input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: EMC CMCNE 11.2.1 - FileUploadController Remote Code Execution (Metasploit) | This exploit targets java systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Focus/SIS 1.0/2.2 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Focus/SIS 1.0/2.2 - Remote File Inclusion. Author: ThE TiGeR |
Analyze the security implications of: Focus/SIS 1.0/2.2 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JS Support Ticket (com_jssupportticket) 1.1.6 - 'ticket.php' Arbitrary File Deletion | This is a webapps exploit for php platform. Description: Joomla! Component JS Support Ticket (com_jssupportticket) 1.1.6 - 'ticket.php' Arbitrary File Deletion. Author: qw3rTyTy |
Analyze the security implications of: Joomla! Component JS Support Ticket (com_jssupportticket) 1.1.6 - 'ticket.php' Arbitrary File Deletion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: extent technologies rbs isp 2.5 - Directory Traversal | This is a remote exploit for multiple platform. Description: extent technologies rbs isp 2.5 - Directory Traversal. Author: anon |
Analyze the security implications of: extent technologies rbs isp 2.5 - Directory Traversal | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: WvTFTPd 0.9 - Remote Heap Overflow | This is a remote exploit for linux platform. Description: WvTFTPd 0.9 - Remote Heap Overflow. Author: infamous41md |
Analyze the security implications of: WvTFTPd 0.9 - Remote Heap Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: All Browsers - Long Unicode Denial of Service (PoC) | This is a dos exploit for multiple platform. Description: All Browsers - Long Unicode Denial of Service (PoC). Author: Dr_IDE |
Analyze the security implications of: All Browsers - Long Unicode Denial of Service (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Unixware 7.0 - SCOhelp HTTP Server Format String | This is a remote exploit for cgi platform. Description: Unixware 7.0 - SCOhelp HTTP Server Format String. Author: Juliano Rizzo |
Analyze the security implications of: Unixware 7.0 - SCOhelp HTTP Server Format String | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Fast Click 1.1.3/2.3.8 - 'show.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Fast Click 1.1.3/2.3.8 - 'show.php' Remote File Inclusion. Author: R@1D3N |
Analyze the security implications of: Fast Click 1.1.3/2.3.8 - 'show.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: nbSMTP 0.99 - 'util.c' Client-Side Command Execution | This is a remote exploit for linux platform. Description: nbSMTP 0.99 - 'util.c' Client-Side Command Execution. Author: CoKi |
Analyze the security implications of: nbSMTP 0.99 - 'util.c' Client-Side Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Event Calender PHP - Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: Event Calender PHP - Multiple Input Validation Vulnerabilities. Author: snup |
Analyze the security implications of: Event Calender PHP - Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iauto mobile Application 2012 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: iauto mobile Application 2012 - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: iauto mobile Application 2012 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMSQLite 1.2 / CMySQLite 1.3.1 - Remote Code Execution | This is a webapps exploit for php platform. Description: CMSQLite 1.2 / CMySQLite 1.3.1 - Remote Code Execution. Author: BlackHawk |
Analyze the security implications of: CMSQLite 1.2 / CMySQLite 1.3.1 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: File Share 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: File Share 1.0 - SQL Injection. Author: TOP SAT 13 |
Analyze the security implications of: File Share 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Postfix < 2.4.9/2.5.5/2.6-20080902 - '.forward' Local Denial of Service | This is a dos exploit for multiple platform. Description: Postfix < 2.4.9/2.5.5/2.6-20080902 - '.forward' Local Denial of Service. Author: Albert Sellares |
Analyze the security implications of: Postfix < 2.4.9/2.5.5/2.6-20080902 - '.forward' Local Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: QNAP Netatalk < 3.1.12 - Authentication Bypass | This is a remote exploit for multiple platform. Description: QNAP Netatalk < 3.1.12 - Authentication Bypass. Author: muts |
Analyze the security implications of: QNAP Netatalk < 3.1.12 - Authentication Bypass | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: SUIDPerl 5.00503 - Mail Shell Escape (2) | This is a local exploit for linux platform. Description: SUIDPerl 5.00503 - Mail Shell Escape (2). Author: Michal Zalewski |
Analyze the security implications of: SUIDPerl 5.00503 - Mail Shell Escape (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Digital Hive 2.0 - 'base.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Digital Hive 2.0 - 'base.php' Cross-Site Scripting. Author: ZoRLu |
Analyze the security implications of: Digital Hive 2.0 - 'base.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Authentication Bypass | This is a webapps exploit for hardware platform. Description: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Authentication Bypass. Author: LiquidWorm |
