input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: bfcommand & control server 1.22/2.0/2.14 manager - Multiple Vulnerabilities | This is a remote exploit for multiple platform. Description: bfcommand & control server 1.22/2.0/2.14 manager - Multiple Vulnerabilities. Author: Luigi Auriemma |
Analyze the security implications of: bfcommand & control server 1.22/2.0/2.14 manager - Multiple Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: HP JetDirect Printer - SNMP JetAdmin Device Password Disclosure | This is a remote exploit for hardware platform. Description: HP JetDirect Printer - SNMP JetAdmin Device Password Disclosure. Author: Sven Pechler |
Analyze the security implications of: HP JetDirect Printer - SNMP JetAdmin Device Password Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Evernew Free Joke Script 1.2 - Remote Change Password | This is a webapps exploit for php platform. Description: Evernew Free Joke Script 1.2 - Remote Change Password. Author: Hakxer |
Analyze the security implications of: Evernew Free Joke Script 1.2 - Remote Change Password | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Froxlor Froxlor Server Management Panel 0.10.16 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Froxlor Froxlor Server Management Panel 0.10.16 - Persistent Cross-Site Scripting. Author: Vulnerability-Lab |
Analyze the security implications of: Froxlor Froxlor Server Management Panel 0.10.16 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BlackBoard Learning System 5.x/6.0 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for cgi platform. Description: BlackBoard Learning System 5.x/6.0 - Multiple Cross-Site Scripting Vulnerabilities. Author: DarC KonQuest |
Analyze the security implications of: BlackBoard Learning System 5.x/6.0 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: FreeBSD 6/8 - ata Device Local Denial of Service | This is a dos exploit for freebsd platform. Description: FreeBSD 6/8 - ata Device Local Denial of Service. Author: Shaun Colley |
Analyze the security implications of: FreeBSD 6/8 - ata Device Local Denial of Service | This exploit targets freebsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: Joomla! Component Maian Music 1.2.1 - 'category' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Maian Music 1.2.1 - 'category' SQL Injection. Author: H!tm@N |
Analyze the security implications of: Joomla! Component Maian Music 1.2.1 - 'category' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Rough Auditing Tool for Security (RATS) 2.3 - Array Out of Block Crash | This is a dos exploit for linux platform. Description: Rough Auditing Tool for Security (RATS) 2.3 - Array Out of Block Crash. Author: David Silveiro |
Analyze the security implications of: Rough Auditing Tool for Security (RATS) 2.3 - Array Out of Block Crash | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apache 2.0.4x mod_php - File Descriptor Leakage (2) | This is a local exploit for linux platform. Description: Apache 2.0.4x mod_php - File Descriptor Leakage (2). Author: frauk\x41ser |
Analyze the security implications of: Apache 2.0.4x mod_php - File Descriptor Leakage (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: big.asp - SQL Injection | This is a webapps exploit for php platform. Description: big.asp - SQL Injection. Author: Ra3cH |
Analyze the security implications of: big.asp - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: showoff! digital media software 1.5.4 - Multiple Vulnerabilities | This is a webapps exploit for cgi platform. Description: showoff! digital media software 1.5.4 - Multiple Vulnerabilities. Author: dr_insane |
Analyze the security implications of: showoff! digital media software 1.5.4 - Multiple Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Discuz! 4.x - SQL Injection / Admin Credentials Disclosure | This is a webapps exploit for php platform. Description: Discuz! 4.x - SQL Injection / Admin Credentials Disclosure. Author: rgod |
Analyze the security implications of: Discuz! 4.x - SQL Injection / Admin Credentials Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LayerBB 1.1.2 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: LayerBB 1.1.2 - Cross-Site Scripting. Author: 0xB9 |
Analyze the security implications of: LayerBB 1.1.2 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dasan Networks GPON ONT WiFi Router H64X Series - Configuration Download | This is a webapps exploit for hardware platform. Description: Dasan Networks GPON ONT WiFi Router H64X Series - Configuration Download. Author: LiquidWorm |
Analyze the security implications of: Dasan Networks GPON ONT WiFi Router H64X Series - Configuration Download | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Mambo Component Articles - 'artid' Blind SQL Injection | This is a webapps exploit for php platform. Description: Mambo Component Articles - 'artid' Blind SQL Injection. Author: Ded MustD!e |
Analyze the security implications of: Mambo Component Articles - 'artid' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: askSam 4.0 Web Publisher - Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: askSam 4.0 Web Publisher - Cross-Site Scripting. Author: frog |
Analyze the security implications of: askSam 4.0 Web Publisher - Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Epic Games Unreal Tournament Engine 3 - UMOD Manifest.INI Arbitrary File Overwrite | This is a remote exploit for multiple platform. Description: Epic Games Unreal Tournament Engine 3 - UMOD Manifest.INI Arbitrary File Overwrite. Author: Luigi Auriemma |
