input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: DrayTek VigorACS SI 1.3.0 - Multiple Vulnerabilities | This is a webapps exploit for jsp platform. Description: DrayTek VigorACS SI 1.3.0 - Multiple Vulnerabilities. Author: Digital Misfits |
Analyze the security implications of: DrayTek VigorACS SI 1.3.0 - Multiple Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: WebKit - UXSS Using JavaScript: URI and Synchronous Page Loads | This is a dos exploit for multiple platform. Description: WebKit - UXSS Using JavaScript: URI and Synchronous Page Loads. Author: Google Security Research |
Analyze the security implications of: WebKit - UXSS Using JavaScript: URI and Synchronous Page Loads | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FotoWeb 6.0 - 'Login.fwx?s' Cross-Site Scripting | This is a webapps exploit for php platform. Description: FotoWeb 6.0 - 'Login.fwx?s' Cross-Site Scripting. Author: Stelios Tigkas |
Analyze the security implications of: FotoWeb 6.0 - 'Login.fwx?s' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Clansys 1.1 - 'index.php' PHP Code Insertion | This is a webapps exploit for php platform. Description: Clansys 1.1 - 'index.php' PHP Code Insertion. Author: nukedx |
Analyze the security implications of: Clansys 1.1 - 'index.php' PHP Code Insertion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IncomCMS 2.0 - Insecure File Upload | This is a webapps exploit for multiple platform. Description: IncomCMS 2.0 - Insecure File Upload. Author: MoeAlBarbari |
Analyze the security implications of: IncomCMS 2.0 - Insecure File Upload | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: MojoAuto - Blind SQL Injection | This is a webapps exploit for cgi platform. Description: MojoAuto - Blind SQL Injection. Author: Mr.SQL |
Analyze the security implications of: MojoAuto - Blind SQL Injection | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Melange Chat Server 1.10 - Remote Buffer Overflow | This is a remote exploit for linux platform. Description: Melange Chat Server 1.10 - Remote Buffer Overflow. Author: innerphobia |
Analyze the security implications of: Melange Chat Server 1.10 - Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PulseAudio 0.9.5 - 'Assert()' Remote Denial of Service | This is a dos exploit for linux platform. Description: PulseAudio 0.9.5 - 'Assert()' Remote Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: PulseAudio 0.9.5 - 'Assert()' Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: IndexScript 3.0 - 'parent_id' SQL Injection | This is a webapps exploit for php platform. Description: IndexScript 3.0 - 'parent_id' SQL Injection. Author: d3v1l |
Analyze the security implications of: IndexScript 3.0 - 'parent_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SWAT 4 - Multiple Denial of Service Vulnerabilities | This is a dos exploit for multiple platform. Description: SWAT 4 - Multiple Denial of Service Vulnerabilities. Author: Luigi Auriemma |
Analyze the security implications of: SWAT 4 - Multiple Denial of Service Vulnerabilities | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Claroline 1.8.11 - '/claroline/linker/notfound.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Claroline 1.8.11 - '/claroline/linker/notfound.php' Cross-Site Scripting. Author: Gerendi Sandor Attila |
Analyze the security implications of: Claroline 1.8.11 - '/claroline/linker/notfound.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CadeNix - SQL Injection | This is a webapps exploit for php platform. Description: CadeNix - SQL Injection. Author: HaCkeR_EgY |
Analyze the security implications of: CadeNix - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ISDNRep 4.56 - Command Line Argument Local Buffer Overflow (1) | This is a local exploit for linux platform. Description: ISDNRep 4.56 - Command Line Argument Local Buffer Overflow (1). Author: ace |
Analyze the security implications of: ISDNRep 4.56 - Command Line Argument Local Buffer Overflow (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: jPORTAL 2.2.1/2.3 Forum - 'forum.php' SQL Injection | This is a webapps exploit for php platform. Description: jPORTAL 2.2.1/2.3 Forum - 'forum.php' SQL Injection. Author: Zbigniew |
Analyze the security implications of: jPORTAL 2.2.1/2.3 Forum - 'forum.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: QSSL Voyager 2.0 1B - '.photon' Directory Information Disclosure | This is a remote exploit for multiple platform. Description: QSSL Voyager 2.0 1B - '.photon' Directory Information Disclosure. Author: neonbunny |
Analyze the security implications of: QSSL Voyager 2.0 1B - '.photon' Directory Information Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Hero Framework - '/users/login?Username' Cross-Site Scripting | This is a webapps exploit for java platform. Description: Hero Framework - '/users/login?Username' Cross-Site Scripting. Author: High-Tech Bridge |
Analyze the security implications of: Hero Framework - '/users/login?Username' Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: PHP PDORow Object - Remote Denial of Service | This is a dos exploit for php platform. Description: PHP PDORow Object - Remote Denial of Service. Author: anonymous |
