input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: RedHat Linux - Stickiness of /tmp
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Komodo CMS 2.1 - Multiple Input Validation Vulnerabilities
|
This is a webapps exploit for php platform. Description: Komodo CMS 2.1 - Multiple Input Validation Vulnerabilities. Author: r0t3d3Vil
|
Analyze the security implications of: Komodo CMS 2.1 - Multiple Input Validation Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mura CMS - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for cfm platform. Description: Mura CMS - Multiple Cross-Site Scripting Vulnerabilities. Author: Richard Brain
|
Analyze the security implications of: Mura CMS - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets cfm systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cfm platform
|
What is this exploit about: AmpJuke 0.7.5 - 'index.php' SQL Injection
|
This is a webapps exploit for php platform. Description: AmpJuke 0.7.5 - 'index.php' SQL Injection. Author: S_DLA_S
|
Analyze the security implications of: AmpJuke 0.7.5 - 'index.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Alcatel-Lucent OmniPCX Enterprise Communication Server 7.1 - masterCGI Command Injection (Metasploit)
|
This is a webapps exploit for cgi platform. Description: Alcatel-Lucent OmniPCX Enterprise Communication Server 7.1 - masterCGI Command Injection (Metasploit). Author: patrick
|
Analyze the security implications of: Alcatel-Lucent OmniPCX Enterprise Communication Server 7.1 - masterCGI Command Injection (Metasploit)
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: 2WIRE Routers - 'H04_POST' Access Validation
|
This is a remote exploit for hardware platform. Description: 2WIRE Routers - 'H04_POST' Access Validation. Author: Oligarchy Oligarchy
|
Analyze the security implications of: 2WIRE Routers - 'H04_POST' Access Validation
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: LoveCMS 1.6.2 Final - Multiple Local File Inclusions
|
This is a webapps exploit for php platform. Description: LoveCMS 1.6.2 Final - Multiple Local File Inclusions. Author: cOndemned
|
Analyze the security implications of: LoveCMS 1.6.2 Final - Multiple Local File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: McAfee E-Business Server 8.5.2 - Remote Code Execution / Denial of Service (PoC)
|
This is a dos exploit for multiple platform. Description: McAfee E-Business Server 8.5.2 - Remote Code Execution / Denial of Service (PoC). Author: Leon Juranic
|
Analyze the security implications of: McAfee E-Business Server 8.5.2 - Remote Code Execution / Denial of Service (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Power Up HTML 0.8033 Beta - Directory Traversal Arbitrary File Disclosure
|
This is a remote exploit for cgi platform. Description: Power Up HTML 0.8033 Beta - Directory Traversal Arbitrary File Disclosure. Author: Steve Shepherd
|
Analyze the security implications of: Power Up HTML 0.8033 Beta - Directory Traversal Arbitrary File Disclosure
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Adobe Flash - ATF Image Packing Overflow
|
This is a dos exploit for multiple platform. Description: Adobe Flash - ATF Image Packing Overflow. Author: Google Security Research
|
Analyze the security implications of: Adobe Flash - ATF Image Packing Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Foscam IP (Multiple Cameras) - Multiple Cross-Site Request Forgery Vulnerabilities
|
This is a remote exploit for hardware platform. Description: Foscam IP (Multiple Cameras) - Multiple Cross-Site Request Forgery Vulnerabilities. Author: shekyan
|
Analyze the security implications of: Foscam IP (Multiple Cameras) - Multiple Cross-Site Request Forgery Vulnerabilities
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Fast Click SQL 1.1.7 Lite - 'init.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Fast Click SQL 1.1.7 Lite - 'init.php' Remote File Inclusion. Author: NoGe
|
Analyze the security implications of: Fast Click SQL 1.1.7 Lite - 'init.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_db_setup.php?base_path' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_db_setup.php?base_path' Remote File Inclusion. Author: indoushka
|
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_db_setup.php?base_path' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 68 Classifieds 4.1 - 'viewlisting.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: 68 Classifieds 4.1 - 'viewlisting.php' Cross-Site Scripting. Author: Moudi
|
Analyze the security implications of: 68 Classifieds 4.1 - 'viewlisting.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: SAP Business Connector 4.6/4.7 - 'deleteSingle?fullName' Arbitrary File Deletion
|
This is a remote exploit for linux platform. Description: SAP Business Connector 4.6/4.7 - 'deleteSingle?fullName' Arbitrary File Deletion. Author: Leandro Meiners
|
Analyze the security implications of: SAP Business Connector 4.6/4.7 - 'deleteSingle?fullName' Arbitrary File Deletion
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: addalink 4 Beta - Write Approved Links
|
This is a webapps exploit for php platform. Description: addalink 4 Beta - Write Approved Links. Author: Pepelux
|
Analyze the security implications of: addalink 4 Beta - Write Approved Links
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: JBC Explorer 7.20 RC 1 - Remote Code Execution
|
This is a webapps exploit for php platform. Description: JBC Explorer 7.20 RC 1 - Remote Code Execution. Author: DarkFig
|
Analyze the security implications of: JBC Explorer 7.20 RC 1 - Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LG SuperSign EZ CMS 2.5 - Remote Code Execution
