input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Forcepoint WebSecurity 8.5 - Reflective Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Forcepoint WebSecurity 8.5 - Reflective Cross-Site Scripting. Author: Prasenjit Kanti Paul |
Analyze the security implications of: Forcepoint WebSecurity 8.5 - Reflective Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ACNews 1.0 - Authentication Bypass | This is a webapps exploit for asp platform. Description: ACNews 1.0 - Authentication Bypass. Author: LaMeR |
Analyze the security implications of: ACNews 1.0 - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Ansible Tower 2.0.2 - Multiple Vulnerabilities | This is a webapps exploit for multiple platform. Description: Ansible Tower 2.0.2 - Multiple Vulnerabilities. Author: SEC Consult |
Analyze the security implications of: Ansible Tower 2.0.2 - Multiple Vulnerabilities | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DomainMOD 4.11.01 - 'assets/edit/host.php?whid=5' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DomainMOD 4.11.01 - 'assets/edit/host.php?whid=5' Cross-Site Scripting. Author: Mohammed Abdul Kareem |
Analyze the security implications of: DomainMOD 4.11.01 - 'assets/edit/host.php?whid=5' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Proxmox VE 3/4 - Insecure Hostname Checking Remote Command Execution | This is a remote exploit for linux platform. Description: Proxmox VE 3/4 - Insecure Hostname Checking Remote Command Execution. Author: Sysdream |
Analyze the security implications of: Proxmox VE 3/4 - Insecure Hostname Checking Remote Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AbleDating 2.4 - 'search_results.php?keyword' SQL Injection | This is a webapps exploit for php platform. Description: AbleDating 2.4 - 'search_results.php?keyword' SQL Injection. Author: Ali Jasbi |
Analyze the security implications of: AbleDating 2.4 - 'search_results.php?keyword' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Arab Network Tech. (ANT) CMS - SQL Injection | This is a webapps exploit for php platform. Description: Arab Network Tech. (ANT) CMS - SQL Injection. Author: Tr0y-x |
Analyze the security implications of: Arab Network Tech. (ANT) CMS - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iTech Book Store Script 2.02 - SQL Injection | This is a webapps exploit for php platform. Description: iTech Book Store Script 2.02 - SQL Injection. Author: 8bitsec |
Analyze the security implications of: iTech Book Store Script 2.02 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenSSH server (sshd) 9.8p1 - Race Condition | This is a remote exploit for linux platform. Description: OpenSSH server (sshd) 9.8p1 - Race Condition. Author: Milad karimi |
Analyze the security implications of: OpenSSH server (sshd) 9.8p1 - Race Condition | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: i-Gallery 3.4/4.1 - 'streamfile.asp' Multiple Directory Traversal Vulnerabilities | This is a webapps exploit for asp platform. Description: i-Gallery 3.4/4.1 - 'streamfile.asp' Multiple Directory Traversal Vulnerabilities. Author: Stefano Angaran |
Analyze the security implications of: i-Gallery 3.4/4.1 - 'streamfile.asp' Multiple Directory Traversal Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: WebKit - 'WebCore::FrameView::clientToLayoutViewportPoint' Use-After-Free | This is a dos exploit for multiple platform. Description: WebKit - 'WebCore::FrameView::clientToLayoutViewportPoint' Use-After-Free. Author: Google Security Research |
Analyze the security implications of: WebKit - 'WebCore::FrameView::clientToLayoutViewportPoint' Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DCP-Portal 5.5 - 'lostpassword.php?email' SQL Injection | This is a webapps exploit for php platform. Description: DCP-Portal 5.5 - 'lostpassword.php?email' SQL Injection. Author: Lifo Fifo |
Analyze the security implications of: DCP-Portal 5.5 - 'lostpassword.php?email' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DS CMS 1.0 - 'NewsId' SQL Injection | This is a webapps exploit for php platform. Description: DS CMS 1.0 - 'NewsId' SQL Injection. Author: Palyo34 |
Analyze the security implications of: DS CMS 1.0 - 'NewsId' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HLstats 1.34 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: HLstats 1.34 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities. Author: MC.Iglo |
Analyze the security implications of: HLstats 1.34 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dan Bernstein QMail 1.0 3 - RCPT Denial of Service (1) | This is a dos exploit for linux platform. Description: Dan Bernstein QMail 1.0 3 - RCPT Denial of Service (1). Author: Frank DENIS |
Analyze the security implications of: Dan Bernstein QMail 1.0 3 - RCPT Denial of Service (1) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Novell NetStorage 2.0.1/3.1.5 - Multiple Remote Vulnerabilities | This is a remote exploit for novell platform. Description: Novell NetStorage 2.0.1/3.1.5 - Multiple Remote Vulnerabilities. Author: Bugs NotHugs |
Analyze the security implications of: Novell NetStorage 2.0.1/3.1.5 - Multiple Remote Vulnerabilities | This exploit targets novell systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets novell platform |
What is this exploit about: artmedic weblog 1.0 - Multiple Local File Inclusions | This is a webapps exploit for php platform. Description: artmedic weblog 1.0 - Multiple Local File Inclusions. Author: muuratsalo |
