input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Joomla! Component com_bfsurvey - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_bfsurvey - Local File Inclusion. Author: FL0RiX |
Analyze the security implications of: Joomla! Component com_bfsurvey - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_realestatemanager 3.7 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_realestatemanager 3.7 - SQL Injection. Author: Omer Ramić |
Analyze the security implications of: Joomla! Component com_realestatemanager 3.7 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SIPP 3.3 - Stack-Based Buffer Overflow | This is a local exploit for linux platform. Description: SIPP 3.3 - Stack-Based Buffer Overflow. Author: Juan Sacco |
Analyze the security implications of: SIPP 3.3 - Stack-Based Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Hycus CMS 1.0.1 - Multiple Cross-Site Request Forgery Vulnerabilities | This is a webapps exploit for php platform. Description: Hycus CMS 1.0.1 - Multiple Cross-Site Request Forgery Vulnerabilities. Author: 10n1z3d |
Analyze the security implications of: Hycus CMS 1.0.1 - Multiple Cross-Site Request Forgery Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Zoom Player 3.30/5/6 - '.ZPL' Error Message Arbitrary Code Execution | This is a remote exploit for multiple platform. Description: Zoom Player 3.30/5/6 - '.ZPL' Error Message Arbitrary Code Execution. Author: Luigi Auriemma |
Analyze the security implications of: Zoom Player 3.30/5/6 - '.ZPL' Error Message Arbitrary Code Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple Mac OSX 10.4 - dsidentity Directory Services Account Creation and Deletion | This is a local exploit for osx platform. Description: Apple Mac OSX 10.4 - dsidentity Directory Services Account Creation and Deletion. Author: Neil Archibald |
Analyze the security implications of: Apple Mac OSX 10.4 - dsidentity Directory Services Account Creation and Deletion | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Outpost Security Suite Pro 2009 - Filename Parsing Security Bypass | This is a remote exploit for multiple platform. Description: Outpost Security Suite Pro 2009 - Filename Parsing Security Bypass. Author: Juan Pablo Lopez Yacubian |
Analyze the security implications of: Outpost Security Suite Pro 2009 - Filename Parsing Security Bypass | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Network Security Wizards Dragon-Fire IDS 1.0 - Command Execution | This is a remote exploit for hardware platform. Description: Network Security Wizards Dragon-Fire IDS 1.0 - Command Execution. Author: Stefan Lauda |
Analyze the security implications of: Network Security Wizards Dragon-Fire IDS 1.0 - Command Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: PECL 3.0.x - Alternative PHP Cache Extension 'apc_search_paths()' Remote Buffer Overflow | This is a remote exploit for linux platform. Description: PECL 3.0.x - Alternative PHP Cache Extension 'apc_search_paths()' Remote Buffer Overflow. Author: dannyp |
Analyze the security implications of: PECL 3.0.x - Alternative PHP Cache Extension 'apc_search_paths()' Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Fundanemt 2.2.0 - 'spellcheck.php' Remote Code Execution | This is a webapps exploit for php platform. Description: Fundanemt 2.2.0 - 'spellcheck.php' Remote Code Execution. Author: Kacper |
Analyze the security implications of: Fundanemt 2.2.0 - 'spellcheck.php' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: e107 plugin fm pro 1 - File Disclosure / Arbitrary File Upload / Directory Traversal | This is a webapps exploit for php platform. Description: e107 plugin fm pro 1 - File Disclosure / Arbitrary File Upload / Directory Traversal. Author: GoLd_M |
Analyze the security implications of: e107 plugin fm pro 1 - File Disclosure / Arbitrary File Upload / Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM AIX 6.1/7.1/7.2.0.2 - 'lsmcode' Local Privilege Escalation | This is a local exploit for aix platform. Description: IBM AIX 6.1/7.1/7.2.0.2 - 'lsmcode' Local Privilege Escalation. Author: Hector X. Monsegur |
Analyze the security implications of: IBM AIX 6.1/7.1/7.2.0.2 - 'lsmcode' Local Privilege Escalation | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: GNU GNATS 3.0 02 - PR-Edit Command Line Option Heap Corruption | This is a dos exploit for linux platform. Description: GNU GNATS 3.0 02 - PR-Edit Command Line Option Heap Corruption. Author: dong-h0un U |
Analyze the security implications of: GNU GNATS 3.0 02 - PR-Edit Command Line Option Heap Corruption | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Jevontech PHPenpals - PersonalID SQL Injection | This is a webapps exploit for php platform. Description: Jevontech PHPenpals - PersonalID SQL Injection. Author: Aliaksandr Hartsuyeu |
Analyze the security implications of: Jevontech PHPenpals - PersonalID SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sahi pro 8.x - Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Sahi pro 8.x - Cross-Site Scripting. Author: Goutham Madhwaraj |
Analyze the security implications of: Sahi pro 8.x - Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cosmos Solutions CMS - 'id=' / 'page=' SQL Injection | This is a webapps exploit for php platform. Description: Cosmos Solutions CMS - 'id=' / 'page=' SQL Injection. Author: gendenk |
Analyze the security implications of: Cosmos Solutions CMS - 'id=' / 'page=' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: X-Chat 1.x - CTCP Ping Remote IRC Command Execution | This is a remote exploit for linux platform. Description: X-Chat 1.x - CTCP Ping Remote IRC Command Execution. Author: Marcus Meissner |
