input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sitecore 9.0 rev 171002 - Persistent Cross-Site Scripting | This is a webapps exploit for aspx platform. Description: Sitecore 9.0 rev 171002 - Persistent Cross-Site Scripting. Author: Owais Mehtab |
Analyze the security implications of: Sitecore 9.0 rev 171002 - Persistent Cross-Site Scripting | This exploit targets aspx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aspx platform |
What is this exploit about: CuteNews 1.4.6 - 'ip ban' Authorized Cross-Site Scripting / Command Execution | This is a webapps exploit for php platform. Description: CuteNews 1.4.6 - 'ip ban' Authorized Cross-Site Scripting / Command Execution. Author: StAkeR |
Analyze the security implications of: CuteNews 1.4.6 - 'ip ban' Authorized Cross-Site Scripting / Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Basic B2B Script 2.0.8 - 'product_details.php?id' SQL Injection | This is a webapps exploit for php platform. Description: Basic B2B Script 2.0.8 - 'product_details.php?id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Basic B2B Script 2.0.8 - 'product_details.php?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LightRO CMS 1.0 - 'inhalt.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: LightRO CMS 1.0 - 'inhalt.php' Remote File Inclusion. Author: ajann |
Analyze the security implications of: LightRO CMS 1.0 - 'inhalt.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Android - android.util.MemoryIntArray Ashmem Race Conditions | This is a dos exploit for android platform. Description: Google Android - android.util.MemoryIntArray Ashmem Race Conditions. Author: Google Security Research |
Analyze the security implications of: Google Android - android.util.MemoryIntArray Ashmem Race Conditions | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Setelsa Conacwin 3.7.1.2 - Local File Inclusion | This is a webapps exploit for multiple platform. Description: Setelsa Conacwin 3.7.1.2 - Local File Inclusion. Author: Bryan Rodriguez Martin |
Analyze the security implications of: Setelsa Conacwin 3.7.1.2 - Local File Inclusion | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Oracle 10g - 'LT.FINDRICSET' SQL Injection (IDS Evasion) | This is a local exploit for multiple platform. Description: Oracle 10g - 'LT.FINDRICSET' SQL Injection (IDS Evasion). Author: sh2kerr |
Analyze the security implications of: Oracle 10g - 'LT.FINDRICSET' SQL Injection (IDS Evasion) | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: SurgeLDAP 1.0 - 'User.cgi' Directory Traversal | This is a remote exploit for cgi platform. Description: SurgeLDAP 1.0 - 'User.cgi' Directory Traversal. Author: dr_insane |
Analyze the security implications of: SurgeLDAP 1.0 - 'User.cgi' Directory Traversal | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Microsoft 365 MSO (Version 2305 Build 16.0.16501.20074) 64-bit - Remote Code Execution (RCE) | This is a remote exploit for multiple platform. Description: Microsoft 365 MSO (Version 2305 Build 16.0.16501.20074) 64-bit - Remote Code Execution (RCE). Author: nu11secur1ty |
Analyze the security implications of: Microsoft 365 MSO (Version 2305 Build 16.0.16501.20074) 64-bit - Remote Code Execution (RCE) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Neo4j 3.4.18 - RMI based Remote Code Execution (RCE) | This is a remote exploit for java platform. Description: Neo4j 3.4.18 - RMI based Remote Code Execution (RCE). Author: Christopher Ellis |
Analyze the security implications of: Neo4j 3.4.18 - RMI based Remote Code Execution (RCE) | This exploit targets java systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Alstrasoft Template Seller Pro 3.25 - Remote Code Execution | This is a webapps exploit for php platform. Description: Alstrasoft Template Seller Pro 3.25 - Remote Code Execution. Author: BlackHawk |
Analyze the security implications of: Alstrasoft Template Seller Pro 3.25 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Transferable Remote 1.1 iPad iPhone - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Transferable Remote 1.1 iPad iPhone - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: Transferable Remote 1.1 iPad iPhone - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component MCQuiz 0.9 Final - 'tid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component MCQuiz 0.9 Final - 'tid' SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! Component MCQuiz 0.9 Final - 'tid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Groone's GLink ORGanizer - 'index.php?cat' SQL Injection | This is a webapps exploit for php platform. Description: Groone's GLink ORGanizer - 'index.php?cat' SQL Injection. Author: nuclear |
Analyze the security implications of: Groone's GLink ORGanizer - 'index.php?cat' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LXR 0.9.x - Cross Referencer Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: LXR 0.9.x - Cross Referencer Multiple Cross-Site Scripting Vulnerabilities. Author: Dan Rosenberg |
Analyze the security implications of: LXR 0.9.x - Cross Referencer Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ewire Payment Client 1.60/1.70 - Command Execution | This is a webapps exploit for php platform. Description: ewire Payment Client 1.60/1.70 - Command Execution. Author: anonymous |
