input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ClipBucket < 4.0.0 - Release 4902 - Command Injection / File Upload / SQL Injection | This is a webapps exploit for php platform. Description: ClipBucket < 4.0.0 - Release 4902 - Command Injection / File Upload / SQL Injection. Author: SEC Consult |
Analyze the security implications of: ClipBucket < 4.0.0 - Release 4902 - Command Injection / File Upload / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Easypx41 - Multiple Variable Injection Vulnerabilities | This is a webapps exploit for php platform. Description: Easypx41 - Multiple Variable Injection Vulnerabilities. Author: FalconDeOro |
Analyze the security implications of: Easypx41 - Multiple Variable Injection Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Barracuda Firewall 6.1.0.016 - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Barracuda Firewall 6.1.0.016 - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: Barracuda Firewall 6.1.0.016 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: OpenBSD - 'ftp' Local Overflow | This is a local exploit for bsd platform. Description: OpenBSD - 'ftp' Local Overflow. Author: Teso |
Analyze the security implications of: OpenBSD - 'ftp' Local Overflow | This exploit targets bsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Centreon 2.6.1 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Centreon 2.6.1 - Multiple Vulnerabilities. Author: LiquidWorm |
Analyze the security implications of: Centreon 2.6.1 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: net-snmp 5.7.3 - (Authenticated) Denial of Service (PoC) | This is a dos exploit for linux platform. Description: net-snmp 5.7.3 - (Authenticated) Denial of Service (PoC). Author: Magnus Klaaborg Stubman |
Analyze the security implications of: net-snmp 5.7.3 - (Authenticated) Denial of Service (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Matt Kruse Calendar Script 2.2 - Arbitrary Command Execution | This is a remote exploit for cgi platform. Description: Matt Kruse Calendar Script 2.2 - Arbitrary Command Execution. Author: suid |
Analyze the security implications of: Matt Kruse Calendar Script 2.2 - Arbitrary Command Execution | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: DUportal 3.1.2 - 'inc_poll_voting.asp?DAT_PARENT' SQL Injection | This is a webapps exploit for asp platform. Description: DUportal 3.1.2 - 'inc_poll_voting.asp?DAT_PARENT' SQL Injection. Author: Dcrab |
Analyze the security implications of: DUportal 3.1.2 - 'inc_poll_voting.asp?DAT_PARENT' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: PHP 5.3.8 - Multiple Vulnerabilities | This is a dos exploit for multiple platform. Description: PHP 5.3.8 - Multiple Vulnerabilities. Author: Maksymilian Arciemowicz |
Analyze the security implications of: PHP 5.3.8 - Multiple Vulnerabilities | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Aplaya Beach Resort Online Reservation System 1.0 - SQL Injection / Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: Aplaya Beach Resort Online Reservation System 1.0 - SQL Injection / Cross-Site Request Forgery. Author: Ihsan Sencan |
Analyze the security implications of: Aplaya Beach Resort Online Reservation System 1.0 - SQL Injection / Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Chrome 0.2.149 - Malformed 'title' Tag Remote Denial of Service | This is a dos exploit for multiple platform. Description: Google Chrome 0.2.149 - Malformed 'title' Tag Remote Denial of Service. Author: Exodus |
Analyze the security implications of: Google Chrome 0.2.149 - Malformed 'title' Tag Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ProcessMaker 3.5.4 - Local File inclusion | This is a webapps exploit for multiple platform. Description: ProcessMaker 3.5.4 - Local File inclusion. Author: Ai Ho |
Analyze the security implications of: ProcessMaker 3.5.4 - Local File inclusion | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Rittal CMC-TC Processing Unit II - Multiple Vulnerabilities | This is a remote exploit for hardware platform. Description: Rittal CMC-TC Processing Unit II - Multiple Vulnerabilities. Author: Louhi Networks |
Analyze the security implications of: Rittal CMC-TC Processing Unit II - Multiple Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: A4Desk Event Calendar - 'v' Remote File Inclusion | This is a webapps exploit for php platform. Description: A4Desk Event Calendar - 'v' Remote File Inclusion. Author: Lo$er |
Analyze the security implications of: A4Desk Event Calendar - 'v' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EasyPage 7 - 'Default.aspx' SQL Injection | This is a webapps exploit for asp platform. Description: EasyPage 7 - 'Default.aspx' SQL Injection. Author: s3rv3r_hack3r |
Analyze the security implications of: EasyPage 7 - 'Default.aspx' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component com_news - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_news - SQL Injection. Author: snakespc |
Analyze the security implications of: Joomla! Component com_news - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Webeveyn Whomp! Real Estate Manager 2005 - Login SQL Injection | This is a webapps exploit for asp platform. Description: Webeveyn Whomp! Real Estate Manager 2005 - Login SQL Injection. Author: night_warrior771 |
