input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: censura 1.16.04 - Blind SQL Injection / Cross-Site Scripting | This is a webapps exploit for php platform. Description: censura 1.16.04 - Blind SQL Injection / Cross-Site Scripting. Author: Vrs-hCk |
Analyze the security implications of: censura 1.16.04 - Blind SQL Injection / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: gokhun asp stok 1.0 - Multiple Vulnerabilities | This is a webapps exploit for asp platform. Description: gokhun asp stok 1.0 - Multiple Vulnerabilities. Author: KnocKout |
Analyze the security implications of: gokhun asp stok 1.0 - Multiple Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Hyvikk Fleet Manager - Shell Upload | This is a webapps exploit for php platform. Description: Hyvikk Fleet Manager - Shell Upload. Author: saxgy1331 |
Analyze the security implications of: Hyvikk Fleet Manager - Shell Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Endian Firewall < 3.0.0 - OS Command Injection (Metasploit) | This is a remote exploit for cgi platform. Description: Endian Firewall < 3.0.0 - OS Command Injection (Metasploit). Author: Ben Lincoln |
Analyze the security implications of: Endian Firewall < 3.0.0 - OS Command Injection (Metasploit) | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Claroline 1.8.9 - 'phpBB/viewtopic.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Claroline 1.8.9 - 'phpBB/viewtopic.php' Cross-Site Scripting. Author: Digital Security Research Group |
Analyze the security implications of: Claroline 1.8.9 - 'phpBB/viewtopic.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: elFinder PHP Connector < 2.1.48 - 'exiftran' Command Injection (Metasploit) | This is a remote exploit for php platform. Description: elFinder PHP Connector < 2.1.48 - 'exiftran' Command Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: elFinder PHP Connector < 2.1.48 - 'exiftran' Command Injection (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Article Script 1.6.3 - 'rss.php' SQL Injection | This is a webapps exploit for php platform. Description: Article Script 1.6.3 - 'rss.php' SQL Injection. Author: Liz0ziM |
Analyze the security implications of: Article Script 1.6.3 - 'rss.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Audio Article Directory - 'file' Remote File Disclosure | This is a webapps exploit for php platform. Description: Audio Article Directory - 'file' Remote File Disclosure. Author: ThE g0bL!N |
Analyze the security implications of: Audio Article Directory - 'file' Remote File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Heatmiser Wifi Thermostat 1.7 - Cross-Site Request Forgery (Update Admin) | This is a webapps exploit for hardware platform. Description: Heatmiser Wifi Thermostat 1.7 - Cross-Site Request Forgery (Update Admin). Author: SajjadBnd |
Analyze the security implications of: Heatmiser Wifi Thermostat 1.7 - Cross-Site Request Forgery (Update Admin) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Domain Group Network GooCMS 1.02 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Domain Group Network GooCMS 1.02 - 'index.php' Cross-Site Scripting. Author: ahmadbaby |
Analyze the security implications of: Domain Group Network GooCMS 1.02 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: XFree86 4.x - CopyISOLatin1Lowered Font_Name Buffer Overflow | This is a dos exploit for linux platform. Description: XFree86 4.x - CopyISOLatin1Lowered Font_Name Buffer Overflow. Author: Greg MacManus |
Analyze the security implications of: XFree86 4.x - CopyISOLatin1Lowered Font_Name Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: KosmosBlog 0.9.3 - SQL Injection / Cross-Site Scripting / Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: KosmosBlog 0.9.3 - SQL Injection / Cross-Site Scripting / Cross-Site Request Forgery. Author: Milos Zivanovic |
Analyze the security implications of: KosmosBlog 0.9.3 - SQL Injection / Cross-Site Scripting / Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Card sharj 1.0 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Card sharj 1.0 - Multiple SQL Injections. Author: Net.Edit0r |
Analyze the security implications of: Card sharj 1.0 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Digirez 3.4 - Cross-Site Request Forgery (Update Admin) | This is a webapps exploit for asp platform. Description: Digirez 3.4 - Cross-Site Request Forgery (Update Admin). Author: Ihsan Sencan |
Analyze the security implications of: Digirez 3.4 - Cross-Site Request Forgery (Update Admin) | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Chipmunk Pwngame - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Chipmunk Pwngame - Multiple SQL Injections. Author: KnocKout |
Analyze the security implications of: Chipmunk Pwngame - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Flash - Type Confusion in IExternalizable.readExternal When Performing Local Serialization | This is a dos exploit for multiple platform. Description: Adobe Flash - Type Confusion in IExternalizable.readExternal When Performing Local Serialization. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - Type Confusion in IExternalizable.readExternal When Performing Local Serialization | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Andy's PHP Projects Man Page Lookup Script - Information Disclosure | This is a webapps exploit for php platform. Description: Andy's PHP Projects Man Page Lookup Script - Information Disclosure. Author: Cabezon Aurelien |
