input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: EMC CMCNE 11.2.1 - FileUploadController Remote Code Execution (Metasploit)
|
This exploit targets java systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Focus/SIS 1.0/2.2 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Focus/SIS 1.0/2.2 - Remote File Inclusion. Author: ThE TiGeR
|
Analyze the security implications of: Focus/SIS 1.0/2.2 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component JS Support Ticket (com_jssupportticket) 1.1.6 - 'ticket.php' Arbitrary File Deletion
|
This is a webapps exploit for php platform. Description: Joomla! Component JS Support Ticket (com_jssupportticket) 1.1.6 - 'ticket.php' Arbitrary File Deletion. Author: qw3rTyTy
|
Analyze the security implications of: Joomla! Component JS Support Ticket (com_jssupportticket) 1.1.6 - 'ticket.php' Arbitrary File Deletion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: extent technologies rbs isp 2.5 - Directory Traversal
|
This is a remote exploit for multiple platform. Description: extent technologies rbs isp 2.5 - Directory Traversal. Author: anon
|
Analyze the security implications of: extent technologies rbs isp 2.5 - Directory Traversal
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: WvTFTPd 0.9 - Remote Heap Overflow
|
This is a remote exploit for linux platform. Description: WvTFTPd 0.9 - Remote Heap Overflow. Author: infamous41md
|
Analyze the security implications of: WvTFTPd 0.9 - Remote Heap Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: All Browsers - Long Unicode Denial of Service (PoC)
|
This is a dos exploit for multiple platform. Description: All Browsers - Long Unicode Denial of Service (PoC). Author: Dr_IDE
|
Analyze the security implications of: All Browsers - Long Unicode Denial of Service (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Unixware 7.0 - SCOhelp HTTP Server Format String
|
This is a remote exploit for cgi platform. Description: Unixware 7.0 - SCOhelp HTTP Server Format String. Author: Juliano Rizzo
|
Analyze the security implications of: Unixware 7.0 - SCOhelp HTTP Server Format String
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Fast Click 1.1.3/2.3.8 - 'show.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Fast Click 1.1.3/2.3.8 - 'show.php' Remote File Inclusion. Author: R@1D3N
|
Analyze the security implications of: Fast Click 1.1.3/2.3.8 - 'show.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: nbSMTP 0.99 - 'util.c' Client-Side Command Execution
|
This is a remote exploit for linux platform. Description: nbSMTP 0.99 - 'util.c' Client-Side Command Execution. Author: CoKi
|
Analyze the security implications of: nbSMTP 0.99 - 'util.c' Client-Side Command Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Event Calender PHP - Multiple Input Validation Vulnerabilities
|
This is a webapps exploit for php platform. Description: Event Calender PHP - Multiple Input Validation Vulnerabilities. Author: snup
|
Analyze the security implications of: Event Calender PHP - Multiple Input Validation Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: iauto mobile Application 2012 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: iauto mobile Application 2012 - Multiple Vulnerabilities. Author: Vulnerability-Lab
|
Analyze the security implications of: iauto mobile Application 2012 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CMSQLite 1.2 / CMySQLite 1.3.1 - Remote Code Execution
|
This is a webapps exploit for php platform. Description: CMSQLite 1.2 / CMySQLite 1.3.1 - Remote Code Execution. Author: BlackHawk
|
Analyze the security implications of: CMSQLite 1.2 / CMySQLite 1.3.1 - Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: File Share 1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: File Share 1.0 - SQL Injection. Author: TOP SAT 13
|
Analyze the security implications of: File Share 1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Postfix < 2.4.9/2.5.5/2.6-20080902 - '.forward' Local Denial of Service
|
This is a dos exploit for multiple platform. Description: Postfix < 2.4.9/2.5.5/2.6-20080902 - '.forward' Local Denial of Service. Author: Albert Sellares
|
Analyze the security implications of: Postfix < 2.4.9/2.5.5/2.6-20080902 - '.forward' Local Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: QNAP Netatalk < 3.1.12 - Authentication Bypass
|
This is a remote exploit for multiple platform. Description: QNAP Netatalk < 3.1.12 - Authentication Bypass. Author: muts
|
Analyze the security implications of: QNAP Netatalk < 3.1.12 - Authentication Bypass
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: SUIDPerl 5.00503 - Mail Shell Escape (2)
|
This is a local exploit for linux platform. Description: SUIDPerl 5.00503 - Mail Shell Escape (2). Author: Michal Zalewski
|
Analyze the security implications of: SUIDPerl 5.00503 - Mail Shell Escape (2)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Digital Hive 2.0 - 'base.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Digital Hive 2.0 - 'base.php' Cross-Site Scripting. Author: ZoRLu
|
Analyze the security implications of: Digital Hive 2.0 - 'base.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Authentication Bypass. Author: LiquidWorm
|
Analyze the security implications of: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component com_jcollection - Directory Traversal
