input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component EZ Store Remote - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component EZ Store Remote - Blind SQL Injection. Author: His0k4 |
Analyze the security implications of: Joomla! Component EZ Store Remote - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco IOS 12.4(23) - HTTP Server Multiple Cross-Site Scripting Vulnerabilities | This is a remote exploit for hardware platform. Description: Cisco IOS 12.4(23) - HTTP Server Multiple Cross-Site Scripting Vulnerabilities. Author: Zloss |
Analyze the security implications of: Cisco IOS 12.4(23) - HTTP Server Multiple Cross-Site Scripting Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: GNU binutils - 'print_insn_score16' Buffer Overflow | This is a dos exploit for linux platform. Description: GNU binutils - 'print_insn_score16' Buffer Overflow. Author: Alexandre Adamski |
Analyze the security implications of: GNU binutils - 'print_insn_score16' Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: iPlanet 4.1 Web Publisher - Remote Buffer Overflow (2) | This is a dos exploit for multiple platform. Description: iPlanet 4.1 Web Publisher - Remote Buffer Overflow (2). Author: Gabriel Maggiotti |
Analyze the security implications of: iPlanet 4.1 Web Publisher - Remote Buffer Overflow (2) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Kide Shoutbox 0.4.6 - Cross-Site Scripting / AXFR | This is a webapps exploit for php platform. Description: Kide Shoutbox 0.4.6 - Cross-Site Scripting / AXFR. Author: andresg888 |
Analyze the security implications of: Kide Shoutbox 0.4.6 - Cross-Site Scripting / AXFR | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Aruba ClearPass Policy Manager - Persistent Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: Aruba ClearPass Policy Manager - Persistent Cross-Site Scripting. Author: Cristiano Maruti |
Analyze the security implications of: Aruba ClearPass Policy Manager - Persistent Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ATutor 1.x - 'body_header.inc.php?section' Local File Inclusion | This is a webapps exploit for php platform. Description: ATutor 1.x - 'body_header.inc.php?section' Local File Inclusion. Author: Andreas Sandblad |
Analyze the security implications of: ATutor 1.x - 'body_header.inc.php?section' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Freeway 1.4.1.171 - '/templates/Freeway/boxes/loginbox.php?language' Traversal Local File Inclusion | This is a webapps exploit for php platform. Description: Freeway 1.4.1.171 - '/templates/Freeway/boxes/loginbox.php?language' Traversal Local File Inclusion. Author: Digital Security Research Group |
Analyze the security implications of: Freeway 1.4.1.171 - '/templates/Freeway/boxes/loginbox.php?language' Traversal Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: UFO: Alien Invasion IRC Client (OSX) - Remote Buffer Overflow (Metasploit) | This is a remote exploit for osx platform. Description: UFO: Alien Invasion IRC Client (OSX) - Remote Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: UFO: Alien Invasion IRC Client (OSX) - Remote Buffer Overflow (Metasploit) | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: FreznoShop 1.3.0 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: FreznoShop 1.3.0 - 'id' SQL Injection. Author: NoGe |
Analyze the security implications of: FreznoShop 1.3.0 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Web Wiz Forum 9.5 - 'admin_category_details.asp?mode' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Web Wiz Forum 9.5 - 'admin_category_details.asp?mode' Cross-Site Scripting. Author: CSDT |
Analyze the security implications of: Web Wiz Forum 9.5 - 'admin_category_details.asp?mode' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: IPB (nv2) Awards < 1.1.0 - SQL Injection | This is a webapps exploit for php platform. Description: IPB (nv2) Awards < 1.1.0 - SQL Injection. Author: fred777 |
Analyze the security implications of: IPB (nv2) Awards < 1.1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link Devices - Cookie Command Execution (Metasploit) | This is a remote exploit for hardware platform. Description: D-Link Devices - Cookie Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: D-Link Devices - Cookie Command Execution (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: iGaming CMS 1.5 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: iGaming CMS 1.5 - Multiple SQL Injections. Author: StAkeR |
Analyze the security implications of: iGaming CMS 1.5 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ActiveCampaign KnowledgeBuilder 2.2 - Remote File Inclusion | This is a webapps exploit for php platform. Description: ActiveCampaign KnowledgeBuilder 2.2 - Remote File Inclusion. Author: igi |
Analyze the security implications of: ActiveCampaign KnowledgeBuilder 2.2 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fortinet FortiOS 5.6.3 - 5.6.7 / FortiOS 6.0.0 - 6.0.4 - Credentials Disclosure | This is a webapps exploit for hardware platform. Description: Fortinet FortiOS 5.6.3 - 5.6.7 / FortiOS 6.0.0 - 6.0.4 - Credentials Disclosure. Author: Carlos E. Vieira |
Analyze the security implications of: Fortinet FortiOS 5.6.3 - 5.6.7 / FortiOS 6.0.0 - 6.0.4 - Credentials Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Ero Auktion 2.0 - 'news.php' SQL Injection | This is a webapps exploit for php platform. Description: Ero Auktion 2.0 - 'news.php' SQL Injection. Author: Easy Laster |
