input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: mintinstall 7.9.9 - Code Execution | This is a webapps exploit for linux platform. Description: mintinstall 7.9.9 - Code Execution. Author: İbrahim Hakan Şeker |
Analyze the security implications of: mintinstall 7.9.9 - Code Execution | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: anaconda Foundation 1.4 < 1.9 - Directory Traversal | This is a remote exploit for cgi platform. Description: anaconda Foundation 1.4 < 1.9 - Directory Traversal. Author: pestilence |
Analyze the security implications of: anaconda Foundation 1.4 < 1.9 - Directory Traversal | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Tenable Appliance < 4.5 - Root Remote Code Execution | This is a remote exploit for linux platform. Description: Tenable Appliance < 4.5 - Root Remote Code Execution. Author: agix |
Analyze the security implications of: Tenable Appliance < 4.5 - Root Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CGI Script Center Account Manager 1.0 LITE / PRO - Administrative Password Alteration (1) | This is a remote exploit for cgi platform. Description: CGI Script Center Account Manager 1.0 LITE / PRO - Administrative Password Alteration (1). Author: teleh0r |
Analyze the security implications of: CGI Script Center Account Manager 1.0 LITE / PRO - Administrative Password Alteration (1) | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: GNU glibc - 'strcoll()' Routine Integer Overflow | This is a dos exploit for linux platform. Description: GNU glibc - 'strcoll()' Routine Integer Overflow. Author: Jan iankko Lieskovsky |
Analyze the security implications of: GNU glibc - 'strcoll()' Routine Integer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Caldera - '/costview2/jobs.php?tr' SQL Injection | This is a webapps exploit for php platform. Description: Caldera - '/costview2/jobs.php?tr' SQL Injection. Author: Thomas Fischer |
Analyze the security implications of: Caldera - '/costview2/jobs.php?tr' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Site2Nite Real Estate Web - 'agentlist.asp' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: Site2Nite Real Estate Web - 'agentlist.asp' Multiple SQL Injections. Author: S@BUN |
Analyze the security implications of: Site2Nite Real Estate Web - 'agentlist.asp' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: MapInfo Discovery 1.0/1.1 - Cleartext Transmission Credential Disclosure | This is a webapps exploit for asp platform. Description: MapInfo Discovery 1.0/1.1 - Cleartext Transmission Credential Disclosure. Author: anonymous |
Analyze the security implications of: MapInfo Discovery 1.0/1.1 - Cleartext Transmission Credential Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Apache mod_proxy_cluster 1.2.6 - Stored XSS | This is a webapps exploit for php platform. Description: Apache mod_proxy_cluster 1.2.6 - Stored XSS. Author: Mohamed Mounir Boudjema |
Analyze the security implications of: Apache mod_proxy_cluster 1.2.6 - Stored XSS | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DataLife Engine 8.3 - '/engine/inc/include/init.php?selected_language' Remote File Inclusion | This is a webapps exploit for php platform. Description: DataLife Engine 8.3 - '/engine/inc/include/init.php?selected_language' Remote File Inclusion. Author: indoushka |
Analyze the security implications of: DataLife Engine 8.3 - '/engine/inc/include/init.php?selected_language' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Green Shop - SQL Injection | This is a webapps exploit for php platform. Description: Green Shop - SQL Injection. Author: PrinceofHacking |
Analyze the security implications of: Green Shop - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TP-Link WR840N 0.9.1 3.16 - Denial of Service (PoC) | This is a dos exploit for hardware platform. Description: TP-Link WR840N 0.9.1 3.16 - Denial of Service (PoC). Author: Aniket Dinda |
Analyze the security implications of: TP-Link WR840N 0.9.1 3.16 - Denial of Service (PoC) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Liens_Dynamiques 2.1 - 'AdminLien.php' Security Restriction Bypass | This is a webapps exploit for php platform. Description: Liens_Dynamiques 2.1 - 'AdminLien.php' Security Restriction Bypass. Author: sn0oPy |
Analyze the security implications of: Liens_Dynamiques 2.1 - 'AdminLien.php' Security Restriction Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX 10.4.8 - DiskManagement BOM Privilege Escalation | This is a local exploit for osx platform. Description: Apple Mac OSX 10.4.8 - DiskManagement BOM Privilege Escalation. Author: MoAB |
Analyze the security implications of: Apple Mac OSX 10.4.8 - DiskManagement BOM Privilege Escalation | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Symantec Web Gateway 5.0.3.18 - Arbitrary Password Change | This is a webapps exploit for linux platform. Description: Symantec Web Gateway 5.0.3.18 - Arbitrary Password Change. Author: Kc57 |
Analyze the security implications of: Symantec Web Gateway 5.0.3.18 - Arbitrary Password Change | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Integramod 1.4.x - Insecure Directory Download Database | This is a webapps exploit for php platform. Description: Integramod 1.4.x - Insecure Directory Download Database. Author: TheJT |
Analyze the security implications of: Integramod 1.4.x - Insecure Directory Download Database | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Football Website Manager 1.1 - SQL Injection / Multiple HTML Injection Vulnerabilities | This is a webapps exploit for php platform. Description: Football Website Manager 1.1 - SQL Injection / Multiple HTML Injection Vulnerabilities. Author: RoAd_KiLlEr |
