input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: FishCart 3.1 - 'display.php?nlst' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: FishCart 3.1 - 'display.php?nlst' Cross-Site Scripting. Author: Dcrab
|
Analyze the security implications of: FishCart 3.1 - 'display.php?nlst' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Extra Search 2.2.8 - 'establename' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Extra Search 2.2.8 - 'establename' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component Extra Search 2.2.8 - 'establename' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: OpenSC 0.11.x - PKCS#11 Implementation Unauthorized Access
|
This is a local exploit for linux platform. Description: OpenSC 0.11.x - PKCS#11 Implementation Unauthorized Access. Author: Andreas Jellinghaus
|
Analyze the security implications of: OpenSC 0.11.x - PKCS#11 Implementation Unauthorized Access
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Slackware Linux 3.4 - 'netconfig' Temporary File
|
This is a local exploit for linux platform. Description: Slackware Linux 3.4 - 'netconfig' Temporary File. Author: neonhaze
|
Analyze the security implications of: Slackware Linux 3.4 - 'netconfig' Temporary File
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Event Manager Admin panel - 'events_new.php' SQL injection
|
This is a webapps exploit for php platform. Description: Event Manager Admin panel - 'events_new.php' SQL injection. Author: telahdihapus
|
Analyze the security implications of: Event Manager Admin panel - 'events_new.php' SQL injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ASAN/SUID - Local Privilege Escalation
|
This is a local exploit for multiple platform. Description: ASAN/SUID - Local Privilege Escalation. Author: bcoles
|
Analyze the security implications of: ASAN/SUID - Local Privilege Escalation
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: tnftp (FreeBSD 8/9/10) - 'tnftp' Client Side
|
This is a remote exploit for bsd platform. Description: tnftp (FreeBSD 8/9/10) - 'tnftp' Client Side. Author: dash
|
Analyze the security implications of: tnftp (FreeBSD 8/9/10) - 'tnftp' Client Side
|
This exploit targets bsd systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets bsd platform
|
What is this exploit about: Joomla! Component FlippingBook 1.0.4 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component FlippingBook 1.0.4 - SQL Injection. Author: cO2
|
Analyze the security implications of: Joomla! Component FlippingBook 1.0.4 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Maian Weblog 4.0 - Cross-Site Request Forgery (Add New Post)
|
This is a webapps exploit for php platform. Description: Maian Weblog 4.0 - Cross-Site Request Forgery (Add New Post). Author: Besim
|
Analyze the security implications of: Maian Weblog 4.0 - Cross-Site Request Forgery (Add New Post)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ArticleSetup Article Script 1.00 - SQL Injection
|
This is a webapps exploit for php platform. Description: ArticleSetup Article Script 1.00 - SQL Injection. Author: Linux Zone Research Team
|
Analyze the security implications of: ArticleSetup Article Script 1.00 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GUnet OpenEclass E-learning platform 1.7.3 - 'uname' SQL Injection
|
This is a webapps exploit for php platform. Description: GUnet OpenEclass E-learning platform 1.7.3 - 'uname' SQL Injection. Author: emaragkos
|
Analyze the security implications of: GUnet OpenEclass E-learning platform 1.7.3 - 'uname' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GNU Mailman 2.0.x - Subscribe Cross-Site Scripting
|
This is a remote exploit for cgi platform. Description: GNU Mailman 2.0.x - Subscribe Cross-Site Scripting. Author: office
|
Analyze the security implications of: GNU Mailman 2.0.x - Subscribe Cross-Site Scripting
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Flax Article Manager 1.1 - Remote PHP Script Upload
|
This is a webapps exploit for php platform. Description: Flax Article Manager 1.1 - Remote PHP Script Upload. Author: S.W.A.T.
