input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Exim 3.x - Format String
|
This is a local exploit for linux platform. Description: Exim 3.x - Format String. Author: Megyer Laszlo
|
Analyze the security implications of: Exim 3.x - Format String
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: APHP ImgList 1.2.2 - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: APHP ImgList 1.2.2 - Cross-Site Scripting. Author: indoushka
|
Analyze the security implications of: APHP ImgList 1.2.2 - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: glFTPd (Slackware 9.0/9.1/10.0) - Local Stack Overflow
|
This is a local exploit for linux platform. Description: glFTPd (Slackware 9.0/9.1/10.0) - Local Stack Overflow. Author: CoKi
|
Analyze the security implications of: glFTPd (Slackware 9.0/9.1/10.0) - Local Stack Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Adtran Personal Phone Manager 10.8.1 - 'emailAddress' Stored Cross-Site Scripting (XSS)
|
This is a webapps exploit for hardware platform. Description: Adtran Personal Phone Manager 10.8.1 - 'emailAddress' Stored Cross-Site Scripting (XSS). Author: 3ndG4me
|
Analyze the security implications of: Adtran Personal Phone Manager 10.8.1 - 'emailAddress' Stored Cross-Site Scripting (XSS)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: WhatsApp 2.17.52 - Memory Corruption
|
This is a dos exploit for ios platform. Description: WhatsApp 2.17.52 - Memory Corruption. Author: Juan Sacco
|
Analyze the security implications of: WhatsApp 2.17.52 - Memory Corruption
|
This exploit targets ios systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: JiRos Link Manager 1.0 - 'openlink.asp?LinkID' SQL Injection
|
This is a webapps exploit for asp platform. Description: JiRos Link Manager 1.0 - 'openlink.asp?LinkID' SQL Injection. Author: laurent gaffie
|
Analyze the security implications of: JiRos Link Manager 1.0 - 'openlink.asp?LinkID' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: ContaoCMS (aka TYPOlight) 2.11 - Cross-Site Request Forgery (Delete Admin / Delete Article)
|
This is a webapps exploit for php platform. Description: ContaoCMS (aka TYPOlight) 2.11 - Cross-Site Request Forgery (Delete Admin / Delete Article). Author: Ivano Binetti
|
Analyze the security implications of: ContaoCMS (aka TYPOlight) 2.11 - Cross-Site Request Forgery (Delete Admin / Delete Article)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Netgear ReadyNAS Surveillance 1.4.3-16 - Remote Command Execution
|
This is a webapps exploit for hardware platform. Description: Netgear ReadyNAS Surveillance 1.4.3-16 - Remote Command Execution. Author: Kacper Szurek
|
Analyze the security implications of: Netgear ReadyNAS Surveillance 1.4.3-16 - Remote Command Execution
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Schmid Watson Management Console - Directory Traversal
|
This is a remote exploit for linux platform. Description: Schmid Watson Management Console - Directory Traversal. Author: Dhruv Shah
|
Analyze the security implications of: Schmid Watson Management Console - Directory Traversal
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Xine-Lib 1.1.12 - NSF demuxer Stack Overflow (PoC)
|
This is a dos exploit for linux platform. Description: Xine-Lib 1.1.12 - NSF demuxer Stack Overflow (PoC). Author: Guido Landi
|
Analyze the security implications of: Xine-Lib 1.1.12 - NSF demuxer Stack Overflow (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: BBS E-Market - 'postscript.php?p_mode' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: BBS E-Market - 'postscript.php?p_mode' Remote File Inclusion. Author: mozi
|
Analyze the security implications of: BBS E-Market - 'postscript.php?p_mode' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component EkRishta 2.10 - 'username' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component EkRishta 2.10 - 'username' SQL Injection. Author: L0RD
|
Analyze the security implications of: Joomla! Component EkRishta 2.10 - 'username' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Affiliate Me Version 5.0.1 - SQL Injection
|
This is a webapps exploit for php platform. Description: Affiliate Me Version 5.0.1 - SQL Injection. Author: h4ck3r
|
Analyze the security implications of: Affiliate Me Version 5.0.1 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HP-UX 11.0 - net.init RC Script
|
This is a local exploit for hp-ux platform. Description: HP-UX 11.0 - net.init RC Script. Author: Kyong-won Cho
|
Analyze the security implications of: HP-UX 11.0 - net.init RC Script
|
This exploit targets hp-ux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hp-ux platform
|
What is this exploit about: Daily Expense Manager 1.0 - Cross-Site Request Forgery (Delete Income)
|
This is a webapps exploit for php platform. Description: Daily Expense Manager 1.0 - Cross-Site Request Forgery (Delete Income). Author: Mr Winst0n
|
Analyze the security implications of: Daily Expense Manager 1.0 - Cross-Site Request Forgery (Delete Income)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: UFO: Alien Invasion 2.2.1 (OSX) - Remote Code Execution
|
This is a remote exploit for osx platform. Description: UFO: Alien Invasion 2.2.1 (OSX) - Remote Code Execution. Author: dookie
|
Analyze the security implications of: UFO: Alien Invasion 2.2.1 (OSX) - Remote Code Execution
|
This exploit targets osx systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Flippa Website Script - SQL Injection
|
This is a webapps exploit for php platform. Description: Flippa Website Script - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Flippa Website Script - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: OpenEMR 5.0.1.3 - (Authenticated) Arbitrary File Actions
