input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: ErfurtWiki R1.02b - Local File Inclusion | This is a webapps exploit for php platform. Description: ErfurtWiki R1.02b - Local File Inclusion. Author: Unohope |
Analyze the security implications of: ErfurtWiki R1.02b - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dental Clinic Appointment Reservation System 1.0 - Cross Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: Dental Clinic Appointment Reservation System 1.0 - Cross Site Request Forgery (Add Admin). Author: Reza Afsahi |
Analyze the security implications of: Dental Clinic Appointment Reservation System 1.0 - Cross Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Atrus Trivalie Productions Simple Network Time Sync 1.0 - daemon Buffer Overflow | This is a remote exploit for linux platform. Description: Atrus Trivalie Productions Simple Network Time Sync 1.0 - daemon Buffer Overflow. Author: Ben Taylor |
Analyze the security implications of: Atrus Trivalie Productions Simple Network Time Sync 1.0 - daemon Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Bajie HTTP Server 0.95 - Example Scripts and Servlets Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Bajie HTTP Server 0.95 - Example Scripts and Servlets Cross-Site Scripting. Author: Oliver Karow |
Analyze the security implications of: Bajie HTTP Server 0.95 - Example Scripts and Servlets Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: VestaCP 0.9.8 - File Upload CSRF | This is a webapps exploit for multiple platform. Description: VestaCP 0.9.8 - File Upload CSRF. Author: Fady Mohammed Osman |
Analyze the security implications of: VestaCP 0.9.8 - File Upload CSRF | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: VTLS Virtua InfoStation.cgi - SQL Injection | This is a webapps exploit for cgi platform. Description: VTLS Virtua InfoStation.cgi - SQL Injection. Author: José Tozo |
Analyze the security implications of: VTLS Virtua InfoStation.cgi - SQL Injection | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Apple Mac OSX 10.x - DirectoryService Denial of Service | This is a dos exploit for osx platform. Description: Apple Mac OSX 10.x - DirectoryService Denial of Service. Author: Neeko Oni |
Analyze the security implications of: Apple Mac OSX 10.x - DirectoryService Denial of Service | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Active eCommerce CMS 6.5.0 - Stored Cross-Site Scripting (XSS) | This is a webapps exploit for multiple platform. Description: Active eCommerce CMS 6.5.0 - Stored Cross-Site Scripting (XSS). Author: Sajibe Kanti |
Analyze the security implications of: Active eCommerce CMS 6.5.0 - Stored Cross-Site Scripting (XSS) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Church Management System 1.0 - Arbitrary File Upload (Authenticated) | This is a webapps exploit for php platform. Description: Church Management System 1.0 - Arbitrary File Upload (Authenticated). Author: Murat DEMİRCİ |
Analyze the security implications of: Church Management System 1.0 - Arbitrary File Upload (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MusicDaemon 0.0.3 - Remote Denial of Service / '/etc/shadow' Stealer (2) | This is a remote exploit for linux platform. Description: MusicDaemon 0.0.3 - Remote Denial of Service / '/etc/shadow' Stealer (2). Author: Tal0n |
Analyze the security implications of: MusicDaemon 0.0.3 - Remote Denial of Service / '/etc/shadow' Stealer (2) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: GS Real Estate Portal US/International Module - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: GS Real Estate Portal US/International Module - Multiple Vulnerabilities. Author: ZoRLu |
Analyze the security implications of: GS Real Estate Portal US/International Module - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Opium OPI Server and CyanPrintIP - Format String / Denial of Service | This is a dos exploit for multiple platform. Description: Opium OPI Server and CyanPrintIP - Format String / Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: Opium OPI Server and CyanPrintIP - Format String / Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apache Struts 2.0.1 < 2.3.33 / 2.5 < 2.5.10 - Arbitrary Code Execution | This is a remote exploit for multiple platform. Description: Apache Struts 2.0.1 < 2.3.33 / 2.5 < 2.5.10 - Arbitrary Code Execution. Author: brianwrf |
Analyze the security implications of: Apache Struts 2.0.1 < 2.3.33 / 2.5 < 2.5.10 - Arbitrary Code Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Opencart < 3.0.2.0 - Denial of Service | This is a dos exploit for php platform. Description: Opencart < 3.0.2.0 - Denial of Service. Author: Todor Donev |
Analyze the security implications of: Opencart < 3.0.2.0 - Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WWWBoard 2.0 - 'passwd.txt' Remote Password Disclosure | This is a webapps exploit for cgi platform. Description: WWWBoard 2.0 - 'passwd.txt' Remote Password Disclosure. Author: bd0rk |
Analyze the security implications of: WWWBoard 2.0 - 'passwd.txt' Remote Password Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Nagios < 4.2.2 - Arbitrary Code Execution | This is a remote exploit for linux platform. Description: Nagios < 4.2.2 - Arbitrary Code Execution. Author: Dawid Golunski |
Analyze the security implications of: Nagios < 4.2.2 - Arbitrary Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Energine CMS - SQL Injection | This is a webapps exploit for php platform. Description: Energine CMS - SQL Injection. Author: High-Tech Bridge SA |
