input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: mintinstall 7.9.9 - Code Execution
|
This is a webapps exploit for linux platform. Description: mintinstall 7.9.9 - Code Execution. Author: İbrahim Hakan Şeker
|
Analyze the security implications of: mintinstall 7.9.9 - Code Execution
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: anaconda Foundation 1.4 < 1.9 - Directory Traversal
|
This is a remote exploit for cgi platform. Description: anaconda Foundation 1.4 < 1.9 - Directory Traversal. Author: pestilence
|
Analyze the security implications of: anaconda Foundation 1.4 < 1.9 - Directory Traversal
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Tenable Appliance < 4.5 - Root Remote Code Execution
|
This is a remote exploit for linux platform. Description: Tenable Appliance < 4.5 - Root Remote Code Execution. Author: agix
|
Analyze the security implications of: Tenable Appliance < 4.5 - Root Remote Code Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: CGI Script Center Account Manager 1.0 LITE / PRO - Administrative Password Alteration (1)
|
This is a remote exploit for cgi platform. Description: CGI Script Center Account Manager 1.0 LITE / PRO - Administrative Password Alteration (1). Author: teleh0r
|
Analyze the security implications of: CGI Script Center Account Manager 1.0 LITE / PRO - Administrative Password Alteration (1)
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: GNU glibc - 'strcoll()' Routine Integer Overflow
|
This is a dos exploit for linux platform. Description: GNU glibc - 'strcoll()' Routine Integer Overflow. Author: Jan iankko Lieskovsky
|
Analyze the security implications of: GNU glibc - 'strcoll()' Routine Integer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Caldera - '/costview2/jobs.php?tr' SQL Injection
|
This is a webapps exploit for php platform. Description: Caldera - '/costview2/jobs.php?tr' SQL Injection. Author: Thomas Fischer
|
Analyze the security implications of: Caldera - '/costview2/jobs.php?tr' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Site2Nite Real Estate Web - 'agentlist.asp' Multiple SQL Injections
|
This is a webapps exploit for asp platform. Description: Site2Nite Real Estate Web - 'agentlist.asp' Multiple SQL Injections. Author: S@BUN
|
Analyze the security implications of: Site2Nite Real Estate Web - 'agentlist.asp' Multiple SQL Injections
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: MapInfo Discovery 1.0/1.1 - Cleartext Transmission Credential Disclosure
|
This is a webapps exploit for asp platform. Description: MapInfo Discovery 1.0/1.1 - Cleartext Transmission Credential Disclosure. Author: anonymous
|
Analyze the security implications of: MapInfo Discovery 1.0/1.1 - Cleartext Transmission Credential Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Apache mod_proxy_cluster 1.2.6 - Stored XSS
|
This is a webapps exploit for php platform. Description: Apache mod_proxy_cluster 1.2.6 - Stored XSS. Author: Mohamed Mounir Boudjema
|
Analyze the security implications of: Apache mod_proxy_cluster 1.2.6 - Stored XSS
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DataLife Engine 8.3 - '/engine/inc/include/init.php?selected_language' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: DataLife Engine 8.3 - '/engine/inc/include/init.php?selected_language' Remote File Inclusion. Author: indoushka
|
Analyze the security implications of: DataLife Engine 8.3 - '/engine/inc/include/init.php?selected_language' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Green Shop - SQL Injection
|
This is a webapps exploit for php platform. Description: Green Shop - SQL Injection. Author: PrinceofHacking
|
Analyze the security implications of: Green Shop - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: TP-Link WR840N 0.9.1 3.16 - Denial of Service (PoC)
|
This is a dos exploit for hardware platform. Description: TP-Link WR840N 0.9.1 3.16 - Denial of Service (PoC). Author: Aniket Dinda
|
Analyze the security implications of: TP-Link WR840N 0.9.1 3.16 - Denial of Service (PoC)
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Liens_Dynamiques 2.1 - 'AdminLien.php' Security Restriction Bypass
|
This is a webapps exploit for php platform. Description: Liens_Dynamiques 2.1 - 'AdminLien.php' Security Restriction Bypass. Author: sn0oPy
|
Analyze the security implications of: Liens_Dynamiques 2.1 - 'AdminLien.php' Security Restriction Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple Mac OSX 10.4.8 - DiskManagement BOM Privilege Escalation
|
This is a local exploit for osx platform. Description: Apple Mac OSX 10.4.8 - DiskManagement BOM Privilege Escalation. Author: MoAB
|
Analyze the security implications of: Apple Mac OSX 10.4.8 - DiskManagement BOM Privilege Escalation
|
This exploit targets osx systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Symantec Web Gateway 5.0.3.18 - Arbitrary Password Change
|
This is a webapps exploit for linux platform. Description: Symantec Web Gateway 5.0.3.18 - Arbitrary Password Change. Author: Kc57
|
Analyze the security implications of: Symantec Web Gateway 5.0.3.18 - Arbitrary Password Change
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Integramod 1.4.x - Insecure Directory Download Database
|
This is a webapps exploit for php platform. Description: Integramod 1.4.x - Insecure Directory Download Database. Author: TheJT
|
Analyze the security implications of: Integramod 1.4.x - Insecure Directory Download Database
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Football Website Manager 1.1 - SQL Injection / Multiple HTML Injection Vulnerabilities
|
This is a webapps exploit for php platform. Description: Football Website Manager 1.1 - SQL Injection / Multiple HTML Injection Vulnerabilities. Author: RoAd_KiLlEr
