input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SGI IRIX 6.3 - 'pset' Local Privilege Escalation | This is a local exploit for irix platform. Description: SGI IRIX 6.3 - 'pset' Local Privilege Escalation. Author: Last Stage of Delirium |
Analyze the security implications of: SGI IRIX 6.3 - 'pset' Local Privilege Escalation | This exploit targets irix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: Femitter FTP Server 1.03 - 'RETR' Remote Denial of Service (PoC) | This is a dos exploit for php platform. Description: Femitter FTP Server 1.03 - 'RETR' Remote Denial of Service (PoC). Author: LiquidWorm |
Analyze the security implications of: Femitter FTP Server 1.03 - 'RETR' Remote Denial of Service (PoC) | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cuteflow Bin 1.5.0 - 'login.php' Local File Inclusion | This is a webapps exploit for php platform. Description: Cuteflow Bin 1.5.0 - 'login.php' Local File Inclusion. Author: KnocKout |
Analyze the security implications of: Cuteflow Bin 1.5.0 - 'login.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ADManager 1.1 - Content Manipulation | This is a webapps exploit for php platform. Description: ADManager 1.1 - Content Manipulation. Author: frog |
Analyze the security implications of: ADManager 1.1 - Content Manipulation | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: lizard cart - 'search.php' SQL Injection | This is a webapps exploit for php platform. Description: lizard cart - 'search.php' SQL Injection. Author: Number 7 |
Analyze the security implications of: lizard cart - 'search.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Flippy DamnFacts - Viral Fun Facts Sharing Script 1.1.0 - Cross-Site Scripting / Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: Flippy DamnFacts - Viral Fun Facts Sharing Script 1.1.0 - Cross-Site Scripting / Cross-Site Request Forgery. Author: L0RD |
Analyze the security implications of: Flippy DamnFacts - Viral Fun Facts Sharing Script 1.1.0 - Cross-Site Scripting / Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX 10.5.x - Mail Arbitrary Code Execution | This is a remote exploit for osx platform. Description: Apple Mac OSX 10.5.x - Mail Arbitrary Code Execution. Author: heise Security |
Analyze the security implications of: Apple Mac OSX 10.5.x - Mail Arbitrary Code Execution | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: TCPDF 4.5.036/4.9.5 - 'params' Attribute Remote Code Execution | This is a remote exploit for linux platform. Description: TCPDF 4.5.036/4.9.5 - 'params' Attribute Remote Code Execution. Author: apoc |
Analyze the security implications of: TCPDF 4.5.036/4.9.5 - 'params' Attribute Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Yukihiro Matsumoto Ruby 1.x - XMLRPC Server Denial of Service | This is a dos exploit for linux platform. Description: Yukihiro Matsumoto Ruby 1.x - XMLRPC Server Denial of Service. Author: Tanaka Akira |
Analyze the security implications of: Yukihiro Matsumoto Ruby 1.x - XMLRPC Server Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AJ Article 3.0 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: AJ Article 3.0 - Cross-Site Scripting. Author: Sid3^effects |
Analyze the security implications of: AJ Article 3.0 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Concrete5 CMS < 8.3.0 - Username / Comments Enumeration | This is a webapps exploit for php platform. Description: Concrete5 CMS < 8.3.0 - Username / Comments Enumeration. Author: Chapman Schleiss |
Analyze the security implications of: Concrete5 CMS < 8.3.0 - Username / Comments Enumeration | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SMC Networks SMCD3G Session Management - Authentication Bypass | This is a remote exploit for multiple platform. Description: SMC Networks SMCD3G Session Management - Authentication Bypass. Author: Zack Fasel & Matthew Jakubowski |
Analyze the security implications of: SMC Networks SMCD3G Session Management - Authentication Bypass | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Job Site PHP Script 1.1 - Authentication Bypass | This is a webapps exploit for php platform. Description: Job Site PHP Script 1.1 - Authentication Bypass. Author: Ihsan Sencan |
Analyze the security implications of: Job Site PHP Script 1.1 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ImageMagick 6.x - '.PNM' Image Decoding Remote Buffer Overflow | This is a dos exploit for linux platform. Description: ImageMagick 6.x - '.PNM' Image Decoding Remote Buffer Overflow. Author: Damian Put |
Analyze the security implications of: ImageMagick 6.x - '.PNM' Image Decoding Remote Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ACGV News 0.9.1 - 'glossaire.php?id' SQL Injection | This is a webapps exploit for php platform. Description: ACGV News 0.9.1 - 'glossaire.php?id' SQL Injection. Author: ZoRLu |
Analyze the security implications of: ACGV News 0.9.1 - 'glossaire.php?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component MyAlbum 1.0 - 'album' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component MyAlbum 1.0 - 'album' SQL Injection. Author: parad0x |
Analyze the security implications of: Joomla! Component MyAlbum 1.0 - 'album' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: b2evolution 3.3.3 - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: b2evolution 3.3.3 - Cross-Site Request Forgery. Author: saudi0hacker |