Analyze the security implications of: Webeveyn Whomp! Real Estate Manager 2005 - Login SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component Kbase 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Kbase 1.0 - SQL Injection. Author: H!tm@N |
Analyze the security implications of: Joomla! Component Kbase 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache Tomcat 5.x/6.0.x - Directory Traversal | This is a remote exploit for linux platform. Description: Apache Tomcat 5.x/6.0.x - Directory Traversal. Author: D. Matscheko |
Analyze the security implications of: Apache Tomcat 5.x/6.0.x - Directory Traversal | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Liferay Enterprise Portal 4.3.6 - User-Agent HTTP Header Cross-Site Scripting | This is a webapps exploit for php platform. Description: Liferay Enterprise Portal 4.3.6 - User-Agent HTTP Header Cross-Site Scripting. Author: Tomasz Kuczynski |
Analyze the security implications of: Liferay Enterprise Portal 4.3.6 - User-Agent HTTP Header Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gossamer Threads Links 2.x - 'User.cgi' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: Gossamer Threads Links 2.x - 'User.cgi' Cross-Site Scripting. Author: Nathan House |
Analyze the security implications of: Gossamer Threads Links 2.x - 'User.cgi' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Amateur Photographer's Image Gallery - 'force-download.php?File' Information Disclosure | This is a webapps exploit for php platform. Description: Amateur Photographer's Image Gallery - 'force-download.php?File' Information Disclosure. Author: cr4wl3r |
Analyze the security implications of: Amateur Photographer's Image Gallery - 'force-download.php?File' Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sticky Notes & Color Widgets 1.4.2 - Denial of Service (PoC) | This is a dos exploit for ios platform. Description: Sticky Notes & Color Widgets 1.4.2 - Denial of Service (PoC). Author: Geovanni Ruiz |
Analyze the security implications of: Sticky Notes & Color Widgets 1.4.2 - Denial of Service (PoC) | This exploit targets ios systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Edgephp ClickBank Affiliate Marketplace Script - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Edgephp ClickBank Affiliate Marketplace Script - Multiple Vulnerabilities. Author: L0rd CrusAd3r |
Analyze the security implications of: Edgephp ClickBank Affiliate Marketplace Script - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Flash Player - Drawing Fill Shader Memory Corruption (Metasploit) | This is a remote exploit for multiple platform. Description: Adobe Flash Player - Drawing Fill Shader Memory Corruption (Metasploit). Author: Metasploit |
Analyze the security implications of: Adobe Flash Player - Drawing Fill Shader Memory Corruption (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apache - httpOnly Cookie Disclosure | This is a remote exploit for multiple platform. Description: Apache - httpOnly Cookie Disclosure. Author: pilate |
Analyze the security implications of: Apache - httpOnly Cookie Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Grav CMS 1.4.2 Admin Plugin - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Grav CMS 1.4.2 Admin Plugin - Cross-Site Scripting. Author: Ahsan Tahir |
Analyze the security implications of: Grav CMS 1.4.2 Admin Plugin - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: E-Xoops 1.0.5/1.0.8 - '/adresses/ratefile.php?lid' SQL Injection | This is a webapps exploit for php platform. Description: E-Xoops 1.0.5/1.0.8 - '/adresses/ratefile.php?lid' SQL Injection. Author: Lostmon |
Analyze the security implications of: E-Xoops 1.0.5/1.0.8 - '/adresses/ratefile.php?lid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM AIX 4.2.1 / Sun Solaris 7.0 - LC_MESSAGES libc Buffer Overflow (5) | This is a local exploit for aix platform. Description: IBM AIX 4.2.1 / Sun Solaris 7.0 - LC_MESSAGES libc Buffer Overflow (5). Author: UNYUN |
Analyze the security implications of: IBM AIX 4.2.1 / Sun Solaris 7.0 - LC_MESSAGES libc Buffer Overflow (5) | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: JSBoard 2.0.10/2.0.11 - 'login.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: JSBoard 2.0.10/2.0.11 - 'login.php' Cross-Site Scripting. Author: Alexander Klink |
Analyze the security implications of: JSBoard 2.0.10/2.0.11 - 'login.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASKEY RTF3505VW-N1 - Privilege Escalation | This is a remote exploit for hardware platform. Description: ASKEY RTF3505VW-N1 - Privilege Escalation. Author: Leonardo Nicolas Servalli |
Analyze the security implications of: ASKEY RTF3505VW-N1 - Privilege Escalation | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Screen SFT DAB 600/C - Unauthenticated Information Disclosure (userManager.cgx) | This is a remote exploit for hardware platform. Description: Screen SFT DAB 600/C - Unauthenticated Information Disclosure (userManager.cgx). Author: LiquidWorm |
Analyze the security implications of: Screen SFT DAB 600/C - Unauthenticated Information Disclosure (userManager.cgx) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apache mod_dav / svn - Remote Denial of Service | This is a dos exploit for multiple platform. Description: Apache mod_dav / svn - Remote Denial of Service. Author: kingcope |
Analyze the security implications of: Apache mod_dav / svn - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.