input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Exim 3.x - Format String | This is a local exploit for linux platform. Description: Exim 3.x - Format String. Author: Megyer Laszlo |
Analyze the security implications of: Exim 3.x - Format String | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: APHP ImgList 1.2.2 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: APHP ImgList 1.2.2 - Cross-Site Scripting. Author: indoushka |
Analyze the security implications of: APHP ImgList 1.2.2 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: glFTPd (Slackware 9.0/9.1/10.0) - Local Stack Overflow | This is a local exploit for linux platform. Description: glFTPd (Slackware 9.0/9.1/10.0) - Local Stack Overflow. Author: CoKi |
Analyze the security implications of: glFTPd (Slackware 9.0/9.1/10.0) - Local Stack Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Adtran Personal Phone Manager 10.8.1 - 'emailAddress' Stored Cross-Site Scripting (XSS) | This is a webapps exploit for hardware platform. Description: Adtran Personal Phone Manager 10.8.1 - 'emailAddress' Stored Cross-Site Scripting (XSS). Author: 3ndG4me |
Analyze the security implications of: Adtran Personal Phone Manager 10.8.1 - 'emailAddress' Stored Cross-Site Scripting (XSS) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: WhatsApp 2.17.52 - Memory Corruption | This is a dos exploit for ios platform. Description: WhatsApp 2.17.52 - Memory Corruption. Author: Juan Sacco |
Analyze the security implications of: WhatsApp 2.17.52 - Memory Corruption | This exploit targets ios systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: JiRos Link Manager 1.0 - 'openlink.asp?LinkID' SQL Injection | This is a webapps exploit for asp platform. Description: JiRos Link Manager 1.0 - 'openlink.asp?LinkID' SQL Injection. Author: laurent gaffie |
Analyze the security implications of: JiRos Link Manager 1.0 - 'openlink.asp?LinkID' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ContaoCMS (aka TYPOlight) 2.11 - Cross-Site Request Forgery (Delete Admin / Delete Article) | This is a webapps exploit for php platform. Description: ContaoCMS (aka TYPOlight) 2.11 - Cross-Site Request Forgery (Delete Admin / Delete Article). Author: Ivano Binetti |
Analyze the security implications of: ContaoCMS (aka TYPOlight) 2.11 - Cross-Site Request Forgery (Delete Admin / Delete Article) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Netgear ReadyNAS Surveillance 1.4.3-16 - Remote Command Execution | This is a webapps exploit for hardware platform. Description: Netgear ReadyNAS Surveillance 1.4.3-16 - Remote Command Execution. Author: Kacper Szurek |
Analyze the security implications of: Netgear ReadyNAS Surveillance 1.4.3-16 - Remote Command Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Schmid Watson Management Console - Directory Traversal | This is a remote exploit for linux platform. Description: Schmid Watson Management Console - Directory Traversal. Author: Dhruv Shah |
Analyze the security implications of: Schmid Watson Management Console - Directory Traversal | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Xine-Lib 1.1.12 - NSF demuxer Stack Overflow (PoC) | This is a dos exploit for linux platform. Description: Xine-Lib 1.1.12 - NSF demuxer Stack Overflow (PoC). Author: Guido Landi |
Analyze the security implications of: Xine-Lib 1.1.12 - NSF demuxer Stack Overflow (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: BBS E-Market - 'postscript.php?p_mode' Remote File Inclusion | This is a webapps exploit for php platform. Description: BBS E-Market - 'postscript.php?p_mode' Remote File Inclusion. Author: mozi |
Analyze the security implications of: BBS E-Market - 'postscript.php?p_mode' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component EkRishta 2.10 - 'username' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component EkRishta 2.10 - 'username' SQL Injection. Author: L0RD |
Analyze the security implications of: Joomla! Component EkRishta 2.10 - 'username' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Affiliate Me Version 5.0.1 - SQL Injection | This is a webapps exploit for php platform. Description: Affiliate Me Version 5.0.1 - SQL Injection. Author: h4ck3r |
Analyze the security implications of: Affiliate Me Version 5.0.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP-UX 11.0 - net.init RC Script | This is a local exploit for hp-ux platform. Description: HP-UX 11.0 - net.init RC Script. Author: Kyong-won Cho |
Analyze the security implications of: HP-UX 11.0 - net.init RC Script | This exploit targets hp-ux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hp-ux platform |
What is this exploit about: Daily Expense Manager 1.0 - Cross-Site Request Forgery (Delete Income) | This is a webapps exploit for php platform. Description: Daily Expense Manager 1.0 - Cross-Site Request Forgery (Delete Income). Author: Mr Winst0n |
Analyze the security implications of: Daily Expense Manager 1.0 - Cross-Site Request Forgery (Delete Income) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: UFO: Alien Invasion 2.2.1 (OSX) - Remote Code Execution | This is a remote exploit for osx platform. Description: UFO: Alien Invasion 2.2.1 (OSX) - Remote Code Execution. Author: dookie |
Analyze the security implications of: UFO: Alien Invasion 2.2.1 (OSX) - Remote Code Execution | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Flippa Website Script - SQL Injection | This is a webapps exploit for php platform. Description: Flippa Website Script - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Flippa Website Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenEMR 5.0.1.3 - (Authenticated) Arbitrary File Actions | This is a webapps exploit for linux platform. Description: OpenEMR 5.0.1.3 - (Authenticated) Arbitrary File Actions. Author: Joshua Fam |
