input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: HughesNet HT2000W Satellite Modem - Password Reset | This is a webapps exploit for hardware platform. Description: HughesNet HT2000W Satellite Modem - Password Reset. Author: Simon Greenblatt |
Analyze the security implications of: HughesNet HT2000W Satellite Modem - Password Reset | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: DirectAdmin 1.34.0 - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: DirectAdmin 1.34.0 - Cross-Site Request Forgery (Add Admin). Author: SecurityRules |
Analyze the security implications of: DirectAdmin 1.34.0 - Cross-Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Zh BaiduMap 3.0.0.1 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Zh BaiduMap 3.0.0.1 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Zh BaiduMap 3.0.0.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Achievo 1.4.3 - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: Achievo 1.4.3 - Cross-Site Request Forgery. Author: Pablo Milano |
Analyze the security implications of: Achievo 1.4.3 - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Phoenix Contact WebVisit 6.40.00 - Password Disclosure | This is a webapps exploit for hardware platform. Description: Phoenix Contact WebVisit 6.40.00 - Password Disclosure. Author: Photubias |
Analyze the security implications of: Phoenix Contact WebVisit 6.40.00 - Password Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: E-lokaler CMS 2 - Admin Login Multiple SQL Injections | This is a webapps exploit for php platform. Description: E-lokaler CMS 2 - Admin Login Multiple SQL Injections. Author: ali_err0r |
Analyze the security implications of: E-lokaler CMS 2 - Admin Login Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eSyndiCat 1.6 - 'admin_lng' Cookie Authentication Bypass | This is a webapps exploit for php platform. Description: eSyndiCat 1.6 - 'admin_lng' Cookie Authentication Bypass. Author: Ciph3r |
Analyze the security implications of: eSyndiCat 1.6 - 'admin_lng' Cookie Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bus Pass Management System 1.0 - 'viewid' SQL Injection | This is a webapps exploit for php platform. Description: Bus Pass Management System 1.0 - 'viewid' SQL Injection. Author: Aryan Chehreghani |
Analyze the security implications of: Bus Pass Management System 1.0 - 'viewid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache CouchDB 1.5.0 - 'uuids' Denial of Service | This is a dos exploit for multiple platform. Description: Apache CouchDB 1.5.0 - 'uuids' Denial of Service. Author: Krusty Hack |
Analyze the security implications of: Apache CouchDB 1.5.0 - 'uuids' Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GeekLog 1.4.0sr3 - '_CONF[path]' Remote File Inclusion | This is a webapps exploit for php platform. Description: GeekLog 1.4.0sr3 - '_CONF[path]' Remote File Inclusion. Author: Kw3[R]Ln |
Analyze the security implications of: GeekLog 1.4.0sr3 - '_CONF[path]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreeBSD 6.4 - Netgraph Privilege Escalation | This is a local exploit for bsd platform. Description: FreeBSD 6.4 - Netgraph Privilege Escalation. Author: zx2c4 |
Analyze the security implications of: FreeBSD 6.4 - Netgraph Privilege Escalation | This exploit targets bsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Joomla! Component com_pinboard - 'task' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_pinboard - 'task' SQL Injection. Author: Stack |
Analyze the security implications of: Joomla! Component com_pinboard - 'task' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MobileIron Virtual Smartphone Platform - Privilege Escalation | This is a remote exploit for hardware platform. Description: MobileIron Virtual Smartphone Platform - Privilege Escalation. Author: prdelka |
Analyze the security implications of: MobileIron Virtual Smartphone Platform - Privilege Escalation | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Linux Kernel - VMA Use-After-Free via Buggy vmacache_flush_all() Fastpath Local Privilege Escalation | This is a local exploit for linux platform. Description: Linux Kernel - VMA Use-After-Free via Buggy vmacache_flush_all() Fastpath Local Privilege Escalation. Author: Google Security Research |
Analyze the security implications of: Linux Kernel - VMA Use-After-Free via Buggy vmacache_flush_all() Fastpath Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Wireshark - LWRES Dissector getaddrsbyname_request Buffer Overflow (Metasploit) | This is a remote exploit for linux platform. Description: Wireshark - LWRES Dissector getaddrsbyname_request Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: Wireshark - LWRES Dissector getaddrsbyname_request Buffer Overflow (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Built2Go PHP Rate My Photo 1.46.4 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Built2Go PHP Rate My Photo 1.46.4 - Arbitrary File Upload. Author: ZoRLu |
Analyze the security implications of: Built2Go PHP Rate My Photo 1.46.4 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHPFreeChat 1.7 - Denial of Service | This is a dos exploit for php platform. Description: PHPFreeChat 1.7 - Denial of Service. Author: A. Pakbaz |