|
This is a webapps exploit for linux platform. Description: OpenEMR 5.0.1.3 - (Authenticated) Arbitrary File Actions. Author: Joshua Fam
|
Analyze the security implications of: OpenEMR 5.0.1.3 - (Authenticated) Arbitrary File Actions
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: 2DayBiz Business Community Script - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: 2DayBiz Business Community Script - Multiple Vulnerabilities. Author: TiGeR-Dz
|
Analyze the security implications of: 2DayBiz Business Community Script - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DotNetNuke 4.9.3 - 'ErrorPage.aspx' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: DotNetNuke 4.9.3 - 'ErrorPage.aspx' Cross-Site Scripting. Author: ben hawkes
|
Analyze the security implications of: DotNetNuke 4.9.3 - 'ErrorPage.aspx' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: PaperCut NG/MG 22.0.4 - Authentication Bypass
|
This is a webapps exploit for multiple platform. Description: PaperCut NG/MG 22.0.4 - Authentication Bypass. Author: MaanVader
|
Analyze the security implications of: PaperCut NG/MG 22.0.4 - Authentication Bypass
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component module autostand 1.0 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component module autostand 1.0 - Remote File Inclusion. Author: Cold Zero
|
Analyze the security implications of: Joomla! Component module autostand 1.0 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_xvs - 'Controller' Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component com_xvs - 'Controller' Local File Inclusion. Author: KedAns-Dz
|
Analyze the security implications of: Joomla! Component com_xvs - 'Controller' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Bloq 0.5.4 - 'rdf.php?page[path]' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Bloq 0.5.4 - 'rdf.php?page[path]' Remote File Inclusion. Author: KorsaN
|
Analyze the security implications of: Bloq 0.5.4 - 'rdf.php?page[path]' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PHP 5.2.5 - Multiple GetText functions Denial of Service Vulnerabilities
|
This is a dos exploit for php platform. Description: PHP 5.2.5 - Multiple GetText functions Denial of Service Vulnerabilities. Author: laurent gaffie
|
Analyze the security implications of: PHP 5.2.5 - Multiple GetText functions Denial of Service Vulnerabilities
|
This exploit targets php systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Zoho ManageEngine ServiceDesk Plus (SDP) < 10.0 build 10012 - Arbitrary File Upload
|
This is a webapps exploit for jsp platform. Description: Zoho ManageEngine ServiceDesk Plus (SDP) < 10.0 build 10012 - Arbitrary File Upload. Author: Dao Duy Hung
|
Analyze the security implications of: Zoho ManageEngine ServiceDesk Plus (SDP) < 10.0 build 10012 - Arbitrary File Upload
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Perl Data::FormValidator 4.66 Module - 'results()' Security Bypass
|
This is a remote exploit for linux platform. Description: Perl Data::FormValidator 4.66 Module - 'results()' Security Bypass. Author: dst
|
Analyze the security implications of: Perl Data::FormValidator 4.66 Module - 'results()' Security Bypass
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: SmarterTools SmarterStats 5.3.3819 - 'frmHelp.aspx' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: SmarterTools SmarterStats 5.3.3819 - 'frmHelp.aspx' Cross-Site Scripting. Author: David Hoyt
|
Analyze the security implications of: SmarterTools SmarterStats 5.3.3819 - 'frmHelp.aspx' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: APSIS Pound 1.5 - Remote Format String
|
This is a remote exploit for linux platform. Description: APSIS Pound 1.5 - Remote Format String. Author: Nilanjan De
|
Analyze the security implications of: APSIS Pound 1.5 - Remote Format String
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Linux Kernel - 'The Huge Dirty Cow' Overwriting The Huge Zero Page (1)
|
This is a dos exploit for linux platform. Description: Linux Kernel - 'The Huge Dirty Cow' Overwriting The Huge Zero Page (1). Author: Bindecy
|
Analyze the security implications of: Linux Kernel - 'The Huge Dirty Cow' Overwriting The Huge Zero Page (1)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Dixell XWEB 500 - Arbitrary File Write
|
This is a remote exploit for hardware platform. Description: Dixell XWEB 500 - Arbitrary File Write. Author: Roberto Palamaro
|
Analyze the security implications of: Dixell XWEB 500 - Arbitrary File Write
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Cacti v1.2.8 - Unauthenticated Remote Code Execution (Metasploit)
|
This is a webapps exploit for php platform. Description: Cacti v1.2.8 - Unauthenticated Remote Code Execution (Metasploit). Author: Lucas Amorim
|
Analyze the security implications of: Cacti v1.2.8 - Unauthenticated Remote Code Execution (Metasploit)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Hyperic HQ Enterprise 4.5.1 - Cross-Site Scripting / Multiple Security Vulnerabilities
|
This is a webapps exploit for jsp platform. Description: Hyperic HQ Enterprise 4.5.1 - Cross-Site Scripting / Multiple Security Vulnerabilities. Author: Benjamin Kunz Mejri
|
Analyze the security implications of: Hyperic HQ Enterprise 4.5.1 - Cross-Site Scripting / Multiple Security Vulnerabilities
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Clickcess ChitChat.NET - topic title Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: Clickcess ChitChat.NET - topic title Cross-Site Scripting. Author: G00db0y
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.