input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Clever Copy 3.0 - 'postview.php' SQL Injection | This is a webapps exploit for php platform. Description: Clever Copy 3.0 - 'postview.php' SQL Injection. Author: U238 |
Analyze the security implications of: Clever Copy 3.0 - 'postview.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Discuz! - Remote Reset User Password | This is a webapps exploit for php platform. Description: Discuz! - Remote Reset User Password. Author: 80vul |
Analyze the security implications of: Discuz! - Remote Reset User Password | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Elxis CMS 2009 - 'administrator/index.php' URI Cross-Site Scripting | This is a webapps exploit for php platform. Description: Elxis CMS 2009 - 'administrator/index.php' URI Cross-Site Scripting. Author: Ewerson Guimaraes |
Analyze the security implications of: Elxis CMS 2009 - 'administrator/index.php' URI Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Courier Management System 1.0 - 'MULTIPART street ((custom) ' SQL Injection | This is a webapps exploit for php platform. Description: Courier Management System 1.0 - 'MULTIPART street ((custom) ' SQL Injection. Author: Zhaiyi |
Analyze the security implications of: Courier Management System 1.0 - 'MULTIPART street ((custom) ' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Davolink DV-2051 - Multiple Vulnerabilities | This is a webapps exploit for cgi platform. Description: Davolink DV-2051 - Multiple Vulnerabilities. Author: Eric Flokstra |
Analyze the security implications of: Davolink DV-2051 - Multiple Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Cisco DPC2100 - Denial of Service | This is a dos exploit for hardware platform. Description: Cisco DPC2100 - Denial of Service. Author: Daniel Smith |
Analyze the security implications of: Cisco DPC2100 - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Alcatel-Lucent Omnivista 8770 - Remote Code Execution | This is a webapps exploit for php platform. Description: Alcatel-Lucent Omnivista 8770 - Remote Code Execution. Author: 0x1911 |
Analyze the security implications of: Alcatel-Lucent Omnivista 8770 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Wireshark - DIAMETER Dissector Denial of Service | This is a dos exploit for multiple platform. Description: Wireshark - DIAMETER Dissector Denial of Service. Author: Wireshark |
Analyze the security implications of: Wireshark - DIAMETER Dissector Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple XNU Kernel - Memory Corruption due to Integer Overflow in __offsetof Usage in posix_spawn on 32-bit Platforms | This is a dos exploit for multiple platform. Description: Apple XNU Kernel - Memory Corruption due to Integer Overflow in __offsetof Usage in posix_spawn on 32-bit Platforms. Author: Google Security Research |
Analyze the security implications of: Apple XNU Kernel - Memory Corruption due to Integer Overflow in __offsetof Usage in posix_spawn on 32-bit Platforms | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple Mac OSX - OSMetaClassBase::safeMetaCast in IOAccelContext2::connectClient NULL Dereference | This is a dos exploit for osx platform. Description: Apple Mac OSX - OSMetaClassBase::safeMetaCast in IOAccelContext2::connectClient NULL Dereference. Author: Google Security Research |
Analyze the security implications of: Apple Mac OSX - OSMetaClassBase::safeMetaCast in IOAccelContext2::connectClient NULL Dereference | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: IBM Websphere Application Server 7.0.0.13 - Cross-Site Request Forgery | This is a webapps exploit for multiple platform. Description: IBM Websphere Application Server 7.0.0.13 - Cross-Site Request Forgery. Author: Core Security |
Analyze the security implications of: IBM Websphere Application Server 7.0.0.13 - Cross-Site Request Forgery | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apexis IP CAM - Information Disclosure | This is a webapps exploit for hardware platform. Description: Apexis IP CAM - Information Disclosure. Author: Sunplace Solutions |
Analyze the security implications of: Apexis IP CAM - Information Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Maian Weblog 4.0 - Insecure Cookie Handling | This is a webapps exploit for php platform. Description: Maian Weblog 4.0 - Insecure Cookie Handling. Author: S.W.A.T. |
Analyze the security implications of: Maian Weblog 4.0 - Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache 2.4.7 + PHP 7.0.2 - 'openssl_seal()' Uninitialized Memory Code Execution | This is a remote exploit for php platform. Description: Apache 2.4.7 + PHP 7.0.2 - 'openssl_seal()' Uninitialized Memory Code Execution. Author: akat1 |
Analyze the security implications of: Apache 2.4.7 + PHP 7.0.2 - 'openssl_seal()' Uninitialized Memory Code Execution | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DirectAdmin 1.28/1.29 - 'CMD_FTP_SHOW' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DirectAdmin 1.28/1.29 - 'CMD_FTP_SHOW' Cross-Site Scripting. Author: Aria-Security Team |
Analyze the security implications of: DirectAdmin 1.28/1.29 - 'CMD_FTP_SHOW' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Limny 1.01 - Authentication Bypass | This is a webapps exploit for php platform. Description: Limny 1.01 - Authentication Bypass. Author: SirGod |
Analyze the security implications of: Limny 1.01 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: COMMAX UMS Client ActiveX Control 1.7.0.2 - 'CNC_Ctrl.dll' Heap Buffer Overflow | This is a webapps exploit for hardware platform. Description: COMMAX UMS Client ActiveX Control 1.7.0.2 - 'CNC_Ctrl.dll' Heap Buffer Overflow. Author: LiquidWorm |
