input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Symantec Messaging Gateway < 10.6.3-267 - Cross-Site Request Forgery | This is a webapps exploit for multiple platform. Description: Symantec Messaging Gateway < 10.6.3-267 - Cross-Site Request Forgery. Author: Dhiraj Mishra |
Analyze the security implications of: Symantec Messaging Gateway < 10.6.3-267 - Cross-Site Request Forgery | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Sitecom Home Storage Center - Authentication Bypass | This is a webapps exploit for hardware platform. Description: Sitecom Home Storage Center - Authentication Bypass. Author: Mattijs van Ommeren |
Analyze the security implications of: Sitecom Home Storage Center - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: HybridAuth 2.2.2 - Remote Code Execution | This is a webapps exploit for php platform. Description: HybridAuth 2.2.2 - Remote Code Execution. Author: @u0x |
Analyze the security implications of: HybridAuth 2.2.2 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Client Management System 1.1 - 'username' Stored Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Client Management System 1.1 - 'username' Stored Cross-Site Scripting (XSS). Author: BHAVESH KAUL |
Analyze the security implications of: Client Management System 1.1 - 'username' Stored Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Invoice Manager 3.1 - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: Invoice Manager 3.1 - Cross-Site Request Forgery (Add Admin). Author: Ali BawazeEer |
Analyze the security implications of: Invoice Manager 3.1 - Cross-Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JBlog 1.0 - Create / Delete Admin Authentication Bypass | This is a webapps exploit for php platform. Description: JBlog 1.0 - Create / Delete Admin Authentication Bypass. Author: s4mi |
Analyze the security implications of: JBlog 1.0 - Create / Delete Admin Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CedStat 1.31 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: CedStat 1.31 - 'index.php' Cross-Site Scripting. Author: sn0oPy |
Analyze the security implications of: CedStat 1.31 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FooSun - 'Api_Response.asp' SQL Injection | This is a webapps exploit for asp platform. Description: FooSun - 'Api_Response.asp' SQL Injection. Author: flyh4t |
Analyze the security implications of: FooSun - 'Api_Response.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Apple macOS/iOS - 'TIKeyboardLayout initWithCoder:' NSKeyedArchiver Heap Corruption Due to Rounding Error | This is a dos exploit for multiple platform. Description: Apple macOS/iOS - 'TIKeyboardLayout initWithCoder:' NSKeyedArchiver Heap Corruption Due to Rounding Error. Author: Google Security Research |
Analyze the security implications of: Apple macOS/iOS - 'TIKeyboardLayout initWithCoder:' NSKeyedArchiver Heap Corruption Due to Rounding Error | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Facebook Clone Script 1.0 - 'id' / 'send' SQL Injection | This is a webapps exploit for php platform. Description: Facebook Clone Script 1.0 - 'id' / 'send' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Facebook Clone Script 1.0 - 'id' / 'send' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.4.23/2.6.0 - 'do_mremap()' Bound Checking Validator (1) | This is a local exploit for linux platform. Description: Linux Kernel 2.4.23/2.6.0 - 'do_mremap()' Bound Checking Validator (1). Author: Christophe Devine |
Analyze the security implications of: Linux Kernel 2.4.23/2.6.0 - 'do_mremap()' Bound Checking Validator (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: asgbookPHP 1.9 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: asgbookPHP 1.9 - 'index.php' Cross-Site Scripting. Author: indoushka |
Analyze the security implications of: asgbookPHP 1.9 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MacOSXLabs RsyncX 2.1 - Insecure Temporary File Creation | This is a local exploit for osx platform. Description: MacOSXLabs RsyncX 2.1 - Insecure Temporary File Creation. Author: Matt Johnston |
Analyze the security implications of: MacOSXLabs RsyncX 2.1 - Insecure Temporary File Creation | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Kentico CMS 9.0-12.0.49 - Persistent Cross Site Scripting | This is a webapps exploit for php platform. Description: Kentico CMS 9.0-12.0.49 - Persistent Cross Site Scripting. Author: Ataberk YAVUZER |
Analyze the security implications of: Kentico CMS 9.0-12.0.49 - Persistent Cross Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GuppY 4.5.16 - Remote Command Execution | This is a webapps exploit for php platform. Description: GuppY 4.5.16 - Remote Command Execution. Author: rgod |
Analyze the security implications of: GuppY 4.5.16 - Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Safari 1.x - Large JavaScript Array Handling Denial of Service | This is a dos exploit for osx platform. Description: Apple Safari 1.x - Large JavaScript Array Handling Denial of Service. Author: kang |
Analyze the security implications of: Apple Safari 1.x - Large JavaScript Array Handling Denial of Service | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: TP-Link TL-WR1043ND 2 - Authentication Bypass | This is a webapps exploit for hardware platform. Description: TP-Link TL-WR1043ND 2 - Authentication Bypass. Author: Uriel Kosayev |
