input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Kajona 4.7 - Cross-Site Scripting / Directory Traversal
|
This is a webapps exploit for php platform. Description: Kajona 4.7 - Cross-Site Scripting / Directory Traversal. Author: Curesec Research Team
|
Analyze the security implications of: Kajona 4.7 - Cross-Site Scripting / Directory Traversal
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Koch Roland Rolis Guestbook 1.0 - '$path' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Koch Roland Rolis Guestbook 1.0 - '$path' Remote File Inclusion. Author: RusH security team
|
Analyze the security implications of: Koch Roland Rolis Guestbook 1.0 - '$path' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Jinzora 2.7.5 - 'slim.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Jinzora 2.7.5 - 'slim.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Alexandr Polyakov
|
Analyze the security implications of: Jinzora 2.7.5 - 'slim.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Zix Forum 1.12 - 'layid' SQL Injection
|
This is a webapps exploit for asp platform. Description: Zix Forum 1.12 - 'layid' SQL Injection. Author: FarhadKey
|
Analyze the security implications of: Zix Forum 1.12 - 'layid' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Xine-Lib 1.1 - 'Media Player Library' Remote Format String
|
This is a remote exploit for linux platform. Description: Xine-Lib 1.1 - 'Media Player Library' Remote Format String. Author: Ulf Harnhammar
|
Analyze the security implications of: Xine-Lib 1.1 - 'Media Player Library' Remote Format String
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: WordPress Plugin Ajax Load More 2.8.1.1 - PHP Upload (Metasploit)
|
This is a remote exploit for php platform. Description: WordPress Plugin Ajax Load More 2.8.1.1 - PHP Upload (Metasploit). Author: Metasploit
|
Analyze the security implications of: WordPress Plugin Ajax Load More 2.8.1.1 - PHP Upload (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IBM DB2 - 'db2govd' Command Line Argument Local Overflow
|
This is a dos exploit for linux platform. Description: IBM DB2 - 'db2govd' Command Line Argument Local Overflow. Author: SNOSoft
|
Analyze the security implications of: IBM DB2 - 'db2govd' Command Line Argument Local Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Drupal < 5.22/6.16 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Drupal < 5.22/6.16 - Multiple Vulnerabilities. Author: David Rothstein
|
Analyze the security implications of: Drupal < 5.22/6.16 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Sagem F@ST 2604 ADSL Router - Cross-Site Request Forgery
|
This is a webapps exploit for hardware platform. Description: Sagem F@ST 2604 ADSL Router - Cross-Site Request Forgery. Author: KinG Of PiraTeS
|
Analyze the security implications of: Sagem F@ST 2604 ADSL Router - Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Denapars Shop Script - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Denapars Shop Script - Multiple Vulnerabilities. Author: indoushka
|
Analyze the security implications of: Denapars Shop Script - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Payara Micro Community 5.2021.6 - Directory Traversal
|
This is a webapps exploit for multiple platform. Description: Payara Micro Community 5.2021.6 - Directory Traversal. Author: Yasser Khan
|
Analyze the security implications of: Payara Micro Community 5.2021.6 - Directory Traversal
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Verizon Fios Router MI424WR-GEN3I - Cross-Site Request Forgery
|
This is a webapps exploit for hardware platform. Description: Verizon Fios Router MI424WR-GEN3I - Cross-Site Request Forgery. Author: Jacob Holcomb
|
Analyze the security implications of: Verizon Fios Router MI424WR-GEN3I - Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Aqua CMS - 'Username' SQL Injection
|
This is a webapps exploit for php platform. Description: Aqua CMS - 'Username' SQL Injection. Author: halkfild
|
Analyze the security implications of: Aqua CMS - 'Username' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: EZ Publish 2.2.7/3.0 - Multiple Full Path Disclosure Vulnerabilities
|
This is a webapps exploit for php platform. Description: EZ Publish 2.2.7/3.0 - Multiple Full Path Disclosure Vulnerabilities. Author: gregory Le Bras
|
Analyze the security implications of: EZ Publish 2.2.7/3.0 - Multiple Full Path Disclosure Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CourseMS 2.1 - 'name' Stored XSS
|
This is a webapps exploit for multiple platform. Description: CourseMS 2.1 - 'name' Stored XSS. Author: cptsticky
|
Analyze the security implications of: CourseMS 2.1 - 'name' Stored XSS
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: MagicScripts E-Store Kit-2 PayPal Edition - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: MagicScripts E-Store Kit-2 PayPal Edition - Cross-Site Scripting. Author: Dcrab
|
Analyze the security implications of: MagicScripts E-Store Kit-2 PayPal Edition - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Almond Classifieds com_aclassf 7.5 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Joomla! Component Almond Classifieds com_aclassf 7.5 - Multiple Vulnerabilities. Author: Moudi
|
