input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets novell platform |
What is this exploit about: Ruby on Rails - JSON Processor YAML Deserialization Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Ruby on Rails - JSON Processor YAML Deserialization Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Ruby on Rails - JSON Processor YAML Deserialization Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Aztech Routers - '/cgi-bin/AZ_Retrain.cgi' Denial of Service | This is a dos exploit for hardware platform. Description: Aztech Routers - '/cgi-bin/AZ_Retrain.cgi' Denial of Service. Author: Federick Joe P Fajardo |
Analyze the security implications of: Aztech Routers - '/cgi-bin/AZ_Retrain.cgi' Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Imageview - 'upload.php' Arbitrary File Upload | This is a webapps exploit for php platform. Description: Imageview - 'upload.php' Arbitrary File Upload. Author: TUNISIAN CYBER |
Analyze the security implications of: Imageview - 'upload.php' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Way-Board 2.0 - File Disclosure | This is a remote exploit for cgi platform. Description: Way-Board 2.0 - File Disclosure. Author: cuctema |
Analyze the security implications of: Way-Board 2.0 - File Disclosure | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Open Proficy HMI-SCADA 5.0.0.25920 - 'Password' Denial of Service (PoC) | This is a dos exploit for ios platform. Description: Open Proficy HMI-SCADA 5.0.0.25920 - 'Password' Denial of Service (PoC). Author: Luis Martínez |
Analyze the security implications of: Open Proficy HMI-SCADA 5.0.0.25920 - 'Password' Denial of Service (PoC) | This exploit targets ios systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Apple Mac OSX xnu 1228.x - 'vfssysctl' Local Kernel Denial of Service (PoC) | This is a dos exploit for osx platform. Description: Apple Mac OSX xnu 1228.x - 'vfssysctl' Local Kernel Denial of Service (PoC). Author: mu-b |
Analyze the security implications of: Apple Mac OSX xnu 1228.x - 'vfssysctl' Local Kernel Denial of Service (PoC) | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: e107 website system 0.7.5 - 'admin.php?Query String (PATH_INFO)' Cross-Site Scripting | This is a webapps exploit for php platform. Description: e107 website system 0.7.5 - 'admin.php?Query String (PATH_INFO)' Cross-Site Scripting. Author: zark0vac |
Analyze the security implications of: e107 website system 0.7.5 - 'admin.php?Query String (PATH_INFO)' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FoodStar 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: FoodStar 1.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: FoodStar 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Goople CMS 1.7 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Goople CMS 1.7 - Arbitrary File Upload. Author: x0r |
Analyze the security implications of: Goople CMS 1.7 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco IOS 12 MSFC2 - Layer 2 Frame Denial of Service | This is a dos exploit for hardware platform. Description: Cisco IOS 12 MSFC2 - Layer 2 Frame Denial of Service. Author: blackangels |
Analyze the security implications of: Cisco IOS 12 MSFC2 - Layer 2 Frame Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Wireshark - find_signature Stack Out-of-Bounds Read | This is a dos exploit for multiple platform. Description: Wireshark - find_signature Stack Out-of-Bounds Read. Author: Google Security Research |
Analyze the security implications of: Wireshark - find_signature Stack Out-of-Bounds Read | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: e-107 Plugin ZoGo-Shop 1.16 Beta 13 - SQL Injection | This is a webapps exploit for php platform. Description: e-107 Plugin ZoGo-Shop 1.16 Beta 13 - SQL Injection. Author: Cr@zy_King |
Analyze the security implications of: e-107 Plugin ZoGo-Shop 1.16 Beta 13 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Zyxel zysh - Format string | This is a remote exploit for hardware platform. Description: Zyxel zysh - Format string. Author: Marco Ivaldi |
Analyze the security implications of: Zyxel zysh - Format string | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Sitecore CMS 8.1 Update-3 - Cross-Site Scripting | This is a webapps exploit for aspx platform. Description: Sitecore CMS 8.1 Update-3 - Cross-Site Scripting. Author: Pralhad Chaskar |
Analyze the security implications of: Sitecore CMS 8.1 Update-3 - Cross-Site Scripting | This exploit targets aspx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aspx platform |
What is this exploit about: Juniper Networks Secure Access 2000 - 'rdremediate.cgi' Cross-Site Scripting | This is a remote exploit for hardware platform. Description: Juniper Networks Secure Access 2000 - 'rdremediate.cgi' Cross-Site Scripting. Author: Richard Brain |
Analyze the security implications of: Juniper Networks Secure Access 2000 - 'rdremediate.cgi' Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: SonicWALL SOHO 5.1.7 - Web Interface Multiple Remote Input Validation Vulnerabilities | This is a webapps exploit for cgi platform. Description: SonicWALL SOHO 5.1.7 - Web Interface Multiple Remote Input Validation Vulnerabilities. Author: Oliver Karow |