|
This is a webapps exploit for hardware platform. Description: LG SuperSign EZ CMS 2.5 - Remote Code Execution. Author: Alejandro Fanjul
|
Analyze the security implications of: LG SuperSign EZ CMS 2.5 - Remote Code Execution
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: CacheGuard-OS 5.7.7 - Cross-Site Request Forgery
|
This is a webapps exploit for linux platform. Description: CacheGuard-OS 5.7.7 - Cross-Site Request Forgery. Author: William Costa
|
Analyze the security implications of: CacheGuard-OS 5.7.7 - Cross-Site Request Forgery
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Jupiter CMS 1.1.5 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Jupiter CMS 1.1.5 - Arbitrary File Upload. Author: DarkFig
|
Analyze the security implications of: Jupiter CMS 1.1.5 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LxBlog - Multiple Cross-Site Scripting / SQL Injections
|
This is a webapps exploit for php platform. Description: LxBlog - Multiple Cross-Site Scripting / SQL Injections. Author: Securitylab.ir
|
Analyze the security implications of: LxBlog - Multiple Cross-Site Scripting / SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PHP 5.1.6 - 'Msg_Receive()' Memory Allocation Integer Overflow
|
This is a remote exploit for php platform. Description: PHP 5.1.6 - 'Msg_Receive()' Memory Allocation Integer Overflow. Author: Stefan Esser
|
Analyze the security implications of: PHP 5.1.6 - 'Msg_Receive()' Memory Allocation Integer Overflow
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Code Widgets Multiple Question - Multiple Choice Online Questionnaire SQL Injections
|
This is a webapps exploit for asp platform. Description: Code Widgets Multiple Question - Multiple Choice Online Questionnaire SQL Injections. Author: L0rd CrusAd3r
|
Analyze the security implications of: Code Widgets Multiple Question - Multiple Choice Online Questionnaire SQL Injections
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: BRS Webweaver 1.0 1 - MKDir Directory Traversal
|
This is a remote exploit for linux platform. Description: BRS Webweaver 1.0 1 - MKDir Directory Traversal. Author: euronymous
|
Analyze the security implications of: BRS Webweaver 1.0 1 - MKDir Directory Traversal
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: e107 1.0.1 - Arbitrary JavaScript Execution (via Cross-Site Request Forgery)
|
This is a webapps exploit for php platform. Description: e107 1.0.1 - Arbitrary JavaScript Execution (via Cross-Site Request Forgery). Author: Joshua Reynolds
|
Analyze the security implications of: e107 1.0.1 - Arbitrary JavaScript Execution (via Cross-Site Request Forgery)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: pam-krb5 < 3.13 - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: pam-krb5 < 3.13 - Local Privilege Escalation. Author: Jon Oberheide
|
Analyze the security implications of: pam-krb5 < 3.13 - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: WePresent WiPG-1500 - Backdoor Account
|
This is a remote exploit for hardware platform. Description: WePresent WiPG-1500 - Backdoor Account. Author: Quentin Olagne
|
Analyze the security implications of: WePresent WiPG-1500 - Backdoor Account
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: OpenBSD 2.x - Pending ARP Request Remote Denial of Service
|
This is a dos exploit for openbsd platform. Description: OpenBSD 2.x - Pending ARP Request Remote Denial of Service. Author: skyper
|
Analyze the security implications of: OpenBSD 2.x - Pending ARP Request Remote Denial of Service
|
This exploit targets openbsd systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets openbsd platform
|
What is this exploit about: ElkarBackup 1.3.3 - 'Policy[name]' and 'Policy[Description]' Stored Cross-site Scripting
|
This is a webapps exploit for php platform. Description: ElkarBackup 1.3.3 - 'Policy[name]' and 'Policy[Description]' Stored Cross-site Scripting. Author: Vyshnav nk
|
Analyze the security implications of: ElkarBackup 1.3.3 - 'Policy[name]' and 'Policy[Description]' Stored Cross-site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cisco node-jos < 0.11.0 - Re-sign Tokens
|
This is a webapps exploit for multiple platform. Description: Cisco node-jos < 0.11.0 - Re-sign Tokens. Author: zioBlack
|
Analyze the security implications of: Cisco node-jos < 0.11.0 - Re-sign Tokens
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Church Management System 1.0 - 'search' SQL Injection (Unauthenticated)
|
This is a webapps exploit for php platform. Description: Church Management System 1.0 - 'search' SQL Injection (Unauthenticated). Author: Erwin Krazek
|
Analyze the security implications of: Church Management System 1.0 - 'search' SQL Injection (Unauthenticated)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: QNX RTOS 4.25/6.1 - 'phgrafx' Local Privilege Escalation
|
This is a local exploit for linux platform. Description: QNX RTOS 4.25/6.1 - 'phgrafx' Local Privilege Escalation. Author: badc0ded
|
Analyze the security implications of: QNX RTOS 4.25/6.1 - 'phgrafx' Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Berylium2 2003-08-18 - 'beryliumroot' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Berylium2 2003-08-18 - 'beryliumroot' Remote File Inclusion. Author: ThE TiGeR
|
Analyze the security implications of: Berylium2 2003-08-18 - 'beryliumroot' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component jGive 2.0.9 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component jGive 2.0.9 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component jGive 2.0.9 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.