input
stringlengths 39
228
| output
stringlengths 32
324
|
|---|---|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: GeoVision Geowebserver 5.3.3 - Local FIle Inclusion
|
This is a webapps exploit for hardware platform. Description: GeoVision Geowebserver 5.3.3 - Local FIle Inclusion. Author: Ken Pyle
|
Analyze the security implications of: GeoVision Geowebserver 5.3.3 - Local FIle Inclusion
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: ProFTPd 1.3.5 - 'mod_copy' Remote Command Execution (2)
|
This is a remote exploit for linux platform. Description: ProFTPd 1.3.5 - 'mod_copy' Remote Command Execution (2). Author: Shellbr3ak
|
Analyze the security implications of: ProFTPd 1.3.5 - 'mod_copy' Remote Command Execution (2)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Insanely Simple Blog 0.5 - SQL Injection
|
This is a webapps exploit for php platform. Description: Insanely Simple Blog 0.5 - SQL Injection. Author: Unohope
|
Analyze the security implications of: Insanely Simple Blog 0.5 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ruby on Rails 3.0.5 - 'WEBrick::HTTPRequest' Module HTTP Header Injection
|
This is a remote exploit for multiple platform. Description: Ruby on Rails 3.0.5 - 'WEBrick::HTTPRequest' Module HTTP Header Injection. Author: Jimmy Bandit
|
Analyze the security implications of: Ruby on Rails 3.0.5 - 'WEBrick::HTTPRequest' Module HTTP Header Injection
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: GEPI 1.4.0 - '/gestion/savebackup.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: GEPI 1.4.0 - '/gestion/savebackup.php' Remote File Inclusion. Author: Sumit Siddharth
|
Analyze the security implications of: GEPI 1.4.0 - '/gestion/savebackup.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Spring Security - HTTP Header Injection
|
This is a remote exploit for multiple platform. Description: Spring Security - HTTP Header Injection. Author: David Mas
|
Analyze the security implications of: Spring Security - HTTP Header Injection
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Apple Safari 1.x - Cookie Directory Traversal
|
This is a remote exploit for osx platform. Description: Apple Safari 1.x - Cookie Directory Traversal. Author: Corsaire Limited
|
Analyze the security implications of: Apple Safari 1.x - Cookie Directory Traversal
|
This exploit targets osx systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Oracle Database Vault - 'ptrace(2)' Local Privilege Escalation
|
This is a local exploit for linux platform. Description: Oracle Database Vault - 'ptrace(2)' Local Privilege Escalation. Author: Jakub Wartak
|
Analyze the security implications of: Oracle Database Vault - 'ptrace(2)' Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Google Chrome 8.0.552.237 - replace Denial of Service
|
This is a dos exploit for multiple platform. Description: Google Chrome 8.0.552.237 - replace Denial of Service. Author: Carlos Mario Penagos Hollmann
|
Analyze the security implications of: Google Chrome 8.0.552.237 - replace Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Insurance Management System PHP and MySQL 1.0 - Multiple Stored XSS
|
This is a webapps exploit for php platform. Description: Insurance Management System PHP and MySQL 1.0 - Multiple Stored XSS. Author: Hakkı TOKLU
|
Analyze the security implications of: Insurance Management System PHP and MySQL 1.0 - Multiple Stored XSS
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Balbooa Joomla Forms Builder 2.0.6 - SQL Injection (Unauthenticated)
|
This is a webapps exploit for php platform. Description: Balbooa Joomla Forms Builder 2.0.6 - SQL Injection (Unauthenticated). Author: blockomat2100
|
Analyze the security implications of: Balbooa Joomla Forms Builder 2.0.6 - SQL Injection (Unauthenticated)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linker 2.0.4 - 'index.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Linker 2.0.4 - 'index.php' Cross-Site Scripting. Author: vagrant
|
Analyze the security implications of: Linker 2.0.4 - 'index.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Accela Civic Platform 21.1 - 'contactSeqNumber' Insecure Direct Object References (IDOR)
|
This is a webapps exploit for multiple platform. Description: Accela Civic Platform 21.1 - 'contactSeqNumber' Insecure Direct Object References (IDOR). Author: Abdulazeez Alaseeri
|
Analyze the security implications of: Accela Civic Platform 21.1 - 'contactSeqNumber' Insecure Direct Object References (IDOR)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: List Site Pro 2.0 - User Database Delimiter Injection
|
This is a remote exploit for multiple platform. Description: List Site Pro 2.0 - User Database Delimiter Injection. Author: Statix
|
Analyze the security implications of: List Site Pro 2.0 - User Database Delimiter Injection
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Beckhoff CX9020 CPU Module - Remote Code Execution
|
This is a webapps exploit for hardware platform. Description: Beckhoff CX9020 CPU Module - Remote Code Execution. Author: Photubias
|
Analyze the security implications of: Beckhoff CX9020 CPU Module - Remote Code Execution
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: KAPhotoservice 7.5 - 'album.asp?cat' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: KAPhotoservice 7.5 - 'album.asp?cat' Cross-Site Scripting. Author: r0t
|
Analyze the security implications of: KAPhotoservice 7.5 - 'album.asp?cat' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Frequency Clock 0.1b - 'securelib' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Frequency Clock 0.1b - 'securelib' Remote File Inclusion. Author: ThE TiGeR
|
