input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Aztek Forum 4.0 - 'myadmin.php' User Privilege Escalation | This is a webapps exploit for php platform. Description: Aztek Forum 4.0 - 'myadmin.php' User Privilege Escalation. Author: Sparah |
Analyze the security implications of: Aztek Forum 4.0 - 'myadmin.php' User Privilege Escalation | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Interscan Web Security 5.0 - Arbitrary File Upload / Privilege Escalation | This is a webapps exploit for multiple platform. Description: Interscan Web Security 5.0 - Arbitrary File Upload / Privilege Escalation. Author: Ivan Huertas |
Analyze the security implications of: Interscan Web Security 5.0 - Arbitrary File Upload / Privilege Escalation | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Galaxy FTP Server 1.0 (Neostrada Livebox DSL Router) - Denial of Service | This is a dos exploit for linux platform. Description: Galaxy FTP Server 1.0 (Neostrada Livebox DSL Router) - Denial of Service. Author: 0in |
Analyze the security implications of: Galaxy FTP Server 1.0 (Neostrada Livebox DSL Router) - Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Perl2Exe 1.0 9/5.0 2/6.0 - Code Obfuscation | This is a local exploit for multiple platform. Description: Perl2Exe 1.0 9/5.0 2/6.0 - Code Obfuscation. Author: Simon Cozens |
Analyze the security implications of: Perl2Exe 1.0 9/5.0 2/6.0 - Code Obfuscation | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Socat 1.4.0.2 - Not SETUID Local Format String | This is a local exploit for linux platform. Description: Socat 1.4.0.2 - Not SETUID Local Format String. Author: CoKi |
Analyze the security implications of: Socat 1.4.0.2 - Not SETUID Local Format String | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: aspWebLinks 2.0 - SQL Injection / Admin Pass Change | This is a webapps exploit for asp platform. Description: aspWebLinks 2.0 - SQL Injection / Admin Pass Change. Author: ajann |
Analyze the security implications of: aspWebLinks 2.0 - SQL Injection / Admin Pass Change | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: BlogEngine 3.3.8 - 'Content' Stored XSS | This is a webapps exploit for aspx platform. Description: BlogEngine 3.3.8 - 'Content' Stored XSS. Author: Andrey Stoykov |
Analyze the security implications of: BlogEngine 3.3.8 - 'Content' Stored XSS | This exploit targets aspx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aspx platform |
What is this exploit about: Joomla! Component Joomlaboard 1.1.1 - 'sbp' Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Joomlaboard 1.1.1 - 'sbp' Remote File Inclusion. Author: Cold Zero |
Analyze the security implications of: Joomla! Component Joomlaboard 1.1.1 - 'sbp' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Check Point Firewall-1 4 Securemote - Network Information Leak | This is a remote exploit for hardware platform. Description: Check Point Firewall-1 4 Securemote - Network Information Leak. Author: Haroon Meer & Roelof Temmingh |
Analyze the security implications of: Check Point Firewall-1 4 Securemote - Network Information Leak | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Help Center Live 1.0/1.2/2.0 - 'module.php' Local File Inclusion | This is a webapps exploit for php platform. Description: Help Center Live 1.0/1.2/2.0 - 'module.php' Local File Inclusion. Author: HACKERS PAL |
Analyze the security implications of: Help Center Live 1.0/1.2/2.0 - 'module.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: COms - 'dynamic.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: COms - 'dynamic.php' Cross-Site Scripting. Author: Pouya_Server |
Analyze the security implications of: COms - 'dynamic.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Valve Software Half-Life Server 3.1.1.0 - Multiplayer Request Buffer Overflow | This is a remote exploit for linux platform. Description: Valve Software Half-Life Server 3.1.1.0 - Multiplayer Request Buffer Overflow. Author: KnbykL |
Analyze the security implications of: Valve Software Half-Life Server 3.1.1.0 - Multiplayer Request Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Emefa Guestbook 3.0 - Remote Database Disclosure | This is a webapps exploit for asp platform. Description: Emefa Guestbook 3.0 - Remote Database Disclosure. Author: Cyber.Zer0 |
Analyze the security implications of: Emefa Guestbook 3.0 - Remote Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: FileBox File Hosting & Sharing Script 1.5 - SQL Injection | This is a webapps exploit for php platform. Description: FileBox File Hosting & Sharing Script 1.5 - SQL Injection. Author: SubhashDasyam |
Analyze the security implications of: FileBox File Hosting & Sharing Script 1.5 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Facturation System 1.0 - 'modid' SQL Injection | This is a webapps exploit for php platform. Description: Facturation System 1.0 - 'modid' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Facturation System 1.0 - 'modid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASPIntranet 2.1 - Multiple SQL Injections | This is a webapps exploit for asp platform. Description: ASPIntranet 2.1 - Multiple SQL Injections. Author: Aria-Security Team |
Analyze the security implications of: ASPIntranet 2.1 - Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ADN Forum 1.0b - Blind SQL Injection | This is a webapps exploit for php platform. Description: ADN Forum 1.0b - Blind SQL Injection. Author: StAkeR |
