input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Crafty Syntax Live Help 3.1.2 - Remote File Inclusion / Full Path Disclosure | This is a webapps exploit for php platform. Description: Crafty Syntax Live Help 3.1.2 - Remote File Inclusion / Full Path Disclosure. Author: ITTIHACK |
Analyze the security implications of: Crafty Syntax Live Help 3.1.2 - Remote File Inclusion / Full Path Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Daily Habit Tracker 1.0 - Broken Access Control | This is a webapps exploit for php platform. Description: Daily Habit Tracker 1.0 - Broken Access Control. Author: Yevhenii Butenko |
Analyze the security implications of: Daily Habit Tracker 1.0 - Broken Access Control | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FOSS Gallery Public 1.0 - Arbitrary File Upload (PoC) | This is a webapps exploit for php platform. Description: FOSS Gallery Public 1.0 - Arbitrary File Upload (PoC). Author: Pepelux |
Analyze the security implications of: FOSS Gallery Public 1.0 - Arbitrary File Upload (PoC) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ProFTPd 1.2 pre1/pre2/pre3/pre4/pre5 - Remote Buffer Overflow (1) | This is a remote exploit for linux platform. Description: ProFTPd 1.2 pre1/pre2/pre3/pre4/pre5 - Remote Buffer Overflow (1). Author: babcia padlina ltd |
Analyze the security implications of: ProFTPd 1.2 pre1/pre2/pre3/pre4/pre5 - Remote Buffer Overflow (1) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apache2Triad 1.5.4 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Apache2Triad 1.5.4 - Multiple Vulnerabilities. Author: hyp3rlinx |
Analyze the security implications of: Apache2Triad 1.5.4 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AdminLTE PiHole 5.18 - Broken Access Control | This is a webapps exploit for php platform. Description: AdminLTE PiHole 5.18 - Broken Access Control. Author: kv1to |
Analyze the security implications of: AdminLTE PiHole 5.18 - Broken Access Control | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle 9.x - 'Database' / Statement Buffer Overflow | This is a dos exploit for multiple platform. Description: Oracle 9.x - 'Database' / Statement Buffer Overflow. Author: NGSSoftware |
Analyze the security implications of: Oracle 9.x - 'Database' / Statement Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Delta Industrial Automation COMMGR 1.08 - Stack Buffer Overflow (PoC) | This is a dos exploit for hardware platform. Description: Delta Industrial Automation COMMGR 1.08 - Stack Buffer Overflow (PoC). Author: t4rkd3vilz |
Analyze the security implications of: Delta Industrial Automation COMMGR 1.08 - Stack Buffer Overflow (PoC) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Cisco UCS Director_ Cisco Integrated Management Controller Supervisor and Cisco UCS Director Express for Big Data - Multiple Vulnerabilities | This is a remote exploit for multiple platform. Description: Cisco UCS Director_ Cisco Integrated Management Controller Supervisor and Cisco UCS Director Express for Big Data - Multiple Vulnerabilities. Author: Pedro Ribeiro |
Analyze the security implications of: Cisco UCS Director_ Cisco Integrated Management Controller Supervisor and Cisco UCS Director Express for Big Data - Multiple Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Bs Events_Locator Script - SQL Injection | This is a webapps exploit for php platform. Description: Bs Events_Locator Script - SQL Injection. Author: Sid3^effects |
Analyze the security implications of: Bs Events_Locator Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Site2Nite Business eListings - SQL Injection | This is a webapps exploit for asp platform. Description: Site2Nite Business eListings - SQL Injection. Author: L0rd CrusAd3r |
Analyze the security implications of: Site2Nite Business eListings - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ZTE ZXHN H168N 3.1 - Remote Code Execution (RCE) via authentication bypass | This is a hardware exploit for multiple platform. Description: ZTE ZXHN H168N 3.1 - Remote Code Execution (RCE) via authentication bypass. Author: tasos meletlidis |
Analyze the security implications of: ZTE ZXHN H168N 3.1 - Remote Code Execution (RCE) via authentication bypass | This exploit targets multiple systems. Type: hardware. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Kartris 1.6 - Arbitrary File Upload | This is a webapps exploit for aspx platform. Description: Kartris 1.6 - Arbitrary File Upload. Author: Nhat Ha |
Analyze the security implications of: Kartris 1.6 - Arbitrary File Upload | This exploit targets aspx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aspx platform |
What is this exploit about: Atlassian Tempo 6.4.3 / JIRA 5.0.0 / Gliffy 3.7.0 - XML Parsing Denial of Service | This is a dos exploit for jsp platform. Description: Atlassian Tempo 6.4.3 / JIRA 5.0.0 / Gliffy 3.7.0 - XML Parsing Denial of Service. Author: anonymous |
Analyze the security implications of: Atlassian Tempo 6.4.3 / JIRA 5.0.0 / Gliffy 3.7.0 - XML Parsing Denial of Service | This exploit targets jsp systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Joomla! Component OS Property 3.0.8 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component OS Property 3.0.8 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component OS Property 3.0.8 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BlogEngine.NET 1.6 - Directory Traversal / Information Disclosure | This is a webapps exploit for asp platform. Description: BlogEngine.NET 1.6 - Directory Traversal / Information Disclosure. Author: Deniz Cevik |
Analyze the security implications of: BlogEngine.NET 1.6 - Directory Traversal / Information Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: GNU C library dynamic linker - '$ORIGIN' Expansion | This is a local exploit for linux platform. Description: GNU C library dynamic linker - '$ORIGIN' Expansion. Author: Tavis Ormandy |
