input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GeoVision Geowebserver 5.3.3 - Local FIle Inclusion | This is a webapps exploit for hardware platform. Description: GeoVision Geowebserver 5.3.3 - Local FIle Inclusion. Author: Ken Pyle |
Analyze the security implications of: GeoVision Geowebserver 5.3.3 - Local FIle Inclusion | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ProFTPd 1.3.5 - 'mod_copy' Remote Command Execution (2) | This is a remote exploit for linux platform. Description: ProFTPd 1.3.5 - 'mod_copy' Remote Command Execution (2). Author: Shellbr3ak |
Analyze the security implications of: ProFTPd 1.3.5 - 'mod_copy' Remote Command Execution (2) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Insanely Simple Blog 0.5 - SQL Injection | This is a webapps exploit for php platform. Description: Insanely Simple Blog 0.5 - SQL Injection. Author: Unohope |
Analyze the security implications of: Insanely Simple Blog 0.5 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ruby on Rails 3.0.5 - 'WEBrick::HTTPRequest' Module HTTP Header Injection | This is a remote exploit for multiple platform. Description: Ruby on Rails 3.0.5 - 'WEBrick::HTTPRequest' Module HTTP Header Injection. Author: Jimmy Bandit |
Analyze the security implications of: Ruby on Rails 3.0.5 - 'WEBrick::HTTPRequest' Module HTTP Header Injection | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GEPI 1.4.0 - '/gestion/savebackup.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: GEPI 1.4.0 - '/gestion/savebackup.php' Remote File Inclusion. Author: Sumit Siddharth |
Analyze the security implications of: GEPI 1.4.0 - '/gestion/savebackup.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Spring Security - HTTP Header Injection | This is a remote exploit for multiple platform. Description: Spring Security - HTTP Header Injection. Author: David Mas |
Analyze the security implications of: Spring Security - HTTP Header Injection | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple Safari 1.x - Cookie Directory Traversal | This is a remote exploit for osx platform. Description: Apple Safari 1.x - Cookie Directory Traversal. Author: Corsaire Limited |
Analyze the security implications of: Apple Safari 1.x - Cookie Directory Traversal | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Oracle Database Vault - 'ptrace(2)' Local Privilege Escalation | This is a local exploit for linux platform. Description: Oracle Database Vault - 'ptrace(2)' Local Privilege Escalation. Author: Jakub Wartak |
Analyze the security implications of: Oracle Database Vault - 'ptrace(2)' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Google Chrome 8.0.552.237 - replace Denial of Service | This is a dos exploit for multiple platform. Description: Google Chrome 8.0.552.237 - replace Denial of Service. Author: Carlos Mario Penagos Hollmann |
Analyze the security implications of: Google Chrome 8.0.552.237 - replace Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Insurance Management System PHP and MySQL 1.0 - Multiple Stored XSS | This is a webapps exploit for php platform. Description: Insurance Management System PHP and MySQL 1.0 - Multiple Stored XSS. Author: Hakkı TOKLU |
Analyze the security implications of: Insurance Management System PHP and MySQL 1.0 - Multiple Stored XSS | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Balbooa Joomla Forms Builder 2.0.6 - SQL Injection (Unauthenticated) | This is a webapps exploit for php platform. Description: Balbooa Joomla Forms Builder 2.0.6 - SQL Injection (Unauthenticated). Author: blockomat2100 |
Analyze the security implications of: Balbooa Joomla Forms Builder 2.0.6 - SQL Injection (Unauthenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linker 2.0.4 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Linker 2.0.4 - 'index.php' Cross-Site Scripting. Author: vagrant |
Analyze the security implications of: Linker 2.0.4 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Accela Civic Platform 21.1 - 'contactSeqNumber' Insecure Direct Object References (IDOR) | This is a webapps exploit for multiple platform. Description: Accela Civic Platform 21.1 - 'contactSeqNumber' Insecure Direct Object References (IDOR). Author: Abdulazeez Alaseeri |
Analyze the security implications of: Accela Civic Platform 21.1 - 'contactSeqNumber' Insecure Direct Object References (IDOR) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: List Site Pro 2.0 - User Database Delimiter Injection | This is a remote exploit for multiple platform. Description: List Site Pro 2.0 - User Database Delimiter Injection. Author: Statix |
Analyze the security implications of: List Site Pro 2.0 - User Database Delimiter Injection | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Beckhoff CX9020 CPU Module - Remote Code Execution | This is a webapps exploit for hardware platform. Description: Beckhoff CX9020 CPU Module - Remote Code Execution. Author: Photubias |
Analyze the security implications of: Beckhoff CX9020 CPU Module - Remote Code Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: KAPhotoservice 7.5 - 'album.asp?cat' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: KAPhotoservice 7.5 - 'album.asp?cat' Cross-Site Scripting. Author: r0t |
Analyze the security implications of: KAPhotoservice 7.5 - 'album.asp?cat' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Frequency Clock 0.1b - 'securelib' Remote File Inclusion | This is a webapps exploit for php platform. Description: Frequency Clock 0.1b - 'securelib' Remote File Inclusion. Author: ThE TiGeR |
