input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Anchor CMS 0.12.7 - CSRF (Delete user)
|
This is a webapps exploit for multiple platform. Description: Anchor CMS 0.12.7 - CSRF (Delete user). Author: Ninad Mishra
|
Analyze the security implications of: Anchor CMS 0.12.7 - CSRF (Delete user)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: eNetman 20050830 - 'index.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: eNetman 20050830 - 'index.php' Remote File Inclusion. Author: JaheeM
|
Analyze the security implications of: eNetman 20050830 - 'index.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: JGS-Portal 3.0.1/3.0.2 - 'jgs_portal_mitgraf.php?year' SQL Injection
|
This is a webapps exploit for php platform. Description: JGS-Portal 3.0.1/3.0.2 - 'jgs_portal_mitgraf.php?year' SQL Injection. Author: deluxe@security-project.org
|
Analyze the security implications of: JGS-Portal 3.0.1/3.0.2 - 'jgs_portal_mitgraf.php?year' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: NCSA HTTPd 1.x - Remote Buffer Overflow (2)
|
This is a remote exploit for linux platform. Description: NCSA HTTPd 1.x - Remote Buffer Overflow (2). Author: Xtremist
|
Analyze the security implications of: NCSA HTTPd 1.x - Remote Buffer Overflow (2)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: CERIO DT-100G-N/DT-300N/CW-300N - Multiple Vulnerabilities
|
This is a remote exploit for hardware platform. Description: CERIO DT-100G-N/DT-300N/CW-300N - Multiple Vulnerabilities. Author: LiquidWorm
|
Analyze the security implications of: CERIO DT-100G-N/DT-300N/CW-300N - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: B-Hind CMS (tiny_mce) - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: B-Hind CMS (tiny_mce) - Arbitrary File Upload. Author: innrwrld & h00die
|
Analyze the security implications of: B-Hind CMS (tiny_mce) - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Slackware Linux 3.1 - '/usr/X11/bin/SuperProbe' Local Buffer Overflow
|
This is a local exploit for linux platform. Description: Slackware Linux 3.1 - '/usr/X11/bin/SuperProbe' Local Buffer Overflow. Author: Solar
|
Analyze the security implications of: Slackware Linux 3.1 - '/usr/X11/bin/SuperProbe' Local Buffer Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component com_extplorer 2.0.0 RC2 - Local Directory Traversal
|
This is a webapps exploit for php platform. Description: Joomla! Component com_extplorer 2.0.0 RC2 - Local Directory Traversal. Author: Houssamix
|
Analyze the security implications of: Joomla! Component com_extplorer 2.0.0 RC2 - Local Directory Traversal
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: iScripts AutoHoster - 'invno' SQL Injection
|
This is a webapps exploit for php platform. Description: iScripts AutoHoster - 'invno' SQL Injection. Author: i-Hmx
|
Analyze the security implications of: iScripts AutoHoster - 'invno' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: University of Washington - imap LSUB Buffer Overflow (Metasploit)
|
This is a remote exploit for linux platform. Description: University of Washington - imap LSUB Buffer Overflow (Metasploit). Author: patrick
|
Analyze the security implications of: University of Washington - imap LSUB Buffer Overflow (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: 427bb 2.3.1 - SQL Injection / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: 427bb 2.3.1 - SQL Injection / Cross-Site Scripting. Author: CWH Underground
|
Analyze the security implications of: 427bb 2.3.1 - SQL Injection / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Home Owners Collection Management System 1.0 - Account Takeover (Unauthenticated)
|
This is a webapps exploit for php platform. Description: Home Owners Collection Management System 1.0 - Account Takeover (Unauthenticated). Author: Saud Alenazi
|
Analyze the security implications of: Home Owners Collection Management System 1.0 - Account Takeover (Unauthenticated)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: TitanNit Web Control 2.01 / Atemio 7600 - Root Remote Code Execution
|
This is a remote exploit for hardware platform. Description: TitanNit Web Control 2.01 / Atemio 7600 - Root Remote Code Execution. Author: LiquidWorm
|
Analyze the security implications of: TitanNit Web Control 2.01 / Atemio 7600 - Root Remote Code Execution
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: VideoLAN VLC Media Player Web Interface 2.2.1 - Metadata Title Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: VideoLAN VLC Media Player Web Interface 2.2.1 - Metadata Title Cross-Site Scripting. Author: Andrea Sindoni
|
Analyze the security implications of: VideoLAN VLC Media Player Web Interface 2.2.1 - Metadata Title Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: OrientDB 3.0.17 GA Community Edition - Cross-Site Request Forgery / Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: OrientDB 3.0.17 GA Community Edition - Cross-Site Request Forgery / Cross-Site Scripting. Author: Ozer Goker
|
Analyze the security implications of: OrientDB 3.0.17 GA Community Edition - Cross-Site Request Forgery / Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: XEROX WorkCentre 7830 Printer - Cross-Site Request Forgery (Add Admin)
|
This is a webapps exploit for hardware platform. Description: XEROX WorkCentre 7830 Printer - Cross-Site Request Forgery (Add Admin). Author: Ismail Tasdelen
|
