input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Chrome 81.0.4044 V8 - Remote Code Execution | This is a remote exploit for multiple platform. Description: Google Chrome 81.0.4044 V8 - Remote Code Execution. Author: r4j0x00 |
Analyze the security implications of: Google Chrome 81.0.4044 V8 - Remote Code Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: LiveSupport 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: LiveSupport 1.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: LiveSupport 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dizi Portali - 'film.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Dizi Portali - 'film.asp' SQL Injection. Author: Kaan KAMIS |
Analyze the security implications of: Dizi Portali - 'film.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials | This is a remote exploit for hardware platform. Description: Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials. Author: LiquidWorm |
Analyze the security implications of: Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component com_camp - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_camp - SQL Injection. Author: Kernel Security Group |
Analyze the security implications of: Joomla! Component com_camp - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mozilla Firefox 2.0 - 'chrome://' URI JavaScript File Request Information Disclosure | This is a remote exploit for linux platform. Description: Mozilla Firefox 2.0 - 'chrome://' URI JavaScript File Request Information Disclosure. Author: Gerry Eisenhaur |
Analyze the security implications of: Mozilla Firefox 2.0 - 'chrome://' URI JavaScript File Request Information Disclosure | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: BBS E-Market Professional - Full Path Disclosure / File Inclusion | This is a webapps exploit for php platform. Description: BBS E-Market Professional - Full Path Disclosure / File Inclusion. Author: y3dips |
Analyze the security implications of: BBS E-Market Professional - Full Path Disclosure / File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EShoppingPro 1.0 - 'Search_Run.asp' SQL Injection | This is a webapps exploit for asp platform. Description: EShoppingPro 1.0 - 'Search_Run.asp' SQL Injection. Author: ajann |
Analyze the security implications of: EShoppingPro 1.0 - 'Search_Run.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: FireEye - Malware Input Processor Privilege Escalation | This is a local exploit for linux platform. Description: FireEye - Malware Input Processor Privilege Escalation. Author: Google Security Research |
Analyze the security implications of: FireEye - Malware Input Processor Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Linux Kernel 2.6.39 < 3.2.2 (Gentoo / Ubuntu x86/x64) - 'Mempodipper' Local Privilege Escalation (1) | This is a local exploit for linux platform. Description: Linux Kernel 2.6.39 < 3.2.2 (Gentoo / Ubuntu x86/x64) - 'Mempodipper' Local Privilege Escalation (1). Author: zx2c4 |
Analyze the security implications of: Linux Kernel 2.6.39 < 3.2.2 (Gentoo / Ubuntu x86/x64) - 'Mempodipper' Local Privilege Escalation (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Calendarix 0.8.20071118 - Multiple SQL Injections / Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Calendarix 0.8.20071118 - Multiple SQL Injections / Cross-Site Scripting Vulnerabilities. Author: DarkBicho |
Analyze the security implications of: Calendarix 0.8.20071118 - Multiple SQL Injections / Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Avidemux 2.5.4 - Buffer Overflow | This is a dos exploit for multiple platform. Description: Avidemux 2.5.4 - Buffer Overflow. Author: The_UnKn@wn |
Analyze the security implications of: Avidemux 2.5.4 - Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: jHTTPd 0.1a - Directory Traversal | This is a remote exploit for multiple platform. Description: jHTTPd 0.1a - Directory Traversal. Author: AutoSec Tools |
Analyze the security implications of: jHTTPd 0.1a - Directory Traversal | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Gphotos 1.4/1.5 - 'diapo.php?rep' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Gphotos 1.4/1.5 - 'diapo.php?rep' Cross-Site Scripting. Author: Morocco Security Team |
Analyze the security implications of: Gphotos 1.4/1.5 - 'diapo.php?rep' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eXtreme-fusion 4.02 - 'Fusion_Forum_View.php' Local File Inclusion | This is a webapps exploit for php platform. Description: eXtreme-fusion 4.02 - 'Fusion_Forum_View.php' Local File Inclusion. Author: Kacper |
Analyze the security implications of: eXtreme-fusion 4.02 - 'Fusion_Forum_View.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_SimpleShop - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_SimpleShop - SQL Injection. Author: UnD3rGr0unD W4rri0rZ |
Analyze the security implications of: Joomla! Component com_SimpleShop - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TRENDnet TEW-812DRU - Cross-Site Request Forgery/Command Injection Root | This is a webapps exploit for hardware platform. Description: TRENDnet TEW-812DRU - Cross-Site Request Forgery/Command Injection Root. Author: Jacob Holcomb |
