input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Sexy polling 1.0.8 - 'answer_id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Sexy polling 1.0.8 - 'answer_id' SQL Injection. Author: High-Tech Bridge |
Analyze the security implications of: Joomla! Component Sexy polling 1.0.8 - 'answer_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Intelbras IWR 3000N - Denial of Service (Remote Reboot) | This is a dos exploit for hardware platform. Description: Intelbras IWR 3000N - Denial of Service (Remote Reboot). Author: Social Engineering Neo |
Analyze the security implications of: Intelbras IWR 3000N - Denial of Service (Remote Reboot) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: FLIR AX8 Thermal Camera 1.32.16 - Hard-Coded Credentials | This is a remote exploit for hardware platform. Description: FLIR AX8 Thermal Camera 1.32.16 - Hard-Coded Credentials. Author: LiquidWorm |
Analyze the security implications of: FLIR AX8 Thermal Camera 1.32.16 - Hard-Coded Credentials | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: PHP 4.4.3/5.1.4 - 'objIndex' Local Buffer Overflow | This is a local exploit for php platform. Description: PHP 4.4.3/5.1.4 - 'objIndex' Local Buffer Overflow. Author: Heintz |
Analyze the security implications of: PHP 4.4.3/5.1.4 - 'objIndex' Local Buffer Overflow | This exploit targets php systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Web Terra 1.1 - 'books.cgi' Remote Command Execution | This is a webapps exploit for cgi platform. Description: Web Terra 1.1 - 'books.cgi' Remote Command Execution. Author: felipe andrian |
Analyze the security implications of: Web Terra 1.1 - 'books.cgi' Remote Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: beLive 0.2.3 - 'arch.php?arch' Local File Inclusion | This is a webapps exploit for php platform. Description: beLive 0.2.3 - 'arch.php?arch' Local File Inclusion. Author: Kacper |
Analyze the security implications of: beLive 0.2.3 - 'arch.php?arch' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Nortel Networks - Multiple UNIStim VoIP Products Remote Eavesdrop Vulnerabilities | This is a dos exploit for hardware platform. Description: Nortel Networks - Multiple UNIStim VoIP Products Remote Eavesdrop Vulnerabilities. Author: Daniel Stirnimann |
Analyze the security implications of: Nortel Networks - Multiple UNIStim VoIP Products Remote Eavesdrop Vulnerabilities | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Majordomo2 - 'SMTP/HTTP' Directory Traversal | This is a remote exploit for multiple platform. Description: Majordomo2 - 'SMTP/HTTP' Directory Traversal. Author: Michael Brooks |
Analyze the security implications of: Majordomo2 - 'SMTP/HTTP' Directory Traversal | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component vRestaurant 1.9.4 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component vRestaurant 1.9.4 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component vRestaurant 1.9.4 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GeniXCMS 0.0.1 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: GeniXCMS 0.0.1 - Multiple Vulnerabilities. Author: LiquidWorm |
Analyze the security implications of: GeniXCMS 0.0.1 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ATutor 1.4.3 - 'search.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: ATutor 1.4.3 - 'search.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Lostmon |
Analyze the security implications of: ATutor 1.4.3 - 'search.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Inim Electronics Smartliving SmartLAN 6.x - Unauthenticated Server-Side Request Forgery | This is a webapps exploit for hardware platform. Description: Inim Electronics Smartliving SmartLAN 6.x - Unauthenticated Server-Side Request Forgery. Author: LiquidWorm |
Analyze the security implications of: Inim Electronics Smartliving SmartLAN 6.x - Unauthenticated Server-Side Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: KZTech T3500V 4G LTE CPE 2.0.1 - Weak Default WiFi Password Algorithm | This is a remote exploit for hardware platform. Description: KZTech T3500V 4G LTE CPE 2.0.1 - Weak Default WiFi Password Algorithm. Author: LiquidWorm |
Analyze the security implications of: KZTech T3500V 4G LTE CPE 2.0.1 - Weak Default WiFi Password Algorithm | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: WebEvent 4.03 - 'Webevent.cgi' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: WebEvent 4.03 - 'Webevent.cgi' Cross-Site Scripting. Author: d3hydr8 |
Analyze the security implications of: WebEvent 4.03 - 'Webevent.cgi' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Apple macOS/iOS Kernel - Use-After-Free Due to Bad Locking in Unix Domain Socket File Descriptor Externalization | This is a dos exploit for multiple platform. Description: Apple macOS/iOS Kernel - Use-After-Free Due to Bad Locking in Unix Domain Socket File Descriptor Externalization. Author: Google Security Research |
Analyze the security implications of: Apple macOS/iOS Kernel - Use-After-Free Due to Bad Locking in Unix Domain Socket File Descriptor Externalization | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AXIS (Multiple Products) - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: AXIS (Multiple Products) - Cross-Site Request Forgery. Author: Orwelllabs |
Analyze the security implications of: AXIS (Multiple Products) - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Oracle 10g Database - 'SUBSCRIPTION_NAME' SQL Injection (1) | This is a remote exploit for multiple platform. Description: Oracle 10g Database - 'SUBSCRIPTION_NAME' SQL Injection (1). Author: bunker |