Analyze the security implications of: Frequency Clock 0.1b - 'securelib' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Screen SFT DAB 600/C - Authentication Bypass Admin Password Change
|
This is a remote exploit for hardware platform. Description: Screen SFT DAB 600/C - Authentication Bypass Admin Password Change. Author: LiquidWorm
|
Analyze the security implications of: Screen SFT DAB 600/C - Authentication Bypass Admin Password Change
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Castor Library - XML External Entity Information Disclosure
|
This is a remote exploit for multiple platform. Description: Castor Library - XML External Entity Information Disclosure. Author: Ron Gutierrez
|
Analyze the security implications of: Castor Library - XML External Entity Information Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Netgear WiFi Router R6120 - Credential Disclosure
|
This is a webapps exploit for hardware platform. Description: Netgear WiFi Router R6120 - Credential Disclosure. Author: Wadeek
|
Analyze the security implications of: Netgear WiFi Router R6120 - Credential Disclosure
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Easy Forum 2.5 - New User Image File HTML Injection
|
This is a webapps exploit for php platform. Description: Easy Forum 2.5 - New User Image File HTML Injection. Author: Aliaksandr Hartsuyeu
|
Analyze the security implications of: Easy Forum 2.5 - New User Image File HTML Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Clinic Management System 1.0 - Unauthenticated Remote Code Execution
|
This is a webapps exploit for php platform. Description: Clinic Management System 1.0 - Unauthenticated Remote Code Execution. Author: BKpatron
|
Analyze the security implications of: Clinic Management System 1.0 - Unauthenticated Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: D-Link DSL-2730U Wireless N 150 - Cross-Site Request Forgery
|
This is a webapps exploit for hardware platform. Description: D-Link DSL-2730U Wireless N 150 - Cross-Site Request Forgery. Author: B GOVIND
|
Analyze the security implications of: D-Link DSL-2730U Wireless N 150 - Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: EyesOfNetwork (EON) 5.0 - Remote Code Execution
|
This is a webapps exploit for php platform. Description: EyesOfNetwork (EON) 5.0 - Remote Code Execution. Author: Sysdream
|
Analyze the security implications of: EyesOfNetwork (EON) 5.0 - Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Libra File Manager 1.18/2.0 - 'fileadmin.php' Local File Inclusion
|
This is a webapps exploit for php platform. Description: Libra File Manager 1.18/2.0 - 'fileadmin.php' Local File Inclusion. Author: Pepelux
|
Analyze the security implications of: Libra File Manager 1.18/2.0 - 'fileadmin.php' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ohesa Emlak Portal 1.0 - 'satilik.asp?Kategori' SQL Injection
|
This is a webapps exploit for asp platform. Description: Ohesa Emlak Portal 1.0 - 'satilik.asp?Kategori' SQL Injection. Author: GeFORC3
|
Analyze the security implications of: Ohesa Emlak Portal 1.0 - 'satilik.asp?Kategori' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: UtilMind Mail List 1.7 - Users Can Execute Commands
|
This is a webapps exploit for cgi platform. Description: UtilMind Mail List 1.7 - Users Can Execute Commands. Author: teleh0r
|
Analyze the security implications of: UtilMind Mail List 1.7 - Users Can Execute Commands
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: EmuLive Server4 - Authentication Bypass / Denial of Service
|
This is a dos exploit for cgi platform. Description: EmuLive Server4 - Authentication Bypass / Denial of Service. Author: GulfTech Security
|
Analyze the security implications of: EmuLive Server4 - Authentication Bypass / Denial of Service
|
This exploit targets cgi systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Guestbook Script 1.7 - 'include_files' Remote Code Execution
|
This is a webapps exploit for php platform. Description: Guestbook Script 1.7 - 'include_files' Remote Code Execution. Author: rgod
|
Analyze the security implications of: Guestbook Script 1.7 - 'include_files' Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IBM Rational RequisitePro 7.10 - 'ReqWeb Help Feature ReqWebHelp/advanced/workingSet.jsp?Operation' Cross-Site Scripting
|
This is a webapps exploit for jsp platform. Description: IBM Rational RequisitePro 7.10 - 'ReqWeb Help Feature ReqWebHelp/advanced/workingSet.jsp?Operation' Cross-Site Scripting. Author: IBM
|
Analyze the security implications of: IBM Rational RequisitePro 7.10 - 'ReqWeb Help Feature ReqWebHelp/advanced/workingSet.jsp?Operation' Cross-Site Scripting
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: AuraCMS 2.x - '/user.php' Security Code Bypass / Arbitrary Add Administrator
|
This is a webapps exploit for php platform. Description: AuraCMS 2.x - '/user.php' Security Code Bypass / Arbitrary Add Administrator. Author: NTOS-Team
|
Analyze the security implications of: AuraCMS 2.x - '/user.php' Security Code Bypass / Arbitrary Add Administrator
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: JAF CMS 4.0 RC2 - Multiple Remote File Inclusions
|
This is a webapps exploit for php platform. Description: JAF CMS 4.0 RC2 - Multiple Remote File Inclusions. Author: CraCkEr
|
Analyze the security implications of: JAF CMS 4.0 RC2 - Multiple Remote File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ciamos CMS 0.9.5 - 'module_path' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Ciamos CMS 0.9.5 - 'module_path' Remote File Inclusion. Author: cr4wl3r
|
Analyze the security implications of: Ciamos CMS 0.9.5 - 'module_path' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.