Analyze the security implications of: Ero Auktion 2.0 - 'news.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CourseForum Technologies ProjectForum 4.7 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: CourseForum Technologies ProjectForum 4.7 - Multiple Cross-Site Scripting Vulnerabilities. Author: r0t3d3Vil |
Analyze the security implications of: CourseForum Technologies ProjectForum 4.7 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CuteNews aj-fork 167f - 'cutepath' Remote File Inclusion | This is a webapps exploit for php platform. Description: CuteNews aj-fork 167f - 'cutepath' Remote File Inclusion. Author: DeltahackingTEAM |
Analyze the security implications of: CuteNews aj-fork 167f - 'cutepath' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bang Resto v1.0 - Stored Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Bang Resto v1.0 - Stored Cross-Site Scripting (XSS). Author: Rahad Chowdhury |
Analyze the security implications of: Bang Resto v1.0 - Stored Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 4.6.3 (x86) - 'Netfilter' Local Privilege Escalation (Metasploit) | This is a local exploit for linux_x86 platform. Description: Linux Kernel 4.6.3 (x86) - 'Netfilter' Local Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: Linux Kernel 4.6.3 (x86) - 'Netfilter' Local Privilege Escalation (Metasploit) | This exploit targets linux_x86 systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux_x86 platform |
What is this exploit about: Apache - Remote Memory Exhaustion (Denial of Service) | This is a dos exploit for multiple platform. Description: Apache - Remote Memory Exhaustion (Denial of Service). Author: kingcope |
Analyze the security implications of: Apache - Remote Memory Exhaustion (Denial of Service) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Sickbeard 0.1 - Remote Command Injection | This is a webapps exploit for hardware platform. Description: Sickbeard 0.1 - Remote Command Injection. Author: bdrake |
Analyze the security implications of: Sickbeard 0.1 - Remote Command Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: 2DayBiz Real Estate Portal - 'viewpropertydetails.php' SQL Injection | This is a webapps exploit for php platform. Description: 2DayBiz Real Estate Portal - 'viewpropertydetails.php' SQL Injection. Author: Sangteamtham |
Analyze the security implications of: 2DayBiz Real Estate Portal - 'viewpropertydetails.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Albinator 2.0.6 - 'Config_rootdir' Remote File Inclusion | This is a webapps exploit for php platform. Description: Albinator 2.0.6 - 'Config_rootdir' Remote File Inclusion. Author: webDEViL |
Analyze the security implications of: Albinator 2.0.6 - 'Config_rootdir' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! / Mambo Component com_iigcatalog - 'cat' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! / Mambo Component com_iigcatalog - 'cat' SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! / Mambo Component com_iigcatalog - 'cat' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iBall Baton iB-WRA150N - DNS Change | This is a webapps exploit for hardware platform. Description: iBall Baton iB-WRA150N - DNS Change. Author: Todor Donev |
Analyze the security implications of: iBall Baton iB-WRA150N - DNS Change | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: macOS 10.14.6 (18G87) - Kernel Use-After-Free due to Race Condition in wait_for_namespace_event() | This is a dos exploit for macos platform. Description: macOS 10.14.6 (18G87) - Kernel Use-After-Free due to Race Condition in wait_for_namespace_event(). Author: Google Security Research |
Analyze the security implications of: macOS 10.14.6 (18G87) - Kernel Use-After-Free due to Race Condition in wait_for_namespace_event() | This exploit targets macos systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: ManageEngine ADSelfService Plus 4.4 - POST Manipulation Security Question | This is a webapps exploit for php platform. Description: ManageEngine ADSelfService Plus 4.4 - POST Manipulation Security Question. Author: Core Security |
Analyze the security implications of: ManageEngine ADSelfService Plus 4.4 - POST Manipulation Security Question | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AnnonceScriptHP 2.0 - '/admin/admin_config/Aide.php?email' Cross-Site Scripting | This is a webapps exploit for php platform. Description: AnnonceScriptHP 2.0 - '/admin/admin_config/Aide.php?email' Cross-Site Scripting. Author: Mr_KaLiMaN |
Analyze the security implications of: AnnonceScriptHP 2.0 - '/admin/admin_config/Aide.php?email' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DropAFew 0.2 - 'newaccount2.php' Arbitrary Account Creation | This is a webapps exploit for php platform. Description: DropAFew 0.2 - 'newaccount2.php' Arbitrary Account Creation. Author: Alexander Klink |
Analyze the security implications of: DropAFew 0.2 - 'newaccount2.php' Arbitrary Account Creation | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bootstrapy CMS - Multiple SQL Injection | This is a webapps exploit for php platform. Description: Bootstrapy CMS - Multiple SQL Injection. Author: Ahmet Ümit BAYRAM |
Analyze the security implications of: Bootstrapy CMS - Multiple SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link Routers - Directory Traversal | This is a webapps exploit for hardware platform. Description: D-Link Routers - Directory Traversal. Author: Blazej Adamczyk |
Analyze the security implications of: D-Link Routers - Directory Traversal | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.