input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Microsoft Windows Mobile 6.0 - Device Long Name Remote Reboot (Denial of Service) | This is a dos exploit for hardware platform. Description: Microsoft Windows Mobile 6.0 - Device Long Name Remote Reboot (Denial of Service). Author: Julien Bedard |
Analyze the security implications of: Microsoft Windows Mobile 6.0 - Device Long Name Remote Reboot (Denial of Service) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Arachni Web Application Scanner Web UI - Persistent Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Arachni Web Application Scanner Web UI - Persistent Cross-Site Scripting. Author: Prakhar Prasad |
Analyze the security implications of: Arachni Web Application Scanner Web UI - Persistent Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DirectAdmin 1.28/1.29 - 'CMD_TICKET' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DirectAdmin 1.28/1.29 - 'CMD_TICKET' Cross-Site Scripting. Author: Aria-Security Team |
Analyze the security implications of: DirectAdmin 1.28/1.29 - 'CMD_TICKET' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JE Directory 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JE Directory 1.0 - SQL Injection. Author: Easy Laster |
Analyze the security implications of: Joomla! Component JE Directory 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ManageEngine Eventlog Analyzer - Arbitrary File Upload (Metasploit) | This is a remote exploit for multiple platform. Description: ManageEngine Eventlog Analyzer - Arbitrary File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: ManageEngine Eventlog Analyzer - Arbitrary File Upload (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Azadi Network - 'page' SQL Injection | This is a webapps exploit for php platform. Description: Azadi Network - 'page' SQL Injection. Author: Hussin X |
Analyze the security implications of: Azadi Network - 'page' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Enthrallweb eClassifieds - 'ad.asp' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: Enthrallweb eClassifieds - 'ad.asp' Multiple SQL Injections. Author: laurent gaffie |
Analyze the security implications of: Enthrallweb eClassifieds - 'ad.asp' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Exim 4.84-3 - Local Privilege Escalation | This is a local exploit for linux platform. Description: Exim 4.84-3 - Local Privilege Escalation. Author: Hacker Fantastic |
Analyze the security implications of: Exim 4.84-3 - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Linux Kernel 2.6.22 < 3.9 - 'Dirty COW' /proc/self/mem Race Condition (Write Access Method) | This is a local exploit for linux platform. Description: Linux Kernel 2.6.22 < 3.9 - 'Dirty COW' /proc/self/mem Race Condition (Write Access Method). Author: Phil Oester |
Analyze the security implications of: Linux Kernel 2.6.22 < 3.9 - 'Dirty COW' /proc/self/mem Race Condition (Write Access Method) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ICDutchAuction 1.2 - SQL Injection | This is a webapps exploit for php platform. Description: ICDutchAuction 1.2 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: ICDutchAuction 1.2 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Wireshark 1.2.1 - TLS Dissector 1.2 Conversation Handling Remote Denial of Service | This is a dos exploit for linux platform. Description: Wireshark 1.2.1 - TLS Dissector 1.2 Conversation Handling Remote Denial of Service. Author: Buildbot Builder |
Analyze the security implications of: Wireshark 1.2.1 - TLS Dissector 1.2 Conversation Handling Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component AcySMS 3.5.0 - CSV Macro Injection | This is a webapps exploit for php platform. Description: Joomla! Component AcySMS 3.5.0 - CSV Macro Injection. Author: Sureshbabu Narvaneni |
Analyze the security implications of: Joomla! Component AcySMS 3.5.0 - CSV Macro Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Network Video Recorder NVR304-16EP - Reflected Cross-Site Scripting (XSS) (Unauthenticated) | This is a webapps exploit for hardware platform. Description: Network Video Recorder NVR304-16EP - Reflected Cross-Site Scripting (XSS) (Unauthenticated). Author: Luis Martínez |
Analyze the security implications of: Network Video Recorder NVR304-16EP - Reflected Cross-Site Scripting (XSS) (Unauthenticated) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Dimension of phpBB 0.2.6 - 'phpbb_root_path' Remote File Inclusions | This is a webapps exploit for php platform. Description: Dimension of phpBB 0.2.6 - 'phpbb_root_path' Remote File Inclusions. Author: SpiderZ |
Analyze the security implications of: Dimension of phpBB 0.2.6 - 'phpbb_root_path' Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: elFinder 2.1.47 - 'PHP connector' Command Injection | This is a webapps exploit for php platform. Description: elFinder 2.1.47 - 'PHP connector' Command Injection. Author: q3rv0 |
Analyze the security implications of: elFinder 2.1.47 - 'PHP connector' Command Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: KAPhotoservice 7.5 - 'edtalbum.asp' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for asp platform. Description: KAPhotoservice 7.5 - 'edtalbum.asp' Multiple Cross-Site Scripting Vulnerabilities. Author: r0t |
Analyze the security implications of: KAPhotoservice 7.5 - 'edtalbum.asp' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: White_Dune 0.29beta791 - Multiple Local Code Execution Vulnerabilities | This is a local exploit for multiple platform. Description: White_Dune 0.29beta791 - Multiple Local Code Execution Vulnerabilities. Author: Luigi Auriemma |
