input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Hosting Controller 6.1 - 'plandetails.asp' Information Disclosure
|
This is a webapps exploit for asp platform. Description: Hosting Controller 6.1 - 'plandetails.asp' Information Disclosure. Author: GrayHatz Security Group
|
Analyze the security implications of: Hosting Controller 6.1 - 'plandetails.asp' Information Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Component com_about - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_about - SQL Injection. Author: snakespc
|
Analyze the security implications of: Joomla! Component com_about - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FCKEditor 2.0 < 2.2 - 'FileManager connector.php' Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: FCKEditor 2.0 < 2.2 - 'FileManager connector.php' Arbitrary File Upload. Author: rgod
|
Analyze the security implications of: FCKEditor 2.0 < 2.2 - 'FileManager connector.php' Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: JAVA Web Start - Arbitrary Command-Line Injection
|
This is a remote exploit for multiple platform. Description: JAVA Web Start - Arbitrary Command-Line Injection. Author: Ruben Santamarta
|
Analyze the security implications of: JAVA Web Start - Arbitrary Command-Line Injection
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Glype 1.4.9 - Cookie Injection Directory Traversal Local File Inclusion
|
This is a webapps exploit for php platform. Description: Glype 1.4.9 - Cookie Injection Directory Traversal Local File Inclusion. Author: Securify
|
Analyze the security implications of: Glype 1.4.9 - Cookie Injection Directory Traversal Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Posnic Stock Management System - SQL Injection
|
This is a remote exploit for php platform. Description: Posnic Stock Management System - SQL Injection. Author: Manish Tanwar
|
Analyze the security implications of: Posnic Stock Management System - SQL Injection
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Berlios GPSD - Format String (Metasploit)
|
This is a remote exploit for linux platform. Description: Berlios GPSD - Format String (Metasploit). Author: Metasploit
|
Analyze the security implications of: Berlios GPSD - Format String (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Omer Portal 3.220060425 - 'arama_islem.asp' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: Omer Portal 3.220060425 - 'arama_islem.asp' Cross-Site Scripting. Author: kurdish hackers team
|
Analyze the security implications of: Omer Portal 3.220060425 - 'arama_islem.asp' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: MediaWiki - 'Thumb.php' Remote Command Execution (Metasploit)
|
This is a remote exploit for multiple platform. Description: MediaWiki - 'Thumb.php' Remote Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: MediaWiki - 'Thumb.php' Remote Command Execution (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: GNU Wget < 1.18 - Access List Bypass / Race Condition
|
This is a remote exploit for multiple platform. Description: GNU Wget < 1.18 - Access List Bypass / Race Condition. Author: Dawid Golunski
|
Analyze the security implications of: GNU Wget < 1.18 - Access List Bypass / Race Condition
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: e107 Plugin BLOG Engine 2.2 - 'uid' Blind SQL Injection
|
This is a webapps exploit for php platform. Description: e107 Plugin BLOG Engine 2.2 - 'uid' Blind SQL Injection. Author: Virangar Security
|
Analyze the security implications of: e107 Plugin BLOG Engine 2.2 - 'uid' Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LFCMS 3.7.0 - Cross-Site Request Forgery (Add User)
|
This is a webapps exploit for php platform. Description: LFCMS 3.7.0 - Cross-Site Request Forgery (Add User). Author: bay0net
|
Analyze the security implications of: LFCMS 3.7.0 - Cross-Site Request Forgery (Add User)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Battle.net Clan Script 1.5.x - 'index.php' Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Battle.net Clan Script 1.5.x - 'index.php' Multiple SQL Injections. Author: Khashayar Fereidani
|
Analyze the security implications of: Battle.net Clan Script 1.5.x - 'index.php' Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Istant-Replay - 'read.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Istant-Replay - 'read.php' Remote File Inclusion. Author: THuGM4N
|
Analyze the security implications of: Istant-Replay - 'read.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IBM AIX 4.x - 'enq' Local Buffer Overflow
|
This is a local exploit for aix platform. Description: IBM AIX 4.x - 'enq' Local Buffer Overflow. Author: watercloud
|
Analyze the security implications of: IBM AIX 4.x - 'enq' Local Buffer Overflow
|
This exploit targets aix systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aix platform
|
What is this exploit about: SureCom EP-9510AX/EP-4504AX Network Device - Malformed Web Authorisation Request Denial of Service (1)
|
This is a dos exploit for hardware platform. Description: SureCom EP-9510AX/EP-4504AX Network Device - Malformed Web Authorisation Request Denial of Service (1). Author: Vasco Costa
|
Analyze the security implications of: SureCom EP-9510AX/EP-4504AX Network Device - Malformed Web Authorisation Request Denial of Service (1)
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: EasyPHP Webserver 14.1 - Multiple Vulnerabilities (RCE and Path Traversal)
|
This is a webapps exploit for php platform. Description: EasyPHP Webserver 14.1 - Multiple Vulnerabilities (RCE and Path Traversal). Author: Rafael Pedrero
|
