input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component PHP-Bridge 1.2.3 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component PHP-Bridge 1.2.3 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component PHP-Bridge 1.2.3 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Python - Interpreter Heap Memory Corruption (PoC) | This is a dos exploit for multiple platform. Description: Python - Interpreter Heap Memory Corruption (PoC). Author: Debasish Mandal |
Analyze the security implications of: Python - Interpreter Heap Memory Corruption (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: SLocate 2.6 - User-Supplied Database Heap Overflow | This is a local exploit for linux platform. Description: SLocate 2.6 - User-Supplied Database Heap Overflow. Author: Patrik Hornik |
Analyze the security implications of: SLocate 2.6 - User-Supplied Database Heap Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: EncapsCMS 0.3.6 - 'config[path]' Remote File Inclusion | This is a webapps exploit for php platform. Description: EncapsCMS 0.3.6 - 'config[path]' Remote File Inclusion. Author: cr4wl3r |
Analyze the security implications of: EncapsCMS 0.3.6 - 'config[path]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MWOpen E-Commerce - 'leggi_commenti.asp' SQL Injection | This is a webapps exploit for asp platform. Description: MWOpen E-Commerce - 'leggi_commenti.asp' SQL Injection. Author: KiNgOfThEwOrLd |
Analyze the security implications of: MWOpen E-Commerce - 'leggi_commenti.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: File Hub 1.9.1 iOS - Multiple Vulnerabilities | This is a webapps exploit for ios platform. Description: File Hub 1.9.1 iOS - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: File Hub 1.9.1 iOS - Multiple Vulnerabilities | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Horde IMP 2.2.x/3.2.x/4.0.x - Email Attachments HTML Injection | This is a remote exploit for linux platform. Description: Horde IMP 2.2.x/3.2.x/4.0.x - Email Attachments HTML Injection. Author: SEC Consult |
Analyze the security implications of: Horde IMP 2.2.x/3.2.x/4.0.x - Email Attachments HTML Injection | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: H3C ER5100 - Authentication Bypass | This is a webapps exploit for asp platform. Description: H3C ER5100 - Authentication Bypass. Author: 128bit |
Analyze the security implications of: H3C ER5100 - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Mitel Audio and Web Conferencing - Command Injection (Metasploit) | This is a remote exploit for linux platform. Description: Mitel Audio and Web Conferencing - Command Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Mitel Audio and Web Conferencing - Command Injection (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: IBM Tealeaf CX 8.8 - Remote OS Command Injection | This is a webapps exploit for php platform. Description: IBM Tealeaf CX 8.8 - Remote OS Command Injection. Author: drone |
Analyze the security implications of: IBM Tealeaf CX 8.8 - Remote OS Command Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Limonade Framework - 'limonade.php' Local File Disclosure | This is a webapps exploit for php platform. Description: Limonade Framework - 'limonade.php' Local File Disclosure. Author: Yashar shahinzadeh |
Analyze the security implications of: Limonade Framework - 'limonade.php' Local File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Office^2 iPhone - '.XLS' Denial of Service | This is a dos exploit for hardware platform. Description: Office^2 iPhone - '.XLS' Denial of Service. Author: Matthew Bergin |
Analyze the security implications of: Office^2 iPhone - '.XLS' Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: SilverStripe 5.3.8 - Stored Cross Site Scripting (XSS) (Authenticated) | This is a webapps exploit for multiple platform. Description: SilverStripe 5.3.8 - Stored Cross Site Scripting (XSS) (Authenticated). Author: James Nicoll |
Analyze the security implications of: SilverStripe 5.3.8 - Stored Cross Site Scripting (XSS) (Authenticated) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AJA Portal 1.2 (Windows) - Local File Inclusion | This is a webapps exploit for php platform. Description: AJA Portal 1.2 (Windows) - Local File Inclusion. Author: ahmadbady |
Analyze the security implications of: AJA Portal 1.2 (Windows) - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sun Java Virtual Machine 1.x - Slash Path Security Model Circumvention | This is a dos exploit for multiple platform. Description: Sun Java Virtual Machine 1.x - Slash Path Security Model Circumvention. Author: Last Stage of Delirium |
Analyze the security implications of: Sun Java Virtual Machine 1.x - Slash Path Security Model Circumvention | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: 8 TOTOLINK Router Models - Backdoor Access / Remote Code Execution | This is a webapps exploit for hardware platform. Description: 8 TOTOLINK Router Models - Backdoor Access / Remote Code Execution. Author: Pierre Kim |
