input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: pkexec - Race Condition Privilege Escalation
|
This is a local exploit for linux platform. Description: pkexec - Race Condition Privilege Escalation. Author: xi4oyu
|
Analyze the security implications of: pkexec - Race Condition Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ASP-Rider 1.6 - 'default.asp' SQL Injection
|
This is a webapps exploit for php platform. Description: ASP-Rider 1.6 - 'default.asp' SQL Injection. Author: info@hoder.com
|
Analyze the security implications of: ASP-Rider 1.6 - 'default.asp' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: iScripts VisualCaster - SQL Injection
|
This is a webapps exploit for php platform. Description: iScripts VisualCaster - SQL Injection. Author: Sid3^effects
|
Analyze the security implications of: iScripts VisualCaster - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: dotProject 2.1.3 - Multiple SQL Injections / HTML Injection Vulnerabilities
|
This is a webapps exploit for php platform. Description: dotProject 2.1.3 - Multiple SQL Injections / HTML Injection Vulnerabilities. Author: Justin C. Klein Keane
|
Analyze the security implications of: dotProject 2.1.3 - Multiple SQL Injections / HTML Injection Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: suPHP 0.7 - 'suPHP_ConfigPath' / 'Safe_Mode()' Restriction Bypass
|
This is a local exploit for php platform. Description: suPHP 0.7 - 'suPHP_ConfigPath' / 'Safe_Mode()' Restriction Bypass. Author: Mr.SaFa7
|
Analyze the security implications of: suPHP 0.7 - 'suPHP_ConfigPath' / 'Safe_Mode()' Restriction Bypass
|
This exploit targets php systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: D-Link DIR-825 (vC) - Multiple Vulnerabilities
|
This is a remote exploit for hardware platform. Description: D-Link DIR-825 (vC) - Multiple Vulnerabilities. Author: Samuel Huntley
|
Analyze the security implications of: D-Link DIR-825 (vC) - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: GeoBlog MOD_1.0 - 'deleteblog.php?id' Arbitrary Blog Deletion
|
This is a webapps exploit for php platform. Description: GeoBlog MOD_1.0 - 'deleteblog.php?id' Arbitrary Blog Deletion. Author: joseph.giron13
|
Analyze the security implications of: GeoBlog MOD_1.0 - 'deleteblog.php?id' Arbitrary Blog Deletion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: EPSON TMNet WebConfig 1.00 - Cross-Site Scripting
|
This is a webapps exploit for hardware platform. Description: EPSON TMNet WebConfig 1.00 - Cross-Site Scripting. Author: Michael Benich
|
Analyze the security implications of: EPSON TMNet WebConfig 1.00 - Cross-Site Scripting
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: AROX School ERP PHP Script - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: AROX School ERP PHP Script - 'id' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: AROX School ERP PHP Script - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: letodms 3.3.6 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: letodms 3.3.6 - Multiple Vulnerabilities. Author: Shai rod
|
Analyze the security implications of: letodms 3.3.6 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: E2 Photo Gallery 0.9 - 'index.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: E2 Photo Gallery 0.9 - 'index.php' Cross-Site Scripting. Author: High-Tech Bridge SA
|
Analyze the security implications of: E2 Photo Gallery 0.9 - 'index.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Tdarr 2.00.15 - Command Injection
|
This is a remote exploit for multiple platform. Description: Tdarr 2.00.15 - Command Injection. Author: Sam Smith
|
Analyze the security implications of: Tdarr 2.00.15 - Command Injection
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: SonicWall SMA 10.2.1.0-17sv - Password Reset
|
This is a webapps exploit for hardware platform. Description: SonicWall SMA 10.2.1.0-17sv - Password Reset. Author: Jacob Baines
|
Analyze the security implications of: SonicWall SMA 10.2.1.0-17sv - Password Reset
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: facebook newsroom CMS 0.5.0 Beta 1 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: facebook newsroom CMS 0.5.0 Beta 1 - Remote File Inclusion. Author: Ciph3r
|
Analyze the security implications of: facebook newsroom CMS 0.5.0 Beta 1 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mozilla Firefox 8.0 - Null Pointer Dereference (PoC)
|
This is a dos exploit for multiple platform. Description: Mozilla Firefox 8.0 - Null Pointer Dereference (PoC). Author: 0in
|
Analyze the security implications of: Mozilla Firefox 8.0 - Null Pointer Dereference (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Auxilium PetRatePro - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Auxilium PetRatePro - Multiple Vulnerabilities. Author: DaOne
|
Analyze the security implications of: Auxilium PetRatePro - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Hogstorps Guestbook 2.0 - Unauthorized Access
|
This is a webapps exploit for asp platform. Description: Hogstorps Guestbook 2.0 - Unauthorized Access. Author: omnipresent
|
Analyze the security implications of: Hogstorps Guestbook 2.0 - Unauthorized Access
