input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: xtokkaetama 1.0b (RedHat 9.0) - Local Game | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AjaXplorer 1.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: AjaXplorer 1.0 - Multiple Vulnerabilities. Author: Trustwave's SpiderLabs |
Analyze the security implications of: AjaXplorer 1.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Acrobat Reader (UNIX) 5.0 6 / Xpdf 0.9x Hyperlinks - Arbitrary Command Execution | This is a remote exploit for linux platform. Description: Adobe Acrobat Reader (UNIX) 5.0 6 / Xpdf 0.9x Hyperlinks - Arbitrary Command Execution. Author: Martyn Gilmore |
Analyze the security implications of: Adobe Acrobat Reader (UNIX) 5.0 6 / Xpdf 0.9x Hyperlinks - Arbitrary Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: e107 < 0.75 - 'e107language_e107cookie' Local File Inclusion | This is a webapps exploit for php platform. Description: e107 < 0.75 - 'e107language_e107cookie' Local File Inclusion. Author: Kacper |
Analyze the security implications of: e107 < 0.75 - 'e107language_e107cookie' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Horde Framework - Unserialize PHP Code Execution (Metasploit) | This is a remote exploit for php platform. Description: Horde Framework - Unserialize PHP Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Horde Framework - Unserialize PHP Code Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Webmin Usermin 2.100 - Username Enumeration | This is a webapps exploit for perl platform. Description: Webmin Usermin 2.100 - Username Enumeration. Author: Kjesper |
Analyze the security implications of: Webmin Usermin 2.100 - Username Enumeration | This exploit targets perl systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets perl platform |
What is this exploit about: Maxwebportal 1.3 - 'custom_link.asp' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: Maxwebportal 1.3 - 'custom_link.asp' Multiple SQL Injections. Author: s-dalili |
Analyze the security implications of: Maxwebportal 1.3 - 'custom_link.asp' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Fast Guest Book - Authentication Bypass | This is a webapps exploit for php platform. Description: Fast Guest Book - Authentication Bypass. Author: Moudi |
Analyze the security implications of: Fast Guest Book - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MiniDVBLinux 5.4 Simple VideoDiskRecorder Protocol SVDRP - Remote Code Execution (RCE) | This is a remote exploit for hardware platform. Description: MiniDVBLinux 5.4 Simple VideoDiskRecorder Protocol SVDRP - Remote Code Execution (RCE). Author: LiquidWorm |
Analyze the security implications of: MiniDVBLinux 5.4 Simple VideoDiskRecorder Protocol SVDRP - Remote Code Execution (RCE) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Exhibit Engine 1.5 RC 4 - 'photo_comment.php' File Inclusion | This is a webapps exploit for php platform. Description: Exhibit Engine 1.5 RC 4 - 'photo_comment.php' File Inclusion. Author: Kacper |
Analyze the security implications of: Exhibit Engine 1.5 RC 4 - 'photo_comment.php' File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM Lotus Domino 7.0.2 - 'readme.nsf' Cross-Site Scripting | This is a remote exploit for multiple platform. Description: IBM Lotus Domino 7.0.2 - 'readme.nsf' Cross-Site Scripting. Author: Nahuel Grisolia |
Analyze the security implications of: IBM Lotus Domino 7.0.2 - 'readme.nsf' Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cisco 871 Integrated Services Router - Cross-Site Request Forgery (1) | This is a remote exploit for hardware platform. Description: Cisco 871 Integrated Services Router - Cross-Site Request Forgery (1). Author: Jeremy Brown |
Analyze the security implications of: Cisco 871 Integrated Services Router - Cross-Site Request Forgery (1) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: SmarterStats 11.3.6347 - Cross-Site Scripting | This is a webapps exploit for aspx platform. Description: SmarterStats 11.3.6347 - Cross-Site Scripting. Author: sqlhacker |
Analyze the security implications of: SmarterStats 11.3.6347 - Cross-Site Scripting | This exploit targets aspx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aspx platform |
What is this exploit about: Beezfud - Remote Code Execution | This is a webapps exploit for php platform. Description: Beezfud - Remote Code Execution. Author: Ashiyane Digital Security Team |
Analyze the security implications of: Beezfud - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Expense Management 1.0 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Expense Management 1.0 - Arbitrary File Upload. Author: Ihsan Sencan |
Analyze the security implications of: Expense Management 1.0 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ccTiddly 1.7.6 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: ccTiddly 1.7.6 - Multiple Remote File Inclusions. Author: eidelweiss |
Analyze the security implications of: ccTiddly 1.7.6 - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ascad Networks 5 - Products Insecure Cookie Handling | This is a webapps exploit for php platform. Description: Ascad Networks 5 - Products Insecure Cookie Handling. Author: G4N0K |