Analyze the security implications of: artmedic weblog 1.0 - Multiple Local File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_car - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Joomla! Component com_car - Multiple SQL Injections. Author: the_cyber_nuxbie |
Analyze the security implications of: Joomla! Component com_car - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASPGuest - 'edit.asp?ID' Blind SQL Injection | This is a webapps exploit for asp platform. Description: ASPGuest - 'edit.asp?ID' Blind SQL Injection. Author: R3d-D3V!L |
Analyze the security implications of: ASPGuest - 'edit.asp?ID' Blind SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Borland Interbase 2007/2007 SP2 - 'open_marker_file' Remote Buffer Overflow (Metasploit) | This is a remote exploit for linux platform. Description: Borland Interbase 2007/2007 SP2 - 'open_marker_file' Remote Buffer Overflow (Metasploit). Author: Adriano Lima |
Analyze the security implications of: Borland Interbase 2007/2007 SP2 - 'open_marker_file' Remote Buffer Overflow (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Galeria Zdjec 3.0 - 'zd_numer.php' Local File Inclusion | This is a webapps exploit for php platform. Description: Galeria Zdjec 3.0 - 'zd_numer.php' Local File Inclusion. Author: ajann |
Analyze the security implications of: Galeria Zdjec 3.0 - 'zd_numer.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Inductive Automation Ignition 7.8.1 - Remote Leakage Of Shared Buffers | This is a remote exploit for multiple platform. Description: Inductive Automation Ignition 7.8.1 - Remote Leakage Of Shared Buffers. Author: LiquidWorm |
Analyze the security implications of: Inductive Automation Ignition 7.8.1 - Remote Leakage Of Shared Buffers | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component JooBlog 0.1.1 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JooBlog 0.1.1 - Blind SQL Injection. Author: His0k4 |
Analyze the security implications of: Joomla! Component JooBlog 0.1.1 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ZHONE < S3.0.501 - Multiple Vulnerabilities | This is a remote exploit for hardware platform. Description: ZHONE < S3.0.501 - Multiple Vulnerabilities. Author: Lyon Yang |
Analyze the security implications of: ZHONE < S3.0.501 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: EyesOfNetwork 5.3 - File Upload Remote Code Execution | This is a webapps exploit for multiple platform. Description: EyesOfNetwork 5.3 - File Upload Remote Code Execution. Author: Audencia Business SCHOOL Red Team |
Analyze the security implications of: EyesOfNetwork 5.3 - File Upload Remote Code Execution | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component ARI Quiz 3.7.4 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component ARI Quiz 3.7.4 - SQL Injection. Author: Mr Winst0n |
Analyze the security implications of: Joomla! Component ARI Quiz 3.7.4 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: n+otes 1.6.2 - Denial of Service (PoC) | This is a dos exploit for ios platform. Description: n+otes 1.6.2 - Denial of Service (PoC). Author: Geovanni Ruiz |
Analyze the security implications of: n+otes 1.6.2 - Denial of Service (PoC) | This exploit targets ios systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: FreeType 2.6.1 - TrueType tt_sbit_decoder_load_bit_aligned Heap Out-of-Bounds Read | This is a dos exploit for multiple platform. Description: FreeType 2.6.1 - TrueType tt_sbit_decoder_load_bit_aligned Heap Out-of-Bounds Read. Author: Google Security Research |
Analyze the security implications of: FreeType 2.6.1 - TrueType tt_sbit_decoder_load_bit_aligned Heap Out-of-Bounds Read | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Holtstraeter Rot 13 - 'Enkrypt.php' Directory Traversal | This is a webapps exploit for php platform. Description: Holtstraeter Rot 13 - 'Enkrypt.php' Directory Traversal. Author: h4ck3r |
Analyze the security implications of: Holtstraeter Rot 13 - 'Enkrypt.php' Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CuteNews - 'page' Local File Inclusion | This is a webapps exploit for php platform. Description: CuteNews - 'page' Local File Inclusion. Author: eidelweiss |
Analyze the security implications of: CuteNews - 'page' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Blaze Apps - Multiple Vulnerabilities | This is a webapps exploit for asp platform. Description: Blaze Apps - Multiple Vulnerabilities. Author: AmnPardaz |
Analyze the security implications of: Blaze Apps - Multiple Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: FAQ Script 3.1.3 - 'category_id' SQL Injection | This is a webapps exploit for php platform. Description: FAQ Script 3.1.3 - 'category_id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: FAQ Script 3.1.3 - 'category_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Chrome 72.0.3626.96 / 74.0.3702.0 - 'JSPromise::TriggerPromiseReactions' Type Confusion | This is a remote exploit for multiple platform. Description: Google Chrome 72.0.3626.96 / 74.0.3702.0 - 'JSPromise::TriggerPromiseReactions' Type Confusion. Author: Google Security Research |
Analyze the security implications of: Google Chrome 72.0.3626.96 / 74.0.3702.0 - 'JSPromise::TriggerPromiseReactions' Type Confusion | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.