input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: cPanel 11.x - 'Fantastico' Local File Inclusion | This is a webapps exploit for php platform. Description: cPanel 11.x - 'Fantastico' Local File Inclusion. Author: joker_1 |
Analyze the security implications of: cPanel 11.x - 'Fantastico' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Constructr CMS 3.02.5 stable - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Constructr CMS 3.02.5 stable - Multiple Vulnerabilities. Author: fuzion |
Analyze the security implications of: Constructr CMS 3.02.5 stable - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP (Multiple Functions) - Local Denial of Service | This is a dos exploit for multiple platform. Description: PHP (Multiple Functions) - Local Denial of Service. Author: Yakir Wizman |
Analyze the security implications of: PHP (Multiple Functions) - Local Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: OpenBSD 2.9/3.0 - Default Crontab Root Command Injection | This is a local exploit for openbsd platform. Description: OpenBSD 2.9/3.0 - Default Crontab Root Command Injection. Author: Przemyslaw Frasunek |
Analyze the security implications of: OpenBSD 2.9/3.0 - Default Crontab Root Command Injection | This exploit targets openbsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets openbsd platform |
What is this exploit about: lftp 2.6.9 - Remote Stack Overflow | This is a remote exploit for linux platform. Description: lftp 2.6.9 - Remote Stack Overflow. Author: Li0n7 |
Analyze the security implications of: lftp 2.6.9 - Remote Stack Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: elaniin CMS 1.0 - Authentication Bypass | This is a webapps exploit for php platform. Description: elaniin CMS 1.0 - Authentication Bypass. Author: riamloo |
Analyze the security implications of: elaniin CMS 1.0 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Zimbra < 8.8.11 - XML External Entity Injection / Server-Side Request Forgery | This is a webapps exploit for jsp platform. Description: Zimbra < 8.8.11 - XML External Entity Injection / Server-Side Request Forgery. Author: k8gege |
Analyze the security implications of: Zimbra < 8.8.11 - XML External Entity Injection / Server-Side Request Forgery | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: DirectAdmin 1.292 - 'CMD_USER_STATS' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DirectAdmin 1.292 - 'CMD_USER_STATS' Cross-Site Scripting. Author: Mandr4ke |
Analyze the security implications of: DirectAdmin 1.292 - 'CMD_USER_STATS' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle Siebel CRM 19.0 - Persistent Cross-Site Scripting | This is a webapps exploit for linux platform. Description: Oracle Siebel CRM 19.0 - Persistent Cross-Site Scripting. Author: Sarath Nair |
Analyze the security implications of: Oracle Siebel CRM 19.0 - Persistent Cross-Site Scripting | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: GLLCTS2 < 4.2.4 - 'detail' SQL Injection | This is a webapps exploit for php platform. Description: GLLCTS2 < 4.2.4 - 'detail' SQL Injection. Author: TheDefaced |
Analyze the security implications of: GLLCTS2 < 4.2.4 - 'detail' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP-UX 10.x - stmkfont Alternate Typeface Library Buffer Overflow (1) | This is a local exploit for hp-ux platform. Description: HP-UX 10.x - stmkfont Alternate Typeface Library Buffer Overflow (1). Author: Last Stage of Delirium |
Analyze the security implications of: HP-UX 10.x - stmkfont Alternate Typeface Library Buffer Overflow (1) | This exploit targets hp-ux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hp-ux platform |
What is this exploit about: macOS Kernel - Use-After-Free Due to Lack of Locking in 'AppleEmbeddedOSSupportHostClient::registerNotificationPort' | This is a dos exploit for macos platform. Description: macOS Kernel - Use-After-Free Due to Lack of Locking in 'AppleEmbeddedOSSupportHostClient::registerNotificationPort'. Author: Google Security Research |
Analyze the security implications of: macOS Kernel - Use-After-Free Due to Lack of Locking in 'AppleEmbeddedOSSupportHostClient::registerNotificationPort' | This exploit targets macos systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Attachmax Dolphin 2.1.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Attachmax Dolphin 2.1.0 - Multiple Vulnerabilities. Author: K-159 |
Analyze the security implications of: Attachmax Dolphin 2.1.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Foto - 'id_categoria' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Foto - 'id_categoria' SQL Injection. Author: SOLVER |
Analyze the security implications of: Joomla! Component Foto - 'id_categoria' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: William Deich Super 3.x - SysLog Format String | This is a local exploit for linux platform. Description: William Deich Super 3.x - SysLog Format String. Author: gobbles |
Analyze the security implications of: William Deich Super 3.x - SysLog Format String | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Xavi 7968 ADSL Router - '/webconfig/lan/lan_config.html/local_lan_config?host_name_txtbox' Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: Xavi 7968 ADSL Router - '/webconfig/lan/lan_config.html/local_lan_config?host_name_txtbox' Cross-Site Scripting. Author: Busindre |
Analyze the security implications of: Xavi 7968 ADSL Router - '/webconfig/lan/lan_config.html/local_lan_config?host_name_txtbox' Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: iGENUS WebMail 2.0.2 - 'config_inc.php' Remote Code Execution | This is a webapps exploit for php platform. Description: iGENUS WebMail 2.0.2 - 'config_inc.php' Remote Code Execution. Author: rgod |
Analyze the security implications of: iGENUS WebMail 2.0.2 - 'config_inc.php' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Maian Cart 1.1 - Insecure Cookie Handling | This is a webapps exploit for php platform. Description: Maian Cart 1.1 - Insecure Cookie Handling. Author: Saime |
