input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Geany .18 - Local File Overwrite
|
This is a local exploit for linux platform. Description: Geany .18 - Local File Overwrite. Author: Jeremy Brown
|
Analyze the security implications of: Geany .18 - Local File Overwrite
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: FreeNews 2.1 - Include Undefined Variable Command Execution
|
This is a webapps exploit for php platform. Description: FreeNews 2.1 - Include Undefined Variable Command Execution. Author: frog
|
Analyze the security implications of: FreeNews 2.1 - Include Undefined Variable Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Sun One 5.1 / IPlanet 5.0/5.1 - Administration Server Directory Traversal
|
This is a remote exploit for multiple platform. Description: Sun One 5.1 / IPlanet 5.0/5.1 - Administration Server Directory Traversal. Author: Jim Hardisty
|
Analyze the security implications of: Sun One 5.1 / IPlanet 5.0/5.1 - Administration Server Directory Traversal
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: PHPMailer 1.7 - 'Data()' Remote Denial of Service
|
This is a dos exploit for php platform. Description: PHPMailer 1.7 - 'Data()' Remote Denial of Service. Author: Mariano Nunez Di Croce
|
Analyze the security implications of: PHPMailer 1.7 - 'Data()' Remote Denial of Service
|
This exploit targets php systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Wireshark < 0.99.5 - DNP3 Dissector Infinite Loop
|
This is a dos exploit for linux platform. Description: Wireshark < 0.99.5 - DNP3 Dissector Infinite Loop. Author: Beyond Security
|
Analyze the security implications of: Wireshark < 0.99.5 - DNP3 Dissector Infinite Loop
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: X7 Chat 2.0.5 - 'message.php' PHP Code Execution (Metasploit)
|
This is a remote exploit for php platform. Description: X7 Chat 2.0.5 - 'message.php' PHP Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: X7 Chat 2.0.5 - 'message.php' PHP Code Execution (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Blood Donor Management System v1.0 - Stored XSS
|
This is a webapps exploit for php platform. Description: Blood Donor Management System v1.0 - Stored XSS. Author: Ehlullah Albayrak
|
Analyze the security implications of: Blood Donor Management System v1.0 - Stored XSS
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Add a link 4 - Security Bypass / SQL Injection
|
This is a webapps exploit for php platform. Description: Add a link 4 - Security Bypass / SQL Injection. Author: JosS
|
Analyze the security implications of: Add a link 4 - Security Bypass / SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: b2evolution 1.8.2/1.9 - '_404_not_found.page.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: b2evolution 1.8.2/1.9 - '_404_not_found.page.php' Multiple Cross-Site Scripting Vulnerabilities. Author: lotto fischer
|
Analyze the security implications of: b2evolution 1.8.2/1.9 - '_404_not_found.page.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Philips VOIP841 Firmware 1.0.4.800 - Multiple Vulnerabilities
|
This is a remote exploit for hardware platform. Description: Philips VOIP841 Firmware 1.0.4.800 - Multiple Vulnerabilities. Author: ikki
|
Analyze the security implications of: Philips VOIP841 Firmware 1.0.4.800 - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Employee Performance Evaluation System v1.0 - File Inclusion and RCE
|
This is a webapps exploit for php platform. Description: Employee Performance Evaluation System v1.0 - File Inclusion and RCE. Author: nu11secur1ty
|
Analyze the security implications of: Employee Performance Evaluation System v1.0 - File Inclusion and RCE
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: E-PHP B2B Marketplace - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: E-PHP B2B Marketplace - Multiple Vulnerabilities. Author: MizoZ
|
Analyze the security implications of: E-PHP B2B Marketplace - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BoxBilling 3.6.11 - 'mod_notification' Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: BoxBilling 3.6.11 - 'mod_notification' Persistent Cross-Site Scripting. Author: LiquidWorm
|
Analyze the security implications of: BoxBilling 3.6.11 - 'mod_notification' Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LogonTracer 1.2.0 - Remote Code Execution (Unauthenticated)
|
This is a webapps exploit for multiple platform. Description: LogonTracer 1.2.0 - Remote Code Execution (Unauthenticated). Author: g0ldm45k
|
Analyze the security implications of: LogonTracer 1.2.0 - Remote Code Execution (Unauthenticated)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Wireshark - my_dgt_tbcd_unpack Static Buffer Overflow
|
This is a dos exploit for multiple platform. Description: Wireshark - my_dgt_tbcd_unpack Static Buffer Overflow. Author: Google Security Research
|
Analyze the security implications of: Wireshark - my_dgt_tbcd_unpack Static Buffer Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Multiple Vendor ICMP Implementation - Spoofed Source Quench Packet Denial of Service
|
This is a dos exploit for multiple platform. Description: Multiple Vendor ICMP Implementation - Spoofed Source Quench Packet Denial of Service. Author: Fernando Gont
|
