input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Geany .18 - Local File Overwrite | This is a local exploit for linux platform. Description: Geany .18 - Local File Overwrite. Author: Jeremy Brown |
Analyze the security implications of: Geany .18 - Local File Overwrite | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FreeNews 2.1 - Include Undefined Variable Command Execution | This is a webapps exploit for php platform. Description: FreeNews 2.1 - Include Undefined Variable Command Execution. Author: frog |
Analyze the security implications of: FreeNews 2.1 - Include Undefined Variable Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sun One 5.1 / IPlanet 5.0/5.1 - Administration Server Directory Traversal | This is a remote exploit for multiple platform. Description: Sun One 5.1 / IPlanet 5.0/5.1 - Administration Server Directory Traversal. Author: Jim Hardisty |
Analyze the security implications of: Sun One 5.1 / IPlanet 5.0/5.1 - Administration Server Directory Traversal | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: PHPMailer 1.7 - 'Data()' Remote Denial of Service | This is a dos exploit for php platform. Description: PHPMailer 1.7 - 'Data()' Remote Denial of Service. Author: Mariano Nunez Di Croce |
Analyze the security implications of: PHPMailer 1.7 - 'Data()' Remote Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Wireshark < 0.99.5 - DNP3 Dissector Infinite Loop | This is a dos exploit for linux platform. Description: Wireshark < 0.99.5 - DNP3 Dissector Infinite Loop. Author: Beyond Security |
Analyze the security implications of: Wireshark < 0.99.5 - DNP3 Dissector Infinite Loop | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: X7 Chat 2.0.5 - 'message.php' PHP Code Execution (Metasploit) | This is a remote exploit for php platform. Description: X7 Chat 2.0.5 - 'message.php' PHP Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: X7 Chat 2.0.5 - 'message.php' PHP Code Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Blood Donor Management System v1.0 - Stored XSS | This is a webapps exploit for php platform. Description: Blood Donor Management System v1.0 - Stored XSS. Author: Ehlullah Albayrak |
Analyze the security implications of: Blood Donor Management System v1.0 - Stored XSS | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Add a link 4 - Security Bypass / SQL Injection | This is a webapps exploit for php platform. Description: Add a link 4 - Security Bypass / SQL Injection. Author: JosS |
Analyze the security implications of: Add a link 4 - Security Bypass / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: b2evolution 1.8.2/1.9 - '_404_not_found.page.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: b2evolution 1.8.2/1.9 - '_404_not_found.page.php' Multiple Cross-Site Scripting Vulnerabilities. Author: lotto fischer |
Analyze the security implications of: b2evolution 1.8.2/1.9 - '_404_not_found.page.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Philips VOIP841 Firmware 1.0.4.800 - Multiple Vulnerabilities | This is a remote exploit for hardware platform. Description: Philips VOIP841 Firmware 1.0.4.800 - Multiple Vulnerabilities. Author: ikki |
Analyze the security implications of: Philips VOIP841 Firmware 1.0.4.800 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Employee Performance Evaluation System v1.0 - File Inclusion and RCE | This is a webapps exploit for php platform. Description: Employee Performance Evaluation System v1.0 - File Inclusion and RCE. Author: nu11secur1ty |
Analyze the security implications of: Employee Performance Evaluation System v1.0 - File Inclusion and RCE | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: E-PHP B2B Marketplace - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: E-PHP B2B Marketplace - Multiple Vulnerabilities. Author: MizoZ |
Analyze the security implications of: E-PHP B2B Marketplace - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BoxBilling 3.6.11 - 'mod_notification' Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: BoxBilling 3.6.11 - 'mod_notification' Persistent Cross-Site Scripting. Author: LiquidWorm |
Analyze the security implications of: BoxBilling 3.6.11 - 'mod_notification' Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LogonTracer 1.2.0 - Remote Code Execution (Unauthenticated) | This is a webapps exploit for multiple platform. Description: LogonTracer 1.2.0 - Remote Code Execution (Unauthenticated). Author: g0ldm45k |
Analyze the security implications of: LogonTracer 1.2.0 - Remote Code Execution (Unauthenticated) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Wireshark - my_dgt_tbcd_unpack Static Buffer Overflow | This is a dos exploit for multiple platform. Description: Wireshark - my_dgt_tbcd_unpack Static Buffer Overflow. Author: Google Security Research |
Analyze the security implications of: Wireshark - my_dgt_tbcd_unpack Static Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Multiple Vendor ICMP Implementation - Spoofed Source Quench Packet Denial of Service | This is a dos exploit for multiple platform. Description: Multiple Vendor ICMP Implementation - Spoofed Source Quench Packet Denial of Service. Author: Fernando Gont |
