input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: ezCourses - 'admin.asp' Security Bypass | This is a webapps exploit for php platform. Description: ezCourses - 'admin.asp' Security Bypass. Author: J.O |
Analyze the security implications of: ezCourses - 'admin.asp' Security Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: e-Soft24 Flash Games Script 1.0 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: e-Soft24 Flash Games Script 1.0 - Cross-Site Scripting. Author: 599eme Man |
Analyze the security implications of: e-Soft24 Flash Games Script 1.0 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CF Image Hosting Script 1.1 - 'upload.php' Arbitrary File Upload | This is a webapps exploit for php platform. Description: CF Image Hosting Script 1.1 - 'upload.php' Arbitrary File Upload. Author: The.Morpheus |
Analyze the security implications of: CF Image Hosting Script 1.1 - 'upload.php' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_mygallery - 'cid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_mygallery - 'cid' SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! Component com_mygallery - 'cid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ICT Protege GX/WX 2.08 - Stored Cross-Site Scripting (XSS) | This is a remote exploit for hardware platform. Description: ICT Protege GX/WX 2.08 - Stored Cross-Site Scripting (XSS). Author: LiquidWorm |
Analyze the security implications of: ICT Protege GX/WX 2.08 - Stored Cross-Site Scripting (XSS) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Blue Angel Software Suite - Command Execution | This is a remote exploit for linux platform. Description: Blue Angel Software Suite - Command Execution. Author: Paolo Serracino_ Pietro Minniti_ Damiano Proietti |
Analyze the security implications of: Blue Angel Software Suite - Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Global In - SQL Injection | This is a webapps exploit for php platform. Description: Global In - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Global In - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: [WS] upload - Arbitrary File Upload | This is a webapps exploit for linux platform. Description: [WS] upload - Arbitrary File Upload. Author: ViRuSMaN |
Analyze the security implications of: [WS] upload - Arbitrary File Upload | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Linux Kernel 4.3.3 (Ubuntu 14.04/15.10) - 'overlayfs' Local Privilege Escalation (1) | This is a local exploit for linux platform. Description: Linux Kernel 4.3.3 (Ubuntu 14.04/15.10) - 'overlayfs' Local Privilege Escalation (1). Author: rebel |
Analyze the security implications of: Linux Kernel 4.3.3 (Ubuntu 14.04/15.10) - 'overlayfs' Local Privilege Escalation (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component Abstract 2.1 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Abstract 2.1 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Abstract 2.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Reader DC 15.010.20060 - Memory Corruption | This is a dos exploit for multiple platform. Description: Adobe Reader DC 15.010.20060 - Memory Corruption. Author: Pier-Luc Maltais |
Analyze the security implications of: Adobe Reader DC 15.010.20060 - Memory Corruption | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ASP-DEV Discussion Forum 2.0 - Admin Directory Weak Default Permissions | This is a webapps exploit for asp platform. Description: ASP-DEV Discussion Forum 2.0 - Admin Directory Weak Default Permissions. Author: G00db0y |
Analyze the security implications of: ASP-DEV Discussion Forum 2.0 - Admin Directory Weak Default Permissions | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: SuSE 6.x/7.0 - MkDir Error Handling rctab Race Condition (2) | This is a local exploit for linux platform. Description: SuSE 6.x/7.0 - MkDir Error Handling rctab Race Condition (2). Author: IhaQueR |
Analyze the security implications of: SuSE 6.x/7.0 - MkDir Error Handling rctab Race Condition (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Arcadem 2.01 - 'index.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Arcadem 2.01 - 'index.php' Remote File Inclusion. Author: sm0k3 |
Analyze the security implications of: Arcadem 2.01 - 'index.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Datenator 0.3.0 - 'event.php?id' SQL Injection | This is a webapps exploit for php platform. Description: Datenator 0.3.0 - 'event.php?id' SQL Injection. Author: The_HuliGun |
Analyze the security implications of: Datenator 0.3.0 - 'event.php?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ImageMagick 6.x - '.SGI' Image File Remote Heap Buffer Overflow | This is a dos exploit for linux platform. Description: ImageMagick 6.x - '.SGI' Image File Remote Heap Buffer Overflow. Author: Damian Put |
Analyze the security implications of: ImageMagick 6.x - '.SGI' Image File Remote Heap Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Oracle Reports Server 10g 9.0.2 - Multiple Cross-Site Scripting Vulnerabilities | This is a remote exploit for multiple platform. Description: Oracle Reports Server 10g 9.0.2 - Multiple Cross-Site Scripting Vulnerabilities. Author: Alexander Kornbrust |