|
Analyze the security implications of: Flax Article Manager 1.1 - Remote PHP Script Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Odine Solutions GateKeeper 1.0 - 'trafficCycle' SQL Injection
|
This is a webapps exploit for multiple platform. Description: Odine Solutions GateKeeper 1.0 - 'trafficCycle' SQL Injection. Author: Emel Basayar
|
Analyze the security implications of: Odine Solutions GateKeeper 1.0 - 'trafficCycle' SQL Injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: iPhone Springboard - Malformed Character Crash (PoC)
|
This is a dos exploit for hardware platform. Description: iPhone Springboard - Malformed Character Crash (PoC). Author: Chase Higgins
|
Analyze the security implications of: iPhone Springboard - Malformed Character Crash (PoC)
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Image Store - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Image Store - Arbitrary File Upload. Author: Mr.FireStormm
|
Analyze the security implications of: Image Store - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FreeBSD 6.4 - 'pipeclose()'/'knlist_cleardel()' Race Condition
|
This is a local exploit for freebsd platform. Description: FreeBSD 6.4 - 'pipeclose()'/'knlist_cleardel()' Race Condition. Author: Przemyslaw Frasunek
|
Analyze the security implications of: FreeBSD 6.4 - 'pipeclose()'/'knlist_cleardel()' Race Condition
|
This exploit targets freebsd systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets freebsd platform
|
What is this exploit about: Campsite 2.6.1 - 'ArticleIndex.php?g_documentRoot' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'ArticleIndex.php?g_documentRoot' Remote File Inclusion. Author: anonymous
|
Analyze the security implications of: Campsite 2.6.1 - 'ArticleIndex.php?g_documentRoot' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: OpenKM 6.3.2 < 6.3.7 - Remote Command Execution (Metasploit)
|
This is a webapps exploit for jsp platform. Description: OpenKM 6.3.2 < 6.3.7 - Remote Command Execution (Metasploit). Author: AkkuS
|
Analyze the security implications of: OpenKM 6.3.2 < 6.3.7 - Remote Command Execution (Metasploit)
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Apple Mac OSX 10.4.x - iPhoto 'photo://' URL Handling Format String
|
This is a dos exploit for osx platform. Description: Apple Mac OSX 10.4.x - iPhoto 'photo://' URL Handling Format String. Author: LMH
|
Analyze the security implications of: Apple Mac OSX 10.4.x - iPhoto 'photo://' URL Handling Format String
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: MiCollab 7.0 - SQL Injection
|
This is a webapps exploit for multiple platform. Description: MiCollab 7.0 - SQL Injection. Author: Goran Tuzovic
|
Analyze the security implications of: MiCollab 7.0 - SQL Injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Dimofinf CMS 3.0.0 - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Dimofinf CMS 3.0.0 - Cross-Site Scripting. Author: Renzi
|
Analyze the security implications of: Dimofinf CMS 3.0.0 - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component JTAG Calendar 6.2.4 - 'search' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component JTAG Calendar 6.2.4 - 'search' SQL Injection. Author: Persian Hack Team
|
Analyze the security implications of: Joomla! Component JTAG Calendar 6.2.4 - 'search' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Zyxel Armor X1 WAP6806 - Directory Traversal
|
This is a webapps exploit for hardware platform. Description: Zyxel Armor X1 WAP6806 - Directory Traversal. Author: Rajivarnan R
|
Analyze the security implications of: Zyxel Armor X1 WAP6806 - Directory Traversal
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Beauty-salon v1.0 - Remote Code Execution (RCE)
|
This is a webapps exploit for php platform. Description: Beauty-salon v1.0 - Remote Code Execution (RCE). Author: nu11secur1ty
|
Analyze the security implications of: Beauty-salon v1.0 - Remote Code Execution (RCE)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LinEx - Password Reset
|
This is a webapps exploit for php platform. Description: LinEx - Password Reset. Author: N B Sri Harsha
|
Analyze the security implications of: LinEx - Password Reset
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HP-UX 11i - 'swpackage' Local Stack Overflow / Local Privilege Escalation
|
This is a local exploit for hp-ux platform. Description: HP-UX 11i - 'swpackage' Local Stack Overflow / Local Privilege Escalation. Author: prdelka
|
Analyze the security implications of: HP-UX 11i - 'swpackage' Local Stack Overflow / Local Privilege Escalation
|
This exploit targets hp-ux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hp-ux platform
|
What is this exploit about: Macaron Notes great notebook 5.5 - Denial of Service (PoC)
|
This is a dos exploit for ios platform. Description: Macaron Notes great notebook 5.5 - Denial of Service (PoC). Author: Geovanni Ruiz
|
Analyze the security implications of: Macaron Notes great notebook 5.5 - Denial of Service (PoC)
|
This exploit targets ios systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: ASP Nuke - SQL Injection
|
This is a webapps exploit for asp platform. Description: ASP Nuke - SQL Injection. Author: Abysssec
|
Analyze the security implications of: ASP Nuke - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Component com_marketplace 1.2 - 'catid' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Joomla! Component com_marketplace 1.2 - 'catid' Cross-Site Scripting. Author: ViRuSMaN
|
Analyze the security implications of: Joomla! Component com_marketplace 1.2 - 'catid' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Openfire 3.6.2 - 'user-properties.jsp' Cross-Site Scripting
|
This is a webapps exploit for jsp platform. Description: Openfire 3.6.2 - 'user-properties.jsp' Cross-Site Scripting. Author: Federico Muttis
|
Analyze the security implications of: Openfire 3.6.2 - 'user-properties.jsp' Cross-Site Scripting
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Joomla! Component Search 1.0.13 - SearchWord Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Joomla! Component Search 1.0.13 - SearchWord Cross-Site Scripting. Author: MustLive
|
Analyze the security implications of: Joomla! Component Search 1.0.13 - SearchWord Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dejcom Market CMS - 'showbrand.aspx' SQL Injection
|
This is a webapps exploit for asp platform. Description: Dejcom Market CMS - 'showbrand.aspx' SQL Injection. Author: Mormoroth
|
Analyze the security implications of: Dejcom Market CMS - 'showbrand.aspx' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.