input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HaPe PKH 1.1 - Cross-Site Request Forgery (Update Admin)
|
This is a webapps exploit for php platform. Description: HaPe PKH 1.1 - Cross-Site Request Forgery (Update Admin). Author: Ihsan Sencan
|
Analyze the security implications of: HaPe PKH 1.1 - Cross-Site Request Forgery (Update Admin)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Boa 0.93.15 - HTTP Basic Authentication Bypass
|
This is a remote exploit for linux platform. Description: Boa 0.93.15 - HTTP Basic Authentication Bypass. Author: ikki
|
Analyze the security implications of: Boa 0.93.15 - HTTP Basic Authentication Bypass
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Corel Linux OS 1.0 - buildxconfig
|
This is a local exploit for linux platform. Description: Corel Linux OS 1.0 - buildxconfig. Author: suid
|
Analyze the security implications of: Corel Linux OS 1.0 - buildxconfig
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Elxis CMS 2008.1 - PHPSESSID Variable Session Fixation
|
This is a webapps exploit for php platform. Description: Elxis CMS 2008.1 - PHPSESSID Variable Session Fixation. Author: faithlove
|
Analyze the security implications of: Elxis CMS 2008.1 - PHPSESSID Variable Session Fixation
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AMD K6 Processor - Denial of Service
|
This is a dos exploit for linux platform. Description: AMD K6 Processor - Denial of Service. Author: Poulot-Cazajous
|
Analyze the security implications of: AMD K6 Processor - Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: BSDI 3.0/3.1 - Local Kernel Denial of Service
|
This is a dos exploit for bsd platform. Description: BSDI 3.0/3.1 - Local Kernel Denial of Service. Author: V9
|
Analyze the security implications of: BSDI 3.0/3.1 - Local Kernel Denial of Service
|
This exploit targets bsd systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets bsd platform
|
What is this exploit about: WordPress Core < 4.7.4 - Unauthorized Password Reset
|
This is a webapps exploit for linux platform. Description: WordPress Core < 4.7.4 - Unauthorized Password Reset. Author: Dawid Golunski
|
Analyze the security implications of: WordPress Core < 4.7.4 - Unauthorized Password Reset
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Enigma Haber 4.2 - Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: Enigma Haber 4.2 - Cross-Site Scripting. Author: The_BeKiR
|
Analyze the security implications of: Enigma Haber 4.2 - Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Microsoft Internet Explorer 5.2.3 for Mac OS - Denial of Service
|
This is a dos exploit for osx platform. Description: Microsoft Internet Explorer 5.2.3 for Mac OS - Denial of Service. Author: Mella Marco
|
Analyze the security implications of: Microsoft Internet Explorer 5.2.3 for Mac OS - Denial of Service
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: ASPApp PortalApp - Remote User Database Access
|
This is a webapps exploit for asp platform. Description: ASPApp PortalApp - Remote User Database Access. Author: newbie6290
|
Analyze the security implications of: ASPApp PortalApp - Remote User Database Access
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: ASPapp Knowledge Base - 'CatId' SQL Injection (1)
|
This is a webapps exploit for asp platform. Description: ASPapp Knowledge Base - 'CatId' SQL Injection (1). Author: xcorpitx
|
Analyze the security implications of: ASPapp Knowledge Base - 'CatId' SQL Injection (1)
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Oracle Siebel CRM 8.1.1 - CSV Injection
|
This is a webapps exploit for java platform. Description: Oracle Siebel CRM 8.1.1 - CSV Injection. Author: Sarath Nair
|
Analyze the security implications of: Oracle Siebel CRM 8.1.1 - CSV Injection
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: FS Amazon Clone - 'category_id' SQL Injection
|
This is a webapps exploit for php platform. Description: FS Amazon Clone - 'category_id' SQL Injection. Author: 8bitsec
|
Analyze the security implications of: FS Amazon Clone - 'category_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PowerFolder Server 10.4.321 - Remote Code Execution
|
This is a remote exploit for java platform. Description: PowerFolder Server 10.4.321 - Remote Code Execution. Author: Hans-Martin Muench
|
Analyze the security implications of: PowerFolder Server 10.4.321 - Remote Code Execution
|
This exploit targets java systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Just Another Video Script 1.4.3 - SQL Injection
|
This is a webapps exploit for php platform. Description: Just Another Video Script 1.4.3 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Just Another Video Script 1.4.3 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: eMerge E3 1.00-06 - Arbitrary File Upload
|
This is a webapps exploit for hardware platform. Description: eMerge E3 1.00-06 - Arbitrary File Upload. Author: LiquidWorm
|
Analyze the security implications of: eMerge E3 1.00-06 - Arbitrary File Upload
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit)
|
This is a remote exploit for hardware platform. Description: QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit). Author: AkkuS
|
Analyze the security implications of: QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Java Applet - JAX-WS Remote Code Execution (Metasploit)
