input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: jPORTAL 2.3.1 - 'Banner.php' SQL Injection | This is a webapps exploit for php platform. Description: jPORTAL 2.3.1 - 'Banner.php' SQL Injection. Author: CiNU5 |
Analyze the security implications of: jPORTAL 2.3.1 - 'Banner.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Beat Websites - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Beat Websites - 'id' SQL Injection. Author: Metropolis |
Analyze the security implications of: Beat Websites - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WU-FTPD 2.4.2 / SCO Open Server 5.0.5 / ProFTPd 1.2 pre1 - 'realpath' Remote Buffer Overflow (2) | This is a remote exploit for linux platform. Description: WU-FTPD 2.4.2 / SCO Open Server 5.0.5 / ProFTPd 1.2 pre1 - 'realpath' Remote Buffer Overflow (2). Author: jamez & c0nd0r |
Analyze the security implications of: WU-FTPD 2.4.2 / SCO Open Server 5.0.5 / ProFTPd 1.2 pre1 - 'realpath' Remote Buffer Overflow (2) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: DigitalHive 2.0 - 'membres.php?mt' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DigitalHive 2.0 - 'membres.php?mt' Cross-Site Scripting. Author: benji lemien |
Analyze the security implications of: DigitalHive 2.0 - 'membres.php?mt' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP-UX 11 CDE DTPrintInfo - Display Environment Variable Buffer Overflow | This is a dos exploit for hp-ux platform. Description: HP-UX 11 CDE DTPrintInfo - Display Environment Variable Buffer Overflow. Author: Davide Del Vecchio |
Analyze the security implications of: HP-UX 11 CDE DTPrintInfo - Display Environment Variable Buffer Overflow | This exploit targets hp-ux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hp-ux platform |
What is this exploit about: Complaints Report Management System 1.0 - 'username' SQL Injection / Remote Code Execution | This is a webapps exploit for php platform. Description: Complaints Report Management System 1.0 - 'username' SQL Injection / Remote Code Execution. Author: Mosaaed |
Analyze the security implications of: Complaints Report Management System 1.0 - 'username' SQL Injection / Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Realtyna RPL 8.9.2 - Persistent Cross-Site Scripting / Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: Joomla! Component Realtyna RPL 8.9.2 - Persistent Cross-Site Scripting / Cross-Site Request Forgery. Author: Bikramaditya Guha |
Analyze the security implications of: Joomla! Component Realtyna RPL 8.9.2 - Persistent Cross-Site Scripting / Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: free QBoard 1.1 - 'delete.php?qb_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: free QBoard 1.1 - 'delete.php?qb_path' Remote File Inclusion. Author: CrAsh_oVeR_rIdE |
Analyze the security implications of: free QBoard 1.1 - 'delete.php?qb_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache Spark - (Unauthenticated) Command Execution (Metasploit) | This is a remote exploit for java platform. Description: Apache Spark - (Unauthenticated) Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Apache Spark - (Unauthenticated) Command Execution (Metasploit) | This exploit targets java systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: D-Link / PLANEX COMMUNICATIONS - 'RuntimeDiagnosticPing()' Remote Stack Buffer Overflow | This is a remote exploit for hardware platform. Description: D-Link / PLANEX COMMUNICATIONS - 'RuntimeDiagnosticPing()' Remote Stack Buffer Overflow. Author: Craig Heffner |
Analyze the security implications of: D-Link / PLANEX COMMUNICATIONS - 'RuntimeDiagnosticPing()' Remote Stack Buffer Overflow | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apple iTunes 8.1.1 - 'ITMS' Multiple Protocol Handler Buffer Overflow (Metasploit) | This is a remote exploit for osx platform. Description: Apple iTunes 8.1.1 - 'ITMS' Multiple Protocol Handler Buffer Overflow (Metasploit). Author: Will Drewry |
Analyze the security implications of: Apple iTunes 8.1.1 - 'ITMS' Multiple Protocol Handler Buffer Overflow (Metasploit) | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Alt-N WebAdmin 2.0.x - Remote File Viewing | This is a remote exploit for cgi platform. Description: Alt-N WebAdmin 2.0.x - Remote File Viewing. Author: david@kamborio.net |
Analyze the security implications of: Alt-N WebAdmin 2.0.x - Remote File Viewing | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: PHP 5.0.0 - 'html_doc_file()' Local Denial of Service | This is a dos exploit for php platform. Description: PHP 5.0.0 - 'html_doc_file()' Local Denial of Service. Author: Yakir Wizman |
Analyze the security implications of: PHP 5.0.0 - 'html_doc_file()' Local Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ashwebstudio Ashnews 0.83 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Ashwebstudio Ashnews 0.83 - Cross-Site Scripting. Author: 0o_zeus_o0 |
Analyze the security implications of: Ashwebstudio Ashnews 0.83 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Redir 3.3 - Denial of Service (PoC) | This is a dos exploit for linux platform. Description: Redir 3.3 - Denial of Service (PoC). Author: hieubl |
Analyze the security implications of: Redir 3.3 - Denial of Service (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Lutron Quantum 2.0 - 3.2.243 - Information Disclosure | This is a webapps exploit for hardware platform. Description: Lutron Quantum 2.0 - 3.2.243 - Information Disclosure. Author: SadFud |
Analyze the security implications of: Lutron Quantum 2.0 - 3.2.243 - Information Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: WMAPM 3.1 - Local Privilege Escalation | This is a local exploit for linux platform. Description: WMAPM 3.1 - Local Privilege Escalation. Author: Knud Erik Hojgaard |
