input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Citadel WebCit 7.02/7.10 - 'showuser?who' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Citadel WebCit 7.02/7.10 - 'showuser?who' Cross-Site Scripting. Author: Christopher Schwardt |
Analyze the security implications of: Citadel WebCit 7.02/7.10 - 'showuser?who' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Quartz Concept Content Manager 3.00 - Authentication Bypass | This is a webapps exploit for asp platform. Description: Quartz Concept Content Manager 3.00 - Authentication Bypass. Author: Mr.aFiR |
Analyze the security implications of: Quartz Concept Content Manager 3.00 - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component Community Quiz 4.3.5 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Community Quiz 4.3.5 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Community Quiz 4.3.5 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 5.3.5 - 'socket_connect()' Local Buffer Overflow | This is a local exploit for multiple platform. Description: PHP 5.3.5 - 'socket_connect()' Local Buffer Overflow. Author: Marek Kroemeke |
Analyze the security implications of: PHP 5.3.5 - 'socket_connect()' Local Buffer Overflow | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple Safari for iPhone/iPod touch - 'Throw' Exception Remote Code Execution | This is a remote exploit for osx platform. Description: Apple Safari for iPhone/iPod touch - 'Throw' Exception Remote Code Execution. Author: Nishant Das Patnaik |
Analyze the security implications of: Apple Safari for iPhone/iPod touch - 'Throw' Exception Remote Code Execution | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Serv-U FTP Server - prepareinstallation Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: Serv-U FTP Server - prepareinstallation Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: Serv-U FTP Server - prepareinstallation Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CD Rentals Script - SQL Injection | This is a webapps exploit for php platform. Description: CD Rentals Script - SQL Injection. Author: Don Tukulesto |
Analyze the security implications of: CD Rentals Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Factory Reset (Unauthenticated) | This is a webapps exploit for hardware platform. Description: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Factory Reset (Unauthenticated). Author: LiquidWorm |
Analyze the security implications of: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Factory Reset (Unauthenticated) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: GEDCOM_TO_MYSQL - '/PHP/index.php?nom_branche' Cross-Site Scripting | This is a webapps exploit for php platform. Description: GEDCOM_TO_MYSQL - '/PHP/index.php?nom_branche' Cross-Site Scripting. Author: ZoRLu |
Analyze the security implications of: GEDCOM_TO_MYSQL - '/PHP/index.php?nom_branche' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Endian UTM Firewall 2.4.x < 2.5.0 - Multiple Web Vulnerabilities | This is a webapps exploit for php platform. Description: Endian UTM Firewall 2.4.x < 2.5.0 - Multiple Web Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: Endian UTM Firewall 2.4.x < 2.5.0 - Multiple Web Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: aspwebalbum 3.2 - Multiple Vulnerabilities | This is a webapps exploit for asp platform. Description: aspwebalbum 3.2 - Multiple Vulnerabilities. Author: e.wiZz! |
Analyze the security implications of: aspwebalbum 3.2 - Multiple Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: GreenCMS 2.3.0603 - Cross-Site Request Forgery / Remote Code Execution | This is a webapps exploit for php platform. Description: GreenCMS 2.3.0603 - Cross-Site Request Forgery / Remote Code Execution. Author: xichao |
Analyze the security implications of: GreenCMS 2.3.0603 - Cross-Site Request Forgery / Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco Linksys EA2700 Router - Multiple Vulnerabilities | This is a remote exploit for hardware platform. Description: Cisco Linksys EA2700 Router - Multiple Vulnerabilities. Author: Phil Purviance |
Analyze the security implications of: Cisco Linksys EA2700 Router - Multiple Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Kjtechforce mailman b1 - Delete Row 'code' SQL Injection | This is a webapps exploit for php platform. Description: Kjtechforce mailman b1 - Delete Row 'code' SQL Injection. Author: YEnH4ckEr |
Analyze the security implications of: Kjtechforce mailman b1 - Delete Row 'code' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ABB Cylon FLXeon 9.3.4 - Remote Code Execution (RCE) | This is a hardware exploit for multiple platform. Description: ABB Cylon FLXeon 9.3.4 - Remote Code Execution (RCE). Author: LiquidWorm |
Analyze the security implications of: ABB Cylon FLXeon 9.3.4 - Remote Code Execution (RCE) | This exploit targets multiple systems. Type: hardware. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cyphor 0.19 - 'footer.php?t_login' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Cyphor 0.19 - 'footer.php?t_login' Cross-Site Scripting. Author: retrogod@aliceposta.it |
Analyze the security implications of: Cyphor 0.19 - 'footer.php?t_login' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreeBSD 4.4 - AIO Library Cross Process Memory Write | This is a local exploit for freebsd platform. Description: FreeBSD 4.4 - AIO Library Cross Process Memory Write. Author: David Rufino |