Analyze the security implications of: Epic Games Unreal Tournament Engine 3 - UMOD Manifest.INI Arbitrary File Overwrite | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: PHP-FPM - Underflow Remote Code Execution (Metasploit) | This is a remote exploit for php platform. Description: PHP-FPM - Underflow Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: PHP-FPM - Underflow Remote Code Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Request For Travel 1.0 - 'product' SQL Injection | This is a webapps exploit for asp platform. Description: Request For Travel 1.0 - 'product' SQL Injection. Author: ajann |
Analyze the security implications of: Request For Travel 1.0 - 'product' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Ayco Okul Portali - 'linkid' SQL Injection | This is a webapps exploit for asp platform. Description: Ayco Okul Portali - 'linkid' SQL Injection. Author: Crackers_Child |
Analyze the security implications of: Ayco Okul Portali - 'linkid' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: VMware - Setuid VMware-mount Unsafe popen(3) (Metasploit) | This is a local exploit for linux platform. Description: VMware - Setuid VMware-mount Unsafe popen(3) (Metasploit). Author: Metasploit |
Analyze the security implications of: VMware - Setuid VMware-mount Unsafe popen(3) (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apache::Gallery 0.4/0.5/0.6 - Insecure File Storage Privilege Escalation | This is a local exploit for linux platform. Description: Apache::Gallery 0.4/0.5/0.6 - Insecure File Storage Privilege Escalation. Author: Jon Hart |
Analyze the security implications of: Apache::Gallery 0.4/0.5/0.6 - Insecure File Storage Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Adobe Flash Player 8.0.34.0/9.0.x - 'main.swf?baseurl' asfunction: Protocol Handler Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Adobe Flash Player 8.0.34.0/9.0.x - 'main.swf?baseurl' asfunction: Protocol Handler Cross-Site Scripting. Author: Rich Cannings |
Analyze the security implications of: Adobe Flash Player 8.0.34.0/9.0.x - 'main.swf?baseurl' asfunction: Protocol Handler Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Maxwebportal 1.30 - Remote Database Disclosure | This is a webapps exploit for asp platform. Description: Maxwebportal 1.30 - Remote Database Disclosure. Author: JeiAr |
Analyze the security implications of: Maxwebportal 1.30 - Remote Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Advantech Switch - 'Shellshock' Bash Environment Variable Command Injection (Metasploit) | This is a remote exploit for cgi platform. Description: Advantech Switch - 'Shellshock' Bash Environment Variable Command Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Advantech Switch - 'Shellshock' Bash Environment Variable Command Injection (Metasploit) | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Battle Blog 1.25 - Authentication Bypass / SQL Injection / HTML Injection | This is a webapps exploit for php platform. Description: Battle Blog 1.25 - Authentication Bypass / SQL Injection / HTML Injection. Author: $qL_DoCt0r |
Analyze the security implications of: Battle Blog 1.25 - Authentication Bypass / SQL Injection / HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TP-Link WDR4300 - Remote Code Execution (Authenticated) | This is a remote exploit for hardware platform. Description: TP-Link WDR4300 - Remote Code Execution (Authenticated). Author: Patrik Lantz |
Analyze the security implications of: TP-Link WDR4300 - Remote Code Execution (Authenticated) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: JNM Solutions DB Top Sites 1.0 - 'vote.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: JNM Solutions DB Top Sites 1.0 - 'vote.php' Cross-Site Scripting. Author: Moudi |
Analyze the security implications of: JNM Solutions DB Top Sites 1.0 - 'vote.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Digital Hive 2.0 - 'base_include.php' Local File Inclusion | This is a webapps exploit for php platform. Description: Digital Hive 2.0 - 'base_include.php' Local File Inclusion. Author: ZoRLu |
Analyze the security implications of: Digital Hive 2.0 - 'base_include.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EggBlog 4.1.2 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: EggBlog 4.1.2 - Arbitrary File Upload. Author: Pokk3rs |
Analyze the security implications of: EggBlog 4.1.2 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.6.28/3.0 (DEC Alpha Linux) - Local Privilege Escalation | This is a local exploit for linux platform. Description: Linux Kernel 2.6.28/3.0 (DEC Alpha Linux) - Local Privilege Escalation. Author: Dan Rosenberg |
Analyze the security implications of: Linux Kernel 2.6.28/3.0 (DEC Alpha Linux) - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Horde Application Framework 3.2.1 - Forward Slash Insufficient Filtering Cross-Site Scripting | This is a webapps exploit for php platform. Description: Horde Application Framework 3.2.1 - Forward Slash Insufficient Filtering Cross-Site Scripting. Author: Alexios Fakos |
Analyze the security implications of: Horde Application Framework 3.2.1 - Forward Slash Insufficient Filtering Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Chipmunk Blog - 'photos.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Chipmunk Blog - 'photos.php' Cross-Site Scripting. Author: sl4xUz |
Analyze the security implications of: Chipmunk Blog - 'photos.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.