Analyze the security implications of: Multiple Vendor ICMP Implementation - Spoofed Source Quench Packet Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CIS Manager CMS - SQL Injection
|
This is a webapps exploit for asp platform. Description: CIS Manager CMS - SQL Injection. Author: felipe andrian
|
Analyze the security implications of: CIS Manager CMS - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Golf Club Site - SQL Injection
|
This is a webapps exploit for php platform. Description: Golf Club Site - SQL Injection. Author: JaMbA
|
Analyze the security implications of: Golf Club Site - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Philip Chinery's Guestbook 1.1 - Script Injection
|
This is a webapps exploit for cgi platform. Description: Philip Chinery's Guestbook 1.1 - Script Injection. Author: markus arndt
|
Analyze the security implications of: Philip Chinery's Guestbook 1.1 - Script Injection
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Auerswald COMpact 8.0B - Arbitrary File Disclosure
|
This is a remote exploit for hardware platform. Description: Auerswald COMpact 8.0B - Arbitrary File Disclosure. Author: RedTeam Pentesting GmbH
|
Analyze the security implications of: Auerswald COMpact 8.0B - Arbitrary File Disclosure
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: PHP 4.3.7/5.0.0RC3 - 'memory_limit' Remote Overflow
|
This is a remote exploit for linux platform. Description: PHP 4.3.7/5.0.0RC3 - 'memory_limit' Remote Overflow. Author: Gyan Chawdhary
|
Analyze the security implications of: PHP 4.3.7/5.0.0RC3 - 'memory_limit' Remote Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: AgerMenu 0.01 - 'top.inc.php?rootdir' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: AgerMenu 0.01 - 'top.inc.php?rootdir' Remote File Inclusion. Author: GoLd_M
|
Analyze the security implications of: AgerMenu 0.01 - 'top.inc.php?rootdir' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: NoteMark < 0.13.0 - Stored XSS
|
This is a webapps exploit for multiple platform. Description: NoteMark < 0.13.0 - Stored XSS. Author: Alessio Romano (sfoffo)
|
Analyze the security implications of: NoteMark < 0.13.0 - Stored XSS
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: DELTAScripts PHP Links 1.3 - Authentication Bypass
|
This is a webapps exploit for php platform. Description: DELTAScripts PHP Links 1.3 - Authentication Bypass. Author: ZoRLu
|
Analyze the security implications of: DELTAScripts PHP Links 1.3 - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Openlitespeed WebServer 1.7.8 - Command Injection (Authenticated) (2)
|
This is a webapps exploit for multiple platform. Description: Openlitespeed WebServer 1.7.8 - Command Injection (Authenticated) (2). Author: Metin Yunus Kandemir
|
Analyze the security implications of: Openlitespeed WebServer 1.7.8 - Command Injection (Authenticated) (2)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: liveSite Version 2019.1 - Remote Code Execution
|
This is a webapps exploit for php platform. Description: liveSite Version 2019.1 - Remote Code Execution. Author: tmrswrr
|
Analyze the security implications of: liveSite Version 2019.1 - Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: e107 0.7.24 - 'cmd' Remote Command Execution
|
This is a webapps exploit for php platform. Description: e107 0.7.24 - 'cmd' Remote Command Execution. Author: Matt Bergin
|
Analyze the security implications of: e107 0.7.24 - 'cmd' Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ABB Cylon FLXeon 9.3.4 - Default Credentials
|
This is a hardware exploit for multiple platform. Description: ABB Cylon FLXeon 9.3.4 - Default Credentials. Author: LiquidWorm
|
Analyze the security implications of: ABB Cylon FLXeon 9.3.4 - Default Credentials
|
This exploit targets multiple systems. Type: hardware. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Ebay Clone 2009 - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Ebay Clone 2009 - Multiple SQL Injections. Author: MizoZ
|
Analyze the security implications of: Ebay Clone 2009 - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cubic CMS - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Cubic CMS - Multiple Vulnerabilities. Author: Eugenio Delfa
|
Analyze the security implications of: Cubic CMS - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: USB&WiFi Flash Drive 1.3 iOS - Code Execution
|
This is a webapps exploit for ios platform. Description: USB&WiFi Flash Drive 1.3 iOS - Code Execution. Author: Vulnerability-Lab
|
Analyze the security implications of: USB&WiFi Flash Drive 1.3 iOS - Code Execution
|
This exploit targets ios systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: Inout Mobile Webmail APP - Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Inout Mobile Webmail APP - Persistent Cross-Site Scripting. Author: Vulnerability-Lab
|
Analyze the security implications of: Inout Mobile Webmail APP - Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Bluo CMS 1.2 - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Bluo CMS 1.2 - Blind SQL Injection. Author: The_5p3ctrum
|
Analyze the security implications of: Bluo CMS 1.2 - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Xpient - Cash Drawer Operation
|
This is a remote exploit for hardware platform. Description: Xpient - Cash Drawer Operation. Author: Core Security
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.