input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Mambo Component com_Musica - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Mambo Component com_Musica - 'id' SQL Injection. Author: Aria-Security Team |
Analyze the security implications of: Mambo Component com_Musica - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FS Grubhub Clone 1.0 - 'keywords' SQL Injection | This is a webapps exploit for php platform. Description: FS Grubhub Clone 1.0 - 'keywords' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: FS Grubhub Clone 1.0 - 'keywords' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 5.0.0 - 'snmprealwalk()' Local Denial of Service | This is a dos exploit for php platform. Description: PHP 5.0.0 - 'snmprealwalk()' Local Denial of Service. Author: Yakir Wizman |
Analyze the security implications of: PHP 5.0.0 - 'snmprealwalk()' Local Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: netkit-telnet-0.17 telnetd (Fedora 31) - 'BraveStarr' Remote Code Execution | This is a remote exploit for linux platform. Description: netkit-telnet-0.17 telnetd (Fedora 31) - 'BraveStarr' Remote Code Execution. Author: Immunity |
Analyze the security implications of: netkit-telnet-0.17 telnetd (Fedora 31) - 'BraveStarr' Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: GestioIP 3.5.7 - Stored Cross-Site Scripting (Stored XSS) | This is a remote exploit for multiple platform. Description: GestioIP 3.5.7 - Stored Cross-Site Scripting (Stored XSS). Author: Maximiliano Belino |
Analyze the security implications of: GestioIP 3.5.7 - Stored Cross-Site Scripting (Stored XSS) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FreeWnn 1.1.1 - JServer Logging Option Data Corruption | This is a local exploit for linux platform. Description: FreeWnn 1.1.1 - JServer Logging Option Data Corruption. Author: Stefano Di Paola |
Analyze the security implications of: FreeWnn 1.1.1 - JServer Logging Option Data Corruption | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PInfo 0.6.9-5.1 - Local Buffer Overflow | This is a local exploit for linux platform. Description: PInfo 0.6.9-5.1 - Local Buffer Overflow. Author: Juan Sacco |
Analyze the security implications of: PInfo 0.6.9-5.1 - Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Cyrus IMAPD 2.3.2 - 'pop3d' Remote Buffer Overflow (3) | This is a remote exploit for linux platform. Description: Cyrus IMAPD 2.3.2 - 'pop3d' Remote Buffer Overflow (3). Author: K-sPecial |
Analyze the security implications of: Cyrus IMAPD 2.3.2 - 'pop3d' Remote Buffer Overflow (3) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: BEA Systems WebLogic Server 4.0 x/4.5 x/5.1 x - Double Dot Buffer Overflow | This is a remote exploit for multiple platform. Description: BEA Systems WebLogic Server 4.0 x/4.5 x/5.1 x - Double Dot Buffer Overflow. Author: peter.grundl |
Analyze the security implications of: BEA Systems WebLogic Server 4.0 x/4.5 x/5.1 x - Double Dot Buffer Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Atlassian Jira Server Data Center 8.16.0 - Arbitrary File Read | This is a webapps exploit for multiple platform. Description: Atlassian Jira Server Data Center 8.16.0 - Arbitrary File Read. Author: Mayank Deshmukh |
Analyze the security implications of: Atlassian Jira Server Data Center 8.16.0 - Arbitrary File Read | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DALIM SOFTWARE ES Core 5.0 build 7184.1 - Server-Side Request Forgery | This is a webapps exploit for jsp platform. Description: DALIM SOFTWARE ES Core 5.0 build 7184.1 - Server-Side Request Forgery. Author: LiquidWorm |
Analyze the security implications of: DALIM SOFTWARE ES Core 5.0 build 7184.1 - Server-Side Request Forgery | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: mount.cifs - 'chdir()' Arbitrary Root File Identification | This is a local exploit for linux platform. Description: mount.cifs - 'chdir()' Arbitrary Root File Identification. Author: Sha0 |
Analyze the security implications of: mount.cifs - 'chdir()' Arbitrary Root File Identification | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: JBC Explorer 7.20 - 'arbre.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: JBC Explorer 7.20 - 'arbre.php' Cross-Site Scripting. Author: Metropolis |
Analyze the security implications of: JBC Explorer 7.20 - 'arbre.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Laravel - 'Hash::make()' Password Truncation Security | This is a remote exploit for multiple platform. Description: Laravel - 'Hash::make()' Password Truncation Security. Author: Pichaya Morimoto |
Analyze the security implications of: Laravel - 'Hash::make()' Password Truncation Security | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Chipmunk Board 1.3 - 'index.php?forumID' SQL Injection | This is a webapps exploit for php platform. Description: Chipmunk Board 1.3 - 'index.php?forumID' SQL Injection. Author: Shamus |
Analyze the security implications of: Chipmunk Board 1.3 - 'index.php?forumID' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Nagios Log Server 2024R1.3.1 - Stored XSS | This is a webapps exploit for multiple platform. Description: Nagios Log Server 2024R1.3.1 - Stored XSS. Author: Seth Kraft |
