input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: EXPBlog 0.3.5 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: EXPBlog 0.3.5 - Multiple Cross-Site Scripting Vulnerabilities. Author: Tamriel
|
Analyze the security implications of: EXPBlog 0.3.5 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: E-Guest 1.1 - Server Side Include Arbitrary Command Execution
|
This is a remote exploit for linux platform. Description: E-Guest 1.1 - Server Side Include Arbitrary Command Execution. Author: DownBload
|
Analyze the security implications of: E-Guest 1.1 - Server Side Include Arbitrary Command Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: JGBBS 3.0beta1 - 'search.asp?author' SQL Injection
|
This is a webapps exploit for asp platform. Description: JGBBS 3.0beta1 - 'search.asp?author' SQL Injection. Author: WiLdBoY
|
Analyze the security implications of: JGBBS 3.0beta1 - 'search.asp?author' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Telerik UI - Remote Code Execution via Insecure Deserialization
|
This is a webapps exploit for aspx platform. Description: Telerik UI - Remote Code Execution via Insecure Deserialization. Author: Bishop Fox
|
Analyze the security implications of: Telerik UI - Remote Code Execution via Insecure Deserialization
|
This exploit targets aspx systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aspx platform
|
What is this exploit about: IBM AIX 4.3.3/5.1/5.2 - 'libIM' Buffer Overflow
|
This is a dos exploit for aix platform. Description: IBM AIX 4.3.3/5.1/5.2 - 'libIM' Buffer Overflow. Author: Euan Briggs
|
Analyze the security implications of: IBM AIX 4.3.3/5.1/5.2 - 'libIM' Buffer Overflow
|
This exploit targets aix systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aix platform
|
What is this exploit about: Joomla! Component Inneradmission - 'index.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Inneradmission - 'index.php' SQL Injection. Author: Lazmania61
|
Analyze the security implications of: Joomla! Component Inneradmission - 'index.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: iTechscripts Freelancer Script 5.11 - 'sk' SQL Injection
|
This is a webapps exploit for php platform. Description: iTechscripts Freelancer Script 5.11 - 'sk' SQL Injection. Author: v3n0m
|
Analyze the security implications of: iTechscripts Freelancer Script 5.11 - 'sk' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Samsung PS50C7700 TV - Denial of Service
|
This is a dos exploit for hardware platform. Description: Samsung PS50C7700 TV - Denial of Service. Author: Malik Mesellem
|
Analyze the security implications of: Samsung PS50C7700 TV - Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component IDoEditor - 'image.php' Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Joomla! Component IDoEditor - 'image.php' Arbitrary File Upload. Author: Sammy FORGIT
|
Analyze the security implications of: Joomla! Component IDoEditor - 'image.php' Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DMANews 0.9 - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: DMANews 0.9 - Multiple SQL Injections. Author: r0t
|
Analyze the security implications of: DMANews 0.9 - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mambo Component 'com_a6mambohelpdesk' 18RC1 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Mambo Component 'com_a6mambohelpdesk' 18RC1 - Remote File Inclusion. Author: Dr.Jr7
|
Analyze the security implications of: Mambo Component 'com_a6mambohelpdesk' 18RC1 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple Mac OSX / iOS - NECP System Control Socket Packet Parsing Kernel Code Execution Integer Overflow
|
This is a dos exploit for multiple platform. Description: Apple Mac OSX / iOS - NECP System Control Socket Packet Parsing Kernel Code Execution Integer Overflow. Author: Google Security Research
|
Analyze the security implications of: Apple Mac OSX / iOS - NECP System Control Socket Packet Parsing Kernel Code Execution Integer Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Nexus Repository Manager - Java EL Injection RCE (Metasploit)
|
This is a remote exploit for linux platform. Description: Nexus Repository Manager - Java EL Injection RCE (Metasploit). Author: Metasploit
|
Analyze the security implications of: Nexus Repository Manager - Java EL Injection RCE (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component com_bt_media 1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_bt_media 1.0 - SQL Injection. Author: Persian Hack Team
|
Analyze the security implications of: Joomla! Component com_bt_media 1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Websense Appliance Manager - Command Injection
|
This is a webapps exploit for java platform. Description: Websense Appliance Manager - Command Injection. Author: Han Sahin
|
Analyze the security implications of: Websense Appliance Manager - Command Injection
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Joomla! Component RSfiles 1.0.2 - 'path' File Download
|
This is a webapps exploit for php platform. Description: Joomla! Component RSfiles 1.0.2 - 'path' File Download. Author: ajann
|
Analyze the security implications of: Joomla! Component RSfiles 1.0.2 - 'path' File Download
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple WebKit - Type Confusion in RenderBox with Accessibility Enabled
|
This is a dos exploit for multiple platform. Description: Apple WebKit - Type Confusion in RenderBox with Accessibility Enabled. Author: Google Security Research