Analyze the security implications of: White_Dune 0.29beta791 - Multiple Local Code Execution Vulnerabilities | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Lighttpd 1.4.x - mod_userdir Information Disclosure | This is a remote exploit for linux platform. Description: Lighttpd 1.4.x - mod_userdir Information Disclosure. Author: julien.cayzac |
Analyze the security implications of: Lighttpd 1.4.x - mod_userdir Information Disclosure | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: e107 website system 0.7.5 - 'user.php?Query String (PATH_INFO)' Cross-Site Scripting | This is a webapps exploit for php platform. Description: e107 website system 0.7.5 - 'user.php?Query String (PATH_INFO)' Cross-Site Scripting. Author: zark0vac |
Analyze the security implications of: e107 website system 0.7.5 - 'user.php?Query String (PATH_INFO)' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JetPhoto 1.0/2.0/2.1 - 'detail.php?page' Cross-Site Scripting | This is a webapps exploit for php platform. Description: JetPhoto 1.0/2.0/2.1 - 'detail.php?page' Cross-Site Scripting. Author: 0o_zeus_o0 |
Analyze the security implications of: JetPhoto 1.0/2.0/2.1 - 'detail.php?page' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GGCMS 1.1.0 RC1 - Remote Code Execution | This is a webapps exploit for php platform. Description: GGCMS 1.1.0 RC1 - Remote Code Execution. Author: Kacper |
Analyze the security implications of: GGCMS 1.1.0 RC1 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DomPHP 0.81 - 'index.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: DomPHP 0.81 - 'index.php' Remote File Inclusion. Author: Houssamix |
Analyze the security implications of: DomPHP 0.81 - 'index.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CGI Script Center Subscribe Me Lite 2.0 - Administrative Password Alteration (1) | This is a remote exploit for cgi platform. Description: CGI Script Center Subscribe Me Lite 2.0 - Administrative Password Alteration (1). Author: teleh0r |
Analyze the security implications of: CGI Script Center Subscribe Me Lite 2.0 - Administrative Password Alteration (1) | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Adam Wright HTMLTidy 0.5 - 'html-tidy-logic.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Adam Wright HTMLTidy 0.5 - 'html-tidy-logic.php' Cross-Site Scripting. Author: ShockShadow |
Analyze the security implications of: Adam Wright HTMLTidy 0.5 - 'html-tidy-logic.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreeRealty(Free Real Estate Listing Software) - Authentication Bypass | This is a webapps exploit for php platform. Description: FreeRealty(Free Real Estate Listing Software) - Authentication Bypass. Author: Sid3^effects |
Analyze the security implications of: FreeRealty(Free Real Estate Listing Software) - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Claroline 1.x - 'rqmkhtml.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Claroline 1.x - 'rqmkhtml.php' Cross-Site Scripting. Author: rgod |
Analyze the security implications of: Claroline 1.x - 'rqmkhtml.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_if_nexus - Remote File Inclusion | This is a webapps exploit for multiple platform. Description: Joomla! Component com_if_nexus - Remote File Inclusion. Author: FL0RiX |
Analyze the security implications of: Joomla! Component com_if_nexus - Remote File Inclusion | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Hide My WP < 6.2.9 - Unauthenticated SQLi | This is a webapps exploit for php platform. Description: Hide My WP < 6.2.9 - Unauthenticated SQLi. Author: Xenofon Vassilakopoulos |
Analyze the security implications of: Hide My WP < 6.2.9 - Unauthenticated SQLi | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ez Ringtone Manager - Multiple Remote File Disclosure Vulnerabilities | This is a webapps exploit for php platform. Description: Ez Ringtone Manager - Multiple Remote File Disclosure Vulnerabilities. Author: b3hz4d |
Analyze the security implications of: Ez Ringtone Manager - Multiple Remote File Disclosure Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: e107 CMS 0.7 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: e107 CMS 0.7 - Multiple Cross-Site Scripting Vulnerabilities. Author: ZoRLu |
Analyze the security implications of: e107 CMS 0.7 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BMForum 3.0 - 'post.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: BMForum 3.0 - 'post.php' Cross-Site Scripting. Author: Lostmon |
Analyze the security implications of: BMForum 3.0 - 'post.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AspxCommerce 2.0 - Arbitrary File Upload | This is a webapps exploit for asp platform. Description: AspxCommerce 2.0 - Arbitrary File Upload. Author: SANTHO |
Analyze the security implications of: AspxCommerce 2.0 - Arbitrary File Upload | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: GStreamer 0.10.15 - Multiple Remote Denial of Service Vulnerabilities | This is a dos exploit for linux platform. Description: GStreamer 0.10.15 - Multiple Remote Denial of Service Vulnerabilities. Author: Sam Hocevar |
Analyze the security implications of: GStreamer 0.10.15 - Multiple Remote Denial of Service Vulnerabilities | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CMScout 2.08 - SQL Injection | This is a webapps exploit for php platform. Description: CMScout 2.08 - SQL Injection. Author: Dr.0rYX & Cr3W-DZ |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.