input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Pegasi Web Server 0.2.2 - Error Page Cross-Site Scripting | This is a remote exploit for linux platform. Description: Pegasi Web Server 0.2.2 - Error Page Cross-Site Scripting. Author: Donato Ferrante |
Analyze the security implications of: Pegasi Web Server 0.2.2 - Error Page Cross-Site Scripting | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Alisveris Sitesi Scripti - 'index.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Alisveris Sitesi Scripti - 'index.asp' Cross-Site Scripting. Author: GeFORC3 |
Analyze the security implications of: Alisveris Sitesi Scripti - 'index.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: macOS < 10.14.3 / iOS < 12.1.3 - Arbitrary mach Port Name Deallocation in XPC Services due to Invalid mach Message Parsing in _xpc_serializer_unpack | This is a dos exploit for multiple platform. Description: macOS < 10.14.3 / iOS < 12.1.3 - Arbitrary mach Port Name Deallocation in XPC Services due to Invalid mach Message Parsing in _xpc_serializer_unpack. Author: Google Security Research |
Analyze the security implications of: macOS < 10.14.3 / iOS < 12.1.3 - Arbitrary mach Port Name Deallocation in XPC Services due to Invalid mach Message Parsing in _xpc_serializer_unpack | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Bang Resto v1.0 - 'Multiple' SQL Injection | This is a webapps exploit for php platform. Description: Bang Resto v1.0 - 'Multiple' SQL Injection. Author: Rahad Chowdhury |
Analyze the security implications of: Bang Resto v1.0 - 'Multiple' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TACK 1.07 - Local Stack Buffer Overflow | This is a dos exploit for linux platform. Description: TACK 1.07 - Local Stack Buffer Overflow. Author: Juan Sacco |
Analyze the security implications of: TACK 1.07 - Local Stack Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Iomega Home Media Network Hard Drive 2.038 < 2.061 - File-system Access | This is a remote exploit for hardware platform. Description: Iomega Home Media Network Hard Drive 2.038 < 2.061 - File-system Access. Author: fizix610 |
Analyze the security implications of: Iomega Home Media Network Hard Drive 2.038 < 2.061 - File-system Access | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Customer Support System 1.0 - _First Name_ & _Last Name_ Stored XSS | This is a webapps exploit for php platform. Description: Customer Support System 1.0 - _First Name_ & _Last Name_ Stored XSS. Author: Saeed Bala Ahmed |
Analyze the security implications of: Customer Support System 1.0 - _First Name_ & _Last Name_ Stored XSS | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GalaxyScripts Mini File Host and DaddyScripts Daddy's File Host - Local File Inclusion | This is a webapps exploit for php platform. Description: GalaxyScripts Mini File Host and DaddyScripts Daddy's File Host - Local File Inclusion. Author: L0n3ly-H34rT |
Analyze the security implications of: GalaxyScripts Mini File Host and DaddyScripts Daddy's File Host - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bash - 'Shellshock' Environment Variables Command Injection | This is a remote exploit for linux platform. Description: Bash - 'Shellshock' Environment Variables Command Injection. Author: Prakhar Prasad & Subho Halder |
Analyze the security implications of: Bash - 'Shellshock' Environment Variables Command Injection | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Metamail 2.7 - Multiple Buffer Overflow / Format String Handling Vulnerabilities | This is a remote exploit for linux platform. Description: Metamail 2.7 - Multiple Buffer Overflow / Format String Handling Vulnerabilities. Author: Ulf Harnhammar |
Analyze the security implications of: Metamail 2.7 - Multiple Buffer Overflow / Format String Handling Vulnerabilities | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CMSimple 3.1 - Local File Inclusion / Arbitrary File Upload | This is a webapps exploit for php platform. Description: CMSimple 3.1 - Local File Inclusion / Arbitrary File Upload. Author: irk4z |
Analyze the security implications of: CMSimple 3.1 - Local File Inclusion / Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASTPP VoIP Billing (4cf207a) - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: ASTPP VoIP Billing (4cf207a) - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: ASTPP VoIP Billing (4cf207a) - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_rpx Ulti RPX 2.1.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_rpx Ulti RPX 2.1.0 - Local File Inclusion. Author: jdc |
Analyze the security implications of: Joomla! Component com_rpx Ulti RPX 2.1.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Infragistics WebHtmlEditor 7.1 - Multiple Vulnerabilities | This is a webapps exploit for asp platform. Description: Infragistics WebHtmlEditor 7.1 - Multiple Vulnerabilities. Author: SpeeDr00t |
Analyze the security implications of: Infragistics WebHtmlEditor 7.1 - Multiple Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Photorange 1.0 iOS - Local File Inclusion | This is a webapps exploit for ios platform. Description: Photorange 1.0 iOS - Local File Inclusion. Author: Vulnerability-Lab |
Analyze the security implications of: Photorange 1.0 iOS - Local File Inclusion | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: SIEMENS IP-Camera CVMS2025-IR / CCMS2025 - Credentials Disclosure | This is a webapps exploit for cgi platform. Description: SIEMENS IP-Camera CVMS2025-IR / CCMS2025 - Credentials Disclosure. Author: Yakir Wizman |