Analyze the security implications of: FreeBSD 4.4 - AIO Library Cross Process Memory Write | This exploit targets freebsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: Debian 2.1 - apcd Symlink | This is a local exploit for linux platform. Description: Debian 2.1 - apcd Symlink. Author: anonymous |
Analyze the security implications of: Debian 2.1 - apcd Symlink | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Command School Student Management System - '/sw/backup/backup_ray2.php' Database Backup Direct Request Information Disclosure | This is a webapps exploit for php platform. Description: Command School Student Management System - '/sw/backup/backup_ray2.php' Database Backup Direct Request Information Disclosure. Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: Command School Student Management System - '/sw/backup/backup_ray2.php' Database Backup Direct Request Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RealOne Player for Linux 2.2 Alpha - Insecure Configuration File Permission Privilege Escalation | This is a local exploit for linux platform. Description: RealOne Player for Linux 2.2 Alpha - Insecure Configuration File Permission Privilege Escalation. Author: Jon Hart |
Analyze the security implications of: RealOne Player for Linux 2.2 Alpha - Insecure Configuration File Permission Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: SQLite3 3.8.6 - Controlled Memory Corruption (PoC) | This is a dos exploit for linux platform. Description: SQLite3 3.8.6 - Controlled Memory Corruption (PoC). Author: Andras Kabai |
Analyze the security implications of: SQLite3 3.8.6 - Controlled Memory Corruption (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Grandora Rialto 1.6 - 'searchoption.asp' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: Grandora Rialto 1.6 - 'searchoption.asp' Multiple SQL Injections. Author: laurent gaffie |
Analyze the security implications of: Grandora Rialto 1.6 - 'searchoption.asp' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: AsusWRT Router < 3.0.0.4.380.7743 - LAN Remote Code Execution | This is a remote exploit for hardware platform. Description: AsusWRT Router < 3.0.0.4.380.7743 - LAN Remote Code Execution. Author: Pedro Ribeiro |
Analyze the security implications of: AsusWRT Router < 3.0.0.4.380.7743 - LAN Remote Code Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apple Safari IPhone - using tel: Remote Crash | This is a dos exploit for hardware platform. Description: Apple Safari IPhone - using tel: Remote Crash. Author: cloud |
Analyze the security implications of: Apple Safari IPhone - using tel: Remote Crash | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Dell OpenManage Server Administrator - Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Dell OpenManage Server Administrator - Cross-Site Scripting. Author: Tenable NS |
Analyze the security implications of: Dell OpenManage Server Administrator - Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cisco Smart Install - Crash (PoC) | This is a dos exploit for hardware platform. Description: Cisco Smart Install - Crash (PoC). Author: embedi |
Analyze the security implications of: Cisco Smart Install - Crash (PoC) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ICT Protege GX/WX 2.08 - Client-Side SHA1 Password Hash Disclosure | This is a remote exploit for hardware platform. Description: ICT Protege GX/WX 2.08 - Client-Side SHA1 Password Hash Disclosure. Author: LiquidWorm |
Analyze the security implications of: ICT Protege GX/WX 2.08 - Client-Side SHA1 Password Hash Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Astrology - 'celebrities.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Astrology - 'celebrities.php' Cross-Site Scripting. Author: Moudi |
Analyze the security implications of: Astrology - 'celebrities.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenMediaVault Cron - Remote Command Execution (Metasploit) | This is a remote exploit for linux platform. Description: OpenMediaVault Cron - Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: OpenMediaVault Cron - Remote Command Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component ongumatimesheet20 4b - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component ongumatimesheet20 4b - Remote File Inclusion. Author: NoGe |
Analyze the security implications of: Joomla! Component ongumatimesheet20 4b - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBMi Navigator 7.5 - Server Side Request Forgery (SSRF) | This is a webapps exploit for multiple platform. Description: IBMi Navigator 7.5 - Server Side Request Forgery (SSRF). Author: hyp3rlinx |
Analyze the security implications of: IBMi Navigator 7.5 - Server Side Request Forgery (SSRF) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: mpg123 0.59r - Malformed .mp3 (SIGSEGV) (PoC) | This is a dos exploit for linux platform. Description: mpg123 0.59r - Malformed .mp3 (SIGSEGV) (PoC). Author: nitr0us |
Analyze the security implications of: mpg123 0.59r - Malformed .mp3 (SIGSEGV) (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Blackcat Cms v1.4 - Remote Code Execution (RCE) | This is a webapps exploit for php platform. Description: Blackcat Cms v1.4 - Remote Code Execution (RCE). Author: Mirabbas Ağalarov |
Analyze the security implications of: Blackcat Cms v1.4 - Remote Code Execution (RCE) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.