input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HospitalRun 1.0.0-beta - Local Root Exploit for macOS | This is a local exploit for macos platform. Description: HospitalRun 1.0.0-beta - Local Root Exploit for macOS. Author: Jean Pereira |
Analyze the security implications of: HospitalRun 1.0.0-beta - Local Root Exploit for macOS | This exploit targets macos systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Just William's Amazon Webstore - 'searchFor' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Just William's Amazon Webstore - 'searchFor' Cross-Site Scripting. Author: Lostmon |
Analyze the security implications of: Just William's Amazon Webstore - 'searchFor' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FrontAccounting 2.4.5 - 'SubmitUser' SQL Injection | This is a webapps exploit for php platform. Description: FrontAccounting 2.4.5 - 'SubmitUser' SQL Injection. Author: Sainadh Jamalpur |
Analyze the security implications of: FrontAccounting 2.4.5 - 'SubmitUser' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Konqueror 3.5.9 - 'font color' Remote Crash | This is a dos exploit for linux platform. Description: Konqueror 3.5.9 - 'font color' Remote Crash. Author: Jeremy Brown |
Analyze the security implications of: Konqueror 3.5.9 - 'font color' Remote Crash | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Library System 1.0 - 'category' SQL Injection | This is a webapps exploit for php platform. Description: Library System 1.0 - 'category' SQL Injection. Author: Aitor Herrero |
Analyze the security implications of: Library System 1.0 - 'category' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX 10 - nidump Password File Disclosure | This is a remote exploit for osx platform. Description: Apple Mac OSX 10 - nidump Password File Disclosure. Author: Steven Kreuzer |
Analyze the security implications of: Apple Mac OSX 10 - nidump Password File Disclosure | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: ClickTrackerASP - 'sitedetails.asp?siteid' SQL Injection | This is a webapps exploit for asp platform. Description: ClickTrackerASP - 'sitedetails.asp?siteid' SQL Injection. Author: R3d-D3V!L |
Analyze the security implications of: ClickTrackerASP - 'sitedetails.asp?siteid' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component com_spain - 'nv' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_spain - 'nv' SQL Injection. Author: FL0RiX |
Analyze the security implications of: Joomla! Component com_spain - 'nv' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Trend Micro Data Loss Prevention Virtual Appliance 5.2 - Path Traversal | This is a webapps exploit for linux platform. Description: Trend Micro Data Loss Prevention Virtual Appliance 5.2 - Path Traversal. Author: Leonardo Duarte |
Analyze the security implications of: Trend Micro Data Loss Prevention Virtual Appliance 5.2 - Path Traversal | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: HPE < 7.2 - Java Deserialization | This is a remote exploit for java platform. Description: HPE < 7.2 - Java Deserialization. Author: Raphael Kuhn |
Analyze the security implications of: HPE < 7.2 - Java Deserialization | This exploit targets java systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Maian Weblog 4.0 - SQL Injection | This is a webapps exploit for php platform. Description: Maian Weblog 4.0 - SQL Injection. Author: Kaan KAMIS |
Analyze the security implications of: Maian Weblog 4.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Metasploit Web UI - Diagnostic Console Command Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Metasploit Web UI - Diagnostic Console Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Metasploit Web UI - Diagnostic Console Command Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple Mac OSX Regex Engine (TRE) - Stack Buffer Overflow (PoC) | This is a dos exploit for osx platform. Description: Apple Mac OSX Regex Engine (TRE) - Stack Buffer Overflow (PoC). Author: Google Security Research |
Analyze the security implications of: Apple Mac OSX Regex Engine (TRE) - Stack Buffer Overflow (PoC) | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Electrolink FM/DAB/TV Transmitter (Login Cookie) - Authentication Bypass | This is a webapps exploit for hardware platform. Description: Electrolink FM/DAB/TV Transmitter (Login Cookie) - Authentication Bypass. Author: LiquidWorm |
Analyze the security implications of: Electrolink FM/DAB/TV Transmitter (Login Cookie) - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: DiscusWare Discus 3.10 - Error Message Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: DiscusWare Discus 3.10 - Error Message Cross-Site Scripting. Author: $um$id |
Analyze the security implications of: DiscusWare Discus 3.10 - Error Message Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: CS-Cart 4.2.4 - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: CS-Cart 4.2.4 - Cross-Site Request Forgery. Author: Luis Santana |
Analyze the security implications of: CS-Cart 4.2.4 - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: aradblog - Multiple Vulnerabilities | This is a webapps exploit for asp platform. Description: aradblog - Multiple Vulnerabilities. Author: Abysssec |
Analyze the security implications of: aradblog - Multiple Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Vesta Control Panel 0.9.8-26 - Authenticated Remote Code Execution (Metasploit) | This is a webapps exploit for multiple platform. Description: Vesta Control Panel 0.9.8-26 - Authenticated Remote Code Execution (Metasploit). Author: Mehmet Ince |
