input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Mozilla Firefox - Proxy Prototype Privileged JavaScript Injection (Metasploit)
|
This is a remote exploit for multiple platform. Description: Mozilla Firefox - Proxy Prototype Privileged JavaScript Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: Mozilla Firefox - Proxy Prototype Privileged JavaScript Injection (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: cyberBB 0.6 - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: cyberBB 0.6 - Multiple SQL Injections. Author: cOndemned
|
Analyze the security implications of: cyberBB 0.6 - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component jDownloads 3.2.58 - Cross Site Scripting
|
This is a webapps exploit for php platform. Description: Joomla! Component jDownloads 3.2.58 - Cross Site Scripting. Author: Sureshbabu Narvaneni
|
Analyze the security implications of: Joomla! Component jDownloads 3.2.58 - Cross Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joostina 1.3 - 'index.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Joostina 1.3 - 'index.php' Cross-Site Scripting. Author: MustLive
|
Analyze the security implications of: Joostina 1.3 - 'index.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Elasticsearch ECE 7.13.3 - Anonymous Database Dump
|
This is a webapps exploit for multiple platform. Description: Elasticsearch ECE 7.13.3 - Anonymous Database Dump. Author: Joan Martinez
|
Analyze the security implications of: Elasticsearch ECE 7.13.3 - Anonymous Database Dump
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: TP-Link Archer CR-700 - Cross-Site Scripting
|
This is a webapps exploit for hardware platform. Description: TP-Link Archer CR-700 - Cross-Site Scripting. Author: Ayushman Dutta
|
Analyze the security implications of: TP-Link Archer CR-700 - Cross-Site Scripting
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Apple iPhone 3.1.2 - '7D11' Model MB702LL Mobile Safari Denial of Service
|
This is a dos exploit for hardware platform. Description: Apple iPhone 3.1.2 - '7D11' Model MB702LL Mobile Safari Denial of Service. Author: Matthew Bergin
|
Analyze the security implications of: Apple iPhone 3.1.2 - '7D11' Model MB702LL Mobile Safari Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Lepton CMS 2.2.0/2.2.1 - PHP Code Injection
|
This is a webapps exploit for php platform. Description: Lepton CMS 2.2.0/2.2.1 - PHP Code Injection. Author: hyp3rlinx
|
Analyze the security implications of: Lepton CMS 2.2.0/2.2.1 - PHP Code Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: eVision CMS 2.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: eVision CMS 2.0 - SQL Injection. Author: darkjoker
|
Analyze the security implications of: eVision CMS 2.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DasForum - 'layout' Local File Inclusion
|
This is a webapps exploit for php platform. Description: DasForum - 'layout' Local File Inclusion. Author: cr4wl3r
|
Analyze the security implications of: DasForum - 'layout' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ASPSitem 1.83 - 'Haberler.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: ASPSitem 1.83 - 'Haberler.asp' SQL Injection. Author: nukedx
|
Analyze the security implications of: ASPSitem 1.83 - 'Haberler.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: AFFCommerce Shopping Cart 1.1.4 - 'ItemInfo.php?item_id' SQL Injection
|
This is a webapps exploit for php platform. Description: AFFCommerce Shopping Cart 1.1.4 - 'ItemInfo.php?item_id' SQL Injection. Author: r0t3d3Vil
|
Analyze the security implications of: AFFCommerce Shopping Cart 1.1.4 - 'ItemInfo.php?item_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Oracle JD Edwards EnterpriseOne 8.9x Tools Web Runtime SEC - '/jde/MafletClose.mafService?RENDER_MAFLET' Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: Oracle JD Edwards EnterpriseOne 8.9x Tools Web Runtime SEC - '/jde/MafletClose.mafService?RENDER_MAFLET' Cross-Site Scripting. Author: Juan Manuel Garcia
|
Analyze the security implications of: Oracle JD Edwards EnterpriseOne 8.9x Tools Web Runtime SEC - '/jde/MafletClose.mafService?RENDER_MAFLET' Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Easynews 4.4.1 - 'admin.php' Authentication Bypass
|
This is a webapps exploit for php platform. Description: Easynews 4.4.1 - 'admin.php' Authentication Bypass. Author: nuffsaid
|
Analyze the security implications of: Easynews 4.4.1 - 'admin.php' Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: dotProject 2.1.5 - Cross-Site Request Forgery
|
This is a webapps exploit for php platform. Description: dotProject 2.1.5 - Cross-Site Request Forgery. Author: AutoSec Tools
|
Analyze the security implications of: dotProject 2.1.5 - Cross-Site Request Forgery
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CS-Cart 1.3.2 - 'index.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: CS-Cart 1.3.2 - 'index.php' Cross-Site Scripting. Author: sasquatch
|
Analyze the security implications of: CS-Cart 1.3.2 - 'index.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Advanced Image Hosting Script - SQL Injection
|
This is a webapps exploit for php platform. Description: Advanced Image Hosting Script - SQL Injection. Author: Robert Cooper
|