Analyze the security implications of: Joomla! Component Almond Classifieds com_aclassf 7.5 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Danneo CMS 0.5.1 - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Danneo CMS 0.5.1 - Blind SQL Injection. Author: InATeam
|
Analyze the security implications of: Danneo CMS 0.5.1 - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component JooDatabase 3.1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component JooDatabase 3.1.0 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component JooDatabase 3.1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component PayPal IPN for DOCman 3.1 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component PayPal IPN for DOCman 3.1 - 'id' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component PayPal IPN for DOCman 3.1 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Eibiz i-Media Server Digital Signage 3.8.0 - Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: Eibiz i-Media Server Digital Signage 3.8.0 - Authentication Bypass. Author: LiquidWorm
|
Analyze the security implications of: Eibiz i-Media Server Digital Signage 3.8.0 - Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: FileContral - Local File Inclusion / Local File Disclosure
|
This is a webapps exploit for php platform. Description: FileContral - Local File Inclusion / Local File Disclosure. Author: Ashiyane Digital Security Team
|
Analyze the security implications of: FileContral - Local File Inclusion / Local File Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CodoForum 3.4 - Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: CodoForum 3.4 - Persistent Cross-Site Scripting. Author: Ahmed Sherif
|
Analyze the security implications of: CodoForum 3.4 - Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GeoBlog MOD_1.0 - 'deletecomment.php?id' Arbitrary Comment Deletion
|
This is a webapps exploit for php platform. Description: GeoBlog MOD_1.0 - 'deletecomment.php?id' Arbitrary Comment Deletion. Author: joseph.giron13
|
Analyze the security implications of: GeoBlog MOD_1.0 - 'deletecomment.php?id' Arbitrary Comment Deletion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Anevia Flamingo XL 3.6.20 - Authenticated Root Remote Code Execution
|
This is a remote exploit for hardware platform. Description: Anevia Flamingo XL 3.6.20 - Authenticated Root Remote Code Execution. Author: LiquidWorm
|
Analyze the security implications of: Anevia Flamingo XL 3.6.20 - Authenticated Root Remote Code Execution
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Drupal < 7.58 - 'Drupalgeddon3' (Authenticated) Remote Code (Metasploit)
|
This is a webapps exploit for php platform. Description: Drupal < 7.58 - 'Drupalgeddon3' (Authenticated) Remote Code (Metasploit). Author: SixP4ck3r
|
Analyze the security implications of: Drupal < 7.58 - 'Drupalgeddon3' (Authenticated) Remote Code (Metasploit)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MercurySteam Scrapland Game Server 1.0 - Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: MercurySteam Scrapland Game Server 1.0 - Remote Denial of Service. Author: Luigi Auriemma
|
Analyze the security implications of: MercurySteam Scrapland Game Server 1.0 - Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Date & Sex Vor und Rückwärts Auktions System 2 - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Date & Sex Vor und Rückwärts Auktions System 2 - Blind SQL Injection. Author: Easy Laster
|
Analyze the security implications of: Date & Sex Vor und Rückwärts Auktions System 2 - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mah-Jong 1.4 - Client/Server Remote sscanf() Buffer Overflow
|
This is a remote exploit for linux platform. Description: Mah-Jong 1.4 - Client/Server Remote sscanf() Buffer Overflow. Author: V9
|
Analyze the security implications of: Mah-Jong 1.4 - Client/Server Remote sscanf() Buffer Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Oracle WebLogic Server 10.3.6.0 - Java Deserialization Remote Code Execution
|
This is a remote exploit for java platform. Description: Oracle WebLogic Server 10.3.6.0 - Java Deserialization Remote Code Execution. Author: SlidingWindow
|
Analyze the security implications of: Oracle WebLogic Server 10.3.6.0 - Java Deserialization Remote Code Execution
|
This exploit targets java systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Joomla! Component com_macgallery 1.5 - Arbitrary File Download
|
This is a webapps exploit for php platform. Description: Joomla! Component com_macgallery 1.5 - Arbitrary File Download. Author: Claudio Viviani
|
Analyze the security implications of: Joomla! Component com_macgallery 1.5 - Arbitrary File Download
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Samsung DVR SHR2040 - HTTPd Remote Denial of Service Denial of Service (PoC)
|
This is a dos exploit for hardware platform. Description: Samsung DVR SHR2040 - HTTPd Remote Denial of Service Denial of Service (PoC). Author: Alex Hernandez
|
Analyze the security implications of: Samsung DVR SHR2040 - HTTPd Remote Denial of Service Denial of Service (PoC)
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component joom12pic 1.0 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component joom12pic 1.0 - Remote File Inclusion. Author: Morgan
|
Analyze the security implications of: Joomla! Component joom12pic 1.0 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.