Analyze the security implications of: OpenEMR 5.0.1.3 - (Authenticated) Arbitrary File Actions | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: 2DayBiz Business Community Script - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: 2DayBiz Business Community Script - Multiple Vulnerabilities. Author: TiGeR-Dz |
Analyze the security implications of: 2DayBiz Business Community Script - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DotNetNuke 4.9.3 - 'ErrorPage.aspx' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: DotNetNuke 4.9.3 - 'ErrorPage.aspx' Cross-Site Scripting. Author: ben hawkes |
Analyze the security implications of: DotNetNuke 4.9.3 - 'ErrorPage.aspx' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: PaperCut NG/MG 22.0.4 - Authentication Bypass | This is a webapps exploit for multiple platform. Description: PaperCut NG/MG 22.0.4 - Authentication Bypass. Author: MaanVader |
Analyze the security implications of: PaperCut NG/MG 22.0.4 - Authentication Bypass | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component module autostand 1.0 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component module autostand 1.0 - Remote File Inclusion. Author: Cold Zero |
Analyze the security implications of: Joomla! Component module autostand 1.0 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_xvs - 'Controller' Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_xvs - 'Controller' Local File Inclusion. Author: KedAns-Dz |
Analyze the security implications of: Joomla! Component com_xvs - 'Controller' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bloq 0.5.4 - 'rdf.php?page[path]' Remote File Inclusion | This is a webapps exploit for php platform. Description: Bloq 0.5.4 - 'rdf.php?page[path]' Remote File Inclusion. Author: KorsaN |
Analyze the security implications of: Bloq 0.5.4 - 'rdf.php?page[path]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 5.2.5 - Multiple GetText functions Denial of Service Vulnerabilities | This is a dos exploit for php platform. Description: PHP 5.2.5 - Multiple GetText functions Denial of Service Vulnerabilities. Author: laurent gaffie |
Analyze the security implications of: PHP 5.2.5 - Multiple GetText functions Denial of Service Vulnerabilities | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Zoho ManageEngine ServiceDesk Plus (SDP) < 10.0 build 10012 - Arbitrary File Upload | This is a webapps exploit for jsp platform. Description: Zoho ManageEngine ServiceDesk Plus (SDP) < 10.0 build 10012 - Arbitrary File Upload. Author: Dao Duy Hung |
Analyze the security implications of: Zoho ManageEngine ServiceDesk Plus (SDP) < 10.0 build 10012 - Arbitrary File Upload | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Perl Data::FormValidator 4.66 Module - 'results()' Security Bypass | This is a remote exploit for linux platform. Description: Perl Data::FormValidator 4.66 Module - 'results()' Security Bypass. Author: dst |
Analyze the security implications of: Perl Data::FormValidator 4.66 Module - 'results()' Security Bypass | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: SmarterTools SmarterStats 5.3.3819 - 'frmHelp.aspx' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: SmarterTools SmarterStats 5.3.3819 - 'frmHelp.aspx' Cross-Site Scripting. Author: David Hoyt |
Analyze the security implications of: SmarterTools SmarterStats 5.3.3819 - 'frmHelp.aspx' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: APSIS Pound 1.5 - Remote Format String | This is a remote exploit for linux platform. Description: APSIS Pound 1.5 - Remote Format String. Author: Nilanjan De |
Analyze the security implications of: APSIS Pound 1.5 - Remote Format String | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Linux Kernel - 'The Huge Dirty Cow' Overwriting The Huge Zero Page (1) | This is a dos exploit for linux platform. Description: Linux Kernel - 'The Huge Dirty Cow' Overwriting The Huge Zero Page (1). Author: Bindecy |
Analyze the security implications of: Linux Kernel - 'The Huge Dirty Cow' Overwriting The Huge Zero Page (1) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Dixell XWEB 500 - Arbitrary File Write | This is a remote exploit for hardware platform. Description: Dixell XWEB 500 - Arbitrary File Write. Author: Roberto Palamaro |
Analyze the security implications of: Dixell XWEB 500 - Arbitrary File Write | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Cacti v1.2.8 - Unauthenticated Remote Code Execution (Metasploit) | This is a webapps exploit for php platform. Description: Cacti v1.2.8 - Unauthenticated Remote Code Execution (Metasploit). Author: Lucas Amorim |
Analyze the security implications of: Cacti v1.2.8 - Unauthenticated Remote Code Execution (Metasploit) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Hyperic HQ Enterprise 4.5.1 - Cross-Site Scripting / Multiple Security Vulnerabilities | This is a webapps exploit for jsp platform. Description: Hyperic HQ Enterprise 4.5.1 - Cross-Site Scripting / Multiple Security Vulnerabilities. Author: Benjamin Kunz Mejri |
Analyze the security implications of: Hyperic HQ Enterprise 4.5.1 - Cross-Site Scripting / Multiple Security Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Clickcess ChitChat.NET - topic title Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Clickcess ChitChat.NET - topic title Cross-Site Scripting. Author: G00db0y |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.