Analyze the security implications of: Advanced Image Hosting Script - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: gps-server.net GPS Tracking Software < 3.1 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: gps-server.net GPS Tracking Software < 3.1 - Multiple Vulnerabilities. Author: Noman Riffat
|
Analyze the security implications of: gps-server.net GPS Tracking Software < 3.1 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Hesk Help Desk 2.1 - Cross-Site Request Forgery
|
This is a webapps exploit for php platform. Description: Hesk Help Desk 2.1 - Cross-Site Request Forgery. Author: The.Morpheus
|
Analyze the security implications of: Hesk Help Desk 2.1 - Cross-Site Request Forgery
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Facebook Clone Script 1.0.5 - Cross-Site Request Forgery
|
This is a webapps exploit for php platform. Description: Facebook Clone Script 1.0.5 - Cross-Site Request Forgery. Author: L0RD
|
Analyze the security implications of: Facebook Clone Script 1.0.5 - Cross-Site Request Forgery
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DirectAdmin 1.55 - 'CMD_ACCOUNT_ADMIN' Cross-Site Request Forgery
|
This is a webapps exploit for php platform. Description: DirectAdmin 1.55 - 'CMD_ACCOUNT_ADMIN' Cross-Site Request Forgery. Author: ManhNho
|
Analyze the security implications of: DirectAdmin 1.55 - 'CMD_ACCOUNT_ADMIN' Cross-Site Request Forgery
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: coppermine photo Gallery 1.4.22 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: coppermine photo Gallery 1.4.22 - Multiple Vulnerabilities. Author: girex
|
Analyze the security implications of: coppermine photo Gallery 1.4.22 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Gauntlet Firewall 4.1/4.2/5.0 / Webshield E-ppliance 100.0/300.0 / IRIX 6.5.x - Remote Buffer Overflow
|
This is a remote exploit for irix platform. Description: Gauntlet Firewall 4.1/4.2/5.0 / Webshield E-ppliance 100.0/300.0 / IRIX 6.5.x - Remote Buffer Overflow. Author: _Gramble_
|
Analyze the security implications of: Gauntlet Firewall 4.1/4.2/5.0 / Webshield E-ppliance 100.0/300.0 / IRIX 6.5.x - Remote Buffer Overflow
|
This exploit targets irix systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets irix platform
|
What is this exploit about: Anzeigenmarkt 2011 - 'index.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Anzeigenmarkt 2011 - 'index.php' SQL Injection. Author: Easy Laster
|
Analyze the security implications of: Anzeigenmarkt 2011 - 'index.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Advanced Image Hosting (AIH) 2.1 - SQL Injection
|
This is a webapps exploit for php platform. Description: Advanced Image Hosting (AIH) 2.1 - SQL Injection. Author: Stack
|
Analyze the security implications of: Advanced Image Hosting (AIH) 2.1 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Horizon Web Builder - 'fshow.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Horizon Web Builder - 'fshow.php' SQL Injection. Author: Iolo Morganwg
|
Analyze the security implications of: Horizon Web Builder - 'fshow.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: College-Management-System 1.2 - Authentication Bypass
|
This is a webapps exploit for php platform. Description: College-Management-System 1.2 - Authentication Bypass. Author: cakes
|
Analyze the security implications of: College-Management-System 1.2 - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mailtraq 2.2 - Webmail Utility Full Path Disclosure
|
This is a webapps exploit for asp platform. Description: Mailtraq 2.2 - Webmail Utility Full Path Disclosure. Author: Ziv Kamir
|
Analyze the security implications of: Mailtraq 2.2 - Webmail Utility Full Path Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Kaseya < 6.3.0.2 - Arbitrary File Upload
|
This is a webapps exploit for asp platform. Description: Kaseya < 6.3.0.2 - Arbitrary File Upload. Author: Security-Assessment.com
|
Analyze the security implications of: Kaseya < 6.3.0.2 - Arbitrary File Upload
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Luckybot 3 - 'DIR' Multiple Remote File Inclusions
|
This is a webapps exploit for php platform. Description: Luckybot 3 - 'DIR' Multiple Remote File Inclusions. Author: Red_Casper
|
Analyze the security implications of: Luckybot 3 - 'DIR' Multiple Remote File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Trend Micro Interscan Web Security Virtual Appliance - Multiple Vulnerabilities
|
This is a remote exploit for hardware platform. Description: Trend Micro Interscan Web Security Virtual Appliance - Multiple Vulnerabilities. Author: Ivan Huertas
|
Analyze the security implications of: Trend Micro Interscan Web Security Virtual Appliance - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: LibTIFF - '_TIFFVGetField (tiffsplit)' Out-of-Bounds Read
|
This is a dos exploit for linux platform. Description: LibTIFF - '_TIFFVGetField (tiffsplit)' Out-of-Bounds Read. Author: zhangtan
|
Analyze the security implications of: LibTIFF - '_TIFFVGetField (tiffsplit)' Out-of-Bounds Read
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apple Safari 3.2.2 - 'feed:' URI Multiple Input Validation Vulnerabilities
|
This is a remote exploit for multiple platform. Description: Apple Safari 3.2.2 - 'feed:' URI Multiple Input Validation Vulnerabilities. Author: Billy Rios
|
Analyze the security implications of: Apple Safari 3.2.2 - 'feed:' URI Multiple Input Validation Vulnerabilities
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.