Analyze the security implications of: EasyPHP Webserver 14.1 - Multiple Vulnerabilities (RCE and Path Traversal)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Google Chrome - Renderer Process to Browser Process Privilege Escalation
|
This is a dos exploit for multiple platform. Description: Google Chrome - Renderer Process to Browser Process Privilege Escalation. Author: Google Security Research
|
Analyze the security implications of: Google Chrome - Renderer Process to Browser Process Privilege Escalation
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: chCounter 3.1.3 - Authentication Bypass
|
This is a webapps exploit for php platform. Description: chCounter 3.1.3 - Authentication Bypass. Author: tmh
|
Analyze the security implications of: chCounter 3.1.3 - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: JForum 2.1.8 - 'bookmarks' Module Multiple HTML Injection Vulnerabilities
|
This is a webapps exploit for jsp platform. Description: JForum 2.1.8 - 'bookmarks' Module Multiple HTML Injection Vulnerabilities. Author: Adam Baldwin
|
Analyze the security implications of: JForum 2.1.8 - 'bookmarks' Module Multiple HTML Injection Vulnerabilities
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: couponPHP CMS 1.0 - Multiple Persistent Cross-Site Scripting / SQL Injections
|
This is a webapps exploit for php platform. Description: couponPHP CMS 1.0 - Multiple Persistent Cross-Site Scripting / SQL Injections. Author: LiquidWorm
|
Analyze the security implications of: couponPHP CMS 1.0 - Multiple Persistent Cross-Site Scripting / SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: RSA IG&L Aveksa 7.1.1 - Remote Code Execution
|
This is a webapps exploit for multiple platform. Description: RSA IG&L Aveksa 7.1.1 - Remote Code Execution. Author: Jakub Palaczynski
|
Analyze the security implications of: RSA IG&L Aveksa 7.1.1 - Remote Code Execution
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component Jobs Factory 2.0.4 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Jobs Factory 2.0.4 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component Jobs Factory 2.0.4 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GForge 3.x - Arbitrary Command Execution
|
This is a webapps exploit for php platform. Description: GForge 3.x - Arbitrary Command Execution. Author: Filippo Spike Morelli
|
Analyze the security implications of: GForge 3.x - Arbitrary Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel < 2.6.16.18 - Netfilter NAT SNMP Module Remote Denial of Service
|
This is a dos exploit for linux platform. Description: Linux Kernel < 2.6.16.18 - Netfilter NAT SNMP Module Remote Denial of Service. Author: ECL Labs
|
Analyze the security implications of: Linux Kernel < 2.6.16.18 - Netfilter NAT SNMP Module Remote Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Archangel Weblog 0.90.02 - Local File Inclusion / Authentication Bypass
|
This is a webapps exploit for php platform. Description: Archangel Weblog 0.90.02 - Local File Inclusion / Authentication Bypass. Author: Dj7xpl
|
Analyze the security implications of: Archangel Weblog 0.90.02 - Local File Inclusion / Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Myportfolio 3.0.2 - 'pid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Myportfolio 3.0.2 - 'pid' SQL Injection. Author: Persian Hack Team
|
Analyze the security implications of: Joomla! Component Myportfolio 3.0.2 - 'pid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component ClickHeat 1.0.1 - Multiple Remote File Inclusions
|
This is a webapps exploit for php platform. Description: Joomla! Component ClickHeat 1.0.1 - Multiple Remote File Inclusions. Author: NoGe
|
Analyze the security implications of: Joomla! Component ClickHeat 1.0.1 - Multiple Remote File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Marked2 - Local File Disclosure
|
This is a local exploit for multiple platform. Description: Marked2 - Local File Disclosure. Author: Corben Leo
|
Analyze the security implications of: Marked2 - Local File Disclosure
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Apple Mac OSX 10.3.x - Help Protocol Remote Code Execution
|
This is a remote exploit for osx platform. Description: Apple Mac OSX 10.3.x - Help Protocol Remote Code Execution. Author: Troels Bay
|
Analyze the security implications of: Apple Mac OSX 10.3.x - Help Protocol Remote Code Execution
|
This exploit targets osx systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: eXV2 Module bamaGalerie 3.03 - SQL Injection
|
This is a webapps exploit for php platform. Description: eXV2 Module bamaGalerie 3.03 - SQL Injection. Author: S@BUN
|
Analyze the security implications of: eXV2 Module bamaGalerie 3.03 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MegaBrowser < 0.71b - Multiple Vulnerabilities
|
This is a webapps exploit for multiple platform. Description: MegaBrowser < 0.71b - Multiple Vulnerabilities. Author: GulfTech Security
|
Analyze the security implications of: MegaBrowser < 0.71b - Multiple Vulnerabilities
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Power Daemon 2.0.2 - 'WHATIDO' Remote Format String
|
This is a remote exploit for linux platform. Description: Power Daemon 2.0.2 - 'WHATIDO' Remote Format String. Author: Gotfault Security
|
Analyze the security implications of: Power Daemon 2.0.2 - 'WHATIDO' Remote Format String
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Linux kernel < 4.10.15 - Race Condition Privilege Escalation
|
This is a local exploit for linux platform. Description: Linux kernel < 4.10.15 - Race Condition Privilege Escalation. Author: anonymous
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.