |
Analyze the security implications of: IPCop 2.1.9 - Remote Code Execution (RCE) (Authenticated) | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Alstrasoft Forum - 'catid' SQL Injection | This is a webapps exploit for php platform. Description: Alstrasoft Forum - 'catid' SQL Injection. Author: r45c4l |
Analyze the security implications of: Alstrasoft Forum - 'catid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! 1.6.0 Alpha2 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joomla! 1.6.0 Alpha2 - Cross-Site Scripting. Author: mega-itec.com |
Analyze the security implications of: Joomla! 1.6.0 Alpha2 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dicshunary 0.1a - 'check_status.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Dicshunary 0.1a - 'check_status.php' Remote File Inclusion. Author: DeltahackingTEAM |
Analyze the security implications of: Dicshunary 0.1a - 'check_status.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ABB Cylon Aspect 3.08.02 (licenseServerUpdate.php) - Stored Cross-Site Scripting | This is a hardware exploit for multiple platform. Description: ABB Cylon Aspect 3.08.02 (licenseServerUpdate.php) - Stored Cross-Site Scripting. Author: LiquidWorm |
Analyze the security implications of: ABB Cylon Aspect 3.08.02 (licenseServerUpdate.php) - Stored Cross-Site Scripting | This exploit targets multiple systems. Type: hardware. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: A-FAQ 1.0 - 'faqDspItem.asp?faqid' SQL Injection | This is a webapps exploit for asp platform. Description: A-FAQ 1.0 - 'faqDspItem.asp?faqid' SQL Injection. Author: r0t |
Analyze the security implications of: A-FAQ 1.0 - 'faqDspItem.asp?faqid' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Blog System 1.x - Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: Blog System 1.x - Multiple Input Validation Vulnerabilities. Author: cp77fk4r |
Analyze the security implications of: Blog System 1.x - Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.