input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Elcom CommunityManager.NET - Authentication Bypass
|
This is a webapps exploit for asp platform. Description: Elcom CommunityManager.NET - Authentication Bypass. Author: Sense of Security
|
Analyze the security implications of: Elcom CommunityManager.NET - Authentication Bypass
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: VideoLAN VLC Media Player 1.1.11 - '.EAC3' File Denial of Service
|
This is a dos exploit for multiple platform. Description: VideoLAN VLC Media Player 1.1.11 - '.EAC3' File Denial of Service. Author: Dan Fosco
|
Analyze the security implications of: VideoLAN VLC Media Player 1.1.11 - '.EAC3' File Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CGIScript.net - csMailto Hidden Form Field Remote Command Execution
|
This is a remote exploit for cgi platform. Description: CGIScript.net - csMailto Hidden Form Field Remote Command Execution. Author: Steve Gustin
|
Analyze the security implications of: CGIScript.net - csMailto Hidden Form Field Remote Command Execution
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Adobe Flash Player - ByteArray Use-After-Free (Metasploit)
|
This is a remote exploit for multiple platform. Description: Adobe Flash Player - ByteArray Use-After-Free (Metasploit). Author: Metasploit
|
Analyze the security implications of: Adobe Flash Player - ByteArray Use-After-Free (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: F5 BIG-IP 11.6 SSL Virtual Server - 'Ticketbleed' Memory Disclosure
|
This is a remote exploit for hardware platform. Description: F5 BIG-IP 11.6 SSL Virtual Server - 'Ticketbleed' Memory Disclosure. Author: @0x00string
|
Analyze the security implications of: F5 BIG-IP 11.6 SSL Virtual Server - 'Ticketbleed' Memory Disclosure
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: eStore 1.0.2 - SQL Injection
|
This is a webapps exploit for php platform. Description: eStore 1.0.2 - SQL Injection. Author: R3VAN_BASTARD
|
Analyze the security implications of: eStore 1.0.2 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Magic Deals Web 1.2.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Magic Deals Web 1.2.0 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component Magic Deals Web 1.2.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Alstrasoft Template Seller Pro 3.25 - 'Fullview.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Alstrasoft Template Seller Pro 3.25 - 'Fullview.php' Cross-Site Scripting. Author: night_warrior771
|
Analyze the security implications of: Alstrasoft Template Seller Pro 3.25 - 'Fullview.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ruby 1.9 - 'WEBrick::HTTP::DefaultFileHandler' Crafted HTTP Request Denial of Service
|
This is a dos exploit for multiple platform. Description: Ruby 1.9 - 'WEBrick::HTTP::DefaultFileHandler' Crafted HTTP Request Denial of Service. Author: Keita Yamaguchi
|
Analyze the security implications of: Ruby 1.9 - 'WEBrick::HTTP::DefaultFileHandler' Crafted HTTP Request Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Sage 1.3.6 - Extension Feed HTML Injection
|
This is a remote exploit for multiple platform. Description: Sage 1.3.6 - Extension Feed HTML Injection. Author: Fukumori
|
Analyze the security implications of: Sage 1.3.6 - Extension Feed HTML Injection
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Cacti Superlinks Plugin 1.4-2 - SQL Injection / Local File Inclusion
|
This is a webapps exploit for php platform. Description: Cacti Superlinks Plugin 1.4-2 - SQL Injection / Local File Inclusion. Author: Wireghoul
|
Analyze the security implications of: Cacti Superlinks Plugin 1.4-2 - SQL Injection / Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DS Wireless Communication - Remote Code Execution
|
This is a local exploit for hardware platform. Description: DS Wireless Communication - Remote Code Execution. Author: MikeIsAStar
|
Analyze the security implications of: DS Wireless Communication - Remote Code Execution
|
This exploit targets hardware systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: IT!CMS 0.2 - 'menu-ed.php?wndtitle' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: IT!CMS 0.2 - 'menu-ed.php?wndtitle' Cross-Site Scripting. Author: Aria-Security Team
|
Analyze the security implications of: IT!CMS 0.2 - 'menu-ed.php?wndtitle' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Vizayn Haber - 'haberdetay.asp?id' SQL Injection
|
This is a webapps exploit for asp platform. Description: Vizayn Haber - 'haberdetay.asp?id' SQL Injection. Author: chernobiLe
|
Analyze the security implications of: Vizayn Haber - 'haberdetay.asp?id' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: FusionZONE CouponZONE 4.2 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for cfm platform. Description: FusionZONE CouponZONE 4.2 - Multiple Cross-Site Scripting Vulnerabilities. Author: r0t
|
Analyze the security implications of: FusionZONE CouponZONE 4.2 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets cfm systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cfm platform
|
What is this exploit about: asaher pro 1.0.4 - Remote Database Backup
|
This is a webapps exploit for php platform. Description: asaher pro 1.0.4 - Remote Database Backup. Author: alnjm33
|
Analyze the security implications of: asaher pro 1.0.4 - Remote Database Backup
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel (Debian 7/8/9/10 / Fedora 23/24/25 / CentOS 5.3/5.11/6.0/6.8/7.2.1511) - 'ldso_hwcap Stack Clash' Local Privilege Escalation
|
This is a local exploit for linux_x86 platform. Description: Linux Kernel (Debian 7/8/9/10 / Fedora 23/24/25 / CentOS 5.3/5.11/6.0/6.8/7.2.1511) - 'ldso_hwcap Stack Clash' Local Privilege Escalation. Author: Qualys Corporation
