input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GALLARIFIC PHP Photo Gallery Script - 'gallery.php' SQL Injection | This is a webapps exploit for php platform. Description: GALLARIFIC PHP Photo Gallery Script - 'gallery.php' SQL Injection. Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: GALLARIFIC PHP Photo Gallery Script - 'gallery.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AlmondSoft Classifieds Pro - 'gmap.php?addr' Cross-Site Scripting | This is a webapps exploit for php platform. Description: AlmondSoft Classifieds Pro - 'gmap.php?addr' Cross-Site Scripting. Author: Moudi |
Analyze the security implications of: AlmondSoft Classifieds Pro - 'gmap.php?addr' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sam Hawker wmcdplay 1.0 beta1-2 - Local Buffer Overflow (2) | This is a local exploit for linux platform. Description: Sam Hawker wmcdplay 1.0 beta1-2 - Local Buffer Overflow (2). Author: Larry W. Cashdolla |
Analyze the security implications of: Sam Hawker wmcdplay 1.0 beta1-2 - Local Buffer Overflow (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ATutor < 2.2.4 - 'file_manager' Remote Code Execution (Metasploit) | This is a webapps exploit for php platform. Description: ATutor < 2.2.4 - 'file_manager' Remote Code Execution (Metasploit). Author: AkkuS |
Analyze the security implications of: ATutor < 2.2.4 - 'file_manager' Remote Code Execution (Metasploit) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: VMware ESX 2.x - Multiple Information Disclosure Vulnerabilities | This is a remote exploit for multiple platform. Description: VMware ESX 2.x - Multiple Information Disclosure Vulnerabilities. Author: Stephen de Vries |
Analyze the security implications of: VMware ESX 2.x - Multiple Information Disclosure Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Diesel Job Site - 'job_id' Blind SQL Injection | This is a webapps exploit for php platform. Description: Diesel Job Site - 'job_id' Blind SQL Injection. Author: Stack |
Analyze the security implications of: Diesel Job Site - 'job_id' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle 8.1.7 - JSP/JSPSQL Remote File Reading | This is a remote exploit for jsp platform. Description: Oracle 8.1.7 - JSP/JSPSQL Remote File Reading. Author: Georgi Guninski |
Analyze the security implications of: Oracle 8.1.7 - JSP/JSPSQL Remote File Reading | This exploit targets jsp systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Sun Secure Global Desktop and Oracle Global Desktop 4.61.915 - Command Injection (Shellshock) | This is a webapps exploit for cgi platform. Description: Sun Secure Global Desktop and Oracle Global Desktop 4.61.915 - Command Injection (Shellshock). Author: lastc0de |
Analyze the security implications of: Sun Secure Global Desktop and Oracle Global Desktop 4.61.915 - Command Injection (Shellshock) | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Oracle 9i/10g - 'utl_file' FileSystem Access | This is a remote exploit for linux platform. Description: Oracle 9i/10g - 'utl_file' FileSystem Access. Author: Marco Ivaldi |
Analyze the security implications of: Oracle 9i/10g - 'utl_file' FileSystem Access | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FLDS 1.2a - 'redir.php' SQL Injection | This is a webapps exploit for php platform. Description: FLDS 1.2a - 'redir.php' SQL Injection. Author: nuclear |
Analyze the security implications of: FLDS 1.2a - 'redir.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FireEye Appliance - Unauthorized File Disclosure | This is a webapps exploit for php platform. Description: FireEye Appliance - Unauthorized File Disclosure. Author: Kristian Erik Hermansen |
Analyze the security implications of: FireEye Appliance - Unauthorized File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: blogme 3.0 - Cross-Site Scripting / Authentication Bypass | This is a webapps exploit for asp platform. Description: blogme 3.0 - Cross-Site Scripting / Authentication Bypass. Author: Security Access Point |
Analyze the security implications of: blogme 3.0 - Cross-Site Scripting / Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Job Portal 1.0 - Remote Code Execution | This is a webapps exploit for php platform. Description: Job Portal 1.0 - Remote Code Execution. Author: Tib3rius |
Analyze the security implications of: Job Portal 1.0 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DALIM SOFTWARE ES Core 5.0 build 7184.1 - User Enumeration | This is a webapps exploit for jsp platform. Description: DALIM SOFTWARE ES Core 5.0 build 7184.1 - User Enumeration. Author: LiquidWorm |
Analyze the security implications of: DALIM SOFTWARE ES Core 5.0 build 7184.1 - User Enumeration | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Joomla! Component com_sectionex - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_sectionex - Local File Inclusion. Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: Joomla! Component com_sectionex - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreeBSD 7.0-RELEASE - Telnet Daemon Privilege Escalation | This is a local exploit for freebsd platform. Description: FreeBSD 7.0-RELEASE - Telnet Daemon Privilege Escalation. Author: kingcope |
Analyze the security implications of: FreeBSD 7.0-RELEASE - Telnet Daemon Privilege Escalation | This exploit targets freebsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: PHP < 4.4.5/5.2.1 - 'shmop' SSL RSA Private-Key Disclosure | This is a local exploit for linux platform. Description: PHP < 4.4.5/5.2.1 - 'shmop' SSL RSA Private-Key Disclosure. Author: Stefan Esser |
