input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: aWebNews 1.1 - 'listing.php?path_to_news' Remote File Inclusion | This is a webapps exploit for php platform. Description: aWebNews 1.1 - 'listing.php?path_to_news' Remote File Inclusion. Author: mostafa_ragab |
Analyze the security implications of: aWebNews 1.1 - 'listing.php?path_to_news' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Freeway 1.4.1.171 - '/english/account.php?language' Traversal Local File Inclusion | This is a webapps exploit for php platform. Description: Freeway 1.4.1.171 - '/english/account.php?language' Traversal Local File Inclusion. Author: Digital Security Research Group |
Analyze the security implications of: Freeway 1.4.1.171 - '/english/account.php?language' Traversal Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CPCommerce 1.1.0 - 'id_category' SQL Injection | This is a webapps exploit for php platform. Description: CPCommerce 1.1.0 - 'id_category' SQL Injection. Author: Kacper |
Analyze the security implications of: CPCommerce 1.1.0 - 'id_category' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: cPanel 11.21 - 'wwwact' Privilege Escalation | This is a webapps exploit for php platform. Description: cPanel 11.21 - 'wwwact' Privilege Escalation. Author: Ali Jasbi |
Analyze the security implications of: cPanel 11.21 - 'wwwact' Privilege Escalation | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: KMSoft Guestbook 1.0 - Database Disclosure | This is a webapps exploit for asp platform. Description: KMSoft Guestbook 1.0 - Database Disclosure. Author: LionTurk |
Analyze the security implications of: KMSoft Guestbook 1.0 - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Tiandy IP Cameras 5.56.17.120 - Sensitive Information Disclosure | This is a webapps exploit for hardware platform. Description: Tiandy IP Cameras 5.56.17.120 - Sensitive Information Disclosure. Author: SecuriTeam |
Analyze the security implications of: Tiandy IP Cameras 5.56.17.120 - Sensitive Information Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: SkyPortal Picture Manager 0.11 - Contents Change | This is a webapps exploit for asp platform. Description: SkyPortal Picture Manager 0.11 - Contents Change. Author: ByALBAYX |
Analyze the security implications of: SkyPortal Picture Manager 0.11 - Contents Change | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Snitz Forums 2000 3.x - 'members.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Snitz Forums 2000 3.x - 'members.asp' SQL Injection. Author: acemi |
Analyze the security implications of: Snitz Forums 2000 3.x - 'members.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: EziScript Google Page Rank 1.1 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: EziScript Google Page Rank 1.1 - Cross-Site Scripting. Author: sarabande |
Analyze the security implications of: EziScript Google Page Rank 1.1 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_spsnewsletter - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_spsnewsletter - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component com_spsnewsletter - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Butterfly ORGanizer 2.0.0 - SQL Injection / Cross-Site Scripting | This is a webapps exploit for php platform. Description: Butterfly ORGanizer 2.0.0 - SQL Injection / Cross-Site Scripting. Author: CWH Underground |
Analyze the security implications of: Butterfly ORGanizer 2.0.0 - SQL Injection / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Seagate Central 2014.0410.0026-F - Remote Command Execution | This is a remote exploit for hardware platform. Description: Seagate Central 2014.0410.0026-F - Remote Command Execution. Author: Jeremy Brown |
Analyze the security implications of: Seagate Central 2014.0410.0026-F - Remote Command Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component Directorix Directory Manager 1.1.1 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Directorix Directory Manager 1.1.1 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Directorix Directory Manager 1.1.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: nipper-ng 0.11.10 - Remote Buffer Overflow (PoC) | This is a remote exploit for linux platform. Description: nipper-ng 0.11.10 - Remote Buffer Overflow (PoC). Author: Guy Levin |
Analyze the security implications of: nipper-ng 0.11.10 - Remote Buffer Overflow (PoC) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: python jsonpickle 2.0.0 - Remote Code Execution | This is a remote exploit for multiple platform. Description: python jsonpickle 2.0.0 - Remote Code Execution. Author: Adi Malyanker |
Analyze the security implications of: python jsonpickle 2.0.0 - Remote Code Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Axioscloud Sissiweb Registro Elettronico 7.0.0 - 'Error_desc' Cross-Site Scripting | This is a webapps exploit for aspx platform. Description: Axioscloud Sissiweb Registro Elettronico 7.0.0 - 'Error_desc' Cross-Site Scripting. Author: Dino Barlattani |
Analyze the security implications of: Axioscloud Sissiweb Registro Elettronico 7.0.0 - 'Error_desc' Cross-Site Scripting | This exploit targets aspx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aspx platform |
What is this exploit about: Joomla! Component com_xmovie 1.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_xmovie 1.0 - Local File Inclusion. Author: KelvinX |