Analyze the security implications of: b2evolution 3.3.3 - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Barracuda Web Application Firewall 660 - '/cgi-mod/index.cgi' Multiple HTML Injection Vulnerabilities | This is a remote exploit for hardware platform. Description: Barracuda Web Application Firewall 660 - '/cgi-mod/index.cgi' Multiple HTML Injection Vulnerabilities. Author: Global-Evolution |
Analyze the security implications of: Barracuda Web Application Firewall 660 - '/cgi-mod/index.cgi' Multiple HTML Injection Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CVS 1.10.7 - Local Denial of Service | This is a dos exploit for linux platform. Description: CVS 1.10.7 - Local Denial of Service. Author: Michal Szymanski |
Analyze the security implications of: CVS 1.10.7 - Local Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component Swap Factory 2.2.1 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Swap Factory 2.2.1 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Swap Factory 2.2.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EuroTel ETL3100 - Transmitter Unauthenticated Config/Log Download | This is a remote exploit for hardware platform. Description: EuroTel ETL3100 - Transmitter Unauthenticated Config/Log Download. Author: LiquidWorm |
Analyze the security implications of: EuroTel ETL3100 - Transmitter Unauthenticated Config/Log Download | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Spotweb 1.4.9 - DOM Based Cross-Site Scripting (XSS) | This is a webapps exploit for multiple platform. Description: Spotweb 1.4.9 - DOM Based Cross-Site Scripting (XSS). Author: nu11secur1ty |
Analyze the security implications of: Spotweb 1.4.9 - DOM Based Cross-Site Scripting (XSS) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Dokeos 1.8.0 - 'my_progress.php?course' SQL Injection | This is a webapps exploit for php platform. Description: Dokeos 1.8.0 - 'my_progress.php?course' SQL Injection. Author: Silentz |
Analyze the security implications of: Dokeos 1.8.0 - 'my_progress.php?course' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Easynet Forum Host - 'forum.php' SQL Injection | This is a webapps exploit for php platform. Description: Easynet Forum Host - 'forum.php' SQL Injection. Author: t0pP8uZz |
Analyze the security implications of: Easynet Forum Host - 'forum.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Brim 2.0.0 - SQL Injection / Cross-Site Scripting | This is a webapps exploit for php platform. Description: Brim 2.0.0 - SQL Injection / Cross-Site Scripting. Author: InjEctOr5 |
Analyze the security implications of: Brim 2.0.0 - SQL Injection / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NetIQ Access Manager 4.0 SP1 - Multiple Vulnerabilities | This is a webapps exploit for jsp platform. Description: NetIQ Access Manager 4.0 SP1 - Multiple Vulnerabilities. Author: SEC Consult |
Analyze the security implications of: NetIQ Access Manager 4.0 SP1 - Multiple Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: D-Forum 1.11 - 'Nav.php3' Cross-Site Scripting | This is a webapps exploit for php platform. Description: D-Forum 1.11 - 'Nav.php3' Cross-Site Scripting. Author: benjilenoob |
Analyze the security implications of: D-Forum 1.11 - 'Nav.php3' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP-UX 10.20 newgrp - Local Privilege Escalation | This is a local exploit for hp-ux platform. Description: HP-UX 10.20 newgrp - Local Privilege Escalation. Author: SOD |
Analyze the security implications of: HP-UX 10.20 newgrp - Local Privilege Escalation | This exploit targets hp-ux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hp-ux platform |
What is this exploit about: Linux Kernel 6.2 - Userspace Processes To Enable Mitigation | This is a local exploit for linux platform. Description: Linux Kernel 6.2 - Userspace Processes To Enable Mitigation. Author: nu11secur1ty |
Analyze the security implications of: Linux Kernel 6.2 - Userspace Processes To Enable Mitigation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: McAfee Email Gateway - Web Administration Broken Access Control | This is a webapps exploit for freebsd platform. Description: McAfee Email Gateway - Web Administration Broken Access Control. Author: Nahuel Grisolia |
Analyze the security implications of: McAfee Email Gateway - Web Administration Broken Access Control | This exploit targets freebsd systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: Adobe Flash - Selection.setFocus Use-After-Free | This is a dos exploit for multiple platform. Description: Adobe Flash - Selection.setFocus Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - Selection.setFocus Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Netis WF2419 Router - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: Netis WF2419 Router - Cross-Site Request Forgery. Author: Sajibe Kanti |
Analyze the security implications of: Netis WF2419 Router - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: XiongMai uc-httpd 1.0.0 - Buffer Overflow | This is a webapps exploit for hardware platform. Description: XiongMai uc-httpd 1.0.0 - Buffer Overflow. Author: Andrew Watson |
Analyze the security implications of: XiongMai uc-httpd 1.0.0 - Buffer Overflow | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.