input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: m-phorum 0.3 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: m-phorum 0.3 - 'index.php' Cross-Site Scripting. Author: CodeXpLoder'tq |
Analyze the security implications of: m-phorum 0.3 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Xtokkaetama 1.0 b-6 - Nickname Local Buffer Overflow (2) | This is a local exploit for linux platform. Description: Xtokkaetama 1.0 b-6 - Nickname Local Buffer Overflow (2). Author: techieone@softhome.net |
Analyze the security implications of: Xtokkaetama 1.0 b-6 - Nickname Local Buffer Overflow (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: IceWarp Mail Server 9.1.1 - '/admin/index.html' Cross-Site Scripting | This is a webapps exploit for php platform. Description: IceWarp Mail Server 9.1.1 - '/admin/index.html' Cross-Site Scripting. Author: Ekin0x |
Analyze the security implications of: IceWarp Mail Server 9.1.1 - '/admin/index.html' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link DSL-2640R - DNS Change | This is a webapps exploit for hardware platform. Description: D-Link DSL-2640R - DNS Change. Author: Todor Donev |
Analyze the security implications of: D-Link DSL-2640R - DNS Change | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Allaire JRun 2.3 - Arbitrary Code Execution | This is a remote exploit for multiple platform. Description: Allaire JRun 2.3 - Arbitrary Code Execution. Author: Foundstone Labs |
Analyze the security implications of: Allaire JRun 2.3 - Arbitrary Code Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: HomeAutomation 3.3.2 - Authentication Bypass | This is a webapps exploit for php platform. Description: HomeAutomation 3.3.2 - Authentication Bypass. Author: LiquidWorm |
Analyze the security implications of: HomeAutomation 3.3.2 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_icagenda - 'id' Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Joomla! Component com_icagenda - 'id' Multiple Vulnerabilities. Author: Dark-Puzzle |
Analyze the security implications of: Joomla! Component com_icagenda - 'id' Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eLouai's Force Download Script - Arbitrary Local File Download | This is a webapps exploit for php platform. Description: eLouai's Force Download Script - Arbitrary Local File Download. Author: v1R00Z |
Analyze the security implications of: eLouai's Force Download Script - Arbitrary Local File Download | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bigware Shop 2.1x - 'main_bigware_54.php' SQL Injection | This is a webapps exploit for php platform. Description: Bigware Shop 2.1x - 'main_bigware_54.php' SQL Injection. Author: rwenzel |
Analyze the security implications of: Bigware Shop 2.1x - 'main_bigware_54.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BBSXP CMS - Multiple SQL Injections | This is a webapps exploit for asp platform. Description: BBSXP CMS - Multiple SQL Injections. Author: Farbod Mahini |
Analyze the security implications of: BBSXP CMS - Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Linux Kernel 4.4.1 - REFCOUNT Overflow Use-After-Free in Keyrings Local Privilege Escalation (1) | This is a local exploit for linux platform. Description: Linux Kernel 4.4.1 - REFCOUNT Overflow Use-After-Free in Keyrings Local Privilege Escalation (1). Author: Perception Point Team |
Analyze the security implications of: Linux Kernel 4.4.1 - REFCOUNT Overflow Use-After-Free in Keyrings Local Privilege Escalation (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Hashicorp vagrant-vmware-fusion 4.0.24 - Local Privilege Escalation | This is a local exploit for macos platform. Description: Hashicorp vagrant-vmware-fusion 4.0.24 - Local Privilege Escalation. Author: Mark Wadham |
Analyze the security implications of: Hashicorp vagrant-vmware-fusion 4.0.24 - Local Privilege Escalation | This exploit targets macos systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: BookingWizz Booking System 5.5 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: BookingWizz Booking System 5.5 - 'id' SQL Injection. Author: AkkuS |
Analyze the security implications of: BookingWizz Booking System 5.5 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ARISg 5.0 - 'wflogin.jsp' Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: ARISg 5.0 - 'wflogin.jsp' Cross-Site Scripting. Author: Yaniv Miron |
Analyze the security implications of: ARISg 5.0 - 'wflogin.jsp' Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: FreePBX 2.10.0 / Elastix 2.2.0 - Remote Code Execution | This is a webapps exploit for php platform. Description: FreePBX 2.10.0 / Elastix 2.2.0 - Remote Code Execution. Author: muts |
Analyze the security implications of: FreePBX 2.10.0 / Elastix 2.2.0 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Watchguard SOHO 2.2 - Denial of Service | This is a dos exploit for hardware platform. Description: Watchguard SOHO 2.2 - Denial of Service. Author: Filip Maertens |
Analyze the security implications of: Watchguard SOHO 2.2 - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: SearchBlox 8.6.6 - Cross-Site Request Forgery | This is a webapps exploit for java platform. Description: SearchBlox 8.6.6 - Cross-Site Request Forgery. Author: Ahmet Gurel |
Analyze the security implications of: SearchBlox 8.6.6 - Cross-Site Request Forgery | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Oracle9i Application Server 9.0.2 - MOD_ORADAV Access Control | This is a remote exploit for multiple platform. Description: Oracle9i Application Server 9.0.2 - MOD_ORADAV Access Control. Author: David Litchfield |
