input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: ErfurtWiki R1.02b - Local File Inclusion
|
This is a webapps exploit for php platform. Description: ErfurtWiki R1.02b - Local File Inclusion. Author: Unohope
|
Analyze the security implications of: ErfurtWiki R1.02b - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dental Clinic Appointment Reservation System 1.0 - Cross Site Request Forgery (Add Admin)
|
This is a webapps exploit for php platform. Description: Dental Clinic Appointment Reservation System 1.0 - Cross Site Request Forgery (Add Admin). Author: Reza Afsahi
|
Analyze the security implications of: Dental Clinic Appointment Reservation System 1.0 - Cross Site Request Forgery (Add Admin)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Atrus Trivalie Productions Simple Network Time Sync 1.0 - daemon Buffer Overflow
|
This is a remote exploit for linux platform. Description: Atrus Trivalie Productions Simple Network Time Sync 1.0 - daemon Buffer Overflow. Author: Ben Taylor
|
Analyze the security implications of: Atrus Trivalie Productions Simple Network Time Sync 1.0 - daemon Buffer Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Bajie HTTP Server 0.95 - Example Scripts and Servlets Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: Bajie HTTP Server 0.95 - Example Scripts and Servlets Cross-Site Scripting. Author: Oliver Karow
|
Analyze the security implications of: Bajie HTTP Server 0.95 - Example Scripts and Servlets Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: VestaCP 0.9.8 - File Upload CSRF
|
This is a webapps exploit for multiple platform. Description: VestaCP 0.9.8 - File Upload CSRF. Author: Fady Mohammed Osman
|
Analyze the security implications of: VestaCP 0.9.8 - File Upload CSRF
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: VTLS Virtua InfoStation.cgi - SQL Injection
|
This is a webapps exploit for cgi platform. Description: VTLS Virtua InfoStation.cgi - SQL Injection. Author: José Tozo
|
Analyze the security implications of: VTLS Virtua InfoStation.cgi - SQL Injection
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Apple Mac OSX 10.x - DirectoryService Denial of Service
|
This is a dos exploit for osx platform. Description: Apple Mac OSX 10.x - DirectoryService Denial of Service. Author: Neeko Oni
|
Analyze the security implications of: Apple Mac OSX 10.x - DirectoryService Denial of Service
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Active eCommerce CMS 6.5.0 - Stored Cross-Site Scripting (XSS)
|
This is a webapps exploit for multiple platform. Description: Active eCommerce CMS 6.5.0 - Stored Cross-Site Scripting (XSS). Author: Sajibe Kanti
|
Analyze the security implications of: Active eCommerce CMS 6.5.0 - Stored Cross-Site Scripting (XSS)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Church Management System 1.0 - Arbitrary File Upload (Authenticated)
|
This is a webapps exploit for php platform. Description: Church Management System 1.0 - Arbitrary File Upload (Authenticated). Author: Murat DEMİRCİ
|
Analyze the security implications of: Church Management System 1.0 - Arbitrary File Upload (Authenticated)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MusicDaemon 0.0.3 - Remote Denial of Service / '/etc/shadow' Stealer (2)
|
This is a remote exploit for linux platform. Description: MusicDaemon 0.0.3 - Remote Denial of Service / '/etc/shadow' Stealer (2). Author: Tal0n
|
Analyze the security implications of: MusicDaemon 0.0.3 - Remote Denial of Service / '/etc/shadow' Stealer (2)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: GS Real Estate Portal US/International Module - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: GS Real Estate Portal US/International Module - Multiple Vulnerabilities. Author: ZoRLu
|
Analyze the security implications of: GS Real Estate Portal US/International Module - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Opium OPI Server and CyanPrintIP - Format String / Denial of Service
|
This is a dos exploit for multiple platform. Description: Opium OPI Server and CyanPrintIP - Format String / Denial of Service. Author: Luigi Auriemma
|
Analyze the security implications of: Opium OPI Server and CyanPrintIP - Format String / Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Apache Struts 2.0.1 < 2.3.33 / 2.5 < 2.5.10 - Arbitrary Code Execution
|
This is a remote exploit for multiple platform. Description: Apache Struts 2.0.1 < 2.3.33 / 2.5 < 2.5.10 - Arbitrary Code Execution. Author: brianwrf
|
Analyze the security implications of: Apache Struts 2.0.1 < 2.3.33 / 2.5 < 2.5.10 - Arbitrary Code Execution
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Opencart < 3.0.2.0 - Denial of Service
|
This is a dos exploit for php platform. Description: Opencart < 3.0.2.0 - Denial of Service. Author: Todor Donev
|
Analyze the security implications of: Opencart < 3.0.2.0 - Denial of Service
|
This exploit targets php systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WWWBoard 2.0 - 'passwd.txt' Remote Password Disclosure
|
This is a webapps exploit for cgi platform. Description: WWWBoard 2.0 - 'passwd.txt' Remote Password Disclosure. Author: bd0rk
|
Analyze the security implications of: WWWBoard 2.0 - 'passwd.txt' Remote Password Disclosure
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Nagios < 4.2.2 - Arbitrary Code Execution
|
This is a remote exploit for linux platform. Description: Nagios < 4.2.2 - Arbitrary Code Execution. Author: Dawid Golunski
|
Analyze the security implications of: Nagios < 4.2.2 - Arbitrary Code Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Energine CMS - SQL Injection
|
This is a webapps exploit for php platform. Description: Energine CMS - SQL Injection. Author: High-Tech Bridge SA