Analyze the security implications of: ADN Forum 1.0b - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SolarWinds Orion IP Address Manager (IPAM) - 'search.aspx' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: SolarWinds Orion IP Address Manager (IPAM) - 'search.aspx' Cross-Site Scripting. Author: Anthony Trummer |
Analyze the security implications of: SolarWinds Orion IP Address Manager (IPAM) - 'search.aspx' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ATutor 1.5.1 - 'password_reminder.php' SQL Injection | This is a webapps exploit for php platform. Description: ATutor 1.5.1 - 'password_reminder.php' SQL Injection. Author: rgod |
Analyze the security implications of: ATutor 1.5.1 - 'password_reminder.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jorp 1.3.05.09 - Arbitrary Remove Projects/Tasks | This is a webapps exploit for php platform. Description: Jorp 1.3.05.09 - Arbitrary Remove Projects/Tasks. Author: YEnH4ckEr |
Analyze the security implications of: Jorp 1.3.05.09 - Arbitrary Remove Projects/Tasks | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ProFTPd 1.3.0/1.3.0a - 'mod_ctrls' 'support' Local Buffer Overflow (2) | This is a local exploit for linux platform. Description: ProFTPd 1.3.0/1.3.0a - 'mod_ctrls' 'support' Local Buffer Overflow (2). Author: Revenge |
Analyze the security implications of: ProFTPd 1.3.0/1.3.0a - 'mod_ctrls' 'support' Local Buffer Overflow (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Linux Kernel - 'offset2lib' Stack Clash | This is a local exploit for linux_x86 platform. Description: Linux Kernel - 'offset2lib' Stack Clash. Author: Qualys Corporation |
Analyze the security implications of: Linux Kernel - 'offset2lib' Stack Clash | This exploit targets linux_x86 systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux_x86 platform |
What is this exploit about: ARRIS DG860A - NVRAM Backup Password Disclosure | This is a webapps exploit for hardware platform. Description: ARRIS DG860A - NVRAM Backup Password Disclosure. Author: Justin Oberdorf |
Analyze the security implications of: ARRIS DG860A - NVRAM Backup Password Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Invision Power Board 2.3.5 - SQL Injection | This is a webapps exploit for php platform. Description: Invision Power Board 2.3.5 - SQL Injection. Author: waraxe |
Analyze the security implications of: Invision Power Board 2.3.5 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: All-Dynamics Digital Signage System 2.0.2 - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for hardware platform. Description: All-Dynamics Digital Signage System 2.0.2 - Cross-Site Request Forgery (Add Admin). Author: LiquidWorm |
Analyze the security implications of: All-Dynamics Digital Signage System 2.0.2 - Cross-Site Request Forgery (Add Admin) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CKGold Shopping Cart 2.5 - 'category_id' SQL Injection | This is a webapps exploit for php platform. Description: CKGold Shopping Cart 2.5 - 'category_id' SQL Injection. Author: Cr@zy_King |
Analyze the security implications of: CKGold Shopping Cart 2.5 - 'category_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Samsung - SecEmailComposer QUICK_REPLY_BACKGROUND Permissions | This is a dos exploit for android platform. Description: Samsung - SecEmailComposer QUICK_REPLY_BACKGROUND Permissions. Author: Google Security Research |
Analyze the security implications of: Samsung - SecEmailComposer QUICK_REPLY_BACKGROUND Permissions | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: BaBB 2.8 - Remote Code Injection | This is a webapps exploit for php platform. Description: BaBB 2.8 - Remote Code Injection. Author: Khashayar Fereidani |
Analyze the security implications of: BaBB 2.8 - Remote Code Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Nginx 1.3.9 < 1.4.0 - Chuncked Encoding Stack Buffer Overflow (Metasploit) | This is a remote exploit for linux platform. Description: Nginx 1.3.9 < 1.4.0 - Chuncked Encoding Stack Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: Nginx 1.3.9 < 1.4.0 - Chuncked Encoding Stack Buffer Overflow (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: BMForum 3.0 - 'announcesys.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: BMForum 3.0 - 'announcesys.php' Cross-Site Scripting. Author: Lostmon |
Analyze the security implications of: BMForum 3.0 - 'announcesys.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JV2 Folder Gallery 3.0 - 'download.php' Remote File Disclosure | This is a webapps exploit for php platform. Description: JV2 Folder Gallery 3.0 - 'download.php' Remote File Disclosure. Author: PeTrO |
Analyze the security implications of: JV2 Folder Gallery 3.0 - 'download.php' Remote File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Intellectual Property 1.5.3 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Intellectual Property 1.5.3 - 'id' SQL Injection. Author: v3n0m |
Analyze the security implications of: Joomla! Component Intellectual Property 1.5.3 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CVSTrac 2.0.0 - Defacement Denial of Service | This is a dos exploit for cgi platform. Description: CVSTrac 2.0.0 - Defacement Denial of Service. Author: Ralf S. Engelschall |
Analyze the security implications of: CVSTrac 2.0.0 - Defacement Denial of Service | This exploit targets cgi systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.