input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: ACME Labs thttpd 2.20 - Cross-Site Scripting
|
This is a remote exploit for linux platform. Description: ACME Labs thttpd 2.20 - Cross-Site Scripting. Author: frog
|
Analyze the security implications of: ACME Labs thttpd 2.20 - Cross-Site Scripting
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: FreePBX 2.9.0/2.10.0 - 'callmenum' Remote Code Execution (Metasploit)
|
This is a webapps exploit for php platform. Description: FreePBX 2.9.0/2.10.0 - 'callmenum' Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: FreePBX 2.9.0/2.10.0 - 'callmenum' Remote Code Execution (Metasploit)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_facegallery 1.0 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Joomla! Component com_facegallery 1.0 - Multiple Vulnerabilities. Author: Claudio Viviani
|
Analyze the security implications of: Joomla! Component com_facegallery 1.0 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Google Android - 'sensord' Local Privilege Escalation
|
This is a local exploit for android platform. Description: Google Android - 'sensord' Local Privilege Escalation. Author: s0m3b0dy
|
Analyze the security implications of: Google Android - 'sensord' Local Privilege Escalation
|
This exploit targets android systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: Joomla! Component Zh YandexMap 6.1.1.0 - 'placemarklistid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Zh YandexMap 6.1.1.0 - 'placemarklistid' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component Zh YandexMap 6.1.1.0 - 'placemarklistid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: D-Link DSL-2730B AU_2.01 - Authentication Bypass DNS Change
|
This is a webapps exploit for hardware platform. Description: D-Link DSL-2730B AU_2.01 - Authentication Bypass DNS Change. Author: Todor Donev
|
Analyze the security implications of: D-Link DSL-2730B AU_2.01 - Authentication Bypass DNS Change
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Selea Targa IP OCR-ANPR Camera - Directory Traversal File Disclosure (Unauthenticated)
|
This is a webapps exploit for hardware platform. Description: Selea Targa IP OCR-ANPR Camera - Directory Traversal File Disclosure (Unauthenticated). Author: LiquidWorm
|
Analyze the security implications of: Selea Targa IP OCR-ANPR Camera - Directory Traversal File Disclosure (Unauthenticated)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Gogs - 'users'/'repos' '?q' SQL Injection
|
This is a webapps exploit for multiple platform. Description: Gogs - 'users'/'repos' '?q' SQL Injection. Author: Timo Schmid
|
Analyze the security implications of: Gogs - 'users'/'repos' '?q' SQL Injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Huawei Home Gateway UPnP/1.0 IGD/1.00 - Password Disclosure
|
This is a webapps exploit for hardware platform. Description: Huawei Home Gateway UPnP/1.0 IGD/1.00 - Password Disclosure. Author: Fady Mohammed Osman
|
Analyze the security implications of: Huawei Home Gateway UPnP/1.0 IGD/1.00 - Password Disclosure
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: EquityPandit 1.0 - Password Disclosure
|
This is a local exploit for android platform. Description: EquityPandit 1.0 - Password Disclosure. Author: ManhNho
|
Analyze the security implications of: EquityPandit 1.0 - Password Disclosure
|
This exploit targets android systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: FreePBX 13.0.x < 13.0.154 - Remote Command Execution
|
This is a webapps exploit for php platform. Description: FreePBX 13.0.x < 13.0.154 - Remote Command Execution. Author: i-Hmx
|
Analyze the security implications of: FreePBX 13.0.x < 13.0.154 - Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WordPress Plugin N-Media Website Contact Form - Arbitrary File Upload (Metasploit)
|
This is a remote exploit for php platform. Description: WordPress Plugin N-Media Website Contact Form - Arbitrary File Upload (Metasploit). Author: Metasploit
|
Analyze the security implications of: WordPress Plugin N-Media Website Contact Form - Arbitrary File Upload (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Boonex Dolphin 6.1 - 'get_list.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Boonex Dolphin 6.1 - 'get_list.php' SQL Injection. Author: Yuri Goltsev
|
Analyze the security implications of: Boonex Dolphin 6.1 - 'get_list.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component F!BB 1.5.96 RC - SQL Injection / HTML Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component F!BB 1.5.96 RC - SQL Injection / HTML Injection. Author: Jeff Channell
|
Analyze the security implications of: Joomla! Component F!BB 1.5.96 RC - SQL Injection / HTML Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Multiple Check Point Endpoint Security Products - Information Disclosure
|
This is a remote exploit for hardware platform. Description: Multiple Check Point Endpoint Security Products - Information Disclosure. Author: Rapid7
|
Analyze the security implications of: Multiple Check Point Endpoint Security Products - Information Disclosure
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: FreznoShop 1.2.3/1.3 - Search Script Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: FreznoShop 1.2.3/1.3 - Search Script Cross-Site Scripting. Author: David S. Ferreira