Analyze the security implications of: SonicWALL SOHO 5.1.7 - Web Interface Multiple Remote Input Validation Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Joomla! 2.5.0 < 2.5.1 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! 2.5.0 < 2.5.1 - Blind SQL Injection. Author: A. Ramos |
Analyze the security implications of: Joomla! 2.5.0 < 2.5.1 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM Tivoli Access Manager for E-Business - '/ibm/wpm/group?method' Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: IBM Tivoli Access Manager for E-Business - '/ibm/wpm/group?method' Cross-Site Scripting. Author: IBM |
Analyze the security implications of: IBM Tivoli Access Manager for E-Business - '/ibm/wpm/group?method' Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Manhali 1.8 - Local File Inclusion | This is a webapps exploit for php platform. Description: Manhali 1.8 - Local File Inclusion. Author: L0n3ly-H34rT |
Analyze the security implications of: Manhali 1.8 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: E-PHP CMS - 'article.php' SQL Injection | This is a webapps exploit for php platform. Description: E-PHP CMS - 'article.php' SQL Injection. Author: HaCkeR_EgY |
Analyze the security implications of: E-PHP CMS - 'article.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FS Amazon Clone 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: FS Amazon Clone 1.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: FS Amazon Clone 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gamespy 3d 2.62/2.63 - IRC Client Remote Buffer Overflow | This is a dos exploit for linux platform. Description: Gamespy 3d 2.62/2.63 - IRC Client Remote Buffer Overflow. Author: Luigi Auriemma |
Analyze the security implications of: Gamespy 3d 2.62/2.63 - IRC Client Remote Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: JonhCMS 4.5.1 - SQL Injection | This is a webapps exploit for php platform. Description: JonhCMS 4.5.1 - SQL Injection. Author: Besim |
Analyze the security implications of: JonhCMS 4.5.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AIOCP 1.3.x - 'cp_forum_view.php' SQL Injection | This is a webapps exploit for php platform. Description: AIOCP 1.3.x - 'cp_forum_view.php' SQL Injection. Author: laurent gaffie |
Analyze the security implications of: AIOCP 1.3.x - 'cp_forum_view.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dating Agent 4.7.1 - Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: Dating Agent 4.7.1 - Multiple Input Validation Vulnerabilities. Author: EllipSiS Security |
Analyze the security implications of: Dating Agent 4.7.1 - Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SonicWALL Gms 6 - Arbitrary File Upload (Metasploit) | This is a remote exploit for multiple platform. Description: SonicWALL Gms 6 - Arbitrary File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: SonicWALL Gms 6 - Arbitrary File Upload (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ASTPP 4.0.1 VoIP Billing - Database Backup Download | This is a webapps exploit for linux platform. Description: ASTPP 4.0.1 VoIP Billing - Database Backup Download. Author: Fabien AUNAY |
Analyze the security implications of: ASTPP 4.0.1 VoIP Billing - Database Backup Download | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Brooky CubeCart 2.0.1/2.0.4 - 'index.php?language' Traversal Arbitrary File Access | This is a webapps exploit for php platform. Description: Brooky CubeCart 2.0.1/2.0.4 - 'index.php?language' Traversal Arbitrary File Access. Author: John Cobb |
Analyze the security implications of: Brooky CubeCart 2.0.1/2.0.4 - 'index.php?language' Traversal Arbitrary File Access | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Device42 WAN Emulator 2.3 - Traceroute Command Injection (Metasploit) | This is a webapps exploit for cgi platform. Description: Device42 WAN Emulator 2.3 - Traceroute Command Injection (Metasploit). Author: Brandon Perry |
Analyze the security implications of: Device42 WAN Emulator 2.3 - Traceroute Command Injection (Metasploit) | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Jettweb PHP Hazır Rent A Car Sitesi Scripti V2 - 'arac_kategori_id' SQL Injection | This is a webapps exploit for php platform. Description: Jettweb PHP Hazır Rent A Car Sitesi Scripti V2 - 'arac_kategori_id' SQL Injection. Author: Ahmet Ümit BAYRAM |
Analyze the security implications of: Jettweb PHP Hazır Rent A Car Sitesi Scripti V2 - 'arac_kategori_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Almond Classifieds - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Joomla! Component Almond Classifieds - Arbitrary File Upload. Author: DevilScreaM |
Analyze the security implications of: Joomla! Component Almond Classifieds - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Telesquare SKT LTE Router SDT-CS3B1 - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: Telesquare SKT LTE Router SDT-CS3B1 - Cross-Site Request Forgery. Author: LiquidWorm |
Analyze the security implications of: Telesquare SKT LTE Router SDT-CS3B1 - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Alienvault 4.3.1 - SQL Injection / Cross-Site Scripting | This is a webapps exploit for php platform. Description: Alienvault 4.3.1 - SQL Injection / Cross-Site Scripting. Author: Sasha Zivojinovic |
Analyze the security implications of: Alienvault 4.3.1 - SQL Injection / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.