|
This is a webapps exploit for php platform. Description: Joomla! Component com_jcollection - Directory Traversal. Author: FL0RiX
|
Analyze the security implications of: Joomla! Component com_jcollection - Directory Traversal
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dew-NewPHPLinks 2.0 - Local File Inclusion / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Dew-NewPHPLinks 2.0 - Local File Inclusion / Cross-Site Scripting. Author: d3v1l
|
Analyze the security implications of: Dew-NewPHPLinks 2.0 - Local File Inclusion / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Campus Bulletin Board 3.4 - '/post3/view.asp?id' SQL Injection
|
This is a webapps exploit for asp platform. Description: Campus Bulletin Board 3.4 - '/post3/view.asp?id' SQL Injection. Author: Unohope
|
Analyze the security implications of: Campus Bulletin Board 3.4 - '/post3/view.asp?id' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: BlueSoft Banner Exchange - 'referer_id' SQL Injection
|
This is a webapps exploit for php platform. Description: BlueSoft Banner Exchange - 'referer_id' SQL Injection. Author: darkTR
|
Analyze the security implications of: BlueSoft Banner Exchange - 'referer_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple QuickTime (Multiple Browsers) - Command Execution
|
This is a remote exploit for multiple platform. Description: Apple QuickTime (Multiple Browsers) - Command Execution. Author: pdp
|
Analyze the security implications of: Apple QuickTime (Multiple Browsers) - Command Execution
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Jigowatt PHP Event Calendar - 'day_view.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Jigowatt PHP Event Calendar - 'day_view.php' SQL Injection. Author: Daniel Godoy
|
Analyze the security implications of: Jigowatt PHP Event Calendar - 'day_view.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Thunderstone TEXIS 3.0 - 'texis.exe' Information Disclosure
|
This is a remote exploit for cgi platform. Description: Thunderstone TEXIS 3.0 - 'texis.exe' Information Disclosure. Author: sir.mordred@hushmail.com
|
Analyze the security implications of: Thunderstone TEXIS 3.0 - 'texis.exe' Information Disclosure
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: EMC Celerra NAS Appliance - Unauthorized Access to Root NFS Export
|
This is a remote exploit for hardware platform. Description: EMC Celerra NAS Appliance - Unauthorized Access to Root NFS Export. Author: Trustwave's SpiderLabs
|
Analyze the security implications of: EMC Celerra NAS Appliance - Unauthorized Access to Root NFS Export
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component JS Support Ticket 1.1.0 - Cross-Site Request Forgery
|
This is a webapps exploit for php platform. Description: Joomla! Component JS Support Ticket 1.1.0 - Cross-Site Request Forgery. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component JS Support Ticket 1.1.0 - Cross-Site Request Forgery
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BibORB 1.3.2 - 'index.php' Traversal Arbitrary File Manipulation
|
This is a webapps exploit for php platform. Description: BibORB 1.3.2 - 'index.php' Traversal Arbitrary File Manipulation. Author: Patrick Hof
|
Analyze the security implications of: BibORB 1.3.2 - 'index.php' Traversal Arbitrary File Manipulation
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Netscape Enterprise Server 3.x/4.x - PageServices Information Disclosure
|
This is a remote exploit for multiple platform. Description: Netscape Enterprise Server 3.x/4.x - PageServices Information Disclosure. Author: anonymous
|
Analyze the security implications of: Netscape Enterprise Server 3.x/4.x - PageServices Information Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ABB Cylon FLXeon 9.3.4 - WebSocket Command Spawning
|
This is a hardware exploit for multiple platform. Description: ABB Cylon FLXeon 9.3.4 - WebSocket Command Spawning. Author: LiquidWorm
|
Analyze the security implications of: ABB Cylon FLXeon 9.3.4 - WebSocket Command Spawning
|
This exploit targets multiple systems. Type: hardware. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Oracle WebLogic Server 10.3 - 'console-help.portal' Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: Oracle WebLogic Server 10.3 - 'console-help.portal' Cross-Site Scripting. Author: Alexandr Polyakov
|
Analyze the security implications of: Oracle WebLogic Server 10.3 - 'console-help.portal' Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Elite Graphix ElitCMS 1.01 / PRO - Multiple Web Vulnerabilities
|
This is a webapps exploit for multiple platform. Description: Elite Graphix ElitCMS 1.01 / PRO - Multiple Web Vulnerabilities. Author: Vulnerability-Lab
|
Analyze the security implications of: Elite Graphix ElitCMS 1.01 / PRO - Multiple Web Vulnerabilities
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component Juicy Gallery - 'picId' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Juicy Gallery - 'picId' SQL Injection. Author: SOLVER
|
Analyze the security implications of: Joomla! Component Juicy Gallery - 'picId' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: chatNow - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: chatNow - Multiple Vulnerabilities. Author: HaHwul
|
Analyze the security implications of: chatNow - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.