Analyze the security implications of: PHP < 4.4.5/5.2.1 - 'shmop' SSL RSA Private-Key Disclosure | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Easy-Clanpage 2.0 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Easy-Clanpage 2.0 - Blind SQL Injection. Author: Easy Laster |
Analyze the security implications of: Easy-Clanpage 2.0 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Samba 4.5.2 - Symlink Race Permits Opening Files Outside Share Directory | This is a remote exploit for multiple platform. Description: Samba 4.5.2 - Symlink Race Permits Opening Files Outside Share Directory. Author: Google Security Research |
Analyze the security implications of: Samba 4.5.2 - Symlink Race Permits Opening Files Outside Share Directory | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ruijie Reyee Mesh Router - Remote Code Execution (RCE) (Authenticated) | This is a remote exploit for hardware platform. Description: Ruijie Reyee Mesh Router - Remote Code Execution (RCE) (Authenticated). Author: Minh Khoa |
Analyze the security implications of: Ruijie Reyee Mesh Router - Remote Code Execution (RCE) (Authenticated) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: BEWARD N100 H.264 VGA IP Camera M2.1.6 - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for hardware platform. Description: BEWARD N100 H.264 VGA IP Camera M2.1.6 - Cross-Site Request Forgery (Add Admin). Author: LiquidWorm |
Analyze the security implications of: BEWARD N100 H.264 VGA IP Camera M2.1.6 - Cross-Site Request Forgery (Add Admin) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Multiple Platform IPv6 Address Publication - Denial of Service | This is a dos exploit for multiple platform. Description: Multiple Platform IPv6 Address Publication - Denial of Service. Author: Tyler Reguly |
Analyze the security implications of: Multiple Platform IPv6 Address Publication - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ICProjectBidding 1.1 - SQL Injection | This is a webapps exploit for php platform. Description: ICProjectBidding 1.1 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: ICProjectBidding 1.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: aForum 1.32 - 'CommonAbsDir' Remote File Inclusion | This is a webapps exploit for php platform. Description: aForum 1.32 - 'CommonAbsDir' Remote File Inclusion. Author: ThE TiGeR |
Analyze the security implications of: aForum 1.32 - 'CommonAbsDir' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: D-Link - Multiple Vulnerabilities. Author: m-1-k-3 |
Analyze the security implications of: D-Link - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Slackware Linux 3.4 - 'liloconfig-color' Temporary File | This is a local exploit for linux platform. Description: Slackware Linux 3.4 - 'liloconfig-color' Temporary File. Author: neonhaze |
Analyze the security implications of: Slackware Linux 3.4 - 'liloconfig-color' Temporary File | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: OLK Web Store 2020 - Cross-Site Request Forgery | This is a webapps exploit for asp platform. Description: OLK Web Store 2020 - Cross-Site Request Forgery. Author: Joel Aviad Ossi |
Analyze the security implications of: OLK Web Store 2020 - Cross-Site Request Forgery | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Family Connections CMS 2.3.2 - Persistent Cross-Site Scripting / XML Injection | This is a webapps exploit for php platform. Description: Family Connections CMS 2.3.2 - Persistent Cross-Site Scripting / XML Injection. Author: LiquidWorm |
Analyze the security implications of: Family Connections CMS 2.3.2 - Persistent Cross-Site Scripting / XML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Systrace 1.x - Local Policy Bypass | This is a local exploit for linux platform. Description: Systrace 1.x - Local Policy Bypass. Author: Brad |
Analyze the security implications of: Systrace 1.x - Local Policy Bypass | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Mitsubishi Electric & INEA SmartRTU - Reflected Cross-Site Scripting (XSS) | This is a webapps exploit for hardware platform. Description: Mitsubishi Electric & INEA SmartRTU - Reflected Cross-Site Scripting (XSS). Author: Hamit CİBO |
Analyze the security implications of: Mitsubishi Electric & INEA SmartRTU - Reflected Cross-Site Scripting (XSS) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Linux Kernel 2.6.x - Cloned Process 'CLONE_PARENT' Local Origin Validation | This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - Cloned Process 'CLONE_PARENT' Local Origin Validation. Author: Chris Evans |
Analyze the security implications of: Linux Kernel 2.6.x - Cloned Process 'CLONE_PARENT' Local Origin Validation | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: blindblog 1.3.1 - SQL Injection / Authentication Bypass / Local File Inclusion | This is a webapps exploit for php platform. Description: blindblog 1.3.1 - SQL Injection / Authentication Bypass / Local File Inclusion. Author: Salvatore Fresta |
Analyze the security implications of: blindblog 1.3.1 - SQL Injection / Authentication Bypass / Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WebKit JSC - reifyStaticProperty Needs to set the PropertyAttribute::CustomAccessor flag for CustomGetterSetter | This is a dos exploit for multiple platform. Description: WebKit JSC - reifyStaticProperty Needs to set the PropertyAttribute::CustomAccessor flag for CustomGetterSetter. Author: Google Security Research |
Analyze the security implications of: WebKit JSC - reifyStaticProperty Needs to set the PropertyAttribute::CustomAccessor flag for CustomGetterSetter | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.