input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Proxy Anket 3.0.1 - 'anket.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Proxy Anket 3.0.1 - 'anket.asp' SQL Injection. Author: Yollubunlar.Org |
Analyze the security implications of: Proxy Anket 3.0.1 - 'anket.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Apple QuickTime/Darwin Streaming Server 4.1.3 QTSSReflector Module - Integer Overflow | This is a dos exploit for osx platform. Description: Apple QuickTime/Darwin Streaming Server 4.1.3 QTSSReflector Module - Integer Overflow. Author: Sir Mordred |
Analyze the security implications of: Apple QuickTime/Darwin Streaming Server 4.1.3 QTSSReflector Module - Integer Overflow | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: OP5 5.3.5/5.4.0/5.4.2/5.5.0/5.5.1 - 'license.php' Remote Command Execution (Metasploit) | This is a webapps exploit for multiple platform. Description: OP5 5.3.5/5.4.0/5.4.2/5.5.0/5.5.1 - 'license.php' Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: OP5 5.3.5/5.4.0/5.4.2/5.5.0/5.5.1 - 'license.php' Remote Command Execution (Metasploit) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GeniXCMS 0.0.3 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: GeniXCMS 0.0.3 - Cross-Site Scripting. Author: hyp3rlinx |
Analyze the security implications of: GeniXCMS 0.0.3 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: i-dreams GB Server - 'admin.dat' File Disclosure | This is a webapps exploit for cgi platform. Description: i-dreams GB Server - 'admin.dat' File Disclosure. Author: Pouya_Server |
Analyze the security implications of: i-dreams GB Server - 'admin.dat' File Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: IonizeCMS 1.0.8 - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: IonizeCMS 1.0.8 - Cross-Site Request Forgery (Add Admin). Author: s0nk3y |
Analyze the security implications of: IonizeCMS 1.0.8 - Cross-Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AContent 1.0 - Cross-Site Scripting / HTML Injection | This is a webapps exploit for php platform. Description: AContent 1.0 - Cross-Site Scripting / HTML Injection. Author: High-Tech Bridge SA |
Analyze the security implications of: AContent 1.0 - Cross-Site Scripting / HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Chicken of the VNC 2.0 - 'NULL-pointer' Remote Denial of Service | This is a dos exploit for osx platform. Description: Chicken of the VNC 2.0 - 'NULL-pointer' Remote Denial of Service. Author: poplix |
Analyze the security implications of: Chicken of the VNC 2.0 - 'NULL-pointer' Remote Denial of Service | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: File Manager Advanced Shortcode 2.3.2 - Unauthenticated Remote Code Execution (RCE) | This is a webapps exploit for php platform. Description: File Manager Advanced Shortcode 2.3.2 - Unauthenticated Remote Code Execution (RCE). Author: Mateus Machado Tesser |
Analyze the security implications of: File Manager Advanced Shortcode 2.3.2 - Unauthenticated Remote Code Execution (RCE) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Gamesbox 1.0.2 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Gamesbox 1.0.2 - 'id' SQL Injection. Author: v3n0m |
Analyze the security implications of: Joomla! Component Gamesbox 1.0.2 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: V-SOL GPON/EPON OLT Platform 2.03 - Remote Privilege Escalation | This is a webapps exploit for hardware platform. Description: V-SOL GPON/EPON OLT Platform 2.03 - Remote Privilege Escalation. Author: LiquidWorm |
Analyze the security implications of: V-SOL GPON/EPON OLT Platform 2.03 - Remote Privilege Escalation | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Linux SELinux - W+X Protection Bypass via AIO | This is a dos exploit for linux platform. Description: Linux SELinux - W+X Protection Bypass via AIO. Author: Google Security Research |
Analyze the security implications of: Linux SELinux - W+X Protection Bypass via AIO | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - '/setup/base_conf_contents.php' Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - '/setup/base_conf_contents.php' Multiple Remote File Inclusions. Author: indoushka |
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - '/setup/base_conf_contents.php' Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_propertylab - 'auction_id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_propertylab - 'auction_id' SQL Injection. Author: Chip d3 bi0s |
Analyze the security implications of: Joomla! Component com_propertylab - 'auction_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple WebKit build 18794 - WebCore Remote Denial of Service | This is a dos exploit for osx platform. Description: Apple WebKit build 18794 - WebCore Remote Denial of Service. Author: Tom Ferris |
Analyze the security implications of: Apple WebKit build 18794 - WebCore Remote Denial of Service | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: BirthSys 3.1 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: BirthSys 3.1 - Multiple SQL Injections. Author: Aliaksandr Hartsuyeu |
