input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TalentSoft Web+ Shop 5.0 - 'Deptname' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: TalentSoft Web+ Shop 5.0 - 'Deptname' Cross-Site Scripting. Author: r0t |
Analyze the security implications of: TalentSoft Web+ Shop 5.0 - 'Deptname' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Fiyo CMS 2.0_1.9.1 - SQL Injection | This is a webapps exploit for php platform. Description: Fiyo CMS 2.0_1.9.1 - SQL Injection. Author: cfreer |
Analyze the security implications of: Fiyo CMS 2.0_1.9.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GForge < 4.6b2 - 'skill_delete' SQL Injection | This is a webapps exploit for php platform. Description: GForge < 4.6b2 - 'skill_delete' SQL Injection. Author: Sumit Siddharth |
Analyze the security implications of: GForge < 4.6b2 - 'skill_delete' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 4Images 1.7.1 - SQL Injection | This is a webapps exploit for php platform. Description: 4Images 1.7.1 - SQL Injection. Author: Master Mind |
Analyze the security implications of: 4Images 1.7.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: html-edit CMS 3.1.x - 'html_output' Cross-Site Scripting | This is a webapps exploit for php platform. Description: html-edit CMS 3.1.x - 'html_output' Cross-Site Scripting. Author: KedAns-Dz |
Analyze the security implications of: html-edit CMS 3.1.x - 'html_output' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: b2evolution 6.11.6 - 'redirect_to' Open Redirect | This is a webapps exploit for php platform. Description: b2evolution 6.11.6 - 'redirect_to' Open Redirect. Author: Nakul Ratti |
Analyze the security implications of: b2evolution 6.11.6 - 'redirect_to' Open Redirect | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: postecards - SQL Injection / File Disclosure | This is a webapps exploit for asp platform. Description: postecards - SQL Injection / File Disclosure. Author: AlpHaNiX |
Analyze the security implications of: postecards - SQL Injection / File Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: FOSS Gallery Admin 1.0 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: FOSS Gallery Admin 1.0 - Arbitrary File Upload. Author: Pepelux |
Analyze the security implications of: FOSS Gallery Admin 1.0 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component NeoRecruit 1.4 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component NeoRecruit 1.4 - SQL Injection. Author: v3n0m |
Analyze the security implications of: Joomla! Component NeoRecruit 1.4 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Musicqueue 1.2 - SIGSEGV Signal Handler Insecure File Creation | This is a local exploit for linux platform. Description: Musicqueue 1.2 - SIGSEGV Signal Handler Insecure File Creation. Author: dong-h0un U |
Analyze the security implications of: Musicqueue 1.2 - SIGSEGV Signal Handler Insecure File Creation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: leaftec CMS - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: leaftec CMS - Multiple Vulnerabilities. Author: Valentin |
Analyze the security implications of: leaftec CMS - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Geeklog 1.3.5 - HTML Attribute Cross-Site Scripting | This is a webapps exploit for php platform. Description: Geeklog 1.3.5 - HTML Attribute Cross-Site Scripting. Author: Ulf Harnhammar |
Analyze the security implications of: Geeklog 1.3.5 - HTML Attribute Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BlackBerry Enterprise Service < 12.4 (BES12) Self-Service - Multiple Vulnerabilities | This is a webapps exploit for java platform. Description: BlackBerry Enterprise Service < 12.4 (BES12) Self-Service - Multiple Vulnerabilities. Author: Security-Assessment.com |
Analyze the security implications of: BlackBerry Enterprise Service < 12.4 (BES12) Self-Service - Multiple Vulnerabilities | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: NetWin DBabble 2.5 i - Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: NetWin DBabble 2.5 i - Cross-Site Scripting. Author: dr_insane |
Analyze the security implications of: NetWin DBabble 2.5 i - Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Edimax PS-1206MF - Web Admin Authentication Bypass | This is a webapps exploit for hardware platform. Description: Edimax PS-1206MF - Web Admin Authentication Bypass. Author: smash |
Analyze the security implications of: Edimax PS-1206MF - Web Admin Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Linux Kernel 2.6.x (Sparc64) - '/proc/iomem' Local Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x (Sparc64) - '/proc/iomem' Local Denial of Service. Author: Mikulas Patocka |
Analyze the security implications of: Linux Kernel 2.6.x (Sparc64) - '/proc/iomem' Local Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PHP 5.3.x < 5.3.2 - 'ext/phar/stream.c' / 'ext/phar/dirstream.c' Multiple Format String Vulnerabilities | This is a remote exploit for php platform. Description: PHP 5.3.x < 5.3.2 - 'ext/phar/stream.c' / 'ext/phar/dirstream.c' Multiple Format String Vulnerabilities. Author: Stefan Esser |
Analyze the security implications of: PHP 5.3.x < 5.3.2 - 'ext/phar/stream.c' / 'ext/phar/dirstream.c' Multiple Format String Vulnerabilities | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Eir D1000 Wireless Router - WAN Side Remote Command Injection (Metasploit) | This is a remote exploit for linux_mips platform. Description: Eir D1000 Wireless Router - WAN Side Remote Command Injection (Metasploit). Author: Kenzo |