|
Analyze the security implications of: Football Website Manager 1.1 - SQL Injection / Multiple HTML Injection Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Zimbra Collaboration - Autodiscover Servlet XXE and ProxyServlet SSRF (Metasploit)
|
This is a remote exploit for linux platform. Description: Zimbra Collaboration - Autodiscover Servlet XXE and ProxyServlet SSRF (Metasploit). Author: Metasploit
|
Analyze the security implications of: Zimbra Collaboration - Autodiscover Servlet XXE and ProxyServlet SSRF (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: FaScript FaUpload - SQL Injection
|
This is a webapps exploit for php platform. Description: FaScript FaUpload - SQL Injection. Author: Aria-Security Team
|
Analyze the security implications of: FaScript FaUpload - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Pentagram Cerberus P 6363 DSL Router - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: Pentagram Cerberus P 6363 DSL Router - Multiple Vulnerabilities. Author: condis
|
Analyze the security implications of: Pentagram Cerberus P 6363 DSL Router - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Plesk < 9.5.4 - Remote Command Execution
|
This is a remote exploit for php platform. Description: Plesk < 9.5.4 - Remote Command Execution. Author: kingcope
|
Analyze the security implications of: Plesk < 9.5.4 - Remote Command Execution
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: e107 Plugin userjournals_menu - 'blog.id' SQL Injection
|
This is a webapps exploit for php platform. Description: e107 Plugin userjournals_menu - 'blog.id' SQL Injection. Author: boom3rang
|
Analyze the security implications of: e107 Plugin userjournals_menu - 'blog.id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MapInfo Discovery 1.0/1.1 - Remote Log File Access Information Disclosure
|
This is a webapps exploit for asp platform. Description: MapInfo Discovery 1.0/1.1 - Remote Log File Access Information Disclosure. Author: anonymous
|
Analyze the security implications of: MapInfo Discovery 1.0/1.1 - Remote Log File Access Information Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: JAD Java Decompiler 1.5.8e - Local Buffer Overflow
|
This is a local exploit for linux platform. Description: JAD Java Decompiler 1.5.8e - Local Buffer Overflow. Author: Juan Sacco
|
Analyze the security implications of: JAD Java Decompiler 1.5.8e - Local Buffer Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Google Android - 'pm_qos' KASLR Bypass
|
This is a dos exploit for android platform. Description: Google Android - 'pm_qos' KASLR Bypass. Author: Google Security Research
|
Analyze the security implications of: Google Android - 'pm_qos' KASLR Bypass
|
This exploit targets android systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: SonicWall Global Management System - XMLRPC set_time_zone Command Injection (Metasploit)
|
This is a remote exploit for linux platform. Description: SonicWall Global Management System - XMLRPC set_time_zone Command Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: SonicWall Global Management System - XMLRPC set_time_zone Command Injection (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Dotclear 2.4.1.2 - '/admin/blogs.php?nb' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Dotclear 2.4.1.2 - '/admin/blogs.php?nb' Cross-Site Scripting. Author: High-Tech Bridge SA
|
Analyze the security implications of: Dotclear 2.4.1.2 - '/admin/blogs.php?nb' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple QuickTime < 7.7.79.80.95 - '.FPX' Parsing Memory Corruption (2)
|
This is a dos exploit for multiple platform. Description: Apple QuickTime < 7.7.79.80.95 - '.FPX' Parsing Memory Corruption (2). Author: Francis Provencher
|
Analyze the security implications of: Apple QuickTime < 7.7.79.80.95 - '.FPX' Parsing Memory Corruption (2)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: clickandemail - SQL Injection / Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: clickandemail - SQL Injection / Cross-Site Scripting. Author: AlpHaNiX
|
Analyze the security implications of: clickandemail - SQL Injection / Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: JiRos FAQ Manager 1.0 - 'index.asp' SQL Injection
|
This is a webapps exploit for php platform. Description: JiRos FAQ Manager 1.0 - 'index.asp' SQL Injection. Author: ajann
|
Analyze the security implications of: JiRos FAQ Manager 1.0 - 'index.asp' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CMS By SoftnSolv - 'index.php' SQL Injection
|
This is a webapps exploit for php platform. Description: CMS By SoftnSolv - 'index.php' SQL Injection. Author: Th3 RDX
|
Analyze the security implications of: CMS By SoftnSolv - 'index.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Claymore Dual GPU Miner 10.5 - Format String
|
This is a dos exploit for multiple platform. Description: Claymore Dual GPU Miner 10.5 - Format String. Author: res1n
|
Analyze the security implications of: Claymore Dual GPU Miner 10.5 - Format String
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: A Better Member-Based ASP Photo Gallery - 'entry' SQL Injection
|
This is a webapps exploit for php platform. Description: A Better Member-Based ASP Photo Gallery - 'entry' SQL Injection. Author: BackDoor
|
Analyze the security implications of: A Better Member-Based ASP Photo Gallery - 'entry' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Hospitals Patient Records Management System 1.0 - 'room_list' Stored Cross Site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: Hospitals Patient Records Management System 1.0 - 'room_list' Stored Cross Site Scripting (XSS). Author: Sant268
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.