Analyze the security implications of: Joomla! Component com_xmovie 1.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: KLiK Social Media Website 1.0 - 'Multiple' SQLi | This is a webapps exploit for php platform. Description: KLiK Social Media Website 1.0 - 'Multiple' SQLi. Author: corpse |
Analyze the security implications of: KLiK Social Media Website 1.0 - 'Multiple' SQLi | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Node.JS - 'node-serialize' Remote Code Execution | This is a remote exploit for linux platform. Description: Node.JS - 'node-serialize' Remote Code Execution. Author: OpSecX |
Analyze the security implications of: Node.JS - 'node-serialize' Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apple Mac OSX 10.4.9 - VPND Local Format String | This is a local exploit for osx platform. Description: Apple Mac OSX 10.4.9 - VPND Local Format String. Author: Chris Anley |
Analyze the security implications of: Apple Mac OSX 10.4.9 - VPND Local Format String | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: eWeather - 'chart' Cross-Site Scripting | This is a webapps exploit for php platform. Description: eWeather - 'chart' Cross-Site Scripting. Author: NetJackal |
Analyze the security implications of: eWeather - 'chart' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Blue Utopia - 'index.php' Local File Inclusion | This is a webapps exploit for php platform. Description: Blue Utopia - 'index.php' Local File Inclusion. Author: PLATEN |
Analyze the security implications of: Blue Utopia - 'index.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ProFTPd 1.2.7 < 1.2.9rc2 - Remote Code Execution / Brute Force | This is a remote exploit for linux platform. Description: ProFTPd 1.2.7 < 1.2.9rc2 - Remote Code Execution / Brute Force. Author: Haggis |
Analyze the security implications of: ProFTPd 1.2.7 < 1.2.9rc2 - Remote Code Execution / Brute Force | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: LittlePhpGallery 1.0.2 - Local File Inclusion | This is a webapps exploit for php platform. Description: LittlePhpGallery 1.0.2 - Local File Inclusion. Author: kire bozorge khavarmian |
Analyze the security implications of: LittlePhpGallery 1.0.2 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WebKit JSC - JSGlobalObject::haveABadTime Causes Type Confusions | This is a dos exploit for multiple platform. Description: WebKit JSC - JSGlobalObject::haveABadTime Causes Type Confusions. Author: Google Security Research |
Analyze the security implications of: WebKit JSC - JSGlobalObject::haveABadTime Causes Type Confusions | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ajax Short URL Script - Authentication Bypass | This is a webapps exploit for php platform. Description: Ajax Short URL Script - Authentication Bypass. Author: Cicklow |
Analyze the security implications of: Ajax Short URL Script - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: KnowGate hipergate 4.0.12 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for jsp platform. Description: KnowGate hipergate 4.0.12 - Multiple Cross-Site Scripting Vulnerabilities. Author: Nahuel Grisolia |
Analyze the security implications of: KnowGate hipergate 4.0.12 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Splunk Enterprise 6.4.3 - Server-Side Request Forgery | This is a webapps exploit for multiple platform. Description: Splunk Enterprise 6.4.3 - Server-Side Request Forgery. Author: Security-Assessment.com |
Analyze the security implications of: Splunk Enterprise 6.4.3 - Server-Side Request Forgery | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: K7 Ultimate Security K7RKScan.sys 17.0.2019 - Denial Of Service (DoS) | This is a remote exploit for multiple platform. Description: K7 Ultimate Security K7RKScan.sys 17.0.2019 - Denial Of Service (DoS). Author: M. Akil Gündoğan |
Analyze the security implications of: K7 Ultimate Security K7RKScan.sys 17.0.2019 - Denial Of Service (DoS) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Atlassian Confluence Widget Connector Macro - Velocity Template Injection (Metasploit) | This is a remote exploit for multiple platform. Description: Atlassian Confluence Widget Connector Macro - Velocity Template Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Atlassian Confluence Widget Connector Macro - Velocity Template Injection (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Webkit JSC: JIT - Uninitialized Variable Access in ArgumentsEliminationPhase::transform | This is a dos exploit for multiple platform. Description: Webkit JSC: JIT - Uninitialized Variable Access in ArgumentsEliminationPhase::transform. Author: Google Security Research |
Analyze the security implications of: Webkit JSC: JIT - Uninitialized Variable Access in ArgumentsEliminationPhase::transform | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: NG WifiTransfer Pro 1.1 - Local File Inclusion | This is a webapps exploit for ios platform. Description: NG WifiTransfer Pro 1.1 - Local File Inclusion. Author: Vulnerability-Lab |
Analyze the security implications of: NG WifiTransfer Pro 1.1 - Local File Inclusion | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: OpenAM 13.0 - LDAP Injection | This is a webapps exploit for java platform. Description: OpenAM 13.0 - LDAP Injection. Author: Charlton Trezevant |
Analyze the security implications of: OpenAM 13.0 - LDAP Injection | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.