Analyze the security implications of: Maian Cart 1.1 - Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Tinycontrol LAN Controller v3 (LK3) 1.58a - Remote Admin Password Change | This is a remote exploit for hardware platform. Description: Tinycontrol LAN Controller v3 (LK3) 1.58a - Remote Admin Password Change. Author: LiquidWorm |
Analyze the security implications of: Tinycontrol LAN Controller v3 (LK3) 1.58a - Remote Admin Password Change | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component JE Ajax Event Calendar 1.0.5 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JE Ajax Event Calendar 1.0.5 - SQL Injection. Author: L0rd CrusAd3r |
Analyze the security implications of: Joomla! Component JE Ajax Event Calendar 1.0.5 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component User Status - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component User Status - Local File Inclusion. Author: Chip d3 bi0s |
Analyze the security implications of: Joomla! Component User Status - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HPE OpenCall Media Platform (OCMP) 4.3.2 - Cross-Site Scripting / Remote File Inclusion | This is a webapps exploit for multiple platform. Description: HPE OpenCall Media Platform (OCMP) 4.3.2 - Cross-Site Scripting / Remote File Inclusion. Author: Paolo Stagno |
Analyze the security implications of: HPE OpenCall Media Platform (OCMP) 4.3.2 - Cross-Site Scripting / Remote File Inclusion | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CompactCMS 1.4.1 - Multiple Cross-Site Scripting Vulnerabilities (1) | This is a webapps exploit for php platform. Description: CompactCMS 1.4.1 - Multiple Cross-Site Scripting Vulnerabilities (1). Author: High-Tech Bridge SA |
Analyze the security implications of: CompactCMS 1.4.1 - Multiple Cross-Site Scripting Vulnerabilities (1) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Trend Micro Email Encryption Gateway 5.5 (Build 1111.00) - Multiple Vulnerabilities | This is a webapps exploit for jsp platform. Description: Trend Micro Email Encryption Gateway 5.5 (Build 1111.00) - Multiple Vulnerabilities. Author: Core Security |
Analyze the security implications of: Trend Micro Email Encryption Gateway 5.5 (Build 1111.00) - Multiple Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Customer Relationship Management System (CRM) 1.0 - Sql Injection Authentication Bypass | This is a webapps exploit for php platform. Description: Customer Relationship Management System (CRM) 1.0 - Sql Injection Authentication Bypass. Author: Shafique_Wasta |
Analyze the security implications of: Customer Relationship Management System (CRM) 1.0 - Sql Injection Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Debian 2.0/2.0 r5 / FreeBSD 3.2 / OpenBSD 2.4 / RedHat 5.2 i386 / S.u.S.E 6.1 - 'Lsof' Local Buffer Overflow (2) | This is a local exploit for linux platform. Description: Debian 2.0/2.0 r5 / FreeBSD 3.2 / OpenBSD 2.4 / RedHat 5.2 i386 / S.u.S.E 6.1 - 'Lsof' Local Buffer Overflow (2). Author: Zhodiac |
Analyze the security implications of: Debian 2.0/2.0 r5 / FreeBSD 3.2 / OpenBSD 2.4 / RedHat 5.2 i386 / S.u.S.E 6.1 - 'Lsof' Local Buffer Overflow (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Hisilicon HiIpcam V100R003 Remote ADSL - Credentials Disclosure | This is a remote exploit for hardware platform. Description: Hisilicon HiIpcam V100R003 Remote ADSL - Credentials Disclosure. Author: Todor Donev |
Analyze the security implications of: Hisilicon HiIpcam V100R003 Remote ADSL - Credentials Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: DieselScripts jokes - Backup | This is a webapps exploit for php platform. Description: DieselScripts jokes - Backup. Author: indoushka |
Analyze the security implications of: DieselScripts jokes - Backup | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel - VMA Use-After-Free via Buggy vmacache_flush_all() Fastpath Local Privilege Escalation | This is a local exploit for linux platform. Description: Linux Kernel - VMA Use-After-Free via Buggy vmacache_flush_all() Fastpath Local Privilege Escalation. Author: Google Security Research |
Analyze the security implications of: Linux Kernel - VMA Use-After-Free via Buggy vmacache_flush_all() Fastpath Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Magic CMS 4.2.747 - 'mysave.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Magic CMS 4.2.747 - 'mysave.php' Remote File Inclusion. Author: DNX |
Analyze the security implications of: Magic CMS 4.2.747 - 'mysave.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dicoogle PACS 2.5.0 - Directory Traversal | This is a webapps exploit for multiple platform. Description: Dicoogle PACS 2.5.0 - Directory Traversal. Author: Carlos Avila |
Analyze the security implications of: Dicoogle PACS 2.5.0 - Directory Traversal | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Sun JDK/SDK 1.3/1.4 / IBM JDK 1.3.1 / BEA Systems WebLogic 5/6/7 - java.util.zip Null Value Denial of Service (3) | This is a dos exploit for multiple platform. Description: Sun JDK/SDK 1.3/1.4 / IBM JDK 1.3.1 / BEA Systems WebLogic 5/6/7 - java.util.zip Null Value Denial of Service (3). Author: Marc Schoenefeld |
Analyze the security implications of: Sun JDK/SDK 1.3/1.4 / IBM JDK 1.3.1 / BEA Systems WebLogic 5/6/7 - java.util.zip Null Value Denial of Service (3) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple macOS/iOS - Kernel Double Free due to Incorrect API Usage in Flow Divert Socket Option Handling | This is a dos exploit for multiple platform. Description: Apple macOS/iOS - Kernel Double Free due to Incorrect API Usage in Flow Divert Socket Option Handling. Author: Google Security Research |
Analyze the security implications of: Apple macOS/iOS - Kernel Double Free due to Incorrect API Usage in Flow Divert Socket Option Handling | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.