Analyze the security implications of: Oracle Reports Server 10g 9.0.2 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: C99Shell (Web Shell) - 'c99.php' Authentication Bypass | This is a webapps exploit for php platform. Description: C99Shell (Web Shell) - 'c99.php' Authentication Bypass. Author: Mandat0ry |
Analyze the security implications of: C99Shell (Web Shell) - 'c99.php' Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AXIS 70U - Network Document Server Privilege Escalation / Cross-Site Scripting | This is a remote exploit for hardware platform. Description: AXIS 70U - Network Document Server Privilege Escalation / Cross-Site Scripting. Author: DSecRG |
Analyze the security implications of: AXIS 70U - Network Document Server Privilege Escalation / Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Clipbucket 2.6 - 'view_collection.php?type' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Clipbucket 2.6 - 'view_collection.php?type' Cross-Site Scripting. Author: YaDoY666 |
Analyze the security implications of: Clipbucket 2.6 - 'view_collection.php?type' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Learning with Texts 1.6.2 - 'start' SQL Injection | This is a webapps exploit for php platform. Description: Learning with Texts 1.6.2 - 'start' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Learning with Texts 1.6.2 - 'start' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM Lotus Domino Server Controller - Authentication Bypass | This is a remote exploit for jsp platform. Description: IBM Lotus Domino Server Controller - Authentication Bypass. Author: Alexey Sintsov |
Analyze the security implications of: IBM Lotus Domino Server Controller - Authentication Bypass | This exploit targets jsp systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Eventy Online Scheduler 1.8 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Eventy Online Scheduler 1.8 - Multiple Vulnerabilities. Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: Eventy Online Scheduler 1.8 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sun Java Applet2ClassLoader - Remote Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Sun Java Applet2ClassLoader - Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Sun Java Applet2ClassLoader - Remote Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ECommerce-TIBSECART - Arbitrary File Upload | This is a webapps exploit for php platform. Description: ECommerce-TIBSECART - Arbitrary File Upload. Author: Ihsan Sencan |
Analyze the security implications of: ECommerce-TIBSECART - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DELTAScripts PHPLinks - 'catid' SQL Injection | This is a webapps exploit for php platform. Description: DELTAScripts PHPLinks - 'catid' SQL Injection. Author: Hamza 'MizoZ' N. |
Analyze the security implications of: DELTAScripts PHPLinks - 'catid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Exim Internet Mailer 3.35/3.36/4.10 - Format String | This is a local exploit for linux platform. Description: Exim Internet Mailer 3.35/3.36/4.10 - Format String. Author: Thomas Wana |
Analyze the security implications of: Exim Internet Mailer 3.35/3.36/4.10 - Format String | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: LANGO Codeigniter Multilingual Script 1.0 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: LANGO Codeigniter Multilingual Script 1.0 - Cross-Site Scripting. Author: Ismail Tasdelen |
Analyze the security implications of: LANGO Codeigniter Multilingual Script 1.0 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mozilla Firefox - 'table' Use-After-Free | This is a dos exploit for multiple platform. Description: Mozilla Firefox - 'table' Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Mozilla Firefox - 'table' Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_jcalpro 1.5.3.6 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_jcalpro 1.5.3.6 - Remote File Inclusion. Author: kaMtiEz |
Analyze the security implications of: Joomla! Component com_jcalpro 1.5.3.6 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Seagate BlackArmor NAS sg2000-2000.1331 - Command Injection | This is a webapps exploit for hardware platform. Description: Seagate BlackArmor NAS sg2000-2000.1331 - Command Injection. Author: Metin Yunus Kandemir |
Analyze the security implications of: Seagate BlackArmor NAS sg2000-2000.1331 - Command Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: FCKEditor Core 2.x 2.4.3 - 'FileManager upload.php' Arbitrary File Upload | This is a webapps exploit for php platform. Description: FCKEditor Core 2.x 2.4.3 - 'FileManager upload.php' Arbitrary File Upload. Author: grabz |
Analyze the security implications of: FCKEditor Core 2.x 2.4.3 - 'FileManager upload.php' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: docmint 2.0 - '/engine/require.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: docmint 2.0 - '/engine/require.php' Remote File Inclusion. Author: K-159 |
Analyze the security implications of: docmint 2.0 - '/engine/require.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.