Analyze the security implications of: Oracle9i Application Server 9.0.2 - MOD_ORADAV Access Control | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component eventCal 1.6.4 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component eventCal 1.6.4 - Blind SQL Injection. Author: RoAd_KiLlEr |
Analyze the security implications of: Joomla! Component eventCal 1.6.4 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Centreon < 2.5.1 / Centreon Enterprise Server < 2.2 - SQL Injection / Command Injection (Metasploit) | This is a webapps exploit for linux platform. Description: Centreon < 2.5.1 / Centreon Enterprise Server < 2.2 - SQL Injection / Command Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Centreon < 2.5.1 / Centreon Enterprise Server < 2.2 - SQL Injection / Command Injection (Metasploit) | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: VideoFlow Digital Video Protection (DVP) 2.10 - Directory Traversal | This is a webapps exploit for perl platform. Description: VideoFlow Digital Video Protection (DVP) 2.10 - Directory Traversal. Author: LiquidWorm |
Analyze the security implications of: VideoFlow Digital Video Protection (DVP) 2.10 - Directory Traversal | This exploit targets perl systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets perl platform |
What is this exploit about: AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection | This is a webapps exploit for perl platform. Description: AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection. Author: BrianWGray |
Analyze the security implications of: AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection | This exploit targets perl systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets perl platform |
What is this exploit about: xscreensaver 5.01 - Arbitrary File Disclosure Symlink | This is a local exploit for multiple platform. Description: xscreensaver 5.01 - Arbitrary File Disclosure Symlink. Author: kingcope |
Analyze the security implications of: xscreensaver 5.01 - Arbitrary File Disclosure Symlink | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Fatwiki (fwiki) 1.0 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Fatwiki (fwiki) 1.0 - Remote File Inclusion. Author: kaMtiEz |
Analyze the security implications of: Fatwiki (fwiki) 1.0 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sendmail 8.13.5 - Remote Signal Handling (PoC) | This is a dos exploit for linux platform. Description: Sendmail 8.13.5 - Remote Signal Handling (PoC). Author: redsand |
Analyze the security implications of: Sendmail 8.13.5 - Remote Signal Handling (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Dokeos 1.8.4 - '/main/mySpace/index.php?tracking_list_coaches_column' SQL Injection | This is a webapps exploit for php platform. Description: Dokeos 1.8.4 - '/main/mySpace/index.php?tracking_list_coaches_column' SQL Injection. Author: Alexandr Polyakov |
Analyze the security implications of: Dokeos 1.8.4 - '/main/mySpace/index.php?tracking_list_coaches_column' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle VM VirtualBox - Environment and ioctl Unprivileged Host User to Host Kernel Privilege Escalation | This is a dos exploit for multiple platform. Description: Oracle VM VirtualBox - Environment and ioctl Unprivileged Host User to Host Kernel Privilege Escalation. Author: Google Security Research |
Analyze the security implications of: Oracle VM VirtualBox - Environment and ioctl Unprivileged Host User to Host Kernel Privilege Escalation | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: bilboblog 2.1 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: bilboblog 2.1 - Multiple Vulnerabilities. Author: BlackH |
Analyze the security implications of: bilboblog 2.1 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EditTag 1.2 - 'edittag_mp.cgi?file' Arbitrary File Disclosure | This is a webapps exploit for cgi platform. Description: EditTag 1.2 - 'edittag_mp.cgi?file' Arbitrary File Disclosure. Author: NetJackal |
Analyze the security implications of: EditTag 1.2 - 'edittag_mp.cgi?file' Arbitrary File Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: GlassFish Application Server - '/resourceNode/externalResourceNew.jsf' Multiple Cross-Site Scripting Vulnerabilities | This is a remote exploit for multiple platform. Description: GlassFish Application Server - '/resourceNode/externalResourceNew.jsf' Multiple Cross-Site Scripting Vulnerabilities. Author: Eduardo Jorge |
Analyze the security implications of: GlassFish Application Server - '/resourceNode/externalResourceNew.jsf' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Novus 1.0 - 'notas.asp?nota_id' SQL Injection | This is a webapps exploit for asp platform. Description: Novus 1.0 - 'notas.asp?nota_id' SQL Injection. Author: ka0x |
Analyze the security implications of: Novus 1.0 - 'notas.asp?nota_id' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Oracle WebLogic Server 12.2.1.4.0 - Remote Code Execution | This is a webapps exploit for java platform. Description: Oracle WebLogic Server 12.2.1.4.0 - Remote Code Execution. Author: nu11secur1ty |
Analyze the security implications of: Oracle WebLogic Server 12.2.1.4.0 - Remote Code Execution | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Cisco Catalyst 2960 IOS 12.2(55)SE1 - 'ROCEM' Remote Code Execution | This is a remote exploit for hardware platform. Description: Cisco Catalyst 2960 IOS 12.2(55)SE1 - 'ROCEM' Remote Code Execution. Author: Artem Kondratenko |
Analyze the security implications of: Cisco Catalyst 2960 IOS 12.2(55)SE1 - 'ROCEM' Remote Code Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.