Analyze the security implications of: Ascad Networks 5 - Products Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alstrasoft Flippa Clone MarketPlace Script 4.10 - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: Alstrasoft Flippa Clone MarketPlace Script 4.10 - Cross-Site Request Forgery (Add Admin). Author: Ihsan Sencan |
Analyze the security implications of: Alstrasoft Flippa Clone MarketPlace Script 4.10 - Cross-Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IceWarp 10.4.4 - Local File Inclusion | This is a webapps exploit for php platform. Description: IceWarp 10.4.4 - Local File Inclusion. Author: JameelNabbo |
Analyze the security implications of: IceWarp 10.4.4 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.6.31-rc5 - sigaltstack 4-Byte Stack Disclosure | This is a local exploit for linux platform. Description: Linux Kernel 2.6.31-rc5 - sigaltstack 4-Byte Stack Disclosure. Author: Jon Oberheide |
Analyze the security implications of: Linux Kernel 2.6.31-rc5 - sigaltstack 4-Byte Stack Disclosure | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Accellion File Transfer Appliance Error Report Message - Open Email Relay | This is a remote exploit for multiple platform. Description: Accellion File Transfer Appliance Error Report Message - Open Email Relay. Author: Eric Beaulieu |
Analyze the security implications of: Accellion File Transfer Appliance Error Report Message - Open Email Relay | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Fishyshoop 0.930b - Remote Add Administrator Account | This is a webapps exploit for php platform. Description: Fishyshoop 0.930b - Remote Add Administrator Account. Author: James Gray |
Analyze the security implications of: Fishyshoop 0.930b - Remote Add Administrator Account | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DLink DIR-601 - Credential Disclosure | This is a webapps exploit for hardware platform. Description: DLink DIR-601 - Credential Disclosure. Author: Kevin Randall |
Analyze the security implications of: DLink DIR-601 - Credential Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Advanced Image Hosting 2.2 - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: Advanced Image Hosting 2.2 - 'index.php' SQL Injection. Author: keracker |
Analyze the security implications of: Advanced Image Hosting 2.2 - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: C4G Basic Laboratory Information System (BLIS) 3.4 - SQL Injection | This is a webapps exploit for php platform. Description: C4G Basic Laboratory Information System (BLIS) 3.4 - SQL Injection. Author: Carlos Avila |
Analyze the security implications of: C4G Basic Laboratory Information System (BLIS) 3.4 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Perception LiteServe 2.0 - CGI Source Disclosure | This is a remote exploit for multiple platform. Description: Perception LiteServe 2.0 - CGI Source Disclosure. Author: mattmurphy |
Analyze the security implications of: Perception LiteServe 2.0 - CGI Source Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Linksys WAP610N - Root Access Security | This is a remote exploit for hardware platform. Description: Linksys WAP610N - Root Access Security. Author: Matteo Ignaccolo |
Analyze the security implications of: Linksys WAP610N - Root Access Security | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CS-Cart 2.0.0 Beta 3 - 'Product_ID' SQL Injection | This is a webapps exploit for php platform. Description: CS-Cart 2.0.0 Beta 3 - 'Product_ID' SQL Injection. Author: netsoul |
Analyze the security implications of: CS-Cart 2.0.0 Beta 3 - 'Product_ID' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: InTouch 0.5.1 Alpha - User Variable SQL Injection | This is a webapps exploit for php platform. Description: InTouch 0.5.1 Alpha - User Variable SQL Injection. Author: Aliaksandr Hartsuyeu |
Analyze the security implications of: InTouch 0.5.1 Alpha - User Variable SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EggAvatar for vBulletin 3.8.x - SQL Injection | This is a webapps exploit for php platform. Description: EggAvatar for vBulletin 3.8.x - SQL Injection. Author: DSecurity |
Analyze the security implications of: EggAvatar for vBulletin 3.8.x - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Homematic CCU2 2.29.23 - Remote Command Execution | This is a webapps exploit for cgi platform. Description: Homematic CCU2 2.29.23 - Remote Command Execution. Author: Patrick Muench and Gregor Kopf |
Analyze the security implications of: Homematic CCU2 2.29.23 - Remote Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Siklu MultiHaul TG series < 2.0.0 - unauthenticated credential disclosure | This is a remote exploit for hardware platform. Description: Siklu MultiHaul TG series < 2.0.0 - unauthenticated credential disclosure. Author: semaja2 |
Analyze the security implications of: Siklu MultiHaul TG series < 2.0.0 - unauthenticated credential disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: appRain CMF - Arbitrary '.PHP' File Upload (Metasploit) | This is a webapps exploit for php platform. Description: appRain CMF - Arbitrary '.PHP' File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: appRain CMF - Arbitrary '.PHP' File Upload (Metasploit) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Drupal 4.1/4.2 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Drupal 4.1/4.2 - Cross-Site Scripting. Author: Ferruh Mavituna |
Analyze the security implications of: Drupal 4.1/4.2 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.