input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Battle Blog 1.25 - 'comment.asp' SQL Injection
|
This is a webapps exploit for php platform. Description: Battle Blog 1.25 - 'comment.asp' SQL Injection. Author: Bl@ckbe@rD
|
Analyze the security implications of: Battle Blog 1.25 - 'comment.asp' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Article Publisher PRO - 'userid' SQL Injection
|
This is a webapps exploit for php platform. Description: Article Publisher PRO - 'userid' SQL Injection. Author: Stack
|
Analyze the security implications of: Article Publisher PRO - 'userid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mambo Component Sitemap 2.0.0 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Mambo Component Sitemap 2.0.0 - Remote File Inclusion. Author: Matdhule
|
Analyze the security implications of: Mambo Component Sitemap 2.0.0 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Coppermine Photo Gallery 1.4.12 - 'referer' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Coppermine Photo Gallery 1.4.12 - 'referer' Cross-Site Scripting. Author: L4teral
|
Analyze the security implications of: Coppermine Photo Gallery 1.4.12 - 'referer' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Nethack 3 - Local Buffer Overflow (1)
|
This is a local exploit for linux platform. Description: Nethack 3 - Local Buffer Overflow (1). Author: tsao@efnet
|
Analyze the security implications of: Nethack 3 - Local Buffer Overflow (1)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Hastymail 1.x - IMAP SMTP Command Injection
|
This is a webapps exploit for php platform. Description: Hastymail 1.x - IMAP SMTP Command Injection. Author: Vicente Aguilera Diaz
|
Analyze the security implications of: Hastymail 1.x - IMAP SMTP Command Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CF Image Hosting Script 1.3.82 - File Disclosure
|
This is a webapps exploit for php platform. Description: CF Image Hosting Script 1.3.82 - File Disclosure. Author: bd0rk
|
Analyze the security implications of: CF Image Hosting Script 1.3.82 - File Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Feng Office 3.7.0.5 - Remote Command Execution (Metasploit)
|
This is a webapps exploit for php platform. Description: Feng Office 3.7.0.5 - Remote Command Execution (Metasploit). Author: AkkuS
|
Analyze the security implications of: Feng Office 3.7.0.5 - Remote Command Execution (Metasploit)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LiquidVPN 1.36 / 1.37 - Privilege Escalation
|
This is a local exploit for macos platform. Description: LiquidVPN 1.36 / 1.37 - Privilege Escalation. Author: Bernd Leitner
|
Analyze the security implications of: LiquidVPN 1.36 / 1.37 - Privilege Escalation
|
This exploit targets macos systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets macos platform
|
What is this exploit about: Joomla! Component jVideoDirect - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component jVideoDirect - Blind SQL Injection. Author: B-HUNT3|2
|
Analyze the security implications of: Joomla! Component jVideoDirect - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: philboard 1.14 - 'philboard_admin.asp' Authentication Bypass
|
This is a webapps exploit for asp platform. Description: philboard 1.14 - 'philboard_admin.asp' Authentication Bypass. Author: aresu@bosen.net
|
Analyze the security implications of: philboard 1.14 - 'philboard_admin.asp' Authentication Bypass
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: fusermount - user_allow_other Restriction Bypass and SELinux Label Control
|
This is a dos exploit for linux platform. Description: fusermount - user_allow_other Restriction Bypass and SELinux Label Control. Author: Google Security Research
|
Analyze the security implications of: fusermount - user_allow_other Restriction Bypass and SELinux Label Control
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Oracle Netbeans IDE 8.1 - Directory Traversal
|
This is a local exploit for multiple platform. Description: Oracle Netbeans IDE 8.1 - Directory Traversal. Author: hyp3rlinx
|
Analyze the security implications of: Oracle Netbeans IDE 8.1 - Directory Traversal
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: BRU 15.1/16.0 - BRUEXECLOG Environment Variable
|
This is a local exploit for multiple platform. Description: BRU 15.1/16.0 - BRUEXECLOG Environment Variable. Author: Riley Hassell
|
Analyze the security implications of: BRU 15.1/16.0 - BRUEXECLOG Environment Variable
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Flatnux CMS 2013-01.17 - 'index.php' Local File Inclusion
|
This is a webapps exploit for php platform. Description: Flatnux CMS 2013-01.17 - 'index.php' Local File Inclusion. Author: DaOne
|
Analyze the security implications of: Flatnux CMS 2013-01.17 - 'index.php' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Big Forum 5.2 - Arbitrary File Upload / Local File Inclusion
|
This is a webapps exploit for php platform. Description: Big Forum 5.2 - Arbitrary File Upload / Local File Inclusion. Author: Zer0 Thunder
|