Analyze the security implications of: Oracle 10g Database - 'SUBSCRIPTION_NAME' SQL Injection (1) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Freeform Interactive Purge 1.4.7/Purge Jihad 2.0.1 Game Client - Remote Buffer Overflow | This is a remote exploit for multiple platform. Description: Freeform Interactive Purge 1.4.7/Purge Jihad 2.0.1 Game Client - Remote Buffer Overflow. Author: Luigi Auriemma |
Analyze the security implications of: Freeform Interactive Purge 1.4.7/Purge Jihad 2.0.1 Game Client - Remote Buffer Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: D-Link DIR-615 - Multiple Buffer Overflow Vulnerabilities | This is a remote exploit for hardware platform. Description: D-Link DIR-615 - Multiple Buffer Overflow Vulnerabilities. Author: Samuel Huntley |
Analyze the security implications of: D-Link DIR-615 - Multiple Buffer Overflow Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Binatone DT 850W Wireless Router - Multiple Cross-Site Request Forgery Vulnerabilities | This is a webapps exploit for hardware platform. Description: Binatone DT 850W Wireless Router - Multiple Cross-Site Request Forgery Vulnerabilities. Author: Samandeep Singh |
Analyze the security implications of: Binatone DT 850W Wireless Router - Multiple Cross-Site Request Forgery Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: TeemIp IPAM < 2.4.0 - 'new_config' Command Injection (Metasploit) | This is a remote exploit for php platform. Description: TeemIp IPAM < 2.4.0 - 'new_config' Command Injection (Metasploit). Author: AkkuS |
Analyze the security implications of: TeemIp IPAM < 2.4.0 - 'new_config' Command Injection (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASUS-DSL N10 1.1.2.2_17 - Authentication Bypass | This is a webapps exploit for hardware platform. Description: ASUS-DSL N10 1.1.2.2_17 - Authentication Bypass. Author: AmnBAN |
Analyze the security implications of: ASUS-DSL N10 1.1.2.2_17 - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: EZWebAlbum - Insecure Cookie Handling | This is a webapps exploit for php platform. Description: EZWebAlbum - Insecure Cookie Handling. Author: Virangar Security |
Analyze the security implications of: EZWebAlbum - Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX - Java applet Remote Deserialization Remote (2) | This is a remote exploit for osx platform. Description: Apple Mac OSX - Java applet Remote Deserialization Remote (2). Author: Landon Fuller |
Analyze the security implications of: Apple Mac OSX - Java applet Remote Deserialization Remote (2) | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: F5 BIG-IP - Authentication Bypass (PoC) | This is a dos exploit for hardware platform. Description: F5 BIG-IP - Authentication Bypass (PoC). Author: Florent Daigniere |
Analyze the security implications of: F5 BIG-IP - Authentication Bypass (PoC) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ASPNuke 0.80 - 'register.asp' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for asp platform. Description: ASPNuke 0.80 - 'register.asp' Multiple Cross-Site Scripting Vulnerabilities. Author: Alberto Trivero |
Analyze the security implications of: ASPNuke 0.80 - 'register.asp' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 - Config Download (Unauthenticated) | This is a webapps exploit for hardware platform. Description: FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 - Config Download (Unauthenticated). Author: LiquidWorm |
Analyze the security implications of: FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 - Config Download (Unauthenticated) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apple Safari 2.0.4 - JavaScript Regular Expression Match Remote Denial of Service | This is a dos exploit for osx platform. Description: Apple Safari 2.0.4 - JavaScript Regular Expression Match Remote Denial of Service. Author: jbh_cg |
Analyze the security implications of: Apple Safari 2.0.4 - JavaScript Regular Expression Match Remote Denial of Service | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Lussumo Vanilla 1.1.5/1.1.7 - 'updatecheck.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Lussumo Vanilla 1.1.5/1.1.7 - 'updatecheck.php' Cross-Site Scripting. Author: Gerendi Sandor Attila |
Analyze the security implications of: Lussumo Vanilla 1.1.5/1.1.7 - 'updatecheck.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Quantum Art QP7.Enterprise - 'news_and_events_new.asp?p_news_id' SQL Injection | This is a webapps exploit for asp platform. Description: Quantum Art QP7.Enterprise - 'news_and_events_new.asp?p_news_id' SQL Injection. Author: r0t3d3Vil |
Analyze the security implications of: Quantum Art QP7.Enterprise - 'news_and_events_new.asp?p_news_id' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: SecuSTATION IPCAM-130 HD Camera - Remote Configuration Disclosure | This is a webapps exploit for hardware platform. Description: SecuSTATION IPCAM-130 HD Camera - Remote Configuration Disclosure. Author: Todor Donev |
Analyze the security implications of: SecuSTATION IPCAM-130 HD Camera - Remote Configuration Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Sipwise C5 NGCP CSC - 'Multiple' Persistent Cross-Site Scripting (XSS) | This is a webapps exploit for hardware platform. Description: Sipwise C5 NGCP CSC - 'Multiple' Persistent Cross-Site Scripting (XSS). Author: LiquidWorm |
Analyze the security implications of: Sipwise C5 NGCP CSC - 'Multiple' Persistent Cross-Site Scripting (XSS) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: e-soft24 Article Directory Script - 'q' Cross-Site Scripting | This is a webapps exploit for php platform. Description: e-soft24 Article Directory Script - 'q' Cross-Site Scripting. Author: 599eme Man |
Analyze the security implications of: e-soft24 Article Directory Script - 'q' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.