input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: D-Link Devices - UPnP M-SEARCH Multicast Command Injection (Metasploit) | This is a remote exploit for hardware platform. Description: D-Link Devices - UPnP M-SEARCH Multicast Command Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: D-Link Devices - UPnP M-SEARCH Multicast Command Injection (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Cells Blog 3.5 - 'bgid' / 'fmid' / 'fnid' SQL Injection | This is a webapps exploit for php platform. Description: Cells Blog 3.5 - 'bgid' / 'fmid' / 'fnid' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Cells Blog 3.5 - 'bgid' / 'fmid' / 'fnid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cobub Razor 0.7.2 - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: Cobub Razor 0.7.2 - Cross-Site Request Forgery. Author: ppb |
Analyze the security implications of: Cobub Razor 0.7.2 - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM Lotus Domino 8.5.x - 'x.nsf' Multiple Cross-Site Scripting Vulnerabilities | This is a remote exploit for multiple platform. Description: IBM Lotus Domino 8.5.x - 'x.nsf' Multiple Cross-Site Scripting Vulnerabilities. Author: MustLive |
Analyze the security implications of: IBM Lotus Domino 8.5.x - 'x.nsf' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: w3tw0rk / Pitbul IRC Bot - Remote Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: w3tw0rk / Pitbul IRC Bot - Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: w3tw0rk / Pitbul IRC Bot - Remote Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Google Chrome - Silent HTTP Authentication | This is a dos exploit for multiple platform. Description: Google Chrome - Silent HTTP Authentication. Author: T355 |
Analyze the security implications of: Google Chrome - Silent HTTP Authentication | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component JE Ticket System 1.2 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JE Ticket System 1.2 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component JE Ticket System 1.2 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Briefcase 4.0 iOS - Code Execution / File Inclusion | This is a webapps exploit for ios platform. Description: Briefcase 4.0 iOS - Code Execution / File Inclusion. Author: Vulnerability-Lab |
Analyze the security implications of: Briefcase 4.0 iOS - Code Execution / File Inclusion | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Snitz Forums 2000 - 'Active.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Snitz Forums 2000 - 'Active.asp' SQL Injection. Author: BugReport.IR |
Analyze the security implications of: Snitz Forums 2000 - 'Active.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Maian Uploader 4.0 - 'keywords' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Maian Uploader 4.0 - 'keywords' Cross-Site Scripting. Author: Khashayar Fereidani |
Analyze the security implications of: Maian Uploader 4.0 - 'keywords' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Git Submodule - Arbitrary Code Execution (PoC) | This is a local exploit for linux platform. Description: Git Submodule - Arbitrary Code Execution (PoC). Author: Junio C Hamano |
Analyze the security implications of: Git Submodule - Arbitrary Code Execution (PoC) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: eCommerce Corporation Online Store Kit 3.0 - 'More.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: eCommerce Corporation Online Store Kit 3.0 - 'More.php' Cross-Site Scripting. Author: David Sopas Ferreira |
Analyze the security implications of: eCommerce Corporation Online Store Kit 3.0 - 'More.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bluetooth Text Chat 1.0 iOS - Code Execution | This is a remote exploit for ios platform. Description: Bluetooth Text Chat 1.0 iOS - Code Execution. Author: Vulnerability-Lab |
Analyze the security implications of: Bluetooth Text Chat 1.0 iOS - Code Execution | This exploit targets ios systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Book Store Management System 1.0.0 - Stored Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Book Store Management System 1.0.0 - Stored Cross-Site Scripting (XSS). Author: Rajeshwar Singh |
Analyze the security implications of: Book Store Management System 1.0.0 - Stored Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Open-Xchange App Suite 7.8.2 - Cross-Site Scripting | This is a webapps exploit for linux platform. Description: Open-Xchange App Suite 7.8.2 - Cross-Site Scripting. Author: Jakub A>>oczek |
Analyze the security implications of: Open-Xchange App Suite 7.8.2 - Cross-Site Scripting | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Rar - CmdExtract::UnstoreFile Integer Truncation Memory Corruption | This is a dos exploit for multiple platform. Description: Rar - CmdExtract::UnstoreFile Integer Truncation Memory Corruption. Author: Google Security Research |
Analyze the security implications of: Rar - CmdExtract::UnstoreFile Integer Truncation Memory Corruption | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: SGI IRIX 5.3/6.2 / SGI license_oeo 1.0 LicenseManager - 'NETLS_LICENSE_FILE' Local Privilege Escalation | This is a local exploit for irix platform. Description: SGI IRIX 5.3/6.2 / SGI license_oeo 1.0 LicenseManager - 'NETLS_LICENSE_FILE' Local Privilege Escalation. Author: Arthur Hagen |