Analyze the security implications of: Frequency Clock 0.1b - 'securelib' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Screen SFT DAB 600/C - Authentication Bypass Admin Password Change | This is a remote exploit for hardware platform. Description: Screen SFT DAB 600/C - Authentication Bypass Admin Password Change. Author: LiquidWorm |
Analyze the security implications of: Screen SFT DAB 600/C - Authentication Bypass Admin Password Change | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Castor Library - XML External Entity Information Disclosure | This is a remote exploit for multiple platform. Description: Castor Library - XML External Entity Information Disclosure. Author: Ron Gutierrez |
Analyze the security implications of: Castor Library - XML External Entity Information Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Netgear WiFi Router R6120 - Credential Disclosure | This is a webapps exploit for hardware platform. Description: Netgear WiFi Router R6120 - Credential Disclosure. Author: Wadeek |
Analyze the security implications of: Netgear WiFi Router R6120 - Credential Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Easy Forum 2.5 - New User Image File HTML Injection | This is a webapps exploit for php platform. Description: Easy Forum 2.5 - New User Image File HTML Injection. Author: Aliaksandr Hartsuyeu |
Analyze the security implications of: Easy Forum 2.5 - New User Image File HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Clinic Management System 1.0 - Unauthenticated Remote Code Execution | This is a webapps exploit for php platform. Description: Clinic Management System 1.0 - Unauthenticated Remote Code Execution. Author: BKpatron |
Analyze the security implications of: Clinic Management System 1.0 - Unauthenticated Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link DSL-2730U Wireless N 150 - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: D-Link DSL-2730U Wireless N 150 - Cross-Site Request Forgery. Author: B GOVIND |
Analyze the security implications of: D-Link DSL-2730U Wireless N 150 - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: EyesOfNetwork (EON) 5.0 - Remote Code Execution | This is a webapps exploit for php platform. Description: EyesOfNetwork (EON) 5.0 - Remote Code Execution. Author: Sysdream |
Analyze the security implications of: EyesOfNetwork (EON) 5.0 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Libra File Manager 1.18/2.0 - 'fileadmin.php' Local File Inclusion | This is a webapps exploit for php platform. Description: Libra File Manager 1.18/2.0 - 'fileadmin.php' Local File Inclusion. Author: Pepelux |
Analyze the security implications of: Libra File Manager 1.18/2.0 - 'fileadmin.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ohesa Emlak Portal 1.0 - 'satilik.asp?Kategori' SQL Injection | This is a webapps exploit for asp platform. Description: Ohesa Emlak Portal 1.0 - 'satilik.asp?Kategori' SQL Injection. Author: GeFORC3 |
Analyze the security implications of: Ohesa Emlak Portal 1.0 - 'satilik.asp?Kategori' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: UtilMind Mail List 1.7 - Users Can Execute Commands | This is a webapps exploit for cgi platform. Description: UtilMind Mail List 1.7 - Users Can Execute Commands. Author: teleh0r |
Analyze the security implications of: UtilMind Mail List 1.7 - Users Can Execute Commands | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: EmuLive Server4 - Authentication Bypass / Denial of Service | This is a dos exploit for cgi platform. Description: EmuLive Server4 - Authentication Bypass / Denial of Service. Author: GulfTech Security |
Analyze the security implications of: EmuLive Server4 - Authentication Bypass / Denial of Service | This exploit targets cgi systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Guestbook Script 1.7 - 'include_files' Remote Code Execution | This is a webapps exploit for php platform. Description: Guestbook Script 1.7 - 'include_files' Remote Code Execution. Author: rgod |
Analyze the security implications of: Guestbook Script 1.7 - 'include_files' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM Rational RequisitePro 7.10 - 'ReqWeb Help Feature ReqWebHelp/advanced/workingSet.jsp?Operation' Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: IBM Rational RequisitePro 7.10 - 'ReqWeb Help Feature ReqWebHelp/advanced/workingSet.jsp?Operation' Cross-Site Scripting. Author: IBM |
Analyze the security implications of: IBM Rational RequisitePro 7.10 - 'ReqWeb Help Feature ReqWebHelp/advanced/workingSet.jsp?Operation' Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: AuraCMS 2.x - '/user.php' Security Code Bypass / Arbitrary Add Administrator | This is a webapps exploit for php platform. Description: AuraCMS 2.x - '/user.php' Security Code Bypass / Arbitrary Add Administrator. Author: NTOS-Team |
Analyze the security implications of: AuraCMS 2.x - '/user.php' Security Code Bypass / Arbitrary Add Administrator | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JAF CMS 4.0 RC2 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: JAF CMS 4.0 RC2 - Multiple Remote File Inclusions. Author: CraCkEr |
Analyze the security implications of: JAF CMS 4.0 RC2 - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ciamos CMS 0.9.5 - 'module_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Ciamos CMS 0.9.5 - 'module_path' Remote File Inclusion. Author: cr4wl3r |
Analyze the security implications of: Ciamos CMS 0.9.5 - 'module_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.