input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FLIR AX8 1.46.16 - Remote Command Injection | This is a webapps exploit for hardware platform. Description: FLIR AX8 1.46.16 - Remote Command Injection. Author: ub3rsick |
Analyze the security implications of: FLIR AX8 1.46.16 - Remote Command Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Centrinity FirstClass HTTP Server 7.1 - Directory Disclosure | This is a remote exploit for multiple platform. Description: Centrinity FirstClass HTTP Server 7.1 - Directory Disclosure. Author: Richard Maudsley |
Analyze the security implications of: Centrinity FirstClass HTTP Server 7.1 - Directory Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: XpoLog Center 6 - Remote Command Execution / Cross-Site Request Forgery | This is a webapps exploit for jsp platform. Description: XpoLog Center 6 - Remote Command Execution / Cross-Site Request Forgery. Author: LiquidWorm |
Analyze the security implications of: XpoLog Center 6 - Remote Command Execution / Cross-Site Request Forgery | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: eDatCat 3.0 - EDCstore.pl Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: eDatCat 3.0 - EDCstore.pl Cross-Site Scripting. Author: r0t3d3Vil |
Analyze the security implications of: eDatCat 3.0 - EDCstore.pl Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Majordomo 1.89/1.90 - 'lists' Command Execution | This is a remote exploit for linux platform. Description: Majordomo 1.89/1.90 - 'lists' Command Execution. Author: Razvan Dragomirescu |
Analyze the security implications of: Majordomo 1.89/1.90 - 'lists' Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: cPanel 5-9 - Killacct Script Customer Account DNS Information Deletion | This is a webapps exploit for php platform. Description: cPanel 5-9 - Killacct Script Customer Account DNS Information Deletion. Author: qbann targ |
Analyze the security implications of: cPanel 5-9 - Killacct Script Customer Account DNS Information Deletion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Imperva SecureSphere - SQL Query Filter Security Bypass | This is a remote exploit for multiple platform. Description: Imperva SecureSphere - SQL Query Filter Security Bypass. Author: @drk1wi |
Analyze the security implications of: Imperva SecureSphere - SQL Query Filter Security Bypass | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Squid 3.3.5 - Denial of Service (PoC) | This is a dos exploit for linux platform. Description: Squid 3.3.5 - Denial of Service (PoC). Author: kingcope |
Analyze the security implications of: Squid 3.3.5 - Denial of Service (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Linux Kernel 2.6.x (x64) - Personality Handling Local Denial of Service | This is a dos exploit for linux_x86-64 platform. Description: Linux Kernel 2.6.x (x64) - Personality Handling Local Denial of Service. Author: Mathias Krause |
Analyze the security implications of: Linux Kernel 2.6.x (x64) - Personality Handling Local Denial of Service | This exploit targets linux_x86-64 systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux_x86-64 platform |
What is this exploit about: CH-CMS.ch 2 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: CH-CMS.ch 2 - Arbitrary File Upload. Author: EL-KAHINA |
Analyze the security implications of: CH-CMS.ch 2 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMS Made Simple 2.2.7 - (Authenticated) Remote Code Execution | This is a webapps exploit for php platform. Description: CMS Made Simple 2.2.7 - (Authenticated) Remote Code Execution. Author: Lucian Ioan Nitescu |
Analyze the security implications of: CMS Made Simple 2.2.7 - (Authenticated) Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Electrolink FM/DAB/TV Transmitter - Unauthenticated Remote DoS | This is a dos exploit for hardware platform. Description: Electrolink FM/DAB/TV Transmitter - Unauthenticated Remote DoS. Author: LiquidWorm |
Analyze the security implications of: Electrolink FM/DAB/TV Transmitter - Unauthenticated Remote DoS | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component OS Property Real Estate 3.12.7 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component OS Property Real Estate 3.12.7 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component OS Property Real Estate 3.12.7 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AUO Solar Data Recorder < 1.3.0 - Incorrect Access Control | This is a webapps exploit for hardware platform. Description: AUO Solar Data Recorder < 1.3.0 - Incorrect Access Control. Author: Luca.Chiou |
Analyze the security implications of: AUO Solar Data Recorder < 1.3.0 - Incorrect Access Control | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: PoPToP PPTP 1.1.4-b3 - 'poptop-sane.c' Remote Command Execution | This is a remote exploit for linux platform. Description: PoPToP PPTP 1.1.4-b3 - 'poptop-sane.c' Remote Command Execution. Author: blightninjas |
Analyze the security implications of: PoPToP PPTP 1.1.4-b3 - 'poptop-sane.c' Remote Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: iOS TIOD 1.3.3 - Directory Traversal | This is a remote exploit for ios platform. Description: iOS TIOD 1.3.3 - Directory Traversal. Author: R3d@l3rt_ H@ckk3y |