Analyze the security implications of: 8 TOTOLINK Router Models - Backdoor Access / Remote Code Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: WordPress Plugin Creative Contact Form - Arbitrary File Upload (Metasploit) | This is a remote exploit for php platform. Description: WordPress Plugin Creative Contact Form - Arbitrary File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: WordPress Plugin Creative Contact Form - Arbitrary File Upload (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DeepSound 1.0.4 - SQL Injection | This is a webapps exploit for php platform. Description: DeepSound 1.0.4 - SQL Injection. Author: Mehmet EMIROGLU |
Analyze the security implications of: DeepSound 1.0.4 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JBrowser 1.0/2.x - 'browser.php' Directory Traversal | This is a webapps exploit for php platform. Description: JBrowser 1.0/2.x - 'browser.php' Directory Traversal. Author: Himeur Nourredine |
Analyze the security implications of: JBrowser 1.0/2.x - 'browser.php' Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.6.10 < 2.6.31.5 - 'pipe.c' Local Privilege Escalation | This is a local exploit for linux platform. Description: Linux Kernel 2.6.10 < 2.6.31.5 - 'pipe.c' Local Privilege Escalation. Author: spender |
Analyze the security implications of: Linux Kernel 2.6.10 < 2.6.31.5 - 'pipe.c' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Jfrog Artifactory < 4.16 - Arbitrary File Upload / Remote Command Execution | This is a webapps exploit for linux platform. Description: Jfrog Artifactory < 4.16 - Arbitrary File Upload / Remote Command Execution. Author: Alessio Sergi |
Analyze the security implications of: Jfrog Artifactory < 4.16 - Arbitrary File Upload / Remote Command Execution | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Command School Student Management System - '/sw/admin_media_codes_1.php?id' SQL Injection | This is a webapps exploit for php platform. Description: Command School Student Management System - '/sw/admin_media_codes_1.php?id' SQL Injection. Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: Command School Student Management System - '/sw/admin_media_codes_1.php?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Broken Access Control - on NodeBB v3.6.7 | This is a webapps exploit for multiple platform. Description: Broken Access Control - on NodeBB v3.6.7. Author: Vibhor Sharma |
Analyze the security implications of: Broken Access Control - on NodeBB v3.6.7 | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_horses - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_horses - 'id' SQL Injection. Author: Kernel Security Group |
Analyze the security implications of: Joomla! Component com_horses - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Open WebMail 1.x/2.x - Remote Command Execution Variant | This is a remote exploit for linux platform. Description: Open WebMail 1.x/2.x - Remote Command Execution Variant. Author: Nullbyte |
Analyze the security implications of: Open WebMail 1.x/2.x - Remote Command Execution Variant | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AT Computing atsar_linux 1.4 - File Manipulation | This is a local exploit for linux platform. Description: AT Computing atsar_linux 1.4 - File Manipulation. Author: S. Krahmer |
Analyze the security implications of: AT Computing atsar_linux 1.4 - File Manipulation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Leed - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Leed - 'id' SQL Injection. Author: Alexandre Herzog |
Analyze the security implications of: Leed - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: cms (id) 5.0 - SQL Injection | This is a webapps exploit for php platform. Description: cms (id) 5.0 - SQL Injection. Author: spykit |
Analyze the security implications of: cms (id) 5.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dojo Toolkit 1.4.1 - '/doh/runner.html' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for multiple platform. Description: Dojo Toolkit 1.4.1 - '/doh/runner.html' Multiple Cross-Site Scripting Vulnerabilities. Author: Adam Bixby |
Analyze the security implications of: Dojo Toolkit 1.4.1 - '/doh/runner.html' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ClipShare 7.0 - SQL Injection | This is a webapps exploit for php platform. Description: ClipShare 7.0 - SQL Injection. Author: 8bitsec |
Analyze the security implications of: ClipShare 7.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link Routers - UPNP Buffer Overflow | This is a dos exploit for hardware platform. Description: D-Link Routers - UPNP Buffer Overflow. Author: Barnaby Jack |
Analyze the security implications of: D-Link Routers - UPNP Buffer Overflow | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: WU-FTPD 2.6.2 - Remote Command Execution | This is a remote exploit for linux platform. Description: WU-FTPD 2.6.2 - Remote Command Execution. Author: Xpl017Elz |
Analyze the security implications of: WU-FTPD 2.6.2 - Remote Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Sun Java System Web Server 6.1/7.0 - Digest Authentication Remote Buffer Overflow | This is a remote exploit for multiple platform. Description: Sun Java System Web Server 6.1/7.0 - Digest Authentication Remote Buffer Overflow. Author: Intevydis |
Analyze the security implications of: Sun Java System Web Server 6.1/7.0 - Digest Authentication Remote Buffer Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.