input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Entrepreneur B2B Script - 'pid' SQL Injection | This is a webapps exploit for php platform. Description: Entrepreneur B2B Script - 'pid' SQL Injection. Author: Meisam Monsef |
Analyze the security implications of: Entrepreneur B2B Script - 'pid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile | This is a webapps exploit for multiple platform. Description: Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile. Author: Shahrukh Iqbal Mirza |
Analyze the security implications of: Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Jfeedback 1.2 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Jfeedback 1.2 - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component Jfeedback 1.2 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mozilla Firefox < 17.0.1 - Flash Privileged Code Injection (Metasploit) | This is a local exploit for multiple platform. Description: Mozilla Firefox < 17.0.1 - Flash Privileged Code Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Mozilla Firefox < 17.0.1 - Flash Privileged Code Injection (Metasploit) | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Black Sheep Web Software Form Tools 1.5 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: Black Sheep Web Software Form Tools 1.5 - Multiple Remote File Inclusions. Author: RoMaNcYxHaCkEr |
Analyze the security implications of: Black Sheep Web Software Form Tools 1.5 - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Havalite CMS 1.0.4 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Havalite CMS 1.0.4 - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: Havalite CMS 1.0.4 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Avaya IP Office 11 - Password Disclosure | This is a webapps exploit for multiple platform. Description: Avaya IP Office 11 - Password Disclosure. Author: hyp3rlinx |
Analyze the security implications of: Avaya IP Office 11 - Password Disclosure | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cisco IOS 12.x/11.x - HTTP Remote Integer Overflow | This is a remote exploit for hardware platform. Description: Cisco IOS 12.x/11.x - HTTP Remote Integer Overflow. Author: FX |
Analyze the security implications of: Cisco IOS 12.x/11.x - HTTP Remote Integer Overflow | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: FunkyASP Glossary 1.0 - 'Glossary.asp' SQL Injection | This is a webapps exploit for asp platform. Description: FunkyASP Glossary 1.0 - 'Glossary.asp' SQL Injection. Author: saps.audit |
Analyze the security implications of: FunkyASP Glossary 1.0 - 'Glossary.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Mozilla Firefox 2.0.0.14 - JSframe Heap Corruption Denial of Service | This is a dos exploit for multiple platform. Description: Mozilla Firefox 2.0.0.14 - JSframe Heap Corruption Denial of Service. Author: 0x000000 |
Analyze the security implications of: Mozilla Firefox 2.0.0.14 - JSframe Heap Corruption Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Google Chrome 72.0.3626.81 - 'V8TrustedTypePolicyOptions::ToImpl' Type Confusion | This is a dos exploit for multiple platform. Description: Google Chrome 72.0.3626.81 - 'V8TrustedTypePolicyOptions::ToImpl' Type Confusion. Author: Google Security Research |
Analyze the security implications of: Google Chrome 72.0.3626.81 - 'V8TrustedTypePolicyOptions::ToImpl' Type Confusion | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: The Classified Ad System 1.0 - 'main' SQL Injection | This is a webapps exploit for asp platform. Description: The Classified Ad System 1.0 - 'main' SQL Injection. Author: ajann |
Analyze the security implications of: The Classified Ad System 1.0 - 'main' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: dev4u CMS (Personenseiten) - 'go_target.php' SQL Injection | This is a webapps exploit for php platform. Description: dev4u CMS (Personenseiten) - 'go_target.php' SQL Injection. Author: Easy Laster |
Analyze the security implications of: dev4u CMS (Personenseiten) - 'go_target.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LongTail JW Player - 'debug' Cross-Site Scripting | This is a webapps exploit for php platform. Description: LongTail JW Player - 'debug' Cross-Site Scripting. Author: gainover |
Analyze the security implications of: LongTail JW Player - 'debug' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ArangoDB Community Edition 3.4.2-1 - Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: ArangoDB Community Edition 3.4.2-1 - Cross-Site Scripting. Author: Ozer Goker |
Analyze the security implications of: ArangoDB Community Edition 3.4.2-1 - Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Adobe Acrobat Reader DC 15.016.20045 - Invalid Font '.ttf' Memory Corruption (5) | This is a dos exploit for multiple platform. Description: Adobe Acrobat Reader DC 15.016.20045 - Invalid Font '.ttf' Memory Corruption (5). Author: COSIG |
Analyze the security implications of: Adobe Acrobat Reader DC 15.016.20045 - Invalid Font '.ttf' Memory Corruption (5) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Webgate WebEye - Information Disclosure | This is a webapps exploit for cgi platform. Description: Webgate WebEye - Information Disclosure. Author: datapath |