Analyze the security implications of: WMAPM 3.1 - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Verity K2 Toolkit 2.20 Query Builder Search Script - Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: Verity K2 Toolkit 2.20 Query Builder Search Script - Cross-Site Scripting. Author: SSR Team |
Analyze the security implications of: Verity K2 Toolkit 2.20 Query Builder Search Script - Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Balitbang CMS 3.3 - 'alumni.php?hal' SQL Injection | This is a webapps exploit for php platform. Description: Balitbang CMS 3.3 - 'alumni.php?hal' SQL Injection. Author: X-Cisadane |
Analyze the security implications of: Balitbang CMS 3.3 - 'alumni.php?hal' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Curfew e-Pass Management System 1.0 - Stored XSS | This is a webapps exploit for php platform. Description: Curfew e-Pass Management System 1.0 - Stored XSS. Author: Arnav Tripathy |
Analyze the security implications of: Curfew e-Pass Management System 1.0 - Stored XSS | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Morris Worm - fingerd Stack Buffer Overflow (Metasploit) | This is a remote exploit for bsd platform. Description: Morris Worm - fingerd Stack Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: Morris Worm - fingerd Stack Buffer Overflow (Metasploit) | This exploit targets bsd systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Joomla! Component memorybook 1.2 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Joomla! Component memorybook 1.2 - Multiple Vulnerabilities. Author: jdc |
Analyze the security implications of: Joomla! Component memorybook 1.2 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Drupal 7.0 < 7.31 - 'Drupalgeddon' SQL Injection (PoC) (Reset Password) (2) | This is a webapps exploit for php platform. Description: Drupal 7.0 < 7.31 - 'Drupalgeddon' SQL Injection (PoC) (Reset Password) (2). Author: Dustin Dörr |
Analyze the security implications of: Drupal 7.0 < 7.31 - 'Drupalgeddon' SQL Injection (PoC) (Reset Password) (2) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 5.2.1 'GD' Extension - '.WBMP' File Integer Overflow | This is a dos exploit for php platform. Description: PHP 5.2.1 'GD' Extension - '.WBMP' File Integer Overflow. Author: Ivan Fratric |
Analyze the security implications of: PHP 5.2.1 'GD' Extension - '.WBMP' File Integer Overflow | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GoAhead Web Server 2.5 < 3.6.5 - HTTPd 'LD_PRELOAD' Arbitrary Module Load (Metasploit) | This is a remote exploit for multiple platform. Description: GoAhead Web Server 2.5 < 3.6.5 - HTTPd 'LD_PRELOAD' Arbitrary Module Load (Metasploit). Author: Metasploit |
Analyze the security implications of: GoAhead Web Server 2.5 < 3.6.5 - HTTPd 'LD_PRELOAD' Arbitrary Module Load (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Artmedic CMS 3.4 - 'index.php' Local File Inclusion | This is a webapps exploit for php platform. Description: Artmedic CMS 3.4 - 'index.php' Local File Inclusion. Author: iNs |
Analyze the security implications of: Artmedic CMS 3.4 - 'index.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HotNews 0.x - 'hotnews-engine.inc.php3?config[header]' Remote File Inclusion | This is a webapps exploit for php platform. Description: HotNews 0.x - 'hotnews-engine.inc.php3?config[header]' Remote File Inclusion. Author: Officerrr |
Analyze the security implications of: HotNews 0.x - 'hotnews-engine.inc.php3?config[header]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DenyAll WAF < 6.3.0 - Remote Code Execution (Metasploit) | This is a webapps exploit for linux platform. Description: DenyAll WAF < 6.3.0 - Remote Code Execution (Metasploit). Author: Mehmet Ince |
Analyze the security implications of: DenyAll WAF < 6.3.0 - Remote Code Execution (Metasploit) | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Gitlist 0.4.0 - Remote Code Execution | This is a remote exploit for multiple platform. Description: Gitlist 0.4.0 - Remote Code Execution. Author: drone |
Analyze the security implications of: Gitlist 0.4.0 - Remote Code Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: JPortal Web Portal 2.2.1/2.3.1 - 'comment.php' SQL Injection | This is a webapps exploit for php platform. Description: JPortal Web Portal 2.2.1/2.3.1 - 'comment.php' SQL Injection. Author: Mousehack |
Analyze the security implications of: JPortal Web Portal 2.2.1/2.3.1 - 'comment.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CSV Import & Export 1.1.0 - SQL Injection / Cross-Site Scripting | This is a webapps exploit for php platform. Description: CSV Import & Export 1.1.0 - SQL Injection / Cross-Site Scripting. Author: Kağan Çapar |
Analyze the security implications of: CSV Import & Export 1.1.0 - SQL Injection / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EasyPHP Devserver 16.1.1 - Cross-Site Request Forgery / Remote Command Execution | This is a webapps exploit for php platform. Description: EasyPHP Devserver 16.1.1 - Cross-Site Request Forgery / Remote Command Execution. Author: hyp3rlinx |
Analyze the security implications of: EasyPHP Devserver 16.1.1 - Cross-Site Request Forgery / Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Multiple Media Players ((iTunes / QuickTime) - HTTP DataHandler Overflow | This is a dos exploit for multiple platform. Description: Multiple Media Players ((iTunes / QuickTime) - HTTP DataHandler Overflow. Author: Dr_IDE |
Analyze the security implications of: Multiple Media Players ((iTunes / QuickTime) - HTTP DataHandler Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.