input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: free QBoard 1.1 - 'history.php?qb_path' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: free QBoard 1.1 - 'history.php?qb_path' Remote File Inclusion. Author: CrAsh_oVeR_rIdE
|
Analyze the security implications of: free QBoard 1.1 - 'history.php?qb_path' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Forum Template 1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: Forum Template 1.0 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Forum Template 1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Complaint Management System 1.0 - 'username' SQL Injection
|
This is a webapps exploit for php platform. Description: Complaint Management System 1.0 - 'username' SQL Injection. Author: Daniel Ortiz
|
Analyze the security implications of: Complaint Management System 1.0 - 'username' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Currency Converter 1.0.0 - 'from' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Joomla! Component Currency Converter 1.0.0 - 'from' Cross-Site Scripting. Author: BHG Security Center
|
Analyze the security implications of: Joomla! Component Currency Converter 1.0.0 - 'from' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Xerver HTTP Server 4.32 - Cross-Site Scripting / Directory Traversal
|
This is a remote exploit for multiple platform. Description: Xerver HTTP Server 4.32 - Cross-Site Scripting / Directory Traversal. Author: Stack
|
Analyze the security implications of: Xerver HTTP Server 4.32 - Cross-Site Scripting / Directory Traversal
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: pdfium - opj_j2k_read_mcc 'libopenjpeg' Heap Out-of-Bounds Read
|
This is a dos exploit for multiple platform. Description: pdfium - opj_j2k_read_mcc 'libopenjpeg' Heap Out-of-Bounds Read. Author: Google Security Research
|
Analyze the security implications of: pdfium - opj_j2k_read_mcc 'libopenjpeg' Heap Out-of-Bounds Read
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ZSNES 1.51 - Local Buffer Overflow
|
This is a local exploit for linux platform. Description: ZSNES 1.51 - Local Buffer Overflow. Author: Juan Sacco
|
Analyze the security implications of: ZSNES 1.51 - Local Buffer Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Linux Kernel < 4.4.0-83 / < 4.8.0-58 (Ubuntu 14.04/16.04) - Local Privilege Escalation (KASLR / SMEP)
|
This is a local exploit for linux platform. Description: Linux Kernel < 4.4.0-83 / < 4.8.0-58 (Ubuntu 14.04/16.04) - Local Privilege Escalation (KASLR / SMEP). Author: Andrey Konovalov
|
Analyze the security implications of: Linux Kernel < 4.4.0-83 / < 4.8.0-58 (Ubuntu 14.04/16.04) - Local Privilege Escalation (KASLR / SMEP)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: HiSilicon DVR/NVR hi3520d firmware - Remote Backdoor Account
|
This is a remote exploit for hardware platform. Description: HiSilicon DVR/NVR hi3520d firmware - Remote Backdoor Account. Author: Snawoot
|
Analyze the security implications of: HiSilicon DVR/NVR hi3520d firmware - Remote Backdoor Account
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: AV Arcade 3 - Cookie Authentication Bypass
|
This is a webapps exploit for php platform. Description: AV Arcade 3 - Cookie Authentication Bypass. Author: saudi0hacker
|
Analyze the security implications of: AV Arcade 3 - Cookie Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component gigCalendar 1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component gigCalendar 1.0 - SQL Injection. Author: boom3rang
|
Analyze the security implications of: Joomla! Component gigCalendar 1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MikroTik 6.40.5 ICMP - Denial of Service
|
This is a dos exploit for hardware platform. Description: MikroTik 6.40.5 ICMP - Denial of Service. Author: FarazPajohan
|
Analyze the security implications of: MikroTik 6.40.5 ICMP - Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Color Prediction Game v1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: Color Prediction Game v1.0 - SQL Injection. Author: Ahmet Ümit BAYRAM
|
Analyze the security implications of: Color Prediction Game v1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component JE Auto - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component JE Auto - Local File Inclusion. Author: Sid3^effects
|
Analyze the security implications of: Joomla! Component JE Auto - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AR-Blog 5.2 - 'print.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: AR-Blog 5.2 - 'print.php' Cross-Site Scripting. Author: ALMOKANN3
|
Analyze the security implications of: AR-Blog 5.2 - 'print.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FluxBB < 1.5.6 - SQL Injection
|
This is a webapps exploit for multiple platform. Description: FluxBB < 1.5.6 - SQL Injection. Author: secthrowaway
|
Analyze the security implications of: FluxBB < 1.5.6 - SQL Injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: itMedia - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: itMedia - Multiple SQL Injections. Author: baltazar