Analyze the security implications of: TRENDnet TEW-812DRU - Cross-Site Request Forgery/Command Injection Root | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: E-PHP B2B Trading Marketplace Script - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: E-PHP B2B Trading Marketplace Script - Multiple Cross-Site Scripting Vulnerabilities. Author: SaiedHacker |
Analyze the security implications of: E-PHP B2B Trading Marketplace Script - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Netwide Assembler (NASM) 2.14rc15 - NULL Pointer Dereference (PoC) | This is a dos exploit for multiple platform. Description: Netwide Assembler (NASM) 2.14rc15 - NULL Pointer Dereference (PoC). Author: Fakhri Zulkifli |
Analyze the security implications of: Netwide Assembler (NASM) 2.14rc15 - NULL Pointer Dereference (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Berthanas Ziyaretci Defteri 2.0 - 'Yonetici.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Berthanas Ziyaretci Defteri 2.0 - 'Yonetici.asp' SQL Injection. Author: Yollubunlar |
Analyze the security implications of: Berthanas Ziyaretci Defteri 2.0 - 'Yonetici.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Fool's Workshop Owl's Workshop 1.0 - 'multiplechoice/index.php' Arbitrary File Access | This is a webapps exploit for php platform. Description: Fool's Workshop Owl's Workshop 1.0 - 'multiplechoice/index.php' Arbitrary File Access. Author: G00db0y |
Analyze the security implications of: Fool's Workshop Owl's Workshop 1.0 - 'multiplechoice/index.php' Arbitrary File Access | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Aruba Instant 8.7.1.0 - Arbitrary File Modification | This is a remote exploit for hardware platform. Description: Aruba Instant 8.7.1.0 - Arbitrary File Modification. Author: Gr33nh4t |
Analyze the security implications of: Aruba Instant 8.7.1.0 - Arbitrary File Modification | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: eXV2 Module Viso 2.0.4.3 - 'kid' SQL Injection | This is a webapps exploit for php platform. Description: eXV2 Module Viso 2.0.4.3 - 'kid' SQL Injection. Author: S@BUN |
Analyze the security implications of: eXV2 Module Viso 2.0.4.3 - 'kid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX 10.4.x - Software Update Format String | This is a dos exploit for osx platform. Description: Apple Mac OSX 10.4.x - Software Update Format String. Author: kf |
Analyze the security implications of: Apple Mac OSX 10.4.x - Software Update Format String | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Docsify.js 4.11.4 - Reflective Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Docsify.js 4.11.4 - Reflective Cross-Site Scripting. Author: Amin Sharifi |
Analyze the security implications of: Docsify.js 4.11.4 - Reflective Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ForumPal FE 1.1 - Authentication Bypass | This is a webapps exploit for php platform. Description: ForumPal FE 1.1 - Authentication Bypass. Author: ThE g0bL!N |
Analyze the security implications of: ForumPal FE 1.1 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MPCSoftWeb 1.0 - Database Disclosure | This is a webapps exploit for asp platform. Description: MPCSoftWeb 1.0 - Database Disclosure. Author: drG4njubas |
Analyze the security implications of: MPCSoftWeb 1.0 - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Combat Evolved 1.0.7.0615 - Multiple Denial of Service Vulnerabilities | This is a dos exploit for multiple platform. Description: Combat Evolved 1.0.7.0615 - Multiple Denial of Service Vulnerabilities. Author: Luigi Auriemma |
Analyze the security implications of: Combat Evolved 1.0.7.0615 - Multiple Denial of Service Vulnerabilities | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GeeCarts - 'view.php?id' Cross-Site Scripting | This is a webapps exploit for php platform. Description: GeeCarts - 'view.php?id' Cross-Site Scripting. Author: Ivan Sanchez |
Analyze the security implications of: GeeCarts - 'view.php?id' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cybershade CMS 0.2 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Cybershade CMS 0.2 - Remote File Inclusion. Author: Mr.SeCreT |
Analyze the security implications of: Cybershade CMS 0.2 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Spider FAQ Lite 1.3.1 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Spider FAQ Lite 1.3.1 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Spider FAQ Lite 1.3.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NetFlow Analyzer 5 - '/jspui/customReport.jsp?rtype' Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: NetFlow Analyzer 5 - '/jspui/customReport.jsp?rtype' Cross-Site Scripting. Author: Lostmon |
Analyze the security implications of: NetFlow Analyzer 5 - '/jspui/customReport.jsp?rtype' Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Cilem Haber 1.4.4 (Tr) - Database Disclosure | This is a webapps exploit for asp platform. Description: Cilem Haber 1.4.4 (Tr) - Database Disclosure. Author: ZoRLu |
Analyze the security implications of: Cilem Haber 1.4.4 (Tr) - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.