input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Rit Research Labs TinyWeb 1.9.2 - Unauthorized Script Disclosure | This is a webapps exploit for cgi platform. Description: Rit Research Labs TinyWeb 1.9.2 - Unauthorized Script Disclosure. Author: Ziv Kamir |
Analyze the security implications of: Rit Research Labs TinyWeb 1.9.2 - Unauthorized Script Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Bloq 0.5.4 - 'rss2.php?page[path]' Remote File Inclusion | This is a webapps exploit for php platform. Description: Bloq 0.5.4 - 'rss2.php?page[path]' Remote File Inclusion. Author: KorsaN |
Analyze the security implications of: Bloq 0.5.4 - 'rss2.php?page[path]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Novell Netware Web Server 3.x - files.pl | This is a remote exploit for novell platform. Description: Novell Netware Web Server 3.x - files.pl. Author: anonymous |
Analyze the security implications of: Novell Netware Web Server 3.x - files.pl | This exploit targets novell systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets novell platform |
What is this exploit about: FreeBSD 2.2-4.2 / NetBSD 1.2-4.5 / OpenBSD 2.x - FTPd 'glob()' Remote Buffer Overflow | This is a remote exploit for bsd platform. Description: FreeBSD 2.2-4.2 / NetBSD 1.2-4.5 / OpenBSD 2.x - FTPd 'glob()' Remote Buffer Overflow. Author: fish stiqz |
Analyze the security implications of: FreeBSD 2.2-4.2 / NetBSD 1.2-4.5 / OpenBSD 2.x - FTPd 'glob()' Remote Buffer Overflow | This exploit targets bsd systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: 35mm Slide Gallery - Cross-Site Scripting | This is a webapps exploit for php platform. Description: 35mm Slide Gallery - Cross-Site Scripting. Author: indoushka |
Analyze the security implications of: 35mm Slide Gallery - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: usb-creator 0.2.x (Ubuntu 12.04/14.04/14.10) - Local Privilege Escalation | This is a local exploit for linux platform. Description: usb-creator 0.2.x (Ubuntu 12.04/14.04/14.10) - Local Privilege Escalation. Author: Tavis Ormandy |
Analyze the security implications of: usb-creator 0.2.x (Ubuntu 12.04/14.04/14.10) - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Groupon Clone Script 3.01 - 'catid' SQL Injection | This is a webapps exploit for php platform. Description: Groupon Clone Script 3.01 - 'catid' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Groupon Clone Script 3.01 - 'catid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IrayoBlog 0.2.4 - '/inc/irayofuncs.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: IrayoBlog 0.2.4 - '/inc/irayofuncs.php' Remote File Inclusion. Author: DeltahackingTEAM |
Analyze the security implications of: IrayoBlog 0.2.4 - '/inc/irayofuncs.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component XOBBIX 1.0 - 'prodid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component XOBBIX 1.0 - 'prodid' SQL Injection. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component XOBBIX 1.0 - 'prodid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Pulse Infotech Flip Wall - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Pulse Infotech Flip Wall - SQL Injection. Author: FL0RiX |
Analyze the security implications of: Joomla! Component Pulse Infotech Flip Wall - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Foreman Smart-Proxy - Remote Command Injection | This is a remote exploit for multiple platform. Description: Foreman Smart-Proxy - Remote Command Injection. Author: Lukas Zapletal |
Analyze the security implications of: Foreman Smart-Proxy - Remote Command Injection | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Elite CMS 1.01 - Multiple Cross-Site Scripting / Cross-Site Request Forgery Vulnerabilities | This is a webapps exploit for php platform. Description: Elite CMS 1.01 - Multiple Cross-Site Scripting / Cross-Site Request Forgery Vulnerabilities. Author: 10n1z3d |
Analyze the security implications of: Elite CMS 1.01 - Multiple Cross-Site Scripting / Cross-Site Request Forgery Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JEmbedAll 1.4 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JEmbedAll 1.4 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component JEmbedAll 1.4 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eCreo - SQL Injection | This is a webapps exploit for php platform. Description: eCreo - SQL Injection. Author: cyberlog |
Analyze the security implications of: eCreo - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Personal Web Sharing 1.1/1.5/1.5.5 - Remote Denial of Service | This is a dos exploit for osx platform. Description: Apple Personal Web Sharing 1.1/1.5/1.5.5 - Remote Denial of Service. Author: Jass Seljamaa |
Analyze the security implications of: Apple Personal Web Sharing 1.1/1.5/1.5.5 - Remote Denial of Service | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: SCPOnly 2.x/3.x - Arbitrary Command Execution | This is a remote exploit for linux platform. Description: SCPOnly 2.x/3.x - Arbitrary Command Execution. Author: Jason Wies |
Analyze the security implications of: SCPOnly 2.x/3.x - Arbitrary Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PHP 3.0/4.0 - Error Logging Format String | This is a remote exploit for php platform. Description: PHP 3.0/4.0 - Error Logging Format String. Author: anonymous |
