input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: m-phorum 0.3 - 'index.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: m-phorum 0.3 - 'index.php' Cross-Site Scripting. Author: CodeXpLoder'tq
|
Analyze the security implications of: m-phorum 0.3 - 'index.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Xtokkaetama 1.0 b-6 - Nickname Local Buffer Overflow (2)
|
This is a local exploit for linux platform. Description: Xtokkaetama 1.0 b-6 - Nickname Local Buffer Overflow (2). Author: techieone@softhome.net
|
Analyze the security implications of: Xtokkaetama 1.0 b-6 - Nickname Local Buffer Overflow (2)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: IceWarp Mail Server 9.1.1 - '/admin/index.html' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: IceWarp Mail Server 9.1.1 - '/admin/index.html' Cross-Site Scripting. Author: Ekin0x
|
Analyze the security implications of: IceWarp Mail Server 9.1.1 - '/admin/index.html' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: D-Link DSL-2640R - DNS Change
|
This is a webapps exploit for hardware platform. Description: D-Link DSL-2640R - DNS Change. Author: Todor Donev
|
Analyze the security implications of: D-Link DSL-2640R - DNS Change
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Allaire JRun 2.3 - Arbitrary Code Execution
|
This is a remote exploit for multiple platform. Description: Allaire JRun 2.3 - Arbitrary Code Execution. Author: Foundstone Labs
|
Analyze the security implications of: Allaire JRun 2.3 - Arbitrary Code Execution
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: HomeAutomation 3.3.2 - Authentication Bypass
|
This is a webapps exploit for php platform. Description: HomeAutomation 3.3.2 - Authentication Bypass. Author: LiquidWorm
|
Analyze the security implications of: HomeAutomation 3.3.2 - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_icagenda - 'id' Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Joomla! Component com_icagenda - 'id' Multiple Vulnerabilities. Author: Dark-Puzzle
|
Analyze the security implications of: Joomla! Component com_icagenda - 'id' Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: eLouai's Force Download Script - Arbitrary Local File Download
|
This is a webapps exploit for php platform. Description: eLouai's Force Download Script - Arbitrary Local File Download. Author: v1R00Z
|
Analyze the security implications of: eLouai's Force Download Script - Arbitrary Local File Download
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Bigware Shop 2.1x - 'main_bigware_54.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Bigware Shop 2.1x - 'main_bigware_54.php' SQL Injection. Author: rwenzel
|
Analyze the security implications of: Bigware Shop 2.1x - 'main_bigware_54.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BBSXP CMS - Multiple SQL Injections
|
This is a webapps exploit for asp platform. Description: BBSXP CMS - Multiple SQL Injections. Author: Farbod Mahini
|
Analyze the security implications of: BBSXP CMS - Multiple SQL Injections
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Linux Kernel 4.4.1 - REFCOUNT Overflow Use-After-Free in Keyrings Local Privilege Escalation (1)
|
This is a local exploit for linux platform. Description: Linux Kernel 4.4.1 - REFCOUNT Overflow Use-After-Free in Keyrings Local Privilege Escalation (1). Author: Perception Point Team
|
Analyze the security implications of: Linux Kernel 4.4.1 - REFCOUNT Overflow Use-After-Free in Keyrings Local Privilege Escalation (1)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Hashicorp vagrant-vmware-fusion 4.0.24 - Local Privilege Escalation
|
This is a local exploit for macos platform. Description: Hashicorp vagrant-vmware-fusion 4.0.24 - Local Privilege Escalation. Author: Mark Wadham
|
Analyze the security implications of: Hashicorp vagrant-vmware-fusion 4.0.24 - Local Privilege Escalation
|
This exploit targets macos systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets macos platform
|
What is this exploit about: BookingWizz Booking System 5.5 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: BookingWizz Booking System 5.5 - 'id' SQL Injection. Author: AkkuS
|
Analyze the security implications of: BookingWizz Booking System 5.5 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ARISg 5.0 - 'wflogin.jsp' Cross-Site Scripting
|
This is a webapps exploit for jsp platform. Description: ARISg 5.0 - 'wflogin.jsp' Cross-Site Scripting. Author: Yaniv Miron
|
Analyze the security implications of: ARISg 5.0 - 'wflogin.jsp' Cross-Site Scripting
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: FreePBX 2.10.0 / Elastix 2.2.0 - Remote Code Execution
|
This is a webapps exploit for php platform. Description: FreePBX 2.10.0 / Elastix 2.2.0 - Remote Code Execution. Author: muts
|
Analyze the security implications of: FreePBX 2.10.0 / Elastix 2.2.0 - Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Watchguard SOHO 2.2 - Denial of Service
|
This is a dos exploit for hardware platform. Description: Watchguard SOHO 2.2 - Denial of Service. Author: Filip Maertens
|
Analyze the security implications of: Watchguard SOHO 2.2 - Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: SearchBlox 8.6.6 - Cross-Site Request Forgery
|
This is a webapps exploit for java platform. Description: SearchBlox 8.6.6 - Cross-Site Request Forgery. Author: Ahmet Gurel
|
Analyze the security implications of: SearchBlox 8.6.6 - Cross-Site Request Forgery
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Oracle9i Application Server 9.0.2 - MOD_ORADAV Access Control
|
This is a remote exploit for multiple platform. Description: Oracle9i Application Server 9.0.2 - MOD_ORADAV Access Control. Author: David Litchfield
