input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Rit Research Labs TinyWeb 1.9.2 - Unauthorized Script Disclosure
|
This is a webapps exploit for cgi platform. Description: Rit Research Labs TinyWeb 1.9.2 - Unauthorized Script Disclosure. Author: Ziv Kamir
|
Analyze the security implications of: Rit Research Labs TinyWeb 1.9.2 - Unauthorized Script Disclosure
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Bloq 0.5.4 - 'rss2.php?page[path]' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Bloq 0.5.4 - 'rss2.php?page[path]' Remote File Inclusion. Author: KorsaN
|
Analyze the security implications of: Bloq 0.5.4 - 'rss2.php?page[path]' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Novell Netware Web Server 3.x - files.pl
|
This is a remote exploit for novell platform. Description: Novell Netware Web Server 3.x - files.pl. Author: anonymous
|
Analyze the security implications of: Novell Netware Web Server 3.x - files.pl
|
This exploit targets novell systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets novell platform
|
What is this exploit about: FreeBSD 2.2-4.2 / NetBSD 1.2-4.5 / OpenBSD 2.x - FTPd 'glob()' Remote Buffer Overflow
|
This is a remote exploit for bsd platform. Description: FreeBSD 2.2-4.2 / NetBSD 1.2-4.5 / OpenBSD 2.x - FTPd 'glob()' Remote Buffer Overflow. Author: fish stiqz
|
Analyze the security implications of: FreeBSD 2.2-4.2 / NetBSD 1.2-4.5 / OpenBSD 2.x - FTPd 'glob()' Remote Buffer Overflow
|
This exploit targets bsd systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets bsd platform
|
What is this exploit about: 35mm Slide Gallery - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: 35mm Slide Gallery - Cross-Site Scripting. Author: indoushka
|
Analyze the security implications of: 35mm Slide Gallery - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: usb-creator 0.2.x (Ubuntu 12.04/14.04/14.10) - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: usb-creator 0.2.x (Ubuntu 12.04/14.04/14.10) - Local Privilege Escalation. Author: Tavis Ormandy
|
Analyze the security implications of: usb-creator 0.2.x (Ubuntu 12.04/14.04/14.10) - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Groupon Clone Script 3.01 - 'catid' SQL Injection
|
This is a webapps exploit for php platform. Description: Groupon Clone Script 3.01 - 'catid' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Groupon Clone Script 3.01 - 'catid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IrayoBlog 0.2.4 - '/inc/irayofuncs.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: IrayoBlog 0.2.4 - '/inc/irayofuncs.php' Remote File Inclusion. Author: DeltahackingTEAM
|
Analyze the security implications of: IrayoBlog 0.2.4 - '/inc/irayofuncs.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component XOBBIX 1.0 - 'prodid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component XOBBIX 1.0 - 'prodid' SQL Injection. Author: AntiSecurity
|
Analyze the security implications of: Joomla! Component XOBBIX 1.0 - 'prodid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Pulse Infotech Flip Wall - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Pulse Infotech Flip Wall - SQL Injection. Author: FL0RiX
|
Analyze the security implications of: Joomla! Component Pulse Infotech Flip Wall - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Foreman Smart-Proxy - Remote Command Injection
|
This is a remote exploit for multiple platform. Description: Foreman Smart-Proxy - Remote Command Injection. Author: Lukas Zapletal
|
Analyze the security implications of: Foreman Smart-Proxy - Remote Command Injection
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Elite CMS 1.01 - Multiple Cross-Site Scripting / Cross-Site Request Forgery Vulnerabilities
|
This is a webapps exploit for php platform. Description: Elite CMS 1.01 - Multiple Cross-Site Scripting / Cross-Site Request Forgery Vulnerabilities. Author: 10n1z3d
|
Analyze the security implications of: Elite CMS 1.01 - Multiple Cross-Site Scripting / Cross-Site Request Forgery Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component JEmbedAll 1.4 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component JEmbedAll 1.4 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component JEmbedAll 1.4 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: eCreo - SQL Injection
|
This is a webapps exploit for php platform. Description: eCreo - SQL Injection. Author: cyberlog
|
Analyze the security implications of: eCreo - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple Personal Web Sharing 1.1/1.5/1.5.5 - Remote Denial of Service
|
This is a dos exploit for osx platform. Description: Apple Personal Web Sharing 1.1/1.5/1.5.5 - Remote Denial of Service. Author: Jass Seljamaa
|
Analyze the security implications of: Apple Personal Web Sharing 1.1/1.5/1.5.5 - Remote Denial of Service
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: SCPOnly 2.x/3.x - Arbitrary Command Execution
|
This is a remote exploit for linux platform. Description: SCPOnly 2.x/3.x - Arbitrary Command Execution. Author: Jason Wies
|
Analyze the security implications of: SCPOnly 2.x/3.x - Arbitrary Command Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: PHP 3.0/4.0 - Error Logging Format String
|
This is a remote exploit for php platform. Description: PHP 3.0/4.0 - Error Logging Format String. Author: anonymous
|
Analyze the security implications of: PHP 3.0/4.0 - Error Logging Format String
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Xtokkaetama 1.0 b-6 - Nickname Local Buffer Overflow (1)
