input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: EXPBlog 0.3.5 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: EXPBlog 0.3.5 - Multiple Cross-Site Scripting Vulnerabilities. Author: Tamriel |
Analyze the security implications of: EXPBlog 0.3.5 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: E-Guest 1.1 - Server Side Include Arbitrary Command Execution | This is a remote exploit for linux platform. Description: E-Guest 1.1 - Server Side Include Arbitrary Command Execution. Author: DownBload |
Analyze the security implications of: E-Guest 1.1 - Server Side Include Arbitrary Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: JGBBS 3.0beta1 - 'search.asp?author' SQL Injection | This is a webapps exploit for asp platform. Description: JGBBS 3.0beta1 - 'search.asp?author' SQL Injection. Author: WiLdBoY |
Analyze the security implications of: JGBBS 3.0beta1 - 'search.asp?author' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Telerik UI - Remote Code Execution via Insecure Deserialization | This is a webapps exploit for aspx platform. Description: Telerik UI - Remote Code Execution via Insecure Deserialization. Author: Bishop Fox |
Analyze the security implications of: Telerik UI - Remote Code Execution via Insecure Deserialization | This exploit targets aspx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aspx platform |
What is this exploit about: IBM AIX 4.3.3/5.1/5.2 - 'libIM' Buffer Overflow | This is a dos exploit for aix platform. Description: IBM AIX 4.3.3/5.1/5.2 - 'libIM' Buffer Overflow. Author: Euan Briggs |
Analyze the security implications of: IBM AIX 4.3.3/5.1/5.2 - 'libIM' Buffer Overflow | This exploit targets aix systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: Joomla! Component Inneradmission - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Inneradmission - 'index.php' SQL Injection. Author: Lazmania61 |
Analyze the security implications of: Joomla! Component Inneradmission - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iTechscripts Freelancer Script 5.11 - 'sk' SQL Injection | This is a webapps exploit for php platform. Description: iTechscripts Freelancer Script 5.11 - 'sk' SQL Injection. Author: v3n0m |
Analyze the security implications of: iTechscripts Freelancer Script 5.11 - 'sk' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Samsung PS50C7700 TV - Denial of Service | This is a dos exploit for hardware platform. Description: Samsung PS50C7700 TV - Denial of Service. Author: Malik Mesellem |
Analyze the security implications of: Samsung PS50C7700 TV - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component IDoEditor - 'image.php' Arbitrary File Upload | This is a webapps exploit for php platform. Description: Joomla! Component IDoEditor - 'image.php' Arbitrary File Upload. Author: Sammy FORGIT |
Analyze the security implications of: Joomla! Component IDoEditor - 'image.php' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DMANews 0.9 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: DMANews 0.9 - Multiple SQL Injections. Author: r0t |
Analyze the security implications of: DMANews 0.9 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo Component 'com_a6mambohelpdesk' 18RC1 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Mambo Component 'com_a6mambohelpdesk' 18RC1 - Remote File Inclusion. Author: Dr.Jr7 |
Analyze the security implications of: Mambo Component 'com_a6mambohelpdesk' 18RC1 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX / iOS - NECP System Control Socket Packet Parsing Kernel Code Execution Integer Overflow | This is a dos exploit for multiple platform. Description: Apple Mac OSX / iOS - NECP System Control Socket Packet Parsing Kernel Code Execution Integer Overflow. Author: Google Security Research |
Analyze the security implications of: Apple Mac OSX / iOS - NECP System Control Socket Packet Parsing Kernel Code Execution Integer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Nexus Repository Manager - Java EL Injection RCE (Metasploit) | This is a remote exploit for linux platform. Description: Nexus Repository Manager - Java EL Injection RCE (Metasploit). Author: Metasploit |
Analyze the security implications of: Nexus Repository Manager - Java EL Injection RCE (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_bt_media 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_bt_media 1.0 - SQL Injection. Author: Persian Hack Team |
Analyze the security implications of: Joomla! Component com_bt_media 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Websense Appliance Manager - Command Injection | This is a webapps exploit for java platform. Description: Websense Appliance Manager - Command Injection. Author: Han Sahin |
Analyze the security implications of: Websense Appliance Manager - Command Injection | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Joomla! Component RSfiles 1.0.2 - 'path' File Download | This is a webapps exploit for php platform. Description: Joomla! Component RSfiles 1.0.2 - 'path' File Download. Author: ajann |
Analyze the security implications of: Joomla! Component RSfiles 1.0.2 - 'path' File Download | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple WebKit - Type Confusion in RenderBox with Accessibility Enabled | This is a dos exploit for multiple platform. Description: Apple WebKit - Type Confusion in RenderBox with Accessibility Enabled. Author: Google Security Research |