|
Analyze the security implications of: Linux Kernel (Debian 7/8/9/10 / Fedora 23/24/25 / CentOS 5.3/5.11/6.0/6.8/7.2.1511) - 'ldso_hwcap Stack Clash' Local Privilege Escalation
|
This exploit targets linux_x86 systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux_x86 platform
|
What is this exploit about: iOS iFileExplorer Free - Directory Traversal
|
This is a remote exploit for ios platform. Description: iOS iFileExplorer Free - Directory Traversal. Author: theSmallNothin
|
Analyze the security implications of: iOS iFileExplorer Free - Directory Traversal
|
This exploit targets ios systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: WebKit JSC - reifyStaticProperty Needs to set the PropertyAttribute::CustomAccessor flag for CustomGetterSetter
|
This is a dos exploit for multiple platform. Description: WebKit JSC - reifyStaticProperty Needs to set the PropertyAttribute::CustomAccessor flag for CustomGetterSetter. Author: Google Security Research
|
Analyze the security implications of: WebKit JSC - reifyStaticProperty Needs to set the PropertyAttribute::CustomAccessor flag for CustomGetterSetter
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ACGV News 0.9.1 - 'header.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: ACGV News 0.9.1 - 'header.php' Remote File Inclusion. Author: ddoshomo
|
Analyze the security implications of: ACGV News 0.9.1 - 'header.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DHCP Client - Command Injection 'DynoRoot' (Metasploit)
|
This is a remote exploit for linux platform. Description: DHCP Client - Command Injection 'DynoRoot' (Metasploit). Author: Metasploit
|
Analyze the security implications of: DHCP Client - Command Injection 'DynoRoot' (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: WebTrends Enterprise Reporting Server 1.5 - Negative Content Length Denial of Service
|
This is a dos exploit for multiple platform. Description: WebTrends Enterprise Reporting Server 1.5 - Negative Content Length Denial of Service. Author: rpc
|
Analyze the security implications of: WebTrends Enterprise Reporting Server 1.5 - Negative Content Length Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: SWFupload - 'movieName' Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: SWFupload - 'movieName' Cross-Site Scripting. Author: Nathan Partlan
|
Analyze the security implications of: SWFupload - 'movieName' Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component allCineVid 1.0.0 - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component allCineVid 1.0.0 - Blind SQL Injection. Author: Salvatore Fresta
|
Analyze the security implications of: Joomla! Component allCineVid 1.0.0 - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Eclipse Equinoxe OSGi Console - Command Execution (Metasploit)
|
This is a remote exploit for multiple platform. Description: Eclipse Equinoxe OSGi Console - Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Eclipse Equinoxe OSGi Console - Command Execution (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: rgb72 WCMS 1.0 - 'index.php' SQL Injection
|
This is a webapps exploit for asp platform. Description: rgb72 WCMS 1.0 - 'index.php' SQL Injection. Author: CWH Underground
|
Analyze the security implications of: rgb72 WCMS 1.0 - 'index.php' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Symantec AntiVirus - 'dec2lha Library' Remote Stack Buffer Overflow (PoC)
|
This is a dos exploit for multiple platform. Description: Symantec AntiVirus - 'dec2lha Library' Remote Stack Buffer Overflow (PoC). Author: Google Security Research
|
Analyze the security implications of: Symantec AntiVirus - 'dec2lha Library' Remote Stack Buffer Overflow (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: IBM Tivoli Directory Server 6.1.x - Adding 'ibm-globalAdminGroup' Entry Denial of Service
|
This is a dos exploit for multiple platform. Description: IBM Tivoli Directory Server 6.1.x - Adding 'ibm-globalAdminGroup' Entry Denial of Service. Author: anonymous
|
Analyze the security implications of: IBM Tivoli Directory Server 6.1.x - Adding 'ibm-globalAdminGroup' Entry Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: WebKitGTK+ < 2.21.3 - 'WebKitFaviconDatabase' Denial of Service (Metasploit)
|
This is a dos exploit for linux platform. Description: WebKitGTK+ < 2.21.3 - 'WebKitFaviconDatabase' Denial of Service (Metasploit). Author: Dhiraj Mishra
|
Analyze the security implications of: WebKitGTK+ < 2.21.3 - 'WebKitFaviconDatabase' Denial of Service (Metasploit)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component com_kk - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_kk - Blind SQL Injection. Author: Pyske
|
Analyze the security implications of: Joomla! Component com_kk - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: netStartEnterprise 4.0 - SQL Injection
|
This is a webapps exploit for asp platform. Description: netStartEnterprise 4.0 - SQL Injection. Author: L1nK
|
Analyze the security implications of: netStartEnterprise 4.0 - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: LISTSERV 16 - 'SHOWTPL' Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: LISTSERV 16 - 'SHOWTPL' Cross-Site Scripting. Author: Jose Carlos de Arriba
|
Analyze the security implications of: LISTSERV 16 - 'SHOWTPL' Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Screen 4.0.3 (OpenBSD) - Local Authentication Bypass
|
This is a local exploit for linux platform. Description: Screen 4.0.3 (OpenBSD) - Local Authentication Bypass. Author: Rembrandt
|
Analyze the security implications of: Screen 4.0.3 (OpenBSD) - Local Authentication Bypass
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.