|
This is a remote exploit for multiple platform. Description: Java Applet - JAX-WS Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Java Applet - JAX-WS Remote Code Execution (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: JVC IP-Camera VN-T216VPRU - Credentials Disclosure
|
This is a webapps exploit for cgi platform. Description: JVC IP-Camera VN-T216VPRU - Credentials Disclosure. Author: Yakir Wizman
|
Analyze the security implications of: JVC IP-Camera VN-T216VPRU - Credentials Disclosure
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: BrowserCRM 5.100.1 - 'framed' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: BrowserCRM 5.100.1 - 'framed' Cross-Site Scripting. Author: High-Tech Bridge SA
|
Analyze the security implications of: BrowserCRM 5.100.1 - 'framed' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Eterm LibAST < 0.7 - '-X' Option Privilege Escalation
|
This is a local exploit for linux platform. Description: Eterm LibAST < 0.7 - '-X' Option Privilege Escalation. Author: Johnny Mast
|
Analyze the security implications of: Eterm LibAST < 0.7 - '-X' Option Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: P-Synch < 6.2.5 - Multiple Vulnerabilities
|
This is a webapps exploit for multiple platform. Description: P-Synch < 6.2.5 - Multiple Vulnerabilities. Author: GulfTech Security
|
Analyze the security implications of: P-Synch < 6.2.5 - Multiple Vulnerabilities
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Classifieds Caffe - 'cat_id' SQL Injection
|
This is a webapps exploit for php platform. Description: Classifieds Caffe - 'cat_id' SQL Injection. Author: JosS
|
Analyze the security implications of: Classifieds Caffe - 'cat_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Wireshark 2.2.0 < 2.2.12 - ROS Dissector Denial of Service
|
This is a dos exploit for multiple platform. Description: Wireshark 2.2.0 < 2.2.12 - ROS Dissector Denial of Service. Author: OSS-Fuzz
|
Analyze the security implications of: Wireshark 2.2.0 < 2.2.12 - ROS Dissector Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: e-Vision CMS 2.0.2 - Multiple Local File Inclusions
|
This is a webapps exploit for php platform. Description: e-Vision CMS 2.0.2 - Multiple Local File Inclusions. Author: StAkeR
|
Analyze the security implications of: e-Vision CMS 2.0.2 - Multiple Local File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: My Book World Edition NAS - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: My Book World Edition NAS - Multiple Vulnerabilities. Author: emgent
|
Analyze the security implications of: My Book World Edition NAS - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Artmedic NewsLetter 4.1 - 'Log.php' Remote Script Execution
|
This is a webapps exploit for php platform. Description: Artmedic NewsLetter 4.1 - 'Log.php' Remote Script Execution. Author: C.Schmitz
|
Analyze the security implications of: Artmedic NewsLetter 4.1 - 'Log.php' Remote Script Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mozilla Firefox 9.0.1 - Same Origin Policy Security Bypass
|
This is a remote exploit for multiple platform. Description: Mozilla Firefox 9.0.1 - Same Origin Policy Security Bypass. Author: Takeshi Terada
|
Analyze the security implications of: Mozilla Firefox 9.0.1 - Same Origin Policy Security Bypass
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: SimpleBlog 3.0 - 'comments_get.asp?id' SQL Injection
|
This is a webapps exploit for asp platform. Description: SimpleBlog 3.0 - 'comments_get.asp?id' SQL Injection. Author: g00ns
|
Analyze the security implications of: SimpleBlog 3.0 - 'comments_get.asp?id' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Sudo 1.3.1 < 1.6.8p (OpenBSD) - Pathname Validation Privilege Escalation
|
This is a local exploit for bsd platform. Description: Sudo 1.3.1 < 1.6.8p (OpenBSD) - Pathname Validation Privilege Escalation. Author: RusH
|
Analyze the security implications of: Sudo 1.3.1 < 1.6.8p (OpenBSD) - Pathname Validation Privilege Escalation
|
This exploit targets bsd systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets bsd platform
|
What is this exploit about: Claroline 1.8.9 - 'announcements/announcements.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Claroline 1.8.9 - 'announcements/announcements.php' Cross-Site Scripting. Author: Digital Security Research Group
|
Analyze the security implications of: Claroline 1.8.9 - 'announcements/announcements.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ProFTPd - 'ftpdctl' 'pr_ctrls_connect' Local Overflow
|
This is a local exploit for linux platform. Description: ProFTPd - 'ftpdctl' 'pr_ctrls_connect' Local Overflow. Author: pi3
|
Analyze the security implications of: ProFTPd - 'ftpdctl' 'pr_ctrls_connect' Local Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Linux Kernel 2.2.18 (RedHat 6.2/7.0 / 2.2.14/2.2.18/2.2.18ow4) - ptrace/execve Race Condition Privilege Escalation (2)
|
This is a local exploit for linux platform. Description: Linux Kernel 2.2.18 (RedHat 6.2/7.0 / 2.2.14/2.2.18/2.2.18ow4) - ptrace/execve Race Condition Privilege Escalation (2). Author: Wojciech Purczynski
|
Analyze the security implications of: Linux Kernel 2.2.18 (RedHat 6.2/7.0 / 2.2.14/2.2.18/2.2.18ow4) - ptrace/execve Race Condition Privilege Escalation (2)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.