Analyze the security implications of: PHPFreeChat 1.7 - Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IceWarp Universal WebMail - '/mail/include.html' Crafted HTTP_USER_AGENT Arbitrary File Access | This is a webapps exploit for php platform. Description: IceWarp Universal WebMail - '/mail/include.html' Crafted HTTP_USER_AGENT Arbitrary File Access. Author: Tan Chew Keong |
Analyze the security implications of: IceWarp Universal WebMail - '/mail/include.html' Crafted HTTP_USER_AGENT Arbitrary File Access | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple macOS Kernel 10.12.3 (16D32) - Use-After-Free Due to Double-Release in posix_spawn | This is a dos exploit for macos platform. Description: Apple macOS Kernel 10.12.3 (16D32) - Use-After-Free Due to Double-Release in posix_spawn. Author: Google Security Research |
Analyze the security implications of: Apple macOS Kernel 10.12.3 (16D32) - Use-After-Free Due to Double-Release in posix_spawn | This exploit targets macos systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: xine 0.99.2 - Remote Stack Overflow | This is a remote exploit for linux platform. Description: xine 0.99.2 - Remote Stack Overflow. Author: c0ntex |
Analyze the security implications of: xine 0.99.2 - Remote Stack Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Mach Race OSX - Local Privilege Escalation | This is a local exploit for osx platform. Description: Mach Race OSX - Local Privilege Escalation. Author: fG! |
Analyze the security implications of: Mach Race OSX - Local Privilege Escalation | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: InfraPower PPS-02-S Q213V1 - Local File Disclosure | This is a webapps exploit for php platform. Description: InfraPower PPS-02-S Q213V1 - Local File Disclosure. Author: LiquidWorm |
Analyze the security implications of: InfraPower PPS-02-S Q213V1 - Local File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Minify 2.1.x - 'g' Cross-Site Scripting | This is a webapps exploit for java platform. Description: Minify 2.1.x - 'g' Cross-Site Scripting. Author: Ayoub Aboukir |
Analyze the security implications of: Minify 2.1.x - 'g' Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Extreme Mobster - 'login' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Extreme Mobster - 'login' Cross-Site Scripting. Author: indoushka |
Analyze the security implications of: Extreme Mobster - 'login' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LightRO CMS 1.0 - 'index.php?projectid' SQL Injection | This is a webapps exploit for php platform. Description: LightRO CMS 1.0 - 'index.php?projectid' SQL Injection. Author: ajann |
Analyze the security implications of: LightRO CMS 1.0 - 'index.php?projectid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Faculty Evaluation System 1.0 - Unauthenticated File Upload | This is a webapps exploit for php platform. Description: Faculty Evaluation System 1.0 - Unauthenticated File Upload. Author: URGAN |
Analyze the security implications of: Faculty Evaluation System 1.0 - Unauthenticated File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_maintenance.php?base_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_maintenance.php?base_path' Remote File Inclusion. Author: indoushka |
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_maintenance.php?base_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Wyomind Help Desk 1.3.6 - Remote Code Execution (RCE) | This is a webapps exploit for multiple platform. Description: Wyomind Help Desk 1.3.6 - Remote Code Execution (RCE). Author: Patrik Lantz |
Analyze the security implications of: Wyomind Help Desk 1.3.6 - Remote Code Execution (RCE) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Free File Hosting 1.1 - 'forgot_pass.php' File Inclusion | This is a webapps exploit for php platform. Description: Free File Hosting 1.1 - 'forgot_pass.php' File Inclusion. Author: Kacper |
Analyze the security implications of: Free File Hosting 1.1 - 'forgot_pass.php' File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Barracuda Networks #35 Web Firewall 610 6.0.1 - Filter Bypass / Persistent | This is a webapps exploit for multiple platform. Description: Barracuda Networks #35 Web Firewall 610 6.0.1 - Filter Bypass / Persistent. Author: Vulnerability-Lab |
Analyze the security implications of: Barracuda Networks #35 Web Firewall 610 6.0.1 - Filter Bypass / Persistent | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Amateur Photographer's Image Gallery - 'plist.php?albumid' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Amateur Photographer's Image Gallery - 'plist.php?albumid' Cross-Site Scripting. Author: cr4wl3r |
Analyze the security implications of: Amateur Photographer's Image Gallery - 'plist.php?albumid' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Photo Transfer Upload 1.0 iOS - Multiple Vulnerabilities | This is a webapps exploit for ios platform. Description: Photo Transfer Upload 1.0 iOS - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: Photo Transfer Upload 1.0 iOS - Multiple Vulnerabilities | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Joomla! Component vReview 1.9.11 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component vReview 1.9.11 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component vReview 1.9.11 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.