Analyze the security implications of: Webgate WebEye - Information Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: FactoSystem Weblog 0.9/1.0/1.1 - Multiple SQL Injections | This is a webapps exploit for asp platform. Description: FactoSystem Weblog 0.9/1.0/1.1 - Multiple SQL Injections. Author: Matthew Murphy |
Analyze the security implications of: FactoSystem Weblog 0.9/1.0/1.1 - Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: X.Org xorg-server 1.1.1-48.13 - Probe for Files (PoC) | This is a dos exploit for multiple platform. Description: X.Org xorg-server 1.1.1-48.13 - Probe for Files (PoC). Author: vl4dZ |
Analyze the security implications of: X.Org xorg-server 1.1.1-48.13 - Probe for Files (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: RedHat Linux 6.0/6.1/6.2 - 'pam_console' Monitor Activity After Logout | This is a local exploit for linux platform. Description: RedHat Linux 6.0/6.1/6.2 - 'pam_console' Monitor Activity After Logout. Author: Michal Zalewski |
Analyze the security implications of: RedHat Linux 6.0/6.1/6.2 - 'pam_console' Monitor Activity After Logout | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Vypress Tonecast 1.3 - Remote Denial of Service | This is a dos exploit for multiple platform. Description: Vypress Tonecast 1.3 - Remote Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: Vypress Tonecast 1.3 - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ARSC Really Simple Chat 3.3-rc2 - Cross-Site Scripting / Multiple SQL Injections | This is a webapps exploit for php platform. Description: ARSC Really Simple Chat 3.3-rc2 - Cross-Site Scripting / Multiple SQL Injections. Author: High-Tech Bridge SA |
Analyze the security implications of: ARSC Really Simple Chat 3.3-rc2 - Cross-Site Scripting / Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Pydio Cells 4.1.2 - Cross-Site Scripting (XSS) via File Download | This is a webapps exploit for go platform. Description: Pydio Cells 4.1.2 - Cross-Site Scripting (XSS) via File Download. Author: RedTeam Pentesting GmbH |
Analyze the security implications of: Pydio Cells 4.1.2 - Cross-Site Scripting (XSS) via File Download | This exploit targets go systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets go platform |
What is this exploit about: PXE Server 2.0 - Remote Buffer Overrun | This is a remote exploit for linux platform. Description: PXE Server 2.0 - Remote Buffer Overrun. Author: CrZ |
Analyze the security implications of: PXE Server 2.0 - Remote Buffer Overrun | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: 3ware Disk Managment 1.10 - HTTP Request Denial of Service | This is a dos exploit for multiple platform. Description: 3ware Disk Managment 1.10 - HTTP Request Denial of Service. Author: Nathan Neulinger |
Analyze the security implications of: 3ware Disk Managment 1.10 - HTTP Request Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AirDrop 2.0 - Denial of Service (DoS) | This is a dos exploit for android platform. Description: AirDrop 2.0 - Denial of Service (DoS). Author: s4vitar |
Analyze the security implications of: AirDrop 2.0 - Denial of Service (DoS) | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: ZKSoftware 'ZK5000' - Remote Information Disclosure | This is a remote exploit for multiple platform. Description: ZKSoftware 'ZK5000' - Remote Information Disclosure. Author: fb1h2s |
Analyze the security implications of: ZKSoftware 'ZK5000' - Remote Information Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Electronic Engineering Tool (EE TOOL) 0.4.1 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Electronic Engineering Tool (EE TOOL) 0.4.1 - Remote File Inclusion. Author: Mehmet Ince |
Analyze the security implications of: Electronic Engineering Tool (EE TOOL) 0.4.1 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iNet Online Community - Blind SQL Injection | This is a webapps exploit for php platform. Description: iNet Online Community - Blind SQL Injection. Author: JaMbA |
Analyze the security implications of: iNet Online Community - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JoltCard 1.2.1 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JoltCard 1.2.1 - SQL Injection. Author: Valentin |
Analyze the security implications of: Joomla! Component JoltCard 1.2.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Inout Music 1.0 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Inout Music 1.0 - Arbitrary File Upload. Author: SONIC |
Analyze the security implications of: Inout Music 1.0 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GeekLog 1.x - 'error.log' Remote Command Execution | This is a webapps exploit for php platform. Description: GeekLog 1.x - 'error.log' Remote Command Execution. Author: rgod |
Analyze the security implications of: GeekLog 1.x - 'error.log' Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Belkin F5D7234-4 v5 G Wireless Router - Remote Hash Exposed | This is a webapps exploit for hardware platform. Description: Belkin F5D7234-4 v5 G Wireless Router - Remote Hash Exposed. Author: Aodrulez |
Analyze the security implications of: Belkin F5D7234-4 v5 G Wireless Router - Remote Hash Exposed | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.