Analyze the security implications of: TP-Link TL-WR1043ND 2 - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Websense Content Gateway - Multiple Cross-Site Scripting Vulnerabilities | This is a remote exploit for multiple platform. Description: Websense Content Gateway - Multiple Cross-Site Scripting Vulnerabilities. Author: Steven Sim Kok Leong |
Analyze the security implications of: Websense Content Gateway - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: HPE VAN SDN 2.7.18.0503 - Remote Root | This is a webapps exploit for linux platform. Description: HPE VAN SDN 2.7.18.0503 - Remote Root. Author: KoreLogic |
Analyze the security implications of: HPE VAN SDN 2.7.18.0503 - Remote Root | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: eNpaper1 - 'Root_Header.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: eNpaper1 - 'Root_Header.php' Remote File Inclusion. Author: almaster |
Analyze the security implications of: eNpaper1 - 'Root_Header.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IPFire 2.25 - Remote Code Execution (Authenticated) | This is a webapps exploit for cgi platform. Description: IPFire 2.25 - Remote Code Execution (Authenticated). Author: Mücahit Saratar |
Analyze the security implications of: IPFire 2.25 - Remote Code Execution (Authenticated) | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: HotelCMS with Booking Engine - SQL Injection | This is a webapps exploit for php platform. Description: HotelCMS with Booking Engine - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: HotelCMS with Booking Engine - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ID Software Quake II Server 3.2 - Multiple Vulnerabilities | This is a dos exploit for multiple platform. Description: ID Software Quake II Server 3.2 - Multiple Vulnerabilities. Author: Richard Stanway |
Analyze the security implications of: ID Software Quake II Server 3.2 - Multiple Vulnerabilities | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ciamos 0.9.2 - 'Highlight.php' File Disclosure | This is a webapps exploit for php platform. Description: Ciamos 0.9.2 - 'Highlight.php' File Disclosure. Author: Majid NT |
Analyze the security implications of: Ciamos 0.9.2 - 'Highlight.php' File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Car Rental Management System 1.0 - SQL injection + Arbitrary File Upload | This is a webapps exploit for php platform. Description: Car Rental Management System 1.0 - SQL injection + Arbitrary File Upload. Author: Fortunato Lodari |
Analyze the security implications of: Car Rental Management System 1.0 - SQL injection + Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: jPORTAL 2.2.1/2.3.1 - 'download.php' SQL Injection | This is a webapps exploit for php platform. Description: jPORTAL 2.2.1/2.3.1 - 'download.php' SQL Injection. Author: krasza |
Analyze the security implications of: jPORTAL 2.2.1/2.3.1 - 'download.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Python CGIHTTPServer - Encoded Directory Traversal | This is a webapps exploit for multiple platform. Description: Python CGIHTTPServer - Encoded Directory Traversal. Author: RedTeam Pentesting |
Analyze the security implications of: Python CGIHTTPServer - Encoded Directory Traversal | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Business Directory Script - SQL Injection | This is a webapps exploit for php platform. Description: Business Directory Script - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Business Directory Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Samba < 3.6.2 (x86) - Denial of Service (PoC) | This is a dos exploit for linux_x86 platform. Description: Samba < 3.6.2 (x86) - Denial of Service (PoC). Author: sleepya |
Analyze the security implications of: Samba < 3.6.2 (x86) - Denial of Service (PoC) | This exploit targets linux_x86 systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux_x86 platform |
What is this exploit about: Qualcomm qpopper 2.53/3.0 / RedHat imap 4.5 -4 / UoW imap 4.5 popd - Lock File Denial of Service | This is a dos exploit for linux platform. Description: Qualcomm qpopper 2.53/3.0 / RedHat imap 4.5 -4 / UoW imap 4.5 popd - Lock File Denial of Service. Author: Alex Mottram |
Analyze the security implications of: Qualcomm qpopper 2.53/3.0 / RedHat imap 4.5 -4 / UoW imap 4.5 popd - Lock File Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Netscape Browser 9.0.0.6 - Clickjacking | This is a remote exploit for multiple platform. Description: Netscape Browser 9.0.0.6 - Clickjacking. Author: Pouya Daneshmand |
Analyze the security implications of: Netscape Browser 9.0.0.6 - Clickjacking | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Adobe Flash Player - Integer Overflow | This is a remote exploit for multiple platform. Description: Adobe Flash Player - Integer Overflow. Author: ryujin |
Analyze the security implications of: Adobe Flash Player - Integer Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Lmail 2.7 - Temporary File Race Condition | This is a local exploit for linux platform. Description: Lmail 2.7 - Temporary File Race Condition. Author: Charles Stevenson |
Analyze the security implications of: Lmail 2.7 - Temporary File Race Condition | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.