Analyze the security implications of: Eir D1000 Wireless Router - WAN Side Remote Command Injection (Metasploit) | This exploit targets linux_mips systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux_mips platform |
What is this exploit about: Lms 1.5.x - 'RTMessageAdd.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Lms 1.5.x - 'RTMessageAdd.php' Remote File Inclusion. Author: InyeXion |
Analyze the security implications of: Lms 1.5.x - 'RTMessageAdd.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SecurEnvoy SecurMail 9.1.501 - Multiple Vulnerabilities | This is a webapps exploit for aspx platform. Description: SecurEnvoy SecurMail 9.1.501 - Multiple Vulnerabilities. Author: SEC Consult |
Analyze the security implications of: SecurEnvoy SecurMail 9.1.501 - Multiple Vulnerabilities | This exploit targets aspx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aspx platform |
What is this exploit about: Tenda W3002R/A302/w309r Wireless Router v5.07.64_en - Remote DNS Change (PoC) | This is a webapps exploit for asp platform. Description: Tenda W3002R/A302/w309r Wireless Router v5.07.64_en - Remote DNS Change (PoC). Author: Todor Donev |
Analyze the security implications of: Tenda W3002R/A302/w309r Wireless Router v5.07.64_en - Remote DNS Change (PoC) | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: YaBB 1 - Invalid Topic Error Page Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: YaBB 1 - Invalid Topic Error Page Cross-Site Scripting. Author: methodic |
Analyze the security implications of: YaBB 1 - Invalid Topic Error Page Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: PHP 5.3 - 'preg_match()' Full Path Disclosure | This is a remote exploit for php platform. Description: PHP 5.3 - 'preg_match()' Full Path Disclosure. Author: David Vieira-Kurz |
Analyze the security implications of: PHP 5.3 - 'preg_match()' Full Path Disclosure | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Docker - Container Escape | This is a local exploit for linux platform. Description: Docker - Container Escape. Author: dominikczarnotatob |
Analyze the security implications of: Docker - Container Escape | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Banana Dance CMS and Wiki - SQL Injection | This is a webapps exploit for php platform. Description: Banana Dance CMS and Wiki - SQL Injection. Author: Aodrulez |
Analyze the security implications of: Banana Dance CMS and Wiki - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Flat Chat 2.0 - 'include online.txt' Remote Code Execution | This is a webapps exploit for php platform. Description: Flat Chat 2.0 - 'include online.txt' Remote Code Execution. Author: Dj7xpl |
Analyze the security implications of: Flat Chat 2.0 - 'include online.txt' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Youbin 2.5/3.0/3.4 - 'HOME' Buffer Overflow | This is a local exploit for freebsd platform. Description: Youbin 2.5/3.0/3.4 - 'HOME' Buffer Overflow. Author: Knud Erik Hojgaard |
Analyze the security implications of: Youbin 2.5/3.0/3.4 - 'HOME' Buffer Overflow | This exploit targets freebsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: DIGITAL UNIX 4.0 d/f / AIX 4.3.2 / CDE 2.1 / IRIX 6.5.14 / Solaris 7.0 / SunOS 4.1.4 - Local Buffer Overflow | This is a local exploit for linux platform. Description: DIGITAL UNIX 4.0 d/f / AIX 4.3.2 / CDE 2.1 / IRIX 6.5.14 / Solaris 7.0 / SunOS 4.1.4 - Local Buffer Overflow. Author: Job de Haas of ITSX |
Analyze the security implications of: DIGITAL UNIX 4.0 d/f / AIX 4.3.2 / CDE 2.1 / IRIX 6.5.14 / Solaris 7.0 / SunOS 4.1.4 - Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: GlassFish Application Server - '/resourceNode/jmsDestinationNew.jsf' Multiple Cross-Site Scripting Vulnerabilities | This is a remote exploit for multiple platform. Description: GlassFish Application Server - '/resourceNode/jmsDestinationNew.jsf' Multiple Cross-Site Scripting Vulnerabilities. Author: Eduardo Jorge |
Analyze the security implications of: GlassFish Application Server - '/resourceNode/jmsDestinationNew.jsf' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BoxBilling<=4.22.1.5 - Remote Code Execution (RCE) | This is a webapps exploit for php platform. Description: BoxBilling<=4.22.1.5 - Remote Code Execution (RCE). Author: zetc0de |
Analyze the security implications of: BoxBilling<=4.22.1.5 - Remote Code Execution (RCE) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM Tivoli Access Manager for E-Business - '/ivt/ivtserver?parm1' Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: IBM Tivoli Access Manager for E-Business - '/ivt/ivtserver?parm1' Cross-Site Scripting. Author: IBM |
Analyze the security implications of: IBM Tivoli Access Manager for E-Business - '/ivt/ivtserver?parm1' Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Linux Kernel 2.2 - 'ldd core' Force Reboot (Denial of Service) | This is a dos exploit for linux platform. Description: Linux Kernel 2.2 - 'ldd core' Force Reboot (Denial of Service). Author: Dan Burcaw |
Analyze the security implications of: Linux Kernel 2.2 - 'ldd core' Force Reboot (Denial of Service) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Amanda 3.3.1 - 'amstar' Command Injection Privilege Escalation | This is a local exploit for linux platform. Description: Amanda 3.3.1 - 'amstar' Command Injection Privilege Escalation. Author: Hacker Fantastic |
Analyze the security implications of: Amanda 3.3.1 - 'amstar' Command Injection Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.