Analyze the security implications of: PHP 3.0/4.0 - Error Logging Format String | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Xtokkaetama 1.0 b-6 - Nickname Local Buffer Overflow (1) | This is a local exploit for linux platform. Description: Xtokkaetama 1.0 b-6 - Nickname Local Buffer Overflow (1). Author: V9 |
Analyze the security implications of: Xtokkaetama 1.0 b-6 - Nickname Local Buffer Overflow (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: LW-N605R 12.20.2.1486 - Remote Code Execution | This is a webapps exploit for hardware platform. Description: LW-N605R 12.20.2.1486 - Remote Code Execution. Author: Nassim Asrir |
Analyze the security implications of: LW-N605R 12.20.2.1486 - Remote Code Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CodeAvalanche FreeForum - Database Disclosure | This is a webapps exploit for asp platform. Description: CodeAvalanche FreeForum - Database Disclosure. Author: Ghost Hacker |
Analyze the security implications of: CodeAvalanche FreeForum - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ATutor 2.2 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: ATutor 2.2 - Multiple Cross-Site Scripting Vulnerabilities. Author: Curesec Research Team |
Analyze the security implications of: ATutor 2.2 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Camtron CMNC-200 IP Camera - Undocumented Default Accounts | This is a webapps exploit for hardware platform. Description: Camtron CMNC-200 IP Camera - Undocumented Default Accounts. Author: Trustwave's SpiderLabs |
Analyze the security implications of: Camtron CMNC-200 IP Camera - Undocumented Default Accounts | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Campsite 2.6.1 - 'ArticlePublish.php?g_documentRoot' Remote File Inclusion | This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'ArticlePublish.php?g_documentRoot' Remote File Inclusion. Author: anonymous |
Analyze the security implications of: Campsite 2.6.1 - 'ArticlePublish.php?g_documentRoot' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Chrome < 31.0.1650.48 - HTTP 1xx base::StringTokenizerT<...>::QuickGetNext Out-of-Bounds Read | This is a dos exploit for multiple platform. Description: Google Chrome < 31.0.1650.48 - HTTP 1xx base::StringTokenizerT<...>::QuickGetNext Out-of-Bounds Read. Author: Skylined |
Analyze the security implications of: Google Chrome < 31.0.1650.48 - HTTP 1xx base::StringTokenizerT<...>::QuickGetNext Out-of-Bounds Read | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cfnetgs 0.24 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Cfnetgs 0.24 - 'index.php' Cross-Site Scripting. Author: ZoRLu |
Analyze the security implications of: Cfnetgs 0.24 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BZFlag 2.0.4 - undelimited string Denial of Service | This is a dos exploit for multiple platform. Description: BZFlag 2.0.4 - undelimited string Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: BZFlag 2.0.4 - undelimited string Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Wireshark - 'infer_pkt_encap' Heap Out-of-Bounds Read | This is a dos exploit for multiple platform. Description: Wireshark - 'infer_pkt_encap' Heap Out-of-Bounds Read. Author: Google Security Research |
Analyze the security implications of: Wireshark - 'infer_pkt_encap' Heap Out-of-Bounds Read | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: VMware 2 Web Server - Directory Traversal | This is a remote exploit for multiple platform. Description: VMware 2 Web Server - Directory Traversal. Author: clshack |
Analyze the security implications of: VMware 2 Web Server - Directory Traversal | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Microix Timesheet Module - SQL Injection | This is a webapps exploit for aspx platform. Description: Microix Timesheet Module - SQL Injection. Author: Anthony Cole |
Analyze the security implications of: Microix Timesheet Module - SQL Injection | This exploit targets aspx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aspx platform |
What is this exploit about: TRENDnet SecurView TV-IP121WN Wireless Internet Camera - UltraMJCam ActiveX Control OpenFileDlg WideCharToMultiByte Remote Stack Buffer Overflow | This is a remote exploit for hardware platform. Description: TRENDnet SecurView TV-IP121WN Wireless Internet Camera - UltraMJCam ActiveX Control OpenFileDlg WideCharToMultiByte Remote Stack Buffer Overflow. Author: rgod |
Analyze the security implications of: TRENDnet SecurView TV-IP121WN Wireless Internet Camera - UltraMJCam ActiveX Control OpenFileDlg WideCharToMultiByte Remote Stack Buffer Overflow | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Fake Hit Generator 2.2 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Fake Hit Generator 2.2 - Arbitrary File Upload. Author: DigitALL |
Analyze the security implications of: Fake Hit Generator 2.2 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Techno Dreams Announcement - 'key' SQL Injection | This is a webapps exploit for asp platform. Description: Techno Dreams Announcement - 'key' SQL Injection. Author: ajann |
Analyze the security implications of: Techno Dreams Announcement - 'key' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: PortalApp 4.0 - SQL Injection / Cross-Site Scripting / Authentication Bypass | This is a webapps exploit for asp platform. Description: PortalApp 4.0 - SQL Injection / Cross-Site Scripting / Authentication Bypass. Author: r3dm0v3 |
Analyze the security implications of: PortalApp 4.0 - SQL Injection / Cross-Site Scripting / Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.