Analyze the security implications of: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component com_jcollection - Directory Traversal | This is a webapps exploit for php platform. Description: Joomla! Component com_jcollection - Directory Traversal. Author: FL0RiX |
Analyze the security implications of: Joomla! Component com_jcollection - Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dew-NewPHPLinks 2.0 - Local File Inclusion / Cross-Site Scripting | This is a webapps exploit for php platform. Description: Dew-NewPHPLinks 2.0 - Local File Inclusion / Cross-Site Scripting. Author: d3v1l |
Analyze the security implications of: Dew-NewPHPLinks 2.0 - Local File Inclusion / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Campus Bulletin Board 3.4 - '/post3/view.asp?id' SQL Injection | This is a webapps exploit for asp platform. Description: Campus Bulletin Board 3.4 - '/post3/view.asp?id' SQL Injection. Author: Unohope |
Analyze the security implications of: Campus Bulletin Board 3.4 - '/post3/view.asp?id' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: BlueSoft Banner Exchange - 'referer_id' SQL Injection | This is a webapps exploit for php platform. Description: BlueSoft Banner Exchange - 'referer_id' SQL Injection. Author: darkTR |
Analyze the security implications of: BlueSoft Banner Exchange - 'referer_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple QuickTime (Multiple Browsers) - Command Execution | This is a remote exploit for multiple platform. Description: Apple QuickTime (Multiple Browsers) - Command Execution. Author: pdp |
Analyze the security implications of: Apple QuickTime (Multiple Browsers) - Command Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Jigowatt PHP Event Calendar - 'day_view.php' SQL Injection | This is a webapps exploit for php platform. Description: Jigowatt PHP Event Calendar - 'day_view.php' SQL Injection. Author: Daniel Godoy |
Analyze the security implications of: Jigowatt PHP Event Calendar - 'day_view.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Thunderstone TEXIS 3.0 - 'texis.exe' Information Disclosure | This is a remote exploit for cgi platform. Description: Thunderstone TEXIS 3.0 - 'texis.exe' Information Disclosure. Author: sir.mordred@hushmail.com |
Analyze the security implications of: Thunderstone TEXIS 3.0 - 'texis.exe' Information Disclosure | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: EMC Celerra NAS Appliance - Unauthorized Access to Root NFS Export | This is a remote exploit for hardware platform. Description: EMC Celerra NAS Appliance - Unauthorized Access to Root NFS Export. Author: Trustwave's SpiderLabs |
Analyze the security implications of: EMC Celerra NAS Appliance - Unauthorized Access to Root NFS Export | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component JS Support Ticket 1.1.0 - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: Joomla! Component JS Support Ticket 1.1.0 - Cross-Site Request Forgery. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component JS Support Ticket 1.1.0 - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BibORB 1.3.2 - 'index.php' Traversal Arbitrary File Manipulation | This is a webapps exploit for php platform. Description: BibORB 1.3.2 - 'index.php' Traversal Arbitrary File Manipulation. Author: Patrick Hof |
Analyze the security implications of: BibORB 1.3.2 - 'index.php' Traversal Arbitrary File Manipulation | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Netscape Enterprise Server 3.x/4.x - PageServices Information Disclosure | This is a remote exploit for multiple platform. Description: Netscape Enterprise Server 3.x/4.x - PageServices Information Disclosure. Author: anonymous |
Analyze the security implications of: Netscape Enterprise Server 3.x/4.x - PageServices Information Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ABB Cylon FLXeon 9.3.4 - WebSocket Command Spawning | This is a hardware exploit for multiple platform. Description: ABB Cylon FLXeon 9.3.4 - WebSocket Command Spawning. Author: LiquidWorm |
Analyze the security implications of: ABB Cylon FLXeon 9.3.4 - WebSocket Command Spawning | This exploit targets multiple systems. Type: hardware. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Oracle WebLogic Server 10.3 - 'console-help.portal' Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Oracle WebLogic Server 10.3 - 'console-help.portal' Cross-Site Scripting. Author: Alexandr Polyakov |
Analyze the security implications of: Oracle WebLogic Server 10.3 - 'console-help.portal' Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Elite Graphix ElitCMS 1.01 / PRO - Multiple Web Vulnerabilities | This is a webapps exploit for multiple platform. Description: Elite Graphix ElitCMS 1.01 / PRO - Multiple Web Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: Elite Graphix ElitCMS 1.01 / PRO - Multiple Web Vulnerabilities | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Juicy Gallery - 'picId' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Juicy Gallery - 'picId' SQL Injection. Author: SOLVER |
Analyze the security implications of: Joomla! Component Juicy Gallery - 'picId' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: chatNow - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: chatNow - Multiple Vulnerabilities. Author: HaHwul |
Analyze the security implications of: chatNow - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.