Analyze the security implications of: Apple WebKit - Type Confusion in RenderBox with Accessibility Enabled | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GlassFish Enterprise Server 2.1 - Admin Console /customMBeans/customMBeans.jsf URI Cross-Site Scripting | This is a remote exploit for multiple platform. Description: GlassFish Enterprise Server 2.1 - Admin Console /customMBeans/customMBeans.jsf URI Cross-Site Scripting. Author: DSecRG |
Analyze the security implications of: GlassFish Enterprise Server 2.1 - Admin Console /customMBeans/customMBeans.jsf URI Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mozilla Firefox 3.0.14 - Remote Memory Corruption | This is a dos exploit for linux platform. Description: Mozilla Firefox 3.0.14 - Remote Memory Corruption. Author: Carsten Book |
Analyze the security implications of: Mozilla Firefox 3.0.14 - Remote Memory Corruption | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Adobe Acrobat 9.1.1 (OSX/Windows) - Stack Overflow Crash (PoC) | This is a dos exploit for multiple platform. Description: Adobe Acrobat 9.1.1 (OSX/Windows) - Stack Overflow Crash (PoC). Author: Saint Patrick |
Analyze the security implications of: Adobe Acrobat 9.1.1 (OSX/Windows) - Stack Overflow Crash (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: dirLIST 0.3.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: dirLIST 0.3.0 - Local File Inclusion. Author: L0n3ly-H34rT |
Analyze the security implications of: dirLIST 0.3.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ComicShout 2.8 - 'news_id' SQL Injection | This is a webapps exploit for php platform. Description: ComicShout 2.8 - 'news_id' SQL Injection. Author: JosS |
Analyze the security implications of: ComicShout 2.8 - 'news_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component iF Portfolio Nexus - 'Controller' Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component iF Portfolio Nexus - 'Controller' Remote File Inclusion. Author: F10riX |
Analyze the security implications of: Joomla! Component iF Portfolio Nexus - 'Controller' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Confixx 3.0/3.1 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Confixx 3.0/3.1 - 'index.php' Cross-Site Scripting. Author: LoK-Crew |
Analyze the security implications of: Confixx 3.0/3.1 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ntpdc 4.2.6p3 - Local Buffer Overflow | This is a local exploit for multiple platform. Description: Ntpdc 4.2.6p3 - Local Buffer Overflow. Author: drone |
Analyze the security implications of: Ntpdc 4.2.6p3 - Local Buffer Overflow | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ez Poll Hoster - Multiple Cross-Site Scripting / Cross-Site Request Forgery Vulnerabilities | This is a webapps exploit for php platform. Description: Ez Poll Hoster - Multiple Cross-Site Scripting / Cross-Site Request Forgery Vulnerabilities. Author: Milos Zivanovic |
Analyze the security implications of: Ez Poll Hoster - Multiple Cross-Site Scripting / Cross-Site Request Forgery Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iOS 12.4 - Sandbox Escape due to Integer Overflow in mediaserverd | This is a dos exploit for ios platform. Description: iOS 12.4 - Sandbox Escape due to Integer Overflow in mediaserverd. Author: Google Security Research |
Analyze the security implications of: iOS 12.4 - Sandbox Escape due to Integer Overflow in mediaserverd | This exploit targets ios systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Luftguitar CMS - Upload Arbitrary File | This is a webapps exploit for asp platform. Description: Luftguitar CMS - Upload Arbitrary File. Author: Abysssec |
Analyze the security implications of: Luftguitar CMS - Upload Arbitrary File | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: UUCP - File Creation/Overwriting Symlinks | This is a local exploit for linux platform. Description: UUCP - File Creation/Overwriting Symlinks. Author: t--zen |
Analyze the security implications of: UUCP - File Creation/Overwriting Symlinks | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FlatNuke 2.5.5 - 'footer.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: FlatNuke 2.5.5 - 'footer.php' Multiple Cross-Site Scripting Vulnerabilities. Author: rgod |
Analyze the security implications of: FlatNuke 2.5.5 - 'footer.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Croogo 3.0.2 - Remote Code Execution (Authenticated) | This is a webapps exploit for php platform. Description: Croogo 3.0.2 - Remote Code Execution (Authenticated). Author: Deha Berkin Bir |
Analyze the security implications of: Croogo 3.0.2 - Remote Code Execution (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Motorola Wimax modem CPEi300 - File Disclosure / Cross-Site Scripting | This is a remote exploit for hardware platform. Description: Motorola Wimax modem CPEi300 - File Disclosure / Cross-Site Scripting. Author: Usman Saeed |
Analyze the security implications of: Motorola Wimax modem CPEi300 - File Disclosure / Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Baal Systems 3.8 - Authentication Bypass | This is a webapps exploit for php platform. Description: Baal Systems 3.8 - Authentication Bypass. Author: cr4wl3r |
Analyze the security implications of: Baal Systems 3.8 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.