input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: FishCart 3.1 - 'display.php?nlst' Cross-Site Scripting | This is a webapps exploit for php platform. Description: FishCart 3.1 - 'display.php?nlst' Cross-Site Scripting. Author: Dcrab |
Analyze the security implications of: FishCart 3.1 - 'display.php?nlst' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Extra Search 2.2.8 - 'establename' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Extra Search 2.2.8 - 'establename' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Extra Search 2.2.8 - 'establename' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenSC 0.11.x - PKCS#11 Implementation Unauthorized Access | This is a local exploit for linux platform. Description: OpenSC 0.11.x - PKCS#11 Implementation Unauthorized Access. Author: Andreas Jellinghaus |
Analyze the security implications of: OpenSC 0.11.x - PKCS#11 Implementation Unauthorized Access | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Slackware Linux 3.4 - 'netconfig' Temporary File | This is a local exploit for linux platform. Description: Slackware Linux 3.4 - 'netconfig' Temporary File. Author: neonhaze |
Analyze the security implications of: Slackware Linux 3.4 - 'netconfig' Temporary File | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Event Manager Admin panel - 'events_new.php' SQL injection | This is a webapps exploit for php platform. Description: Event Manager Admin panel - 'events_new.php' SQL injection. Author: telahdihapus |
Analyze the security implications of: Event Manager Admin panel - 'events_new.php' SQL injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASAN/SUID - Local Privilege Escalation | This is a local exploit for multiple platform. Description: ASAN/SUID - Local Privilege Escalation. Author: bcoles |
Analyze the security implications of: ASAN/SUID - Local Privilege Escalation | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: tnftp (FreeBSD 8/9/10) - 'tnftp' Client Side | This is a remote exploit for bsd platform. Description: tnftp (FreeBSD 8/9/10) - 'tnftp' Client Side. Author: dash |
Analyze the security implications of: tnftp (FreeBSD 8/9/10) - 'tnftp' Client Side | This exploit targets bsd systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Joomla! Component FlippingBook 1.0.4 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component FlippingBook 1.0.4 - SQL Injection. Author: cO2 |
Analyze the security implications of: Joomla! Component FlippingBook 1.0.4 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Maian Weblog 4.0 - Cross-Site Request Forgery (Add New Post) | This is a webapps exploit for php platform. Description: Maian Weblog 4.0 - Cross-Site Request Forgery (Add New Post). Author: Besim |
Analyze the security implications of: Maian Weblog 4.0 - Cross-Site Request Forgery (Add New Post) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ArticleSetup Article Script 1.00 - SQL Injection | This is a webapps exploit for php platform. Description: ArticleSetup Article Script 1.00 - SQL Injection. Author: Linux Zone Research Team |
Analyze the security implications of: ArticleSetup Article Script 1.00 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GUnet OpenEclass E-learning platform 1.7.3 - 'uname' SQL Injection | This is a webapps exploit for php platform. Description: GUnet OpenEclass E-learning platform 1.7.3 - 'uname' SQL Injection. Author: emaragkos |
Analyze the security implications of: GUnet OpenEclass E-learning platform 1.7.3 - 'uname' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GNU Mailman 2.0.x - Subscribe Cross-Site Scripting | This is a remote exploit for cgi platform. Description: GNU Mailman 2.0.x - Subscribe Cross-Site Scripting. Author: office |
Analyze the security implications of: GNU Mailman 2.0.x - Subscribe Cross-Site Scripting | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Flax Article Manager 1.1 - Remote PHP Script Upload | This is a webapps exploit for php platform. Description: Flax Article Manager 1.1 - Remote PHP Script Upload. Author: S.W.A.T. |
Analyze the security implications of: Flax Article Manager 1.1 - Remote PHP Script Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Odine Solutions GateKeeper 1.0 - 'trafficCycle' SQL Injection | This is a webapps exploit for multiple platform. Description: Odine Solutions GateKeeper 1.0 - 'trafficCycle' SQL Injection. Author: Emel Basayar |
Analyze the security implications of: Odine Solutions GateKeeper 1.0 - 'trafficCycle' SQL Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: iPhone Springboard - Malformed Character Crash (PoC) | This is a dos exploit for hardware platform. Description: iPhone Springboard - Malformed Character Crash (PoC). Author: Chase Higgins |
Analyze the security implications of: iPhone Springboard - Malformed Character Crash (PoC) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Image Store - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Image Store - Arbitrary File Upload. Author: Mr.FireStormm |
Analyze the security implications of: Image Store - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreeBSD 6.4 - 'pipeclose()'/'knlist_cleardel()' Race Condition | This is a local exploit for freebsd platform. Description: FreeBSD 6.4 - 'pipeclose()'/'knlist_cleardel()' Race Condition. Author: Przemyslaw Frasunek |