|
Analyze the security implications of: FreznoShop 1.2.3/1.3 - Search Script Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: atari800 - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: atari800 - Local Privilege Escalation. Author: pi3
|
Analyze the security implications of: atari800 - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: CBAS-Web 19.0.0 - 'id' Boolean-based Blind SQL Injection
|
This is a webapps exploit for php platform. Description: CBAS-Web 19.0.0 - 'id' Boolean-based Blind SQL Injection. Author: LiquidWorm
|
Analyze the security implications of: CBAS-Web 19.0.0 - 'id' Boolean-based Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HotNews 0.x - 'config[incdir]' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: HotNews 0.x - 'config[incdir]' Remote File Inclusion. Author: Officerrr
|
Analyze the security implications of: HotNews 0.x - 'config[incdir]' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: JSPWiki 2.5.139 - 'NewGroup.jsp' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for jsp platform. Description: JSPWiki 2.5.139 - 'NewGroup.jsp' Multiple Cross-Site Scripting Vulnerabilities. Author: Jason Kratzer
|
Analyze the security implications of: JSPWiki 2.5.139 - 'NewGroup.jsp' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: MP3Info 0.8.5a - Buffer Overflow
|
This is a dos exploit for linux platform. Description: MP3Info 0.8.5a - Buffer Overflow. Author: jsacco
|
Analyze the security implications of: MP3Info 0.8.5a - Buffer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apache Struts 2 - Skill Name Remote Code Execution
|
This is a remote exploit for multiple platform. Description: Apache Struts 2 - Skill Name Remote Code Execution. Author: kxlzx
|
Analyze the security implications of: Apache Struts 2 - Skill Name Remote Code Execution
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Istgah for Centerhost - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Istgah for Centerhost - Multiple Vulnerabilities. Author: indoushka
|
Analyze the security implications of: Istgah for Centerhost - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cyrus imapd 2.2.4 < 2.2.8 - 'imapmagicplus' Remote Overflow
|
This is a remote exploit for linux platform. Description: Cyrus imapd 2.2.4 < 2.2.8 - 'imapmagicplus' Remote Overflow. Author: crash-x
|
Analyze the security implications of: Cyrus imapd 2.2.4 < 2.2.8 - 'imapmagicplus' Remote Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Faweb_2 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Faweb_2 - Multiple Vulnerabilities. Author: indoushka
|
Analyze the security implications of: Faweb_2 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: RedHat 6.1/6.2 - TTY Flood Users
|
This is a dos exploit for linux platform. Description: RedHat 6.1/6.2 - TTY Flood Users. Author: teleh0r
|
Analyze the security implications of: RedHat 6.1/6.2 - TTY Flood Users
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Aenovo - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for asp platform. Description: Aenovo - Multiple Cross-Site Scripting Vulnerabilities. Author: farhad koosha
|
Analyze the security implications of: Aenovo - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Lanius CMS 0.5.2 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Lanius CMS 0.5.2 - Arbitrary File Upload. Author: EgiX
|
Analyze the security implications of: Lanius CMS 0.5.2 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_jfusion - 'itemID' Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_jfusion - 'itemID' Blind SQL Injection. Author: Chip d3 bi0s
|
Analyze the security implications of: Joomla! Component com_jfusion - 'itemID' Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Academic Timetable Final Build 7.0 - Information Disclosure
|
This is a webapps exploit for php platform. Description: Academic Timetable Final Build 7.0 - Information Disclosure. Author: Ihsan Sencan
|
Analyze the security implications of: Academic Timetable Final Build 7.0 - Information Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AIX 3.x - bugfiler Arbitrary File Creation
|
This is a local exploit for aix platform. Description: AIX 3.x - bugfiler Arbitrary File Creation. Author: Johannes Schwabe
|
Analyze the security implications of: AIX 3.x - bugfiler Arbitrary File Creation
|
This exploit targets aix systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aix platform
|
What is this exploit about: SuSE Linux 6.3/6.4 Gnomelib - Local Buffer Overflow
|
This is a local exploit for linux platform. Description: SuSE Linux 6.3/6.4 Gnomelib - Local Buffer Overflow. Author: bladi
|
Analyze the security implications of: SuSE Linux 6.3/6.4 Gnomelib - Local Buffer Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Sagem F@ST Routers - DHCP Hostname Cross-Site Request Forgery
|
This is a remote exploit for hardware platform. Description: Sagem F@ST Routers - DHCP Hostname Cross-Site Request Forgery. Author: Zigma
|
Analyze the security implications of: Sagem F@ST Routers - DHCP Hostname Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: AJ Matrix 3.1 - 'id' Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: AJ Matrix 3.1 - 'id' Multiple SQL Injections. Author: v3n0m
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.