Analyze the security implications of: Nagios Log Server 2024R1.3.1 - Stored XSS | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Expinion.net News Manager Lite 2.5 - 'comment_add.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Expinion.net News Manager Lite 2.5 - 'comment_add.asp' Cross-Site Scripting. Author: Manuel Lopez |
Analyze the security implications of: Expinion.net News Manager Lite 2.5 - 'comment_add.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Nokia S60 SMS/MMS (Curse of Silence) - Denial of Service | This is a dos exploit for hardware platform. Description: Nokia S60 SMS/MMS (Curse of Silence) - Denial of Service. Author: Tobias Engel |
Analyze the security implications of: Nokia S60 SMS/MMS (Curse of Silence) - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Bedita 3.5.1 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Bedita 3.5.1 - Cross-Site Scripting. Author: Sébastien Morin |
Analyze the security implications of: Bedita 3.5.1 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: cPanel 11 Beta - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: cPanel 11 Beta - Multiple Cross-Site Scripting Vulnerabilities. Author: Aria-Security Team |
Analyze the security implications of: cPanel 11 Beta - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AKY Blog - SQL Injection | This is a webapps exploit for asp platform. Description: AKY Blog - SQL Injection. Author: v0calist |
Analyze the security implications of: AKY Blog - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Laravel Framework 11 - Credential Leakage | This is a webapps exploit for php platform. Description: Laravel Framework 11 - Credential Leakage. Author: Huseein Amer |
Analyze the security implications of: Laravel Framework 11 - Credential Leakage | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FaceSentry Access Control System 6.4.8 - Remote Root Exploit | This is a webapps exploit for hardware platform. Description: FaceSentry Access Control System 6.4.8 - Remote Root Exploit. Author: LiquidWorm |
Analyze the security implications of: FaceSentry Access Control System 6.4.8 - Remote Root Exploit | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Narcissus Image Configuration - Passthru (Metasploit) | This is a remote exploit for linux platform. Description: Narcissus Image Configuration - Passthru (Metasploit). Author: Metasploit |
Analyze the security implications of: Narcissus Image Configuration - Passthru (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: E-Xoops 1.0.5/1.0.8 - '/mysections/ratefile.php?lid' SQL Injection | This is a webapps exploit for php platform. Description: E-Xoops 1.0.5/1.0.8 - '/mysections/ratefile.php?lid' SQL Injection. Author: Lostmon |
Analyze the security implications of: E-Xoops 1.0.5/1.0.8 - '/mysections/ratefile.php?lid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Online Market 2.x - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Online Market 2.x - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component Online Market 2.x - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Safari 4.0.2 - Clickjacking | This is a remote exploit for multiple platform. Description: Apple Safari 4.0.2 - Clickjacking. Author: Pouya Daneshmand |
Analyze the security implications of: Apple Safari 4.0.2 - Clickjacking | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Six Apart Vox - 'search' Page Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Six Apart Vox - 'search' Page Cross-Site Scripting. Author: Phenom |
Analyze the security implications of: Six Apart Vox - 'search' Page Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FENIX 0.92 - Local Buffer Overflow | This is a local exploit for linux platform. Description: FENIX 0.92 - Local Buffer Overflow. Author: Juan Sacco |
Analyze the security implications of: FENIX 0.92 - Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apple Mac OSX 10.4.x - AppleTalk AIOCRegLocalZN IOCTL Stack Buffer Overflow | This is a local exploit for osx platform. Description: Apple Mac OSX 10.4.x - AppleTalk AIOCRegLocalZN IOCTL Stack Buffer Overflow. Author: LMH |
Analyze the security implications of: Apple Mac OSX 10.4.x - AppleTalk AIOCRegLocalZN IOCTL Stack Buffer Overflow | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Quantum Art QP7.Enterprise - 'news.asp?p_news_id' SQL Injection | This is a webapps exploit for asp platform. Description: Quantum Art QP7.Enterprise - 'news.asp?p_news_id' SQL Injection. Author: r0t3d3Vil |
Analyze the security implications of: Quantum Art QP7.Enterprise - 'news.asp?p_news_id' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Oracle WebCenter FatWire Content Server < 7 - Improper Access Control | This is a webapps exploit for linux platform. Description: Oracle WebCenter FatWire Content Server < 7 - Improper Access Control. Author: Sebastian Cornejo |
Analyze the security implications of: Oracle WebCenter FatWire Content Server < 7 - Improper Access Control | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Ji-takz - Remote File Inclusion | This is a webapps exploit for php platform. Description: Ji-takz - Remote File Inclusion. Author: SpC-x |
Analyze the security implications of: Ji-takz - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.