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Local Services Search Engine Management System (LSSMES) 1.0 - Blind & Error based SQL injection (Authenticated)
|
This is a webapps exploit for php platform. Description: Local Services Search Engine Management System (LSSMES) 1.0 - Blind & Error based SQL injection (Authenticated). Author: Tushar Vaidya
|
Analyze the security implications of: Local Services Search Engine Management System (LSSMES) 1.0 - Blind & Error based SQL injection (Authenticated)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ASP-DEV XM Forum RC3 - IMG Tag Script Injection
|
This is a webapps exploit for asp platform. Description: ASP-DEV XM Forum RC3 - IMG Tag Script Injection. Author: Zinho
|
Analyze the security implications of: ASP-DEV XM Forum RC3 - IMG Tag Script Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Virtual Store Open 3.0 - Acess SQL Injection
|
This is a webapps exploit for asp platform. Description: Virtual Store Open 3.0 - Acess SQL Injection. Author: Br0ly
|
Analyze the security implications of: Virtual Store Open 3.0 - Acess SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: GeekLog 1.5.0 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: GeekLog 1.5.0 - Arbitrary File Upload. Author: t0pP8uZz
|
Analyze the security implications of: GeekLog 1.5.0 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Quagga Routing Software Suite 0.9x - RIPd RIPv1 Request Routing Table Disclosure
|
This is a remote exploit for linux platform. Description: Quagga Routing Software Suite 0.9x - RIPd RIPv1 Request Routing Table Disclosure. Author: Konstantin V. Gavrilenko
|
Analyze the security implications of: Quagga Routing Software Suite 0.9x - RIPd RIPv1 Request Routing Table Disclosure
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: EyouCMS 1.4.6 - Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: EyouCMS 1.4.6 - Persistent Cross-Site Scripting. Author: China Banking and Insurance Information Technology Management Co.
|
Analyze the security implications of: EyouCMS 1.4.6 - Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 2DayBiz Businesscard Script - Authentication Bypass
|
This is a webapps exploit for php platform. Description: 2DayBiz Businesscard Script - Authentication Bypass. Author: D4rk357
|
Analyze the security implications of: 2DayBiz Businesscard Script - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CSP MySQL User Manager 2.3.1 - Authentication Bypass
|
This is a webapps exploit for linux platform. Description: CSP MySQL User Manager 2.3.1 - Authentication Bypass. Author: Youssef Mami
|
Analyze the security implications of: CSP MySQL User Manager 2.3.1 - Authentication Bypass
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Western Digital My Cloud 04.01.03-421/04.01.04-422 - Command Injection
|
This is a webapps exploit for hardware platform. Description: Western Digital My Cloud 04.01.03-421/04.01.04-422 - Command Injection. Author: absane
|
Analyze the security implications of: Western Digital My Cloud 04.01.03-421/04.01.04-422 - Command Injection
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: DomPHP 0.83 - SQL Injection
|
This is a webapps exploit for php platform. Description: DomPHP 0.83 - SQL Injection. Author: Houssamix
|
Analyze the security implications of: DomPHP 0.83 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Project Log 1.5.3 - 'search' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Project Log 1.5.3 - 'search' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component Project Log 1.5.3 - 'search' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Bludit 4.0.0-rc-2 - Account takeover
|
This is a webapps exploit for php platform. Description: Bludit 4.0.0-rc-2 - Account takeover. Author: nu11secur1ty
|
Analyze the security implications of: Bludit 4.0.0-rc-2 - Account takeover
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FTP Sprite 1.2.1 iOS - Persistent Cross-Site Scripting
|
This is a webapps exploit for ios platform. Description: FTP Sprite 1.2.1 iOS - Persistent Cross-Site Scripting. Author: Vulnerability-Lab
|
Analyze the security implications of: FTP Sprite 1.2.1 iOS - Persistent Cross-Site Scripting
|
This exploit targets ios systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: MacOS 320.whatis Script - Privilege Escalation
|
This is a local exploit for macos platform. Description: MacOS 320.whatis Script - Privilege Escalation. Author: Csaba Fitzl
|
Analyze the security implications of: MacOS 320.whatis Script - Privilege Escalation
|
This exploit targets macos systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets macos platform
|
What is this exploit about: Airlock WAF 4.2.4 - Overlong UTF-8 Sequence Bypass
|
This is a dos exploit for multiple platform. Description: Airlock WAF 4.2.4 - Overlong UTF-8 Sequence Bypass. Author: SEC Consult
|
Analyze the security implications of: Airlock WAF 4.2.4 - Overlong UTF-8 Sequence Bypass
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: D-Link DIR-615 vE4 Firmware 5.10 - Cross-Site Request Forgery
|
This is a webapps exploit for hardware platform. Description: D-Link DIR-615 vE4 Firmware 5.10 - Cross-Site Request Forgery. Author: Dhruv Shah
|
Analyze the security implications of: D-Link DIR-615 vE4 Firmware 5.10 - Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.