Analyze the security implications of: BirthSys 3.1 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FS Makemytrip Clone - 'id' SQL Injection | This is a webapps exploit for php platform. Description: FS Makemytrip Clone - 'id' SQL Injection. Author: Dan° |
Analyze the security implications of: FS Makemytrip Clone - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Horos 2.1.0 Web Portal - Directory Traversal | This is a remote exploit for osx platform. Description: Horos 2.1.0 Web Portal - Directory Traversal. Author: LiquidWorm |
Analyze the security implications of: Horos 2.1.0 Web Portal - Directory Traversal | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Joomla! Component com_community - 'userid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_community - 'userid' SQL Injection. Author: Ne0 H4ck3R |
Analyze the security implications of: Joomla! Component com_community - 'userid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mysql 3.22.x/3.23.x - Local Buffer Overflow | This is a local exploit for linux platform. Description: Mysql 3.22.x/3.23.x - Local Buffer Overflow. Author: Luis Miguel Silva |
Analyze the security implications of: Mysql 3.22.x/3.23.x - Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Sony IPELA Network Camera 1.82.01 - 'ftpclient.cgi' Remote Stack Buffer Overflow | This is a remote exploit for hardware platform. Description: Sony IPELA Network Camera 1.82.01 - 'ftpclient.cgi' Remote Stack Buffer Overflow. Author: LiquidWorm |
Analyze the security implications of: Sony IPELA Network Camera 1.82.01 - 'ftpclient.cgi' Remote Stack Buffer Overflow | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: SuSE 6.3/6.4/7.0 sdb - Arbitrary Command Execution | This is a remote exploit for linux platform. Description: SuSE 6.3/6.4/7.0 sdb - Arbitrary Command Execution. Author: Maurycy Prodeus |
Analyze the security implications of: SuSE 6.3/6.4/7.0 sdb - Arbitrary Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: fhttpd 0.4.2 - 'un64()' Remote Denial of Service | This is a dos exploit for linux platform. Description: fhttpd 0.4.2 - 'un64()' Remote Denial of Service. Author: Jeremy Brown |
Analyze the security implications of: fhttpd 0.4.2 - 'un64()' Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Fonality trixbox 2.4.2 - Cross-Site Scripting (1) | This is a webapps exploit for php platform. Description: Fonality trixbox 2.4.2 - Cross-Site Scripting (1). Author: Omer Singer |
Analyze the security implications of: Fonality trixbox 2.4.2 - Cross-Site Scripting (1) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ZYXEL Router 3.40 Zynos - SMB Data Handling Denial of Service | This is a dos exploit for hardware platform. Description: ZYXEL Router 3.40 Zynos - SMB Data Handling Denial of Service. Author: Joxean Koret |
Analyze the security implications of: ZYXEL Router 3.40 Zynos - SMB Data Handling Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Fonality trixbox - 'index.php' Remote Code Execution | This is a webapps exploit for php platform. Description: Fonality trixbox - 'index.php' Remote Code Execution. Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: Fonality trixbox - 'index.php' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Opsview 4.6.2 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for multiple platform. Description: Opsview 4.6.2 - Multiple Cross-Site Scripting Vulnerabilities. Author: Dolev Farhi |
Analyze the security implications of: Opsview 4.6.2 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Acc PHP eMail 1.1 - Insecure Cookie Handling | This is a webapps exploit for php platform. Description: Acc PHP eMail 1.1 - Insecure Cookie Handling. Author: Hakxer |
Analyze the security implications of: Acc PHP eMail 1.1 - Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Picpuz 2.1.1 - Buffer Overflow (Denial of Service) (PoC) | This is a dos exploit for linux platform. Description: Picpuz 2.1.1 - Buffer Overflow (Denial of Service) (PoC). Author: $andman |
Analyze the security implications of: Picpuz 2.1.1 - Buffer Overflow (Denial of Service) (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: xwine 1.0.1 - '.exe' Local Crash (PoC) | This is a dos exploit for linux platform. Description: xwine 1.0.1 - '.exe' Local Crash (PoC). Author: JosS |
Analyze the security implications of: xwine 1.0.1 - '.exe' Local Crash (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: EggBlog 2.0 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: EggBlog 2.0 - 'id' SQL Injection. Author: alex@evuln.com |
Analyze the security implications of: EggBlog 2.0 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Barracuda Firmware 5.0.0.012 - (Authenticated) Remote Command Execution (Metasploit) | This is a remote exploit for linux platform. Description: Barracuda Firmware 5.0.0.012 - (Authenticated) Remote Command Execution (Metasploit). Author: xort |
Analyze the security implications of: Barracuda Firmware 5.0.0.012 - (Authenticated) Remote Command Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: kooora 3.0 - AR Cross-Site Scripting | This is a webapps exploit for php platform. Description: kooora 3.0 - AR Cross-Site Scripting. Author: indoushka |
Analyze the security implications of: kooora 3.0 - AR Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.