Analyze the security implications of: XEROX WorkCentre 7830 Printer - Cross-Site Request Forgery (Add Admin)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Sendmail 8.12.x - 'X-header' Remote Heap Buffer Overflow (PoC)
|
This is a dos exploit for linux platform. Description: Sendmail 8.12.x - 'X-header' Remote Heap Buffer Overflow (PoC). Author: Simple Nomad
|
Analyze the security implications of: Sendmail 8.12.x - 'X-header' Remote Heap Buffer Overflow (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Oracle 10g R1 - xdb.xdb_pitrig_pkg PLSQL Injection (Change Sys Password)
|
This is a local exploit for multiple platform. Description: Oracle 10g R1 - xdb.xdb_pitrig_pkg PLSQL Injection (Change Sys Password). Author: sh2kerr
|
Analyze the security implications of: Oracle 10g R1 - xdb.xdb_pitrig_pkg PLSQL Injection (Change Sys Password)
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Exim 4.87 - 4.91 - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: Exim 4.87 - 4.91 - Local Privilege Escalation. Author: Marco Ivaldi
|
Analyze the security implications of: Exim 4.87 - 4.91 - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ZTE ZXHN H168N - Improper Access Restrictions
|
This is a webapps exploit for hardware platform. Description: ZTE ZXHN H168N - Improper Access Restrictions. Author: Usman Saeed
|
Analyze the security implications of: ZTE ZXHN H168N - Improper Access Restrictions
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: e107 website system 0.7.5 - 'search.php?Query String (PATH_INFO)' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: e107 website system 0.7.5 - 'search.php?Query String (PATH_INFO)' Cross-Site Scripting. Author: zark0vac
|
Analyze the security implications of: e107 website system 0.7.5 - 'search.php?Query String (PATH_INFO)' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: JCE-Tech PHP Video Script - 'index.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: JCE-Tech PHP Video Script - 'index.php' Cross-Site Scripting. Author: Moudi
|
Analyze the security implications of: JCE-Tech PHP Video Script - 'index.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux - 'page->_refcount' Overflow via FUSE
|
This is a dos exploit for linux platform. Description: Linux - 'page->_refcount' Overflow via FUSE. Author: Google Security Research
|
Analyze the security implications of: Linux - 'page->_refcount' Overflow via FUSE
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: BlogCFC 5.9.6.001 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: BlogCFC 5.9.6.001 - Multiple Cross-Site Scripting Vulnerabilities. Author: Richard Brain
|
Analyze the security implications of: BlogCFC 5.9.6.001 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CodeAvalanche News 1.x - 'CAT_ID' SQL Injection
|
This is a webapps exploit for asp platform. Description: CodeAvalanche News 1.x - 'CAT_ID' SQL Injection. Author: beks
|
Analyze the security implications of: CodeAvalanche News 1.x - 'CAT_ID' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! 2.5.1 - 'redirect.php' Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! 2.5.1 - 'redirect.php' Blind SQL Injection. Author: Colin Wong
|
Analyze the security implications of: Joomla! 2.5.1 - 'redirect.php' Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: iServiceOnline 1.0 - 'r' SQL Injection
|
This is a webapps exploit for php platform. Description: iServiceOnline 1.0 - 'r' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: iServiceOnline 1.0 - 'r' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component vBizz 1.0.7 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component vBizz 1.0.7 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component vBizz 1.0.7 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Coppermine Photo Gallery 1.2.0 RC4 - 'startdir' Traversal Arbitrary File Access
|
This is a webapps exploit for php platform. Description: Coppermine Photo Gallery 1.2.0 RC4 - 'startdir' Traversal Arbitrary File Access. Author: Janek Vind
|
Analyze the security implications of: Coppermine Photo Gallery 1.2.0 RC4 - 'startdir' Traversal Arbitrary File Access
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Samsung Galaxy S6 - libQjpeg je_free Crash
|
This is a dos exploit for android platform. Description: Samsung Galaxy S6 - libQjpeg je_free Crash. Author: Google Security Research
|
Analyze the security implications of: Samsung Galaxy S6 - libQjpeg je_free Crash
|
This exploit targets android systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: Fuzzylime CMS 3.03 - 'track.php' Local File Inclusion
|
This is a webapps exploit for php platform. Description: Fuzzylime CMS 3.03 - 'track.php' Local File Inclusion. Author: Alfons Luja
|
Analyze the security implications of: Fuzzylime CMS 3.03 - 'track.php' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple Safari - Out-of-Bounds Read when Calling Bound Function
|
This is a dos exploit for multiple platform. Description: Apple Safari - Out-of-Bounds Read when Calling Bound Function. Author: Google Security Research
|
Analyze the security implications of: Apple Safari - Out-of-Bounds Read when Calling Bound Function
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: QNX RTOS 6.4 - '.ELF' Binary File Local Denial of Service
|
This is a dos exploit for linux platform. Description: QNX RTOS 6.4 - '.ELF' Binary File Local Denial of Service. Author: kokanin
|
Analyze the security implications of: QNX RTOS 6.4 - '.ELF' Binary File Local Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.