|
Analyze the security implications of: Energine CMS - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HTTP Upload Tool - 'download.php' Information Disclosure
|
This is a webapps exploit for php platform. Description: HTTP Upload Tool - 'download.php' Information Disclosure. Author: Craig Heffner
|
Analyze the security implications of: HTTP Upload Tool - 'download.php' Information Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FreeBSD 4.10/5.x - 'execve()' Unaligned Memory Access Denial of Service
|
This is a dos exploit for freebsd platform. Description: FreeBSD 4.10/5.x - 'execve()' Unaligned Memory Access Denial of Service. Author: Marceta Milos
|
Analyze the security implications of: FreeBSD 4.10/5.x - 'execve()' Unaligned Memory Access Denial of Service
|
This exploit targets freebsd systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets freebsd platform
|
What is this exploit about: Clip Bucket 1.7.1 - Insecure Cookie Handling
|
This is a webapps exploit for php platform. Description: Clip Bucket 1.7.1 - Insecure Cookie Handling. Author: Qabandi
|
Analyze the security implications of: Clip Bucket 1.7.1 - Insecure Cookie Handling
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Live CMS - SQL Injection
|
This is a webapps exploit for php platform. Description: Live CMS - SQL Injection. Author: ahwak2000
|
Analyze the security implications of: Live CMS - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ManageEngine Network Configuration Manager 12.2 - 'apiKey' SQL Injection
|
This is a webapps exploit for java platform. Description: ManageEngine Network Configuration Manager 12.2 - 'apiKey' SQL Injection. Author: Ertebat Gostar Co
|
Analyze the security implications of: ManageEngine Network Configuration Manager 12.2 - 'apiKey' SQL Injection
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Cyberfolio 7.12.2 - 'theme' Local File Inclusion
|
This is a webapps exploit for php platform. Description: Cyberfolio 7.12.2 - 'theme' Local File Inclusion. Author: dun
|
Analyze the security implications of: Cyberfolio 7.12.2 - 'theme' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Oracle E-Business Suite 12.x - Server-Side Request Forgery
|
This is a webapps exploit for jsp platform. Description: Oracle E-Business Suite 12.x - Server-Side Request Forgery. Author: Sarath Nair
|
Analyze the security implications of: Oracle E-Business Suite 12.x - Server-Side Request Forgery
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: 4Images 1.7.7 - 'image_utils.php' Remote Command Execution
|
This is a webapps exploit for php platform. Description: 4Images 1.7.7 - 'image_utils.php' Remote Command Execution. Author: Sn!pEr.S!Te Hacker
|
Analyze the security implications of: 4Images 1.7.7 - 'image_utils.php' Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CGIScript.net CSFAQ 1.0 Script - Full Path Disclosure
|
This is a webapps exploit for cgi platform. Description: CGIScript.net CSFAQ 1.0 Script - Full Path Disclosure. Author: DarkBicho
|
Analyze the security implications of: CGIScript.net CSFAQ 1.0 Script - Full Path Disclosure
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Joomla! Component joomlacontenteditor 2.0.10 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Joomla! Component joomlacontenteditor 2.0.10 - Multiple Vulnerabilities. Author: AmnPardaz
|
Analyze the security implications of: Joomla! Component joomlacontenteditor 2.0.10 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CUPS 1.3.7 - 'HP-GL/2' Filter Remote Code Execution
|
This is a remote exploit for linux platform. Description: CUPS 1.3.7 - 'HP-GL/2' Filter Remote Code Execution. Author: regenrecht
|
Analyze the security implications of: CUPS 1.3.7 - 'HP-GL/2' Filter Remote Code Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Maple Maplet - File Creation / Command Execution (Metasploit)
|
This is a remote exploit for multiple platform. Description: Maple Maplet - File Creation / Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Maple Maplet - File Creation / Command Execution (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Thunderbird ESR < 60.7.XXX - 'icalmemorystrdupanddequote' Heap-Based Buffer Overflow
|
This is a dos exploit for multiple platform. Description: Thunderbird ESR < 60.7.XXX - 'icalmemorystrdupanddequote' Heap-Based Buffer Overflow. Author: X41 D-Sec GmbH
|
Analyze the security implications of: Thunderbird ESR < 60.7.XXX - 'icalmemorystrdupanddequote' Heap-Based Buffer Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Hot Links SQL-PHP - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Hot Links SQL-PHP - Multiple Cross-Site Scripting Vulnerabilities. Author: sl4xUz
|
Analyze the security implications of: Hot Links SQL-PHP - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Keene Digital Media Server 1.0.2 - Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: Keene Digital Media Server 1.0.2 - Cross-Site Scripting. Author: dr_insane
|
Analyze the security implications of: Keene Digital Media Server 1.0.2 - Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: EZ Publish 3.9.0/3.9.5/3.10.1 - Command Execution (Admin Required)
|
This is a webapps exploit for php platform. Description: EZ Publish 3.9.0/3.9.5/3.10.1 - Command Execution (Admin Required). Author: s4avrd0w
|
Analyze the security implications of: EZ Publish 3.9.0/3.9.5/3.10.1 - Command Execution (Admin Required)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: JaxUltraBB 2.0 - 'delete.php' Remote Auto Deface
|
This is a webapps exploit for php platform. Description: JaxUltraBB 2.0 - 'delete.php' Remote Auto Deface. Author: Kacper
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.