Analyze the security implications of: Andy's PHP Projects Man Page Lookup Script - Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ZPanel zsudo - Local Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: ZPanel zsudo - Local Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: ZPanel zsudo - Local Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: DblTek - Multiple Vulnerabilities | This is a webapps exploit for linux platform. Description: DblTek - Multiple Vulnerabilities. Author: SecuriTeam |
Analyze the security implications of: DblTek - Multiple Vulnerabilities | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Activity MOD Plus 1.1.0 - 'phpBB Mod' File Inclusion | This is a webapps exploit for php platform. Description: Activity MOD Plus 1.1.0 - 'phpBB Mod' File Inclusion. Author: nukedx |
Analyze the security implications of: Activity MOD Plus 1.1.0 - 'phpBB Mod' File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component aWiki - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component aWiki - Local File Inclusion. Author: Angela Zhang |
Analyze the security implications of: Joomla! Component aWiki - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX 10.4.5 Mail.app - Real Name Buffer Overflow | This is a remote exploit for osx platform. Description: Apple Mac OSX 10.4.5 Mail.app - Real Name Buffer Overflow. Author: Kevin Finisterre |
Analyze the security implications of: Apple Mac OSX 10.4.5 Mail.app - Real Name Buffer Overflow | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Jorani Leave Management 0.6.5 - (Authenticated) 'startdate' SQL Injection | This is a webapps exploit for php platform. Description: Jorani Leave Management 0.6.5 - (Authenticated) 'startdate' SQL Injection. Author: Javier Olmedo |
Analyze the security implications of: Jorani Leave Management 0.6.5 - (Authenticated) 'startdate' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Borland/Inprise Interbase 4.0/5.0/6.0 - Backdoor Password | This is a remote exploit for multiple platform. Description: Borland/Inprise Interbase 4.0/5.0/6.0 - Backdoor Password. Author: Frank Schlottmann-Goedde |
Analyze the security implications of: Borland/Inprise Interbase 4.0/5.0/6.0 - Backdoor Password | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Libmodplug 0.8.8.2 - '.abc' Stack Buffer Overflow (PoC) | This is a dos exploit for linux platform. Description: Libmodplug 0.8.8.2 - '.abc' Stack Buffer Overflow (PoC). Author: epiphant |
Analyze the security implications of: Libmodplug 0.8.8.2 - '.abc' Stack Buffer Overflow (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: WordPress Plugin Work The Flow - Arbitrary File Upload (Metasploit) | This is a remote exploit for php platform. Description: WordPress Plugin Work The Flow - Arbitrary File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: WordPress Plugin Work The Flow - Arbitrary File Upload (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Barcodes generator 1.0 - 'name' Stored Cross Site Scripting | This is a webapps exploit for php platform. Description: Barcodes generator 1.0 - 'name' Stored Cross Site Scripting. Author: Nikhil Kumar |
Analyze the security implications of: Barcodes generator 1.0 - 'name' Stored Cross Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BloofoxCMS 0.5.0 - 'fileurl' Local File Inclusion | This is a webapps exploit for php platform. Description: BloofoxCMS 0.5.0 - 'fileurl' Local File Inclusion. Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: BloofoxCMS 0.5.0 - 'fileurl' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 3proxy 0.5.3g (Linux) - 'proxy.c logurl()' Remote Buffer Overflow | This is a remote exploit for linux platform. Description: 3proxy 0.5.3g (Linux) - 'proxy.c logurl()' Remote Buffer Overflow. Author: vade79 |
Analyze the security implications of: 3proxy 0.5.3g (Linux) - 'proxy.c logurl()' Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: NTP 4.2.8p8 - Denial of Service | This is a dos exploit for linux platform. Description: NTP 4.2.8p8 - Denial of Service. Author: Magnus Klaaborg Stubman |
Analyze the security implications of: NTP 4.2.8p8 - Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: STARFACE 7.3.0.10 - Authentication with Password Hash Possible | This is a webapps exploit for jsp platform. Description: STARFACE 7.3.0.10 - Authentication with Password Hash Possible. Author: RedTeam Pentesting GmbH |
Analyze the security implications of: STARFACE 7.3.0.10 - Authentication with Password Hash Possible | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: ChatSecure IM 2.2.4 iOS - Persistent Cross-Site Scripting | This is a webapps exploit for ios platform. Description: ChatSecure IM 2.2.4 iOS - Persistent Cross-Site Scripting. Author: Vulnerability-Lab |
Analyze the security implications of: ChatSecure IM 2.2.4 iOS - Persistent Cross-Site Scripting | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: DL PayCart 1.34 - Admin Password Changing | This is a webapps exploit for php platform. Description: DL PayCart 1.34 - Admin Password Changing. Author: G4N0K |
Analyze the security implications of: DL PayCart 1.34 - Admin Password Changing | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.