Analyze the security implications of: Multiple Vendor ICMP Implementation - Spoofed Source Quench Packet Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CIS Manager CMS - SQL Injection | This is a webapps exploit for asp platform. Description: CIS Manager CMS - SQL Injection. Author: felipe andrian |
Analyze the security implications of: CIS Manager CMS - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Golf Club Site - SQL Injection | This is a webapps exploit for php platform. Description: Golf Club Site - SQL Injection. Author: JaMbA |
Analyze the security implications of: Golf Club Site - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Philip Chinery's Guestbook 1.1 - Script Injection | This is a webapps exploit for cgi platform. Description: Philip Chinery's Guestbook 1.1 - Script Injection. Author: markus arndt |
Analyze the security implications of: Philip Chinery's Guestbook 1.1 - Script Injection | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Auerswald COMpact 8.0B - Arbitrary File Disclosure | This is a remote exploit for hardware platform. Description: Auerswald COMpact 8.0B - Arbitrary File Disclosure. Author: RedTeam Pentesting GmbH |
Analyze the security implications of: Auerswald COMpact 8.0B - Arbitrary File Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: PHP 4.3.7/5.0.0RC3 - 'memory_limit' Remote Overflow | This is a remote exploit for linux platform. Description: PHP 4.3.7/5.0.0RC3 - 'memory_limit' Remote Overflow. Author: Gyan Chawdhary |
Analyze the security implications of: PHP 4.3.7/5.0.0RC3 - 'memory_limit' Remote Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AgerMenu 0.01 - 'top.inc.php?rootdir' Remote File Inclusion | This is a webapps exploit for php platform. Description: AgerMenu 0.01 - 'top.inc.php?rootdir' Remote File Inclusion. Author: GoLd_M |
Analyze the security implications of: AgerMenu 0.01 - 'top.inc.php?rootdir' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NoteMark < 0.13.0 - Stored XSS | This is a webapps exploit for multiple platform. Description: NoteMark < 0.13.0 - Stored XSS. Author: Alessio Romano (sfoffo) |
Analyze the security implications of: NoteMark < 0.13.0 - Stored XSS | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DELTAScripts PHP Links 1.3 - Authentication Bypass | This is a webapps exploit for php platform. Description: DELTAScripts PHP Links 1.3 - Authentication Bypass. Author: ZoRLu |
Analyze the security implications of: DELTAScripts PHP Links 1.3 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Openlitespeed WebServer 1.7.8 - Command Injection (Authenticated) (2) | This is a webapps exploit for multiple platform. Description: Openlitespeed WebServer 1.7.8 - Command Injection (Authenticated) (2). Author: Metin Yunus Kandemir |
Analyze the security implications of: Openlitespeed WebServer 1.7.8 - Command Injection (Authenticated) (2) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: liveSite Version 2019.1 - Remote Code Execution | This is a webapps exploit for php platform. Description: liveSite Version 2019.1 - Remote Code Execution. Author: tmrswrr |
Analyze the security implications of: liveSite Version 2019.1 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: e107 0.7.24 - 'cmd' Remote Command Execution | This is a webapps exploit for php platform. Description: e107 0.7.24 - 'cmd' Remote Command Execution. Author: Matt Bergin |
Analyze the security implications of: e107 0.7.24 - 'cmd' Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ABB Cylon FLXeon 9.3.4 - Default Credentials | This is a hardware exploit for multiple platform. Description: ABB Cylon FLXeon 9.3.4 - Default Credentials. Author: LiquidWorm |
Analyze the security implications of: ABB Cylon FLXeon 9.3.4 - Default Credentials | This exploit targets multiple systems. Type: hardware. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ebay Clone 2009 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Ebay Clone 2009 - Multiple SQL Injections. Author: MizoZ |
Analyze the security implications of: Ebay Clone 2009 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cubic CMS - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Cubic CMS - Multiple Vulnerabilities. Author: Eugenio Delfa |
Analyze the security implications of: Cubic CMS - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: USB&WiFi Flash Drive 1.3 iOS - Code Execution | This is a webapps exploit for ios platform. Description: USB&WiFi Flash Drive 1.3 iOS - Code Execution. Author: Vulnerability-Lab |
Analyze the security implications of: USB&WiFi Flash Drive 1.3 iOS - Code Execution | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Inout Mobile Webmail APP - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Inout Mobile Webmail APP - Persistent Cross-Site Scripting. Author: Vulnerability-Lab |
Analyze the security implications of: Inout Mobile Webmail APP - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bluo CMS 1.2 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Bluo CMS 1.2 - Blind SQL Injection. Author: The_5p3ctrum |
Analyze the security implications of: Bluo CMS 1.2 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Xpient - Cash Drawer Operation | This is a remote exploit for hardware platform. Description: Xpient - Cash Drawer Operation. Author: Core Security |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.