Analyze the security implications of: FreeBSD 6.4 - 'pipeclose()'/'knlist_cleardel()' Race Condition | This exploit targets freebsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: Campsite 2.6.1 - 'ArticleIndex.php?g_documentRoot' Remote File Inclusion | This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'ArticleIndex.php?g_documentRoot' Remote File Inclusion. Author: anonymous |
Analyze the security implications of: Campsite 2.6.1 - 'ArticleIndex.php?g_documentRoot' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenKM 6.3.2 < 6.3.7 - Remote Command Execution (Metasploit) | This is a webapps exploit for jsp platform. Description: OpenKM 6.3.2 < 6.3.7 - Remote Command Execution (Metasploit). Author: AkkuS |
Analyze the security implications of: OpenKM 6.3.2 < 6.3.7 - Remote Command Execution (Metasploit) | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Apple Mac OSX 10.4.x - iPhoto 'photo://' URL Handling Format String | This is a dos exploit for osx platform. Description: Apple Mac OSX 10.4.x - iPhoto 'photo://' URL Handling Format String. Author: LMH |
Analyze the security implications of: Apple Mac OSX 10.4.x - iPhoto 'photo://' URL Handling Format String | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: MiCollab 7.0 - SQL Injection | This is a webapps exploit for multiple platform. Description: MiCollab 7.0 - SQL Injection. Author: Goran Tuzovic |
Analyze the security implications of: MiCollab 7.0 - SQL Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Dimofinf CMS 3.0.0 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Dimofinf CMS 3.0.0 - Cross-Site Scripting. Author: Renzi |
Analyze the security implications of: Dimofinf CMS 3.0.0 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JTAG Calendar 6.2.4 - 'search' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JTAG Calendar 6.2.4 - 'search' SQL Injection. Author: Persian Hack Team |
Analyze the security implications of: Joomla! Component JTAG Calendar 6.2.4 - 'search' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Zyxel Armor X1 WAP6806 - Directory Traversal | This is a webapps exploit for hardware platform. Description: Zyxel Armor X1 WAP6806 - Directory Traversal. Author: Rajivarnan R |
Analyze the security implications of: Zyxel Armor X1 WAP6806 - Directory Traversal | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Beauty-salon v1.0 - Remote Code Execution (RCE) | This is a webapps exploit for php platform. Description: Beauty-salon v1.0 - Remote Code Execution (RCE). Author: nu11secur1ty |
Analyze the security implications of: Beauty-salon v1.0 - Remote Code Execution (RCE) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LinEx - Password Reset | This is a webapps exploit for php platform. Description: LinEx - Password Reset. Author: N B Sri Harsha |
Analyze the security implications of: LinEx - Password Reset | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP-UX 11i - 'swpackage' Local Stack Overflow / Local Privilege Escalation | This is a local exploit for hp-ux platform. Description: HP-UX 11i - 'swpackage' Local Stack Overflow / Local Privilege Escalation. Author: prdelka |
Analyze the security implications of: HP-UX 11i - 'swpackage' Local Stack Overflow / Local Privilege Escalation | This exploit targets hp-ux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hp-ux platform |
What is this exploit about: Macaron Notes great notebook 5.5 - Denial of Service (PoC) | This is a dos exploit for ios platform. Description: Macaron Notes great notebook 5.5 - Denial of Service (PoC). Author: Geovanni Ruiz |
Analyze the security implications of: Macaron Notes great notebook 5.5 - Denial of Service (PoC) | This exploit targets ios systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: ASP Nuke - SQL Injection | This is a webapps exploit for asp platform. Description: ASP Nuke - SQL Injection. Author: Abysssec |
Analyze the security implications of: ASP Nuke - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component com_marketplace 1.2 - 'catid' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joomla! Component com_marketplace 1.2 - 'catid' Cross-Site Scripting. Author: ViRuSMaN |
Analyze the security implications of: Joomla! Component com_marketplace 1.2 - 'catid' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Openfire 3.6.2 - 'user-properties.jsp' Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: Openfire 3.6.2 - 'user-properties.jsp' Cross-Site Scripting. Author: Federico Muttis |
Analyze the security implications of: Openfire 3.6.2 - 'user-properties.jsp' Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Joomla! Component Search 1.0.13 - SearchWord Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joomla! Component Search 1.0.13 - SearchWord Cross-Site Scripting. Author: MustLive |
Analyze the security implications of: Joomla! Component Search 1.0.13 - SearchWord Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dejcom Market CMS - 'showbrand.aspx' SQL Injection | This is a webapps exploit for asp platform. Description: Dejcom Market CMS - 'showbrand.aspx' SQL Injection. Author: Mormoroth |
Analyze the security implications of: Dejcom Market CMS - 'showbrand.aspx' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.