|
Analyze the security implications of: itMedia - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component JExtensions Property Finder - 'sf_id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component JExtensions Property Finder - 'sf_id' SQL Injection. Author: FL0RiX
|
Analyze the security implications of: Joomla! Component JExtensions Property Finder - 'sf_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Alfresco - '/cmisbrowser?url' Server-Side Request Forgery
|
This is a remote exploit for multiple platform. Description: Alfresco - '/cmisbrowser?url' Server-Side Request Forgery. Author: V. Paulikas
|
Analyze the security implications of: Alfresco - '/cmisbrowser?url' Server-Side Request Forgery
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: BBSXP 5.13 - 'error.asp' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: BBSXP 5.13 - 'error.asp' Cross-Site Scripting. Author: arashps0
|
Analyze the security implications of: BBSXP 5.13 - 'error.asp' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: T-Dreams Cars Ads Package 2.0 - SQL Injection
|
This is a webapps exploit for asp platform. Description: T-Dreams Cars Ads Package 2.0 - SQL Injection. Author: R4dc0re
|
Analyze the security implications of: T-Dreams Cars Ads Package 2.0 - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: magic-portal 2.1 - SQL Injection
|
This is a webapps exploit for php platform. Description: magic-portal 2.1 - SQL Injection. Author: alnjm33
|
Analyze the security implications of: magic-portal 2.1 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Chipmunk NewsLetter - Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Chipmunk NewsLetter - Persistent Cross-Site Scripting. Author: mr_me
|
Analyze the security implications of: Chipmunk NewsLetter - Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Man-db 2.6.7.1 - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: Man-db 2.6.7.1 - Local Privilege Escalation. Author: halfdog
|
Analyze the security implications of: Man-db 2.6.7.1 - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: TP-Link TL-MR3220 - Cross-Site Scripting
|
This is a webapps exploit for hardware platform. Description: TP-Link TL-MR3220 - Cross-Site Scripting. Author: Thiago Sena
|
Analyze the security implications of: TP-Link TL-MR3220 - Cross-Site Scripting
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Wyrestorm Apollo VX20 < 1.3.58 - Account Enumeration
|
This is a remote exploit for multiple platform. Description: Wyrestorm Apollo VX20 < 1.3.58 - Account Enumeration. Author: hyp3rlinx
|
Analyze the security implications of: Wyrestorm Apollo VX20 < 1.3.58 - Account Enumeration
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Linux Kernel 2.4 - IPTables FTP Stateful Inspection Arbitrary Filter Rule Insertion
|
This is a remote exploit for linux platform. Description: Linux Kernel 2.4 - IPTables FTP Stateful Inspection Arbitrary Filter Rule Insertion. Author: Cristiano Lincoln Mattos
|
Analyze the security implications of: Linux Kernel 2.4 - IPTables FTP Stateful Inspection Arbitrary Filter Rule Insertion
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: BloofoxCMS 0.2.2 - 'Img_Popup.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: BloofoxCMS 0.2.2 - 'Img_Popup.php' Cross-Site Scripting. Author: the_Edit0r
|
Analyze the security implications of: BloofoxCMS 0.2.2 - 'Img_Popup.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Bank Locker Management System - SQL Injection
|
This is a webapps exploit for php platform. Description: Bank Locker Management System - SQL Injection. Author: SoSPiro
|
Analyze the security implications of: Bank Locker Management System - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DB[CMS] - 'article.php' SQL Injection
|
This is a webapps exploit for php platform. Description: DB[CMS] - 'article.php' SQL Injection. Author: blackraptor
|
Analyze the security implications of: DB[CMS] - 'article.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: QNX RTOS 4.25 - monitor Arbitrary File Modification
|
This is a local exploit for linux platform. Description: QNX RTOS 4.25 - monitor Arbitrary File Modification. Author: Simon Ouellette
|
Analyze the security implications of: QNX RTOS 4.25 - monitor Arbitrary File Modification
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component Spider Catalog Lite 1.8.10 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Spider Catalog Lite 1.8.10 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component Spider Catalog Lite 1.8.10 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Claroline E-Learning 1.75 - 'ldap.inc.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Claroline E-Learning 1.75 - 'ldap.inc.php' Remote File Inclusion. Author: beford
|
Analyze the security implications of: Claroline E-Learning 1.75 - 'ldap.inc.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.