Analyze the security implications of: Energine CMS - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HTTP Upload Tool - 'download.php' Information Disclosure | This is a webapps exploit for php platform. Description: HTTP Upload Tool - 'download.php' Information Disclosure. Author: Craig Heffner |
Analyze the security implications of: HTTP Upload Tool - 'download.php' Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreeBSD 4.10/5.x - 'execve()' Unaligned Memory Access Denial of Service | This is a dos exploit for freebsd platform. Description: FreeBSD 4.10/5.x - 'execve()' Unaligned Memory Access Denial of Service. Author: Marceta Milos |
Analyze the security implications of: FreeBSD 4.10/5.x - 'execve()' Unaligned Memory Access Denial of Service | This exploit targets freebsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: Clip Bucket 1.7.1 - Insecure Cookie Handling | This is a webapps exploit for php platform. Description: Clip Bucket 1.7.1 - Insecure Cookie Handling. Author: Qabandi |
Analyze the security implications of: Clip Bucket 1.7.1 - Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Live CMS - SQL Injection | This is a webapps exploit for php platform. Description: Live CMS - SQL Injection. Author: ahwak2000 |
Analyze the security implications of: Live CMS - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ManageEngine Network Configuration Manager 12.2 - 'apiKey' SQL Injection | This is a webapps exploit for java platform. Description: ManageEngine Network Configuration Manager 12.2 - 'apiKey' SQL Injection. Author: Ertebat Gostar Co |
Analyze the security implications of: ManageEngine Network Configuration Manager 12.2 - 'apiKey' SQL Injection | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Cyberfolio 7.12.2 - 'theme' Local File Inclusion | This is a webapps exploit for php platform. Description: Cyberfolio 7.12.2 - 'theme' Local File Inclusion. Author: dun |
Analyze the security implications of: Cyberfolio 7.12.2 - 'theme' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle E-Business Suite 12.x - Server-Side Request Forgery | This is a webapps exploit for jsp platform. Description: Oracle E-Business Suite 12.x - Server-Side Request Forgery. Author: Sarath Nair |
Analyze the security implications of: Oracle E-Business Suite 12.x - Server-Side Request Forgery | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: 4Images 1.7.7 - 'image_utils.php' Remote Command Execution | This is a webapps exploit for php platform. Description: 4Images 1.7.7 - 'image_utils.php' Remote Command Execution. Author: Sn!pEr.S!Te Hacker |
Analyze the security implications of: 4Images 1.7.7 - 'image_utils.php' Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CGIScript.net CSFAQ 1.0 Script - Full Path Disclosure | This is a webapps exploit for cgi platform. Description: CGIScript.net CSFAQ 1.0 Script - Full Path Disclosure. Author: DarkBicho |
Analyze the security implications of: CGIScript.net CSFAQ 1.0 Script - Full Path Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Joomla! Component joomlacontenteditor 2.0.10 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Joomla! Component joomlacontenteditor 2.0.10 - Multiple Vulnerabilities. Author: AmnPardaz |
Analyze the security implications of: Joomla! Component joomlacontenteditor 2.0.10 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CUPS 1.3.7 - 'HP-GL/2' Filter Remote Code Execution | This is a remote exploit for linux platform. Description: CUPS 1.3.7 - 'HP-GL/2' Filter Remote Code Execution. Author: regenrecht |
Analyze the security implications of: CUPS 1.3.7 - 'HP-GL/2' Filter Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Maple Maplet - File Creation / Command Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Maple Maplet - File Creation / Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Maple Maplet - File Creation / Command Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Thunderbird ESR < 60.7.XXX - 'icalmemorystrdupanddequote' Heap-Based Buffer Overflow | This is a dos exploit for multiple platform. Description: Thunderbird ESR < 60.7.XXX - 'icalmemorystrdupanddequote' Heap-Based Buffer Overflow. Author: X41 D-Sec GmbH |
Analyze the security implications of: Thunderbird ESR < 60.7.XXX - 'icalmemorystrdupanddequote' Heap-Based Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Hot Links SQL-PHP - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Hot Links SQL-PHP - Multiple Cross-Site Scripting Vulnerabilities. Author: sl4xUz |
Analyze the security implications of: Hot Links SQL-PHP - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Keene Digital Media Server 1.0.2 - Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Keene Digital Media Server 1.0.2 - Cross-Site Scripting. Author: dr_insane |
Analyze the security implications of: Keene Digital Media Server 1.0.2 - Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: EZ Publish 3.9.0/3.9.5/3.10.1 - Command Execution (Admin Required) | This is a webapps exploit for php platform. Description: EZ Publish 3.9.0/3.9.5/3.10.1 - Command Execution (Admin Required). Author: s4avrd0w |
Analyze the security implications of: EZ Publish 3.9.0/3.9.5/3.10.1 - Command Execution (Admin Required) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JaxUltraBB 2.0 - 'delete.php' Remote Auto Deface | This is a webapps exploit for php platform. Description: JaxUltraBB 2.0 - 'delete.php' Remote Auto Deface. Author: Kacper |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.