Analyze the security implications of: ewire Payment Client 1.60/1.70 - Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Check Point Software Firewall-1 3.0/1 4.0/1 4.1 - Session Agent Dictionary Attack (1) | This is a remote exploit for multiple platform. Description: Check Point Software Firewall-1 3.0/1 4.0/1 4.1 - Session Agent Dictionary Attack (1). Author: Nelson Brito |
Analyze the security implications of: Check Point Software Firewall-1 3.0/1 4.0/1 4.1 - Session Agent Dictionary Attack (1) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Digital Crime Report Management System 1.0 - SQL Injection (Authentication Bypass) | This is a webapps exploit for php platform. Description: Digital Crime Report Management System 1.0 - SQL Injection (Authentication Bypass). Author: GaluhID |
Analyze the security implications of: Digital Crime Report Management System 1.0 - SQL Injection (Authentication Bypass) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AShop Deluxe 4.5 - 'salesadmin.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: AShop Deluxe 4.5 - 'salesadmin.php' Cross-Site Scripting. Author: Hackers Center Security |
Analyze the security implications of: AShop Deluxe 4.5 - 'salesadmin.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection | This is a webapps exploit for hardware platform. Description: RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection. Author: Olga Villagran |
Analyze the security implications of: RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: OpenFiler 2.99.1 - Arbitrary Code Execution | This is a webapps exploit for hardware platform. Description: OpenFiler 2.99.1 - Arbitrary Code Execution. Author: Dolev Farhi |
Analyze the security implications of: OpenFiler 2.99.1 - Arbitrary Code Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: EmbryoCore 1.03 - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: EmbryoCore 1.03 - 'index.php' SQL Injection. Author: KedAns-Dz |
Analyze the security implications of: EmbryoCore 1.03 - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Xpdf 3.01 - Local Heap Overflow / Null Pointer Dereference | This is a local exploit for multiple platform. Description: Xpdf 3.01 - Local Heap Overflow / Null Pointer Dereference. Author: Adam Zabrocki |
Analyze the security implications of: Xpdf 3.01 - Local Heap Overflow / Null Pointer Dereference | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GaleriaSHQIP 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: GaleriaSHQIP 1.0 - SQL Injection. Author: Valentin |
Analyze the security implications of: GaleriaSHQIP 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Aspee Ziyaretci Defteri - 'giris.asp' Multiple Field SQL Injections | This is a webapps exploit for asp platform. Description: Aspee Ziyaretci Defteri - 'giris.asp' Multiple Field SQL Injections. Author: ShaFuq31 |
Analyze the security implications of: Aspee Ziyaretci Defteri - 'giris.asp' Multiple Field SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Linux Kernel 3.13 - SGID Privilege Escalation | This is a local exploit for linux platform. Description: Linux Kernel 3.13 - SGID Privilege Escalation. Author: Vitaly Nikolenko |
Analyze the security implications of: Linux Kernel 3.13 - SGID Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: impleo music Collection 2.0 - SQL Injection / Cross-Site Scripting | This is a webapps exploit for php platform. Description: impleo music Collection 2.0 - SQL Injection / Cross-Site Scripting. Author: SirGod |
Analyze the security implications of: impleo music Collection 2.0 - SQL Injection / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dooblou WiFi File Explorer 1.13.3 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Dooblou WiFi File Explorer 1.13.3 - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: Dooblou WiFi File Explorer 1.13.3 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.6.31-rc7 - 'AF_LLC getsockname' 5-Byte Stack Disclosure | This is a local exploit for linux platform. Description: Linux Kernel 2.6.31-rc7 - 'AF_LLC getsockname' 5-Byte Stack Disclosure. Author: Jon Oberheide |
Analyze the security implications of: Linux Kernel 2.6.31-rc7 - 'AF_LLC getsockname' 5-Byte Stack Disclosure | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_hotspots - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_hotspots - SQL Injection. Author: cOndemned |
Analyze the security implications of: Joomla! Component com_hotspots - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution | This is a webapps exploit for hardware platform. Description: OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution. Author: Jonatas Fil |
Analyze the security implications of: OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: getaphpsite Real Estate - Arbitrary File Upload | This is a webapps exploit for php platform. Description: getaphpsite Real Estate - Arbitrary File Upload. Author: ZoRLu |
Analyze the security implications of: getaphpsite Real Estate - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ABB Cylon Aspect 3.08.02 (uploadDb.php) - Remote Code Execution | This is a hardware exploit for multiple platform. Description: ABB Cylon Aspect 3.08.02 (uploadDb.php) - Remote Code Execution. Author: LiquidWorm |
Analyze the security implications of: ABB Cylon Aspect 3.08.02 (uploadDb.php) - Remote Code Execution | This exploit targets multiple systems. Type: hardware. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.