Analyze the security implications of: X-Chat 1.x - CTCP Ping Remote IRC Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Comdev News Publisher 4.1.2 - SQL Injection | This is a webapps exploit for php platform. Description: Comdev News Publisher 4.1.2 - SQL Injection. Author: t0pP8uZz |
Analyze the security implications of: Comdev News Publisher 4.1.2 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cacti 0.8.6i - 'cmd.php?popen()' Remote Injection | This is a webapps exploit for php platform. Description: Cacti 0.8.6i - 'cmd.php?popen()' Remote Injection. Author: rgod |
Analyze the security implications of: Cacti 0.8.6i - 'cmd.php?popen()' Remote Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TL-WR720N 150Mbps Wireless N Router - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: TL-WR720N 150Mbps Wireless N Router - Cross-Site Request Forgery. Author: Mans van Someren |
Analyze the security implications of: TL-WR720N 150Mbps Wireless N Router - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component mod_VisitorData 1.1 - Remote code Execution | This is a webapps exploit for php platform. Description: Joomla! Component mod_VisitorData 1.1 - Remote code Execution. Author: Chip d3 bi0s |
Analyze the security implications of: Joomla! Component mod_VisitorData 1.1 - Remote code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: jQuery - jui_filter_rules PHP Code Execution | This is a remote exploit for php platform. Description: jQuery - jui_filter_rules PHP Code Execution. Author: Timo Schmid |
Analyze the security implications of: jQuery - jui_filter_rules PHP Code Execution | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Nagios XI - 'login.php' Multiple Cross-Site Scripting Vulnerabilities | This is a remote exploit for linux platform. Description: Nagios XI - 'login.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Adam Baldwin |
Analyze the security implications of: Nagios XI - 'login.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Easy File Uploader 1.2 - Arbitrary File Download | This is a webapps exploit for php platform. Description: Easy File Uploader 1.2 - Arbitrary File Download. Author: Ihsan Sencan |
Analyze the security implications of: Easy File Uploader 1.2 - Arbitrary File Download | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.4/2.6 - 'sock_sendpage()' Local Privilege Escalation (3) | This is a local exploit for linux platform. Description: Linux Kernel 2.4/2.6 - 'sock_sendpage()' Local Privilege Escalation (3). Author: Ramon de C Valle |
Analyze the security implications of: Linux Kernel 2.4/2.6 - 'sock_sendpage()' Local Privilege Escalation (3) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: SKIDATA Freemotion.Gate - Web Services Multiple Command Execution Vulnerabilities | This is a remote exploit for multiple platform. Description: SKIDATA Freemotion.Gate - Web Services Multiple Command Execution Vulnerabilities. Author: Dennis Kelly |
Analyze the security implications of: SKIDATA Freemotion.Gate - Web Services Multiple Command Execution Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: KDE Konqueror 3.5 - JavaScript IFrame Denial of Service | This is a dos exploit for linux platform. Description: KDE Konqueror 3.5 - JavaScript IFrame Denial of Service. Author: mark |
Analyze the security implications of: KDE Konqueror 3.5 - JavaScript IFrame Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: OpenText Documentum Content Server - 'dmr_content' Privilege Escalation | This is a webapps exploit for multiple platform. Description: OpenText Documentum Content Server - 'dmr_content' Privilege Escalation. Author: Andrey B. Panfilov |
Analyze the security implications of: OpenText Documentum Content Server - 'dmr_content' Privilege Escalation | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Comersus Backoffice 4.x/5.0/6.0 - '/comersus/database/comersus.mdb' Direct Request Database Disclosure | This is a webapps exploit for asp platform. Description: Comersus Backoffice 4.x/5.0/6.0 - '/comersus/database/comersus.mdb' Direct Request Database Disclosure. Author: _6mO_HaCk |
Analyze the security implications of: Comersus Backoffice 4.x/5.0/6.0 - '/comersus/database/comersus.mdb' Direct Request Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Batflat CMS 1.3.6 - Remote Code Execution (Authenticated) | This is a webapps exploit for php platform. Description: Batflat CMS 1.3.6 - Remote Code Execution (Authenticated). Author: mari0x00 |
Analyze the security implications of: Batflat CMS 1.3.6 - Remote Code Execution (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eFront 3.6.14 (build 18012) - Multiple Persistent Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: eFront 3.6.14 (build 18012) - Multiple Persistent Cross-Site Scripting Vulnerabilities. Author: sajith |
Analyze the security implications of: eFront 3.6.14 (build 18012) - Multiple Persistent Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BSD-Games 2.x - Mille Local Save Game File Name Buffer Overrun | This is a local exploit for bsd platform. Description: BSD-Games 2.x - Mille Local Save Game File Name Buffer Overrun. Author: N4rK07IX |
Analyze the security implications of: BSD-Games 2.x - Mille Local Save Game File Name Buffer Overrun | This exploit targets bsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Setuid perl - 'PerlIO_Debug()' Root Owned File Creation Privilege Escalation | This is a local exploit for linux platform. Description: Setuid perl - 'PerlIO_Debug()' Root Owned File Creation Privilege Escalation. Author: Kevin Finisterre |
Analyze the security implications of: Setuid perl - 'PerlIO_Debug()' Root Owned File Creation Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_alphacontent - 'limitstart' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_alphacontent - 'limitstart' SQL Injection. Author: xDarkSton3x |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.