Analyze the security implications of: Big Forum 5.2 - Arbitrary File Upload / Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: shadowsocks-libev 3.1.0 - Command Execution
|
This is a local exploit for linux platform. Description: shadowsocks-libev 3.1.0 - Command Execution. Author: X41 D-Sec GmbH
|
Analyze the security implications of: shadowsocks-libev 3.1.0 - Command Execution
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Magnolia Search Module 2.1 - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Magnolia Search Module 2.1 - Cross-Site Scripting. Author: r0t3d3Vil
|
Analyze the security implications of: Magnolia Search Module 2.1 - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CMS Afroditi - 'id' SQL Injection
|
This is a webapps exploit for asp platform. Description: CMS Afroditi - 'id' SQL Injection. Author: projectzero labs
|
Analyze the security implications of: CMS Afroditi - 'id' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: PaKnPost Pro 1.14 - Multiple Vulnerabilities
|
This is a webapps exploit for cgi platform. Description: PaKnPost Pro 1.14 - Multiple Vulnerabilities. Author: Edvin Rustemagic_ Grega Preseren
|
Analyze the security implications of: PaKnPost Pro 1.14 - Multiple Vulnerabilities
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: ntop/nbox 2.3 < 2.5 - Multiple Vulnerabilities
|
This is a remote exploit for linux platform. Description: ntop/nbox 2.3 < 2.5 - Multiple Vulnerabilities. Author: Javier Marcos
|
Analyze the security implications of: ntop/nbox 2.3 < 2.5 - Multiple Vulnerabilities
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: CityWriter 0.9.7 - 'head.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: CityWriter 0.9.7 - 'head.php' Remote File Inclusion. Author: RoMaNcYxHaCkEr
|
Analyze the security implications of: CityWriter 0.9.7 - 'head.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: F5 Big-IP - rsync Access
|
This is a remote exploit for hardware platform. Description: F5 Big-IP - rsync Access. Author: Security-Assessment.com
|
Analyze the security implications of: F5 Big-IP - rsync Access
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: PoPToP PPTP 1.1.4-b3 - Remote Command Execution
|
This is a remote exploit for linux platform. Description: PoPToP PPTP 1.1.4-b3 - Remote Command Execution. Author: einstein
|
Analyze the security implications of: PoPToP PPTP 1.1.4-b3 - Remote Command Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: FS Trademe Clone 1.0 - 'search' / 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: FS Trademe Clone 1.0 - 'search' / 'id' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: FS Trademe Clone 1.0 - 'search' / 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Interact 2.4.1 - Multiple Remote File Inclusions
|
This is a webapps exploit for php platform. Description: Interact 2.4.1 - Multiple Remote File Inclusions. Author: RoMaNcYxHaCkEr
|
Analyze the security implications of: Interact 2.4.1 - Multiple Remote File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CUPS Server 1.1 - GET Denial of Service
|
This is a dos exploit for linux platform. Description: CUPS Server 1.1 - GET Denial of Service. Author: tracewar
|
Analyze the security implications of: CUPS Server 1.1 - GET Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Allaire ColdFusion Server 4.0/4.0.1 - 'CFCACHE' Information Disclosure
|
This is a remote exploit for multiple platform. Description: Allaire ColdFusion Server 4.0/4.0.1 - 'CFCACHE' Information Disclosure. Author: anonymous
|
Analyze the security implications of: Allaire ColdFusion Server 4.0/4.0.1 - 'CFCACHE' Information Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Gazelle CMS - Cross-Site Request Forgery
|
This is a webapps exploit for php platform. Description: Gazelle CMS - Cross-Site Request Forgery. Author: pratul agrawal
|
Analyze the security implications of: Gazelle CMS - Cross-Site Request Forgery
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ASPired2Quote - Remote Database Disclosure
|
This is a webapps exploit for asp platform. Description: ASPired2Quote - Remote Database Disclosure. Author: Pouya_Server
|
Analyze the security implications of: ASPired2Quote - Remote Database Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Blog System 1.5 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Blog System 1.5 - Multiple Vulnerabilities. Author: cp77fk4r
|
Analyze the security implications of: Blog System 1.5 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Centreon 2.3.1 - 'command_name' Remote Command Execution
|
This is a webapps exploit for php platform. Description: Centreon 2.3.1 - 'command_name' Remote Command Execution. Author: Christophe de la Fuente
|
Analyze the security implications of: Centreon 2.3.1 - 'command_name' Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: UApplication Ublog Reload 1.0.5 - 'Trackback.asp' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: UApplication Ublog Reload 1.0.5 - 'Trackback.asp' Cross-Site Scripting. Author: Dedi Dwianto
|
Analyze the security implications of: UApplication Ublog Reload 1.0.5 - 'Trackback.asp' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.