Analyze the security implications of: COMMAX UMS Client ActiveX Control 1.7.0.2 - 'CNC_Ctrl.dll' Heap Buffer Overflow | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ElasticSearch - Remote Code Execution | This is a remote exploit for linux platform. Description: ElasticSearch - Remote Code Execution. Author: Xiphos Research Ltd |
Analyze the security implications of: ElasticSearch - Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Megabbs Forum 2.2 - SQL Injection / Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Megabbs Forum 2.2 - SQL Injection / Cross-Site Scripting. Author: BugReport.IR |
Analyze the security implications of: Megabbs Forum 2.2 - SQL Injection / Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Shoplazza 1.1 - Stored Cross-Site Scripting (XSS) | This is a webapps exploit for multiple platform. Description: Shoplazza 1.1 - Stored Cross-Site Scripting (XSS). Author: Andrey Stoykov |
Analyze the security implications of: Shoplazza 1.1 - Stored Cross-Site Scripting (XSS) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Photo Battle 1.0.1 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Photo Battle 1.0.1 - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component Photo Battle 1.0.1 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMS Made Simple 2.2.14 - Arbitrary File Upload (Authenticated) | This is a webapps exploit for php platform. Description: CMS Made Simple 2.2.14 - Arbitrary File Upload (Authenticated). Author: Luis Noriega |
Analyze the security implications of: CMS Made Simple 2.2.14 - Arbitrary File Upload (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion | This is a webapps exploit for php platform. Description: Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion. Author: Haboob Team |
Analyze the security implications of: Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SafeTP 1.46 - Passive Mode Internal IP Address Revealing | This is a remote exploit for multiple platform. Description: SafeTP 1.46 - Passive Mode Internal IP Address Revealing. Author: Jonathan G. Lampe |
Analyze the security implications of: SafeTP 1.46 - Passive Mode Internal IP Address Revealing | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Minix 3.1.2a - Local TTY Panic (Denial of Service) | This is a dos exploit for minix platform. Description: Minix 3.1.2a - Local TTY Panic (Denial of Service). Author: kokanin |
Analyze the security implications of: Minix 3.1.2a - Local TTY Panic (Denial of Service) | This exploit targets minix systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets minix platform |
What is this exploit about: eVision CMS 2.0 - Remote Code Execution | This is a webapps exploit for php platform. Description: eVision CMS 2.0 - Remote Code Execution. Author: Osirys |
Analyze the security implications of: eVision CMS 2.0 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RAVPower 2.000.056 - Root Remote Code Execution | This is a remote exploit for hardware platform. Description: RAVPower 2.000.056 - Root Remote Code Execution. Author: Daniele Linguaglossa & Stefano Farletti |
Analyze the security implications of: RAVPower 2.000.056 - Root Remote Code Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Lotus Domino 4.6.1/4.6.4 Notes - SMTPA MTA Mail Relay | This is a dos exploit for multiple platform. Description: Lotus Domino 4.6.1/4.6.4 Notes - SMTPA MTA Mail Relay. Author: Robert Lister |
Analyze the security implications of: Lotus Domino 4.6.1/4.6.4 Notes - SMTPA MTA Mail Relay | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Atom CMS 2.0 - Remote Code Execution (RCE) | This is a webapps exploit for php platform. Description: Atom CMS 2.0 - Remote Code Execution (RCE). Author: Ashish Koli |
Analyze the security implications of: Atom CMS 2.0 - Remote Code Execution (RCE) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DCI-Taskeen 1.03 - 'cat.php' Multiple SQL Injections | This is a webapps exploit for php platform. Description: DCI-Taskeen 1.03 - 'cat.php' Multiple SQL Injections. Author: Linux_Drox |
Analyze the security implications of: DCI-Taskeen 1.03 - 'cat.php' Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Verizon 4G LTE Network Extender - Weak Credentials Algorithm | This is a remote exploit for hardware platform. Description: Verizon 4G LTE Network Extender - Weak Credentials Algorithm. Author: LiquidWorm |
Analyze the security implications of: Verizon 4G LTE Network Extender - Weak Credentials Algorithm | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component JD-Wiki 1.0.2 - 'wantedpages.php?MosConfig_absolute_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component JD-Wiki 1.0.2 - 'wantedpages.php?MosConfig_absolute_path' Remote File Inclusion. Author: DarkbiteX |
Analyze the security implications of: Joomla! Component JD-Wiki 1.0.2 - 'wantedpages.php?MosConfig_absolute_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sony Playstation 4 (PS4) < 7.02 - 'ValidationMessage::buildBubbleTree()' Use-After-Free WebKit Code Execution (PoC) | This is a webapps exploit for hardware platform. Description: Sony Playstation 4 (PS4) < 7.02 - 'ValidationMessage::buildBubbleTree()' Use-After-Free WebKit Code Execution (PoC). Author: ChendoChap |
Analyze the security implications of: Sony Playstation 4 (PS4) < 7.02 - 'ValidationMessage::buildBubbleTree()' Use-After-Free WebKit Code Execution (PoC) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.