Analyze the security implications of: PHP PDORow Object - Remote Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: COVID19 Testing Management System 1.0 - 'searchdata' SQL Injection | This is a webapps exploit for php platform. Description: COVID19 Testing Management System 1.0 - 'searchdata' SQL Injection. Author: Ashish Upsham |
Analyze the security implications of: COVID19 Testing Management System 1.0 - 'searchdata' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DorsaCMS - 'ShowPage.aspx' SQL Injection | This is a webapps exploit for asp platform. Description: DorsaCMS - 'ShowPage.aspx' SQL Injection. Author: syst3m_f4ult |
Analyze the security implications of: DorsaCMS - 'ShowPage.aspx' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Clever Copy 2.0 - 'calendar.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Clever Copy 2.0 - 'calendar.php' Cross-Site Scripting. Author: Lostmon |
Analyze the security implications of: Clever Copy 2.0 - 'calendar.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LetoDms 1.4.x - 'lang' Local File Inclusion | This is a webapps exploit for php platform. Description: LetoDms 1.4.x - 'lang' Local File Inclusion. Author: D. Fabian |
Analyze the security implications of: LetoDms 1.4.x - 'lang' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LoudBlog 0.5 - SQL Injection / Admin Credentials Disclosure | This is a webapps exploit for php platform. Description: LoudBlog 0.5 - SQL Injection / Admin Credentials Disclosure. Author: rgod |
Analyze the security implications of: LoudBlog 0.5 - SQL Injection / Admin Credentials Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Curriculum Evaluation System 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Curriculum Evaluation System 1.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Curriculum Evaluation System 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DELTAScripts PHPClassifieds - 'rate.php' Blind SQL Injection | This is a webapps exploit for php platform. Description: DELTAScripts PHPClassifieds - 'rate.php' Blind SQL Injection. Author: Hamza 'MizoZ' N. |
Analyze the security implications of: DELTAScripts PHPClassifieds - 'rate.php' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WirelessFiles 1.1 iPad iPhone - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: WirelessFiles 1.1 iPad iPhone - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: WirelessFiles 1.1 iPad iPhone - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: OpenMRS - Java Deserialization RCE (Metasploit) | This is a remote exploit for linux platform. Description: OpenMRS - Java Deserialization RCE (Metasploit). Author: Metasploit |
Analyze the security implications of: OpenMRS - Java Deserialization RCE (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: TeemIp IPAM < 2.4.0 - 'new_config' Command Injection (Metasploit) | This is a remote exploit for php platform. Description: TeemIp IPAM < 2.4.0 - 'new_config' Command Injection (Metasploit). Author: AkkuS |
Analyze the security implications of: TeemIp IPAM < 2.4.0 - 'new_config' Command Injection (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Minix 3.3.0 - Local Denial of Service (PoC) | This is a dos exploit for linux platform. Description: Minix 3.3.0 - Local Denial of Service (PoC). Author: nitr0us |
Analyze the security implications of: Minix 3.3.0 - Local Denial of Service (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Icecast 1.1.x/1.3.x - Directory Traversal | This is a remote exploit for multiple platform. Description: Icecast 1.1.x/1.3.x - Directory Traversal. Author: gollum |
Analyze the security implications of: Icecast 1.1.x/1.3.x - Directory Traversal | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: UStore 1.0 - 'detail.asp' SQL Injection | This is a webapps exploit for asp platform. Description: UStore 1.0 - 'detail.asp' SQL Injection. Author: ajann |
Analyze the security implications of: UStore 1.0 - 'detail.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! / Mambo Component com_profile - 'oid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! / Mambo Component com_profile - 'oid' SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! / Mambo Component com_profile - 'oid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SIX-webboard 2.01 - File Retrieval | This is a remote exploit for cgi platform. Description: SIX-webboard 2.01 - File Retrieval. Author: Hannibal Lector |
Analyze the security implications of: SIX-webboard 2.01 - File Retrieval | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: BSD/OS 2.1 / FreeBSD 2.1.5 / NeXTstep 4.x / IRIX 6.4 / SunOS 4.1.3/4.1.4 - '/usr/bin/lpr' Buffer Overrun Privilege Escalation (2) | This is a local exploit for bsd platform. Description: BSD/OS 2.1 / FreeBSD 2.1.5 / NeXTstep 4.x / IRIX 6.4 / SunOS 4.1.3/4.1.4 - '/usr/bin/lpr' Buffer Overrun Privilege Escalation (2). Author: Vadim Kolontsov |
Analyze the security implications of: BSD/OS 2.1 / FreeBSD 2.1.5 / NeXTstep 4.x / IRIX 6.4 / SunOS 4.1.3/4.1.4 - '/usr/bin/lpr' Buffer Overrun Privilege Escalation (2) | This exploit targets bsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.