Analyze the security implications of: SIEMENS IP-Camera CVMS2025-IR / CCMS2025 - Credentials Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: ClassSystem 2.0/2.3 - 'HomepageMain.php?teacher_id' SQL Injection | This is a webapps exploit for php platform. Description: ClassSystem 2.0/2.3 - 'HomepageMain.php?teacher_id' SQL Injection. Author: Unohope |
Analyze the security implications of: ClassSystem 2.0/2.3 - 'HomepageMain.php?teacher_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 3 < 5 - Ini_Restore() 'Safe_mode' / 'open_basedir' Restriction Bypass | This is a local exploit for php platform. Description: PHP 3 < 5 - Ini_Restore() 'Safe_mode' / 'open_basedir' Restriction Bypass. Author: Maksymilian Arciemowicz |
Analyze the security implications of: PHP 3 < 5 - Ini_Restore() 'Safe_mode' / 'open_basedir' Restriction Bypass | This exploit targets php systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BroadWorks - Call Detail Record Security Bypass | This is a remote exploit for multiple platform. Description: BroadWorks - Call Detail Record Security Bypass. Author: Nick Freeman |
Analyze the security implications of: BroadWorks - Call Detail Record Security Bypass | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CompactCMS 1.4.1 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: CompactCMS 1.4.1 - Multiple Vulnerabilities. Author: Patrick de Brouwer |
Analyze the security implications of: CompactCMS 1.4.1 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FlashChat F_CMS 4.7.9 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: FlashChat F_CMS 4.7.9 - Multiple Remote File Inclusions. Author: Hasadya Raed |
Analyze the security implications of: FlashChat F_CMS 4.7.9 - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dairy Farm Shop Management System 1.0 - SQL Injection Authentication Bypass | This is a webapps exploit for php platform. Description: Dairy Farm Shop Management System 1.0 - SQL Injection Authentication Bypass. Author: Sanjay Singh |
Analyze the security implications of: Dairy Farm Shop Management System 1.0 - SQL Injection Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Pirelli Discus DRG A125g - Remote Change SSID Value | This is a webapps exploit for hardware platform. Description: Pirelli Discus DRG A125g - Remote Change SSID Value. Author: Sebastián Magof |
Analyze the security implications of: Pirelli Discus DRG A125g - Remote Change SSID Value | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Google Desktop Search - Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Google Desktop Search - Cross-Site Scripting. Author: Salvatore Aranzulla |
Analyze the security implications of: Google Desktop Search - Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cobub Razor 0.8.0 - Physical Path Leakage | This is a webapps exploit for php platform. Description: Cobub Razor 0.8.0 - Physical Path Leakage. Author: Kyhvedn |
Analyze the security implications of: Cobub Razor 0.8.0 - Physical Path Leakage | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Wireshark 1.12.0 < 1.12.12 / 2.0.0 < 2.0.4 - RLC Dissector Denial of Service | This is a dos exploit for multiple platform. Description: Wireshark 1.12.0 < 1.12.12 / 2.0.0 < 2.0.4 - RLC Dissector Denial of Service. Author: Antti Levomäki |
Analyze the security implications of: Wireshark 1.12.0 < 1.12.12 / 2.0.0 < 2.0.4 - RLC Dissector Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla Plugin Simple Image Gallery Extended (SIGE) 3.5.3 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Joomla Plugin Simple Image Gallery Extended (SIGE) 3.5.3 - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: Joomla Plugin Simple Image Gallery Extended (SIGE) 3.5.3 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_radio - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_radio - SQL Injection. Author: DevilZ TM |
Analyze the security implications of: Joomla! Component com_radio - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CiuisCRM 1.6 - 'eventType' SQL Injection | This is a webapps exploit for php platform. Description: CiuisCRM 1.6 - 'eventType' SQL Injection. Author: Mehmet EMIROGLU |
Analyze the security implications of: CiuisCRM 1.6 - 'eventType' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Codefixer MailingListPro - Database Disclosure | This is a webapps exploit for asp platform. Description: Codefixer MailingListPro - Database Disclosure. Author: AlpHaNiX |
Analyze the security implications of: Codefixer MailingListPro - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: RedHat Apache 2.0.40 - Directory Index Default Configuration Error | This is a remote exploit for linux platform. Description: RedHat Apache 2.0.40 - Directory Index Default Configuration Error. Author: TfM |
Analyze the security implications of: RedHat Apache 2.0.40 - Directory Index Default Configuration Error | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Sophos VPN Web Panel 2020 - Denial of Service (Poc) | This is a webapps exploit for multiple platform. Description: Sophos VPN Web Panel 2020 - Denial of Service (Poc). Author: Berk KIRAS |
Analyze the security implications of: Sophos VPN Web Panel 2020 - Denial of Service (Poc) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: SonicWALL GMS/Viewpoint/Analyzer - Authentication Bypass | This is a webapps exploit for multiple platform. Description: SonicWALL GMS/Viewpoint/Analyzer - Authentication Bypass. Author: Nikolas Sotiriu |
Analyze the security implications of: SonicWALL GMS/Viewpoint/Analyzer - Authentication Bypass | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: NextApp Echo < 2.1.1 - XML Injection | This is a remote exploit for multiple platform. Description: NextApp Echo < 2.1.1 - XML Injection. Author: SEC Consult |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.