Analyze the security implications of: Football Website Manager 1.1 - SQL Injection / Multiple HTML Injection Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Zimbra Collaboration - Autodiscover Servlet XXE and ProxyServlet SSRF (Metasploit) | This is a remote exploit for linux platform. Description: Zimbra Collaboration - Autodiscover Servlet XXE and ProxyServlet SSRF (Metasploit). Author: Metasploit |
Analyze the security implications of: Zimbra Collaboration - Autodiscover Servlet XXE and ProxyServlet SSRF (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FaScript FaUpload - SQL Injection | This is a webapps exploit for php platform. Description: FaScript FaUpload - SQL Injection. Author: Aria-Security Team |
Analyze the security implications of: FaScript FaUpload - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Pentagram Cerberus P 6363 DSL Router - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Pentagram Cerberus P 6363 DSL Router - Multiple Vulnerabilities. Author: condis |
Analyze the security implications of: Pentagram Cerberus P 6363 DSL Router - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Plesk < 9.5.4 - Remote Command Execution | This is a remote exploit for php platform. Description: Plesk < 9.5.4 - Remote Command Execution. Author: kingcope |
Analyze the security implications of: Plesk < 9.5.4 - Remote Command Execution | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: e107 Plugin userjournals_menu - 'blog.id' SQL Injection | This is a webapps exploit for php platform. Description: e107 Plugin userjournals_menu - 'blog.id' SQL Injection. Author: boom3rang |
Analyze the security implications of: e107 Plugin userjournals_menu - 'blog.id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MapInfo Discovery 1.0/1.1 - Remote Log File Access Information Disclosure | This is a webapps exploit for asp platform. Description: MapInfo Discovery 1.0/1.1 - Remote Log File Access Information Disclosure. Author: anonymous |
Analyze the security implications of: MapInfo Discovery 1.0/1.1 - Remote Log File Access Information Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: JAD Java Decompiler 1.5.8e - Local Buffer Overflow | This is a local exploit for linux platform. Description: JAD Java Decompiler 1.5.8e - Local Buffer Overflow. Author: Juan Sacco |
Analyze the security implications of: JAD Java Decompiler 1.5.8e - Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Google Android - 'pm_qos' KASLR Bypass | This is a dos exploit for android platform. Description: Google Android - 'pm_qos' KASLR Bypass. Author: Google Security Research |
Analyze the security implications of: Google Android - 'pm_qos' KASLR Bypass | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: SonicWall Global Management System - XMLRPC set_time_zone Command Injection (Metasploit) | This is a remote exploit for linux platform. Description: SonicWall Global Management System - XMLRPC set_time_zone Command Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: SonicWall Global Management System - XMLRPC set_time_zone Command Injection (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Dotclear 2.4.1.2 - '/admin/blogs.php?nb' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Dotclear 2.4.1.2 - '/admin/blogs.php?nb' Cross-Site Scripting. Author: High-Tech Bridge SA |
Analyze the security implications of: Dotclear 2.4.1.2 - '/admin/blogs.php?nb' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple QuickTime < 7.7.79.80.95 - '.FPX' Parsing Memory Corruption (2) | This is a dos exploit for multiple platform. Description: Apple QuickTime < 7.7.79.80.95 - '.FPX' Parsing Memory Corruption (2). Author: Francis Provencher |
Analyze the security implications of: Apple QuickTime < 7.7.79.80.95 - '.FPX' Parsing Memory Corruption (2) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: clickandemail - SQL Injection / Cross-Site Scripting | This is a webapps exploit for asp platform. Description: clickandemail - SQL Injection / Cross-Site Scripting. Author: AlpHaNiX |
Analyze the security implications of: clickandemail - SQL Injection / Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: JiRos FAQ Manager 1.0 - 'index.asp' SQL Injection | This is a webapps exploit for php platform. Description: JiRos FAQ Manager 1.0 - 'index.asp' SQL Injection. Author: ajann |
Analyze the security implications of: JiRos FAQ Manager 1.0 - 'index.asp' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMS By SoftnSolv - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: CMS By SoftnSolv - 'index.php' SQL Injection. Author: Th3 RDX |
Analyze the security implications of: CMS By SoftnSolv - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Claymore Dual GPU Miner 10.5 - Format String | This is a dos exploit for multiple platform. Description: Claymore Dual GPU Miner 10.5 - Format String. Author: res1n |
Analyze the security implications of: Claymore Dual GPU Miner 10.5 - Format String | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: A Better Member-Based ASP Photo Gallery - 'entry' SQL Injection | This is a webapps exploit for php platform. Description: A Better Member-Based ASP Photo Gallery - 'entry' SQL Injection. Author: BackDoor |
Analyze the security implications of: A Better Member-Based ASP Photo Gallery - 'entry' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Hospitals Patient Records Management System 1.0 - 'room_list' Stored Cross Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Hospitals Patient Records Management System 1.0 - 'room_list' Stored Cross Site Scripting (XSS). Author: Sant268 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.