Analyze the security implications of: Vesta Control Panel 0.9.8-26 - Authenticated Remote Code Execution (Metasploit) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Spring Data REST < 2.6.9 (Ingalls SR9) / 3.0.1 (Kay SR1) - PATCH Request Remote Code Execution | This is a webapps exploit for java platform. Description: Spring Data REST < 2.6.9 (Ingalls SR9) / 3.0.1 (Kay SR1) - PATCH Request Remote Code Execution. Author: Antonio Francesco Sardella |
Analyze the security implications of: Spring Data REST < 2.6.9 (Ingalls SR9) / 3.0.1 (Kay SR1) - PATCH Request Remote Code Execution | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Ingress-NGINX 4.11.0 - Remote Code Execution (RCE) | This is a remote exploit for multiple platform. Description: Ingress-NGINX 4.11.0 - Remote Code Execution (RCE). Author: Likhith Appalaneni |
Analyze the security implications of: Ingress-NGINX 4.11.0 - Remote Code Execution (RCE) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Google AdWords API PHP client library 6.2.0 - Arbitrary PHP Code Execution | This is a webapps exploit for php platform. Description: Google AdWords API PHP client library 6.2.0 - Arbitrary PHP Code Execution. Author: Dawid Golunski |
Analyze the security implications of: Google AdWords API PHP client library 6.2.0 - Arbitrary PHP Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Havalite CMS 1.1.7 - Unrestricted Arbitrary File Upload | This is a webapps exploit for php platform. Description: Havalite CMS 1.1.7 - Unrestricted Arbitrary File Upload. Author: CWH Underground |
Analyze the security implications of: Havalite CMS 1.1.7 - Unrestricted Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: fipsGallery 1.5 - 'index1.asp' SQL Injection | This is a webapps exploit for asp platform. Description: fipsGallery 1.5 - 'index1.asp' SQL Injection. Author: ajann |
Analyze the security implications of: fipsGallery 1.5 - 'index1.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Magic Photo Storage Website - '/admin/membership_pricing.php?_config[site_path]' Remote File Inclusion | This is a webapps exploit for php platform. Description: Magic Photo Storage Website - '/admin/membership_pricing.php?_config[site_path]' Remote File Inclusion. Author: IbnuSina |
Analyze the security implications of: Magic Photo Storage Website - '/admin/membership_pricing.php?_config[site_path]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dredge School Administration System - '/DSM/loader.php' Cross-Site Request Forgery (Admin Account Manipulation) | This is a webapps exploit for php platform. Description: Dredge School Administration System - '/DSM/loader.php' Cross-Site Request Forgery (Admin Account Manipulation). Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: Dredge School Administration System - '/DSM/loader.php' Cross-Site Request Forgery (Admin Account Manipulation) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Care2x Open Source Hospital Information Management 2.7 Alpha - 'Multiple' Stored XSS | This is a webapps exploit for php platform. Description: Care2x Open Source Hospital Information Management 2.7 Alpha - 'Multiple' Stored XSS. Author: securityforeveryone.com |
Analyze the security implications of: Care2x Open Source Hospital Information Management 2.7 Alpha - 'Multiple' Stored XSS | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ruby on Rails 1.2.3 To_JSON - Script Injection | This is a remote exploit for linux platform. Description: Ruby on Rails 1.2.3 To_JSON - Script Injection. Author: BCC |
Analyze the security implications of: Ruby on Rails 1.2.3 To_JSON - Script Injection | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Aztek Forum 4.0 - Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: Aztek Forum 4.0 - Multiple Input Validation Vulnerabilities. Author: benji lemien |
Analyze the security implications of: Aztek Forum 4.0 - Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Employee Record System 1.0 - Multiple Stored XSS | This is a webapps exploit for php platform. Description: Employee Record System 1.0 - Multiple Stored XSS. Author: Saeed Bala Ahmed |
Analyze the security implications of: Employee Record System 1.0 - Multiple Stored XSS | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MHonArc 2.6.16 - Tag Nesting Remote Denial of Service | This is a dos exploit for linux platform. Description: MHonArc 2.6.16 - Tag Nesting Remote Denial of Service. Author: anonymous |
Analyze the security implications of: MHonArc 2.6.16 - Tag Nesting Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: DIGISOL DG-HR3400 Wireless Router - Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: DIGISOL DG-HR3400 Wireless Router - Cross-Site Scripting. Author: Adipta Basu |
Analyze the security implications of: DIGISOL DG-HR3400 Wireless Router - Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Sun Java System Web Server 7.0 Update 6 - 'admin' Server Denial of Service | This is a dos exploit for multiple platform. Description: Sun Java System Web Server 7.0 Update 6 - 'admin' Server Denial of Service. Author: Intevydis |
Analyze the security implications of: Sun Java System Web Server 7.0 Update 6 - 'admin' Server Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component dcsFlashGames 2.0RC1 - 'catid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component dcsFlashGames 2.0RC1 - 'catid' SQL Injection. Author: kaMtiEz |
Analyze the security implications of: Joomla! Component dcsFlashGames 2.0RC1 - 'catid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.