Analyze the security implications of: SGI IRIX 5.3/6.2 / SGI license_oeo 1.0 LicenseManager - 'NETLS_LICENSE_FILE' Local Privilege Escalation | This exploit targets irix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: Zyxel P-660HW-61 Firmware < 3.40(PE.11)C0 Router - Local File Inclusion | This is a webapps exploit for hardware platform. Description: Zyxel P-660HW-61 Firmware < 3.40(PE.11)C0 Router - Local File Inclusion. Author: ReverseBrain |
Analyze the security implications of: Zyxel P-660HW-61 Firmware < 3.40(PE.11)C0 Router - Local File Inclusion | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ISC DHCPD 2.0/3.0.1 - NSUPDATE Remote Format String | This is a remote exploit for bsd platform. Description: ISC DHCPD 2.0/3.0.1 - NSUPDATE Remote Format String. Author: Andi |
Analyze the security implications of: ISC DHCPD 2.0/3.0.1 - NSUPDATE Remote Format String | This exploit targets bsd systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Joomla! Component Maian15 - 'name' Arbitrary File Upload | This is a webapps exploit for php platform. Description: Joomla! Component Maian15 - 'name' Arbitrary File Upload. Author: SultanHaikal |
Analyze the security implications of: Joomla! Component Maian15 - 'name' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 3/4/5 - Multiple Local/Remote Vulnerabilities (2) | This is a dos exploit for php platform. Description: PHP 3/4/5 - Multiple Local/Remote Vulnerabilities (2). Author: Slythers |
Analyze the security implications of: PHP 3/4/5 - Multiple Local/Remote Vulnerabilities (2) | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Compress::Raw::Zlib Perl Module - Remote Code Execution | This is a remote exploit for linux platform. Description: Compress::Raw::Zlib Perl Module - Remote Code Execution. Author: Leo Bergolth |
Analyze the security implications of: Compress::Raw::Zlib Perl Module - Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: glibc - 'realpath()' Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: glibc - 'realpath()' Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: glibc - 'realpath()' Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: DCForum 6.0 - Remote Admin Privilege Arbitrary Commands | This is a remote exploit for cgi platform. Description: DCForum 6.0 - Remote Admin Privilege Arbitrary Commands. Author: Franklin DeMatto |
Analyze the security implications of: DCForum 6.0 - Remote Admin Privilege Arbitrary Commands | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Kerio MailServer 5.6.3 list Module - Overflow | This is a dos exploit for linux platform. Description: Kerio MailServer 5.6.3 list Module - Overflow. Author: David F.Madrid |
Analyze the security implications of: Kerio MailServer 5.6.3 list Module - Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Conectiva 4.x/5.x / Debian 2.x / RedHat 6.x / S.u.S.E 6.x/7.0 / Trustix 1.x - rpc.statd Remote Format String (3) | This is a remote exploit for linux platform. Description: Conectiva 4.x/5.x / Debian 2.x / RedHat 6.x / S.u.S.E 6.x/7.0 / Trustix 1.x - rpc.statd Remote Format String (3). Author: ron1n |
Analyze the security implications of: Conectiva 4.x/5.x / Debian 2.x / RedHat 6.x / S.u.S.E 6.x/7.0 / Trustix 1.x - rpc.statd Remote Format String (3) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Aterr 0.9.1 - PHP5 Local File Inclusion | This is a webapps exploit for php platform. Description: Aterr 0.9.1 - PHP5 Local File Inclusion. Author: KnocKout |
Analyze the security implications of: Aterr 0.9.1 - PHP5 Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Downline Goldmine paidversion - SQL Injection | This is a webapps exploit for php platform. Description: Downline Goldmine paidversion - SQL Injection. Author: Hussin X |
Analyze the security implications of: Downline Goldmine paidversion - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: XEROX WorkCentre 7855 Printer - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for hardware platform. Description: XEROX WorkCentre 7855 Printer - Cross-Site Request Forgery (Add Admin). Author: Ismail Tasdelen |
Analyze the security implications of: XEROX WorkCentre 7855 Printer - Cross-Site Request Forgery (Add Admin) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component BF Quiz 1.3.0 - SQL Injection (1) | This is a webapps exploit for php platform. Description: Joomla! Component BF Quiz 1.3.0 - SQL Injection (1). Author: Valentin |
Analyze the security implications of: Joomla! Component BF Quiz 1.3.0 - SQL Injection (1) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_tienda - 'categoria' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joomla! Component com_tienda - 'categoria' Cross-Site Scripting. Author: FL0RiX |
Analyze the security implications of: Joomla! Component com_tienda - 'categoria' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Enterprise Heart Enterprise Connector 1.0.2 - 'messages.php?messageid' SQL Injection | This is a webapps exploit for php platform. Description: Enterprise Heart Enterprise Connector 1.0.2 - 'messages.php?messageid' SQL Injection. Author: r0t |
Analyze the security implications of: Enterprise Heart Enterprise Connector 1.0.2 - 'messages.php?messageid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HB CMS 1.7 - SQL Injection | This is a webapps exploit for php platform. Description: HB CMS 1.7 - SQL Injection. Author: Securitylab Security Research |
Analyze the security implications of: HB CMS 1.7 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.