|
Analyze the security implications of: Apple WebKit - Type Confusion in RenderBox with Accessibility Enabled
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: GlassFish Enterprise Server 2.1 - Admin Console /customMBeans/customMBeans.jsf URI Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: GlassFish Enterprise Server 2.1 - Admin Console /customMBeans/customMBeans.jsf URI Cross-Site Scripting. Author: DSecRG
|
Analyze the security implications of: GlassFish Enterprise Server 2.1 - Admin Console /customMBeans/customMBeans.jsf URI Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Mozilla Firefox 3.0.14 - Remote Memory Corruption
|
This is a dos exploit for linux platform. Description: Mozilla Firefox 3.0.14 - Remote Memory Corruption. Author: Carsten Book
|
Analyze the security implications of: Mozilla Firefox 3.0.14 - Remote Memory Corruption
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Adobe Acrobat 9.1.1 (OSX/Windows) - Stack Overflow Crash (PoC)
|
This is a dos exploit for multiple platform. Description: Adobe Acrobat 9.1.1 (OSX/Windows) - Stack Overflow Crash (PoC). Author: Saint Patrick
|
Analyze the security implications of: Adobe Acrobat 9.1.1 (OSX/Windows) - Stack Overflow Crash (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: dirLIST 0.3.0 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: dirLIST 0.3.0 - Local File Inclusion. Author: L0n3ly-H34rT
|
Analyze the security implications of: dirLIST 0.3.0 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ComicShout 2.8 - 'news_id' SQL Injection
|
This is a webapps exploit for php platform. Description: ComicShout 2.8 - 'news_id' SQL Injection. Author: JosS
|
Analyze the security implications of: ComicShout 2.8 - 'news_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component iF Portfolio Nexus - 'Controller' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component iF Portfolio Nexus - 'Controller' Remote File Inclusion. Author: F10riX
|
Analyze the security implications of: Joomla! Component iF Portfolio Nexus - 'Controller' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Confixx 3.0/3.1 - 'index.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Confixx 3.0/3.1 - 'index.php' Cross-Site Scripting. Author: LoK-Crew
|
Analyze the security implications of: Confixx 3.0/3.1 - 'index.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ntpdc 4.2.6p3 - Local Buffer Overflow
|
This is a local exploit for multiple platform. Description: Ntpdc 4.2.6p3 - Local Buffer Overflow. Author: drone
|
Analyze the security implications of: Ntpdc 4.2.6p3 - Local Buffer Overflow
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Ez Poll Hoster - Multiple Cross-Site Scripting / Cross-Site Request Forgery Vulnerabilities
|
This is a webapps exploit for php platform. Description: Ez Poll Hoster - Multiple Cross-Site Scripting / Cross-Site Request Forgery Vulnerabilities. Author: Milos Zivanovic
|
Analyze the security implications of: Ez Poll Hoster - Multiple Cross-Site Scripting / Cross-Site Request Forgery Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: iOS 12.4 - Sandbox Escape due to Integer Overflow in mediaserverd
|
This is a dos exploit for ios platform. Description: iOS 12.4 - Sandbox Escape due to Integer Overflow in mediaserverd. Author: Google Security Research
|
Analyze the security implications of: iOS 12.4 - Sandbox Escape due to Integer Overflow in mediaserverd
|
This exploit targets ios systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: Luftguitar CMS - Upload Arbitrary File
|
This is a webapps exploit for asp platform. Description: Luftguitar CMS - Upload Arbitrary File. Author: Abysssec
|
Analyze the security implications of: Luftguitar CMS - Upload Arbitrary File
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: UUCP - File Creation/Overwriting Symlinks
|
This is a local exploit for linux platform. Description: UUCP - File Creation/Overwriting Symlinks. Author: t--zen
|
Analyze the security implications of: UUCP - File Creation/Overwriting Symlinks
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: FlatNuke 2.5.5 - 'footer.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: FlatNuke 2.5.5 - 'footer.php' Multiple Cross-Site Scripting Vulnerabilities. Author: rgod
|
Analyze the security implications of: FlatNuke 2.5.5 - 'footer.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Croogo 3.0.2 - Remote Code Execution (Authenticated)
|
This is a webapps exploit for php platform. Description: Croogo 3.0.2 - Remote Code Execution (Authenticated). Author: Deha Berkin Bir
|
Analyze the security implications of: Croogo 3.0.2 - Remote Code Execution (Authenticated)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Motorola Wimax modem CPEi300 - File Disclosure / Cross-Site Scripting
|
This is a remote exploit for hardware platform. Description: Motorola Wimax modem CPEi300 - File Disclosure / Cross-Site Scripting. Author: Usman Saeed
|
Analyze the security implications of: Motorola Wimax modem CPEi300 - File Disclosure / Cross-Site Scripting
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Baal Systems 3.8 - Authentication Bypass
|
This is a webapps exploit for php platform. Description: Baal Systems 3.8 - Authentication Bypass. Author: cr4wl3r
|
Analyze the security implications of: Baal Systems 3.8 - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.