|
This is a local exploit for linux platform. Description: Xtokkaetama 1.0 b-6 - Nickname Local Buffer Overflow (1). Author: V9
|
Analyze the security implications of: Xtokkaetama 1.0 b-6 - Nickname Local Buffer Overflow (1)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: LW-N605R 12.20.2.1486 - Remote Code Execution
|
This is a webapps exploit for hardware platform. Description: LW-N605R 12.20.2.1486 - Remote Code Execution. Author: Nassim Asrir
|
Analyze the security implications of: LW-N605R 12.20.2.1486 - Remote Code Execution
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: CodeAvalanche FreeForum - Database Disclosure
|
This is a webapps exploit for asp platform. Description: CodeAvalanche FreeForum - Database Disclosure. Author: Ghost Hacker
|
Analyze the security implications of: CodeAvalanche FreeForum - Database Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: ATutor 2.2 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: ATutor 2.2 - Multiple Cross-Site Scripting Vulnerabilities. Author: Curesec Research Team
|
Analyze the security implications of: ATutor 2.2 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Camtron CMNC-200 IP Camera - Undocumented Default Accounts
|
This is a webapps exploit for hardware platform. Description: Camtron CMNC-200 IP Camera - Undocumented Default Accounts. Author: Trustwave's SpiderLabs
|
Analyze the security implications of: Camtron CMNC-200 IP Camera - Undocumented Default Accounts
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Campsite 2.6.1 - 'ArticlePublish.php?g_documentRoot' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'ArticlePublish.php?g_documentRoot' Remote File Inclusion. Author: anonymous
|
Analyze the security implications of: Campsite 2.6.1 - 'ArticlePublish.php?g_documentRoot' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Google Chrome < 31.0.1650.48 - HTTP 1xx base::StringTokenizerT<...>::QuickGetNext Out-of-Bounds Read
|
This is a dos exploit for multiple platform. Description: Google Chrome < 31.0.1650.48 - HTTP 1xx base::StringTokenizerT<...>::QuickGetNext Out-of-Bounds Read. Author: Skylined
|
Analyze the security implications of: Google Chrome < 31.0.1650.48 - HTTP 1xx base::StringTokenizerT<...>::QuickGetNext Out-of-Bounds Read
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Cfnetgs 0.24 - 'index.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Cfnetgs 0.24 - 'index.php' Cross-Site Scripting. Author: ZoRLu
|
Analyze the security implications of: Cfnetgs 0.24 - 'index.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BZFlag 2.0.4 - undelimited string Denial of Service
|
This is a dos exploit for multiple platform. Description: BZFlag 2.0.4 - undelimited string Denial of Service. Author: Luigi Auriemma
|
Analyze the security implications of: BZFlag 2.0.4 - undelimited string Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Wireshark - 'infer_pkt_encap' Heap Out-of-Bounds Read
|
This is a dos exploit for multiple platform. Description: Wireshark - 'infer_pkt_encap' Heap Out-of-Bounds Read. Author: Google Security Research
|
Analyze the security implications of: Wireshark - 'infer_pkt_encap' Heap Out-of-Bounds Read
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: VMware 2 Web Server - Directory Traversal
|
This is a remote exploit for multiple platform. Description: VMware 2 Web Server - Directory Traversal. Author: clshack
|
Analyze the security implications of: VMware 2 Web Server - Directory Traversal
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Microix Timesheet Module - SQL Injection
|
This is a webapps exploit for aspx platform. Description: Microix Timesheet Module - SQL Injection. Author: Anthony Cole
|
Analyze the security implications of: Microix Timesheet Module - SQL Injection
|
This exploit targets aspx systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aspx platform
|
What is this exploit about: TRENDnet SecurView TV-IP121WN Wireless Internet Camera - UltraMJCam ActiveX Control OpenFileDlg WideCharToMultiByte Remote Stack Buffer Overflow
|
This is a remote exploit for hardware platform. Description: TRENDnet SecurView TV-IP121WN Wireless Internet Camera - UltraMJCam ActiveX Control OpenFileDlg WideCharToMultiByte Remote Stack Buffer Overflow. Author: rgod
|
Analyze the security implications of: TRENDnet SecurView TV-IP121WN Wireless Internet Camera - UltraMJCam ActiveX Control OpenFileDlg WideCharToMultiByte Remote Stack Buffer Overflow
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Fake Hit Generator 2.2 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Fake Hit Generator 2.2 - Arbitrary File Upload. Author: DigitALL
|
Analyze the security implications of: Fake Hit Generator 2.2 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Techno Dreams Announcement - 'key' SQL Injection
|
This is a webapps exploit for asp platform. Description: Techno Dreams Announcement - 'key' SQL Injection. Author: ajann
|
Analyze the security implications of: Techno Dreams Announcement - 'key' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: PortalApp 4.0 - SQL Injection / Cross-Site Scripting / Authentication Bypass
|
This is a webapps exploit for asp platform. Description: PortalApp 4.0 - SQL Injection / Cross-Site Scripting / Authentication Bypass. Author: r3dm0v3
|
Analyze the security implications of: PortalApp 4.0 - SQL Injection / Cross-Site Scripting / Authentication Bypass
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.