|
Analyze the security implications of: Oracle9i Application Server 9.0.2 - MOD_ORADAV Access Control
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component eventCal 1.6.4 - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component eventCal 1.6.4 - Blind SQL Injection. Author: RoAd_KiLlEr
|
Analyze the security implications of: Joomla! Component eventCal 1.6.4 - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Centreon < 2.5.1 / Centreon Enterprise Server < 2.2 - SQL Injection / Command Injection (Metasploit)
|
This is a webapps exploit for linux platform. Description: Centreon < 2.5.1 / Centreon Enterprise Server < 2.2 - SQL Injection / Command Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: Centreon < 2.5.1 / Centreon Enterprise Server < 2.2 - SQL Injection / Command Injection (Metasploit)
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: VideoFlow Digital Video Protection (DVP) 2.10 - Directory Traversal
|
This is a webapps exploit for perl platform. Description: VideoFlow Digital Video Protection (DVP) 2.10 - Directory Traversal. Author: LiquidWorm
|
Analyze the security implications of: VideoFlow Digital Video Protection (DVP) 2.10 - Directory Traversal
|
This exploit targets perl systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets perl platform
|
What is this exploit about: AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection
|
This is a webapps exploit for perl platform. Description: AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection. Author: BrianWGray
|
Analyze the security implications of: AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection
|
This exploit targets perl systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets perl platform
|
What is this exploit about: xscreensaver 5.01 - Arbitrary File Disclosure Symlink
|
This is a local exploit for multiple platform. Description: xscreensaver 5.01 - Arbitrary File Disclosure Symlink. Author: kingcope
|
Analyze the security implications of: xscreensaver 5.01 - Arbitrary File Disclosure Symlink
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Fatwiki (fwiki) 1.0 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Fatwiki (fwiki) 1.0 - Remote File Inclusion. Author: kaMtiEz
|
Analyze the security implications of: Fatwiki (fwiki) 1.0 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Sendmail 8.13.5 - Remote Signal Handling (PoC)
|
This is a dos exploit for linux platform. Description: Sendmail 8.13.5 - Remote Signal Handling (PoC). Author: redsand
|
Analyze the security implications of: Sendmail 8.13.5 - Remote Signal Handling (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Dokeos 1.8.4 - '/main/mySpace/index.php?tracking_list_coaches_column' SQL Injection
|
This is a webapps exploit for php platform. Description: Dokeos 1.8.4 - '/main/mySpace/index.php?tracking_list_coaches_column' SQL Injection. Author: Alexandr Polyakov
|
Analyze the security implications of: Dokeos 1.8.4 - '/main/mySpace/index.php?tracking_list_coaches_column' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Oracle VM VirtualBox - Environment and ioctl Unprivileged Host User to Host Kernel Privilege Escalation
|
This is a dos exploit for multiple platform. Description: Oracle VM VirtualBox - Environment and ioctl Unprivileged Host User to Host Kernel Privilege Escalation. Author: Google Security Research
|
Analyze the security implications of: Oracle VM VirtualBox - Environment and ioctl Unprivileged Host User to Host Kernel Privilege Escalation
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: bilboblog 2.1 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: bilboblog 2.1 - Multiple Vulnerabilities. Author: BlackH
|
Analyze the security implications of: bilboblog 2.1 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: EditTag 1.2 - 'edittag_mp.cgi?file' Arbitrary File Disclosure
|
This is a webapps exploit for cgi platform. Description: EditTag 1.2 - 'edittag_mp.cgi?file' Arbitrary File Disclosure. Author: NetJackal
|
Analyze the security implications of: EditTag 1.2 - 'edittag_mp.cgi?file' Arbitrary File Disclosure
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: GlassFish Application Server - '/resourceNode/externalResourceNew.jsf' Multiple Cross-Site Scripting Vulnerabilities
|
This is a remote exploit for multiple platform. Description: GlassFish Application Server - '/resourceNode/externalResourceNew.jsf' Multiple Cross-Site Scripting Vulnerabilities. Author: Eduardo Jorge
|
Analyze the security implications of: GlassFish Application Server - '/resourceNode/externalResourceNew.jsf' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Novus 1.0 - 'notas.asp?nota_id' SQL Injection
|
This is a webapps exploit for asp platform. Description: Novus 1.0 - 'notas.asp?nota_id' SQL Injection. Author: ka0x
|
Analyze the security implications of: Novus 1.0 - 'notas.asp?nota_id' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Oracle WebLogic Server 12.2.1.4.0 - Remote Code Execution
|
This is a webapps exploit for java platform. Description: Oracle WebLogic Server 12.2.1.4.0 - Remote Code Execution. Author: nu11secur1ty
|
Analyze the security implications of: Oracle WebLogic Server 12.2.1.4.0 - Remote Code Execution
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Cisco Catalyst 2960 IOS 12.2(55)SE1 - 'ROCEM' Remote Code Execution
|
This is a remote exploit for hardware platform. Description: Cisco Catalyst 2960 IOS 12.2(55)SE1 - 'ROCEM' Remote Code Execution. Author: Artem Kondratenko
|
Analyze the security implications of: Cisco Catalyst 2960 IOS 12.2(55)SE1 - 'ROCEM' Remote Code Execution
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.