Analyze the security implications of: GNU C library dynamic linker - '$ORIGIN' Expansion | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: QNAP Transcode Server - Command Execution (Metasploit) | This is a remote exploit for hardware platform. Description: QNAP Transcode Server - Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: QNAP Transcode Server - Command Execution (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Flirt-Projekt 4.8 - 'rub' SQL Injection | This is a webapps exploit for php platform. Description: Flirt-Projekt 4.8 - 'rub' SQL Injection. Author: Lazmania61 |
Analyze the security implications of: Flirt-Projekt 4.8 - 'rub' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Connect Daily 3.2.8/3.2.9 - 'ViewSearch.html' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Connect Daily 3.2.8/3.2.9 - 'ViewSearch.html' Multiple Cross-Site Scripting Vulnerabilities. Author: r0t |
Analyze the security implications of: Connect Daily 3.2.8/3.2.9 - 'ViewSearch.html' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: autositephp 2.0.3 - Local File Inclusion / Cross-Site Request Forgery / Edit File | This is a webapps exploit for php platform. Description: autositephp 2.0.3 - Local File Inclusion / Cross-Site Request Forgery / Edit File. Author: SirGod |
Analyze the security implications of: autositephp 2.0.3 - Local File Inclusion / Cross-Site Request Forgery / Edit File | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ERPNext 12.29 - Cross-Site Scripting (XSS) | This is a webapps exploit for java platform. Description: ERPNext 12.29 - Cross-Site Scripting (XSS). Author: Patrick Dean Ramos / Nathu Nandwani / Junnair Manla |
Analyze the security implications of: ERPNext 12.29 - Cross-Site Scripting (XSS) | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Hosting Controller 1.4 - Import Root Directory Command Execution | This is a webapps exploit for asp platform. Description: Hosting Controller 1.4 - Import Root Directory Command Execution. Author: hdlkha |
Analyze the security implications of: Hosting Controller 1.4 - Import Root Directory Command Execution | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component Spider Calendar - 'date' Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Spider Calendar - 'date' Blind SQL Injection. Author: Red-D3v1L |
Analyze the security implications of: Joomla! Component Spider Calendar - 'date' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Shuttle Tech ADSL Modem/Router 915 WM - Remote DNS Change | This is a remote exploit for hardware platform. Description: Shuttle Tech ADSL Modem/Router 915 WM - Remote DNS Change. Author: Todor Donev |
Analyze the security implications of: Shuttle Tech ADSL Modem/Router 915 WM - Remote DNS Change | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Kordil EDms 2.2.60rc3 - Arbitrary File Upload (Metasploit) | This is a remote exploit for php platform. Description: Kordil EDms 2.2.60rc3 - Arbitrary File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: Kordil EDms 2.2.60rc3 - Arbitrary File Upload (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iOS/macOS - 'task_swap_mach_voucher()' Use-After-Free | This is a dos exploit for multiple platform. Description: iOS/macOS - 'task_swap_mach_voucher()' Use-After-Free. Author: Google Security Research |
Analyze the security implications of: iOS/macOS - 'task_swap_mach_voucher()' Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Engineers Online Portal 1.0 - 'multiple' Stored Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Engineers Online Portal 1.0 - 'multiple' Stored Cross-Site Scripting (XSS). Author: Alon Leviev |
Analyze the security implications of: Engineers Online Portal 1.0 - 'multiple' Stored Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GeeCarts - 'show.php?id' Cross-Site Scripting | This is a webapps exploit for php platform. Description: GeeCarts - 'show.php?id' Cross-Site Scripting. Author: Ivan Sanchez |
Analyze the security implications of: GeeCarts - 'show.php?id' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Blazix 1.2 - Special Character Handling Server Side Script Information Disclosure | This is a remote exploit for multiple platform. Description: Blazix 1.2 - Special Character Handling Server Side Script Information Disclosure. Author: Auriemma Luigi |
Analyze the security implications of: Blazix 1.2 - Special Character Handling Server Side Script Information Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Slackware 7.0/7.1/8.0 - Manual Page Cache File Creation | This is a local exploit for linux platform. Description: Slackware 7.0/7.1/8.0 - Manual Page Cache File Creation. Author: josh |
Analyze the security implications of: Slackware 7.0/7.1/8.0 - Manual Page Cache File Creation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Life Insurance Management System 1.0 - Multiple Stored XSS | This is a webapps exploit for php platform. Description: Life Insurance Management System 1.0 - Multiple Stored XSS. Author: Arnav Tripathy |
Analyze the security implications of: Life Insurance Management System 1.0 - Multiple Stored XSS | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_niceajaxpoll 1.3.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_niceajaxpoll 1.3.0 - SQL Injection. Author: Patrick de Brouwer |
Analyze the security implications of: Joomla! Component com_niceajaxpoll 1.3.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Siemens S55 - Cellular Telephone Sms Confirmation Message Bypass | This is a remote exploit for hardware platform. Description: Siemens S55 - Cellular Telephone Sms Confirmation Message Bypass. Author: FtR |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.