Analyze the security implications of: iOS TIOD 1.3.3 - Directory Traversal | This exploit targets ios systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Mantis Bug Tracker 1.2.0a3 < 1.2.17 XmlImportExport Plugin - PHP Code Injection (Metasploit) (1) | This is a webapps exploit for multiple platform. Description: Mantis Bug Tracker 1.2.0a3 < 1.2.17 XmlImportExport Plugin - PHP Code Injection (Metasploit) (1). Author: Metasploit |
Analyze the security implications of: Mantis Bug Tracker 1.2.0a3 < 1.2.17 XmlImportExport Plugin - PHP Code Injection (Metasploit) (1) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Censura < 2.1.1 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Censura < 2.1.1 - Multiple Cross-Site Scripting Vulnerabilities. Author: mark99 |
Analyze the security implications of: Censura < 2.1.1 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe ColdFusion 9 - Administrative Authentication Bypass (Metasploit) | This is a remote exploit for multiple platform. Description: Adobe ColdFusion 9 - Administrative Authentication Bypass (Metasploit). Author: Metasploit |
Analyze the security implications of: Adobe ColdFusion 9 - Administrative Authentication Bypass (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component redTWITTER 1.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component redTWITTER 1.0 - Local File Inclusion. Author: NoGe |
Analyze the security implications of: Joomla! Component redTWITTER 1.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_school 1.4 - 'classid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_school 1.4 - 'classid' SQL Injection. Author: Chip d3 bi0s |
Analyze the security implications of: Joomla! Component com_school 1.4 - 'classid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe ColdFusion Server 8.0.1 - '/wizards/common/_authenticatewizarduser.cfm' Query String Cross-Site Scripting | This is a webapps exploit for cfm platform. Description: Adobe ColdFusion Server 8.0.1 - '/wizards/common/_authenticatewizarduser.cfm' Query String Cross-Site Scripting. Author: Alexander Polyakov |
Analyze the security implications of: Adobe ColdFusion Server 8.0.1 - '/wizards/common/_authenticatewizarduser.cfm' Query String Cross-Site Scripting | This exploit targets cfm systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cfm platform |
What is this exploit about: CDRDAO 1.1.x - Home Directory Configuration File Symbolic Link (4) | This is a local exploit for linux platform. Description: CDRDAO 1.1.x - Home Directory Configuration File Symbolic Link (4). Author: Karol Wiesek |
Analyze the security implications of: CDRDAO 1.1.x - Home Directory Configuration File Symbolic Link (4) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CubeCart 2.0.x - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: CubeCart 2.0.x - Multiple Cross-Site Scripting Vulnerabilities. Author: Lostmon |
Analyze the security implications of: CubeCart 2.0.x - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AllMyGuests 0.x - 'info.inc.php' Arbitrary Code Execution | This is a webapps exploit for php platform. Description: AllMyGuests 0.x - 'info.inc.php' Arbitrary Code Execution. Author: Pablo Santana |
Analyze the security implications of: AllMyGuests 0.x - 'info.inc.php' Arbitrary Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: jCore CMS - Cross-Site Scripting | This is a webapps exploit for php platform. Description: jCore CMS - Cross-Site Scripting. Author: loneferret |
Analyze the security implications of: jCore CMS - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Crime24 Stealer Panel 1.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Crime24 Stealer Panel 1.0 - Multiple Vulnerabilities. Author: Daisuke Dan |
Analyze the security implications of: Crime24 Stealer Panel 1.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Lyrics Script - SQL Injection / Cross-Site Scripting | This is a webapps exploit for php platform. Description: Lyrics Script - SQL Injection / Cross-Site Scripting. Author: Valentin |
Analyze the security implications of: Lyrics Script - SQL Injection / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bluetooth Photo Share Pro 2.0 iOS - Multiple Vulnerabilities | This is a webapps exploit for ios platform. Description: Bluetooth Photo Share Pro 2.0 iOS - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: Bluetooth Photo Share Pro 2.0 iOS - Multiple Vulnerabilities | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: SiteEnable - SQL Injection | This is a webapps exploit for asp platform. Description: SiteEnable - SQL Injection. Author: Zinho |
Analyze the security implications of: SiteEnable - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: SolarWinds LEM 6.3.1 - Remote Code Execution (Metasploit) | This is a remote exploit for linux platform. Description: SolarWinds LEM 6.3.1 - Remote Code Execution (Metasploit). Author: Mehmet Ince |
Analyze the security implications of: SolarWinds LEM 6.3.1 - Remote Code Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ChartDirector 4.1 - 'viewsource.php' File Disclosure | This is a webapps exploit for php platform. Description: ChartDirector 4.1 - 'viewsource.php' File Disclosure. Author: Stack |
Analyze the security implications of: ChartDirector 4.1 - 'viewsource.php' File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Invision Power Board 2.0/2.1 - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: Invision Power Board 2.0/2.1 - 'index.php' SQL Injection. Author: almaster |
Analyze the security implications of: Invision Power Board 2.0/2.1 - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.