input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: Gazelle CMS 1.0 - Update Statement SQL Injection | This is a webapps exploit for php platform. Description: Gazelle CMS 1.0 - Update Statement SQL Injection. Author: hackme |
Analyze the security implications of: Gazelle CMS 1.0 - Update Statement SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Nagios 3.0.6 - 'statuswml.cgi' Arbitrary Shell Command Injection | This is a remote exploit for cgi platform. Description: Nagios 3.0.6 - 'statuswml.cgi' Arbitrary Shell Command Injection. Author: Paul |
Analyze the security implications of: Nagios 3.0.6 - 'statuswml.cgi' Arbitrary Shell Command Injection | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: BlueSoft Rate My Photo Site - 'ty' SQL Injection | This is a webapps exploit for php platform. Description: BlueSoft Rate My Photo Site - 'ty' SQL Injection. Author: darkTR |
Analyze the security implications of: BlueSoft Rate My Photo Site - 'ty' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WFTPD Server 3.30 - Multiple Vulnerabilities | This is a remote exploit for linux platform. Description: WFTPD Server 3.30 - Multiple Vulnerabilities. Author: fl0 fl0w |
Analyze the security implications of: WFTPD Server 3.30 - Multiple Vulnerabilities | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Polymorph 0.4 - Filename Buffer Overflow | This is a local exploit for linux platform. Description: Polymorph 0.4 - Filename Buffer Overflow. Author: demz |
Analyze the security implications of: Polymorph 0.4 - Filename Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: LinPHA Photo Gallery 2.0 - Remote Command Execution | This is a webapps exploit for php platform. Description: LinPHA Photo Gallery 2.0 - Remote Command Execution. Author: Osirys |
Analyze the security implications of: LinPHA Photo Gallery 2.0 - Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: coWiki - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: coWiki - 'index.php' Cross-Site Scripting. Author: MustLive |
Analyze the security implications of: coWiki - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Pi-Hole - heisenbergCompensator Blocklist OS Command Execution (Metasploit) | This is a remote exploit for php platform. Description: Pi-Hole - heisenbergCompensator Blocklist OS Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Pi-Hole - heisenbergCompensator Blocklist OS Command Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Samba 2.0.7 - SWAT Symlink (1) | This is a local exploit for linux platform. Description: Samba 2.0.7 - SWAT Symlink (1). Author: Optyx |
Analyze the security implications of: Samba 2.0.7 - SWAT Symlink (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Samba 2.0.7 - SWAT Logfile Permissions | This is a local exploit for linux platform. Description: Samba 2.0.7 - SWAT Logfile Permissions. Author: miah |
Analyze the security implications of: Samba 2.0.7 - SWAT Logfile Permissions | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: JMX2 Email Tester - 'save_email.php' Arbitrary File Upload | This is a webapps exploit for multiple platform. Description: JMX2 Email Tester - 'save_email.php' Arbitrary File Upload. Author: HaHwul |
Analyze the security implications of: JMX2 Email Tester - 'save_email.php' Arbitrary File Upload | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Ajax Quiz 1.8 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Ajax Quiz 1.8 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Ajax Quiz 1.8 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Broadcom Wi-Fi SoC - 'dhd_handle_swc_evt' Heap Overflow | This is a remote exploit for hardware platform. Description: Broadcom Wi-Fi SoC - 'dhd_handle_swc_evt' Heap Overflow. Author: Google Security Research |
Analyze the security implications of: Broadcom Wi-Fi SoC - 'dhd_handle_swc_evt' Heap Overflow | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Linux Kernel - TCP Related Read Use-After-Free | This is a dos exploit for linux platform. Description: Linux Kernel - TCP Related Read Use-After-Free. Author: Marco Grassi |
Analyze the security implications of: Linux Kernel - TCP Related Read Use-After-Free | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: BrightSign Digital Signage - Multiple Vulnerablities | This is a webapps exploit for hardware platform. Description: BrightSign Digital Signage - Multiple Vulnerablities. Author: Information Paradox |
Analyze the security implications of: BrightSign Digital Signage - Multiple Vulnerablities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: HP VAN SDN Controller - Root Command Injection (Metasploit) | This is a remote exploit for linux platform. Description: HP VAN SDN Controller - Root Command Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: HP VAN SDN Controller - Root Command Injection (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: HispaH textlinksads - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: HispaH textlinksads - 'index.php' SQL Injection. Author: InjEctOr5 |
Analyze the security implications of: HispaH textlinksads - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MetaDot Portal Server 5.6.x - 'index.pl' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for cgi platform. Description: MetaDot Portal Server 5.6.x - 'index.pl' Multiple Cross-Site Scripting Vulnerabilities. Author: JeiAr |
Analyze the security implications of: MetaDot Portal Server 5.6.x - 'index.pl' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: COMTREND CT-507 IT ADSL Router - 'scvrtsrv.cmd' Cross-Site Scripting | This is a remote exploit for hardware platform. Description: COMTREND CT-507 IT ADSL Router - 'scvrtsrv.cmd' Cross-Site Scripting. Author: Yoyahack |
Analyze the security implications of: COMTREND CT-507 IT ADSL Router - 'scvrtsrv.cmd' Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Zabbix Agent 3.0.1 - 'mysql.size' Shell Command Injection | This is a local exploit for linux platform. Description: Zabbix Agent 3.0.1 - 'mysql.size' Shell Command Injection. Author: Timo Lindfors |
Analyze the security implications of: Zabbix Agent 3.0.1 - 'mysql.size' Shell Command Injection | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apache 2.0.4x mod_perl - File Descriptor Leakage (3) | This is a local exploit for linux platform. Description: Apache 2.0.4x mod_perl - File Descriptor Leakage (3). Author: Steve Grubb |
Analyze the security implications of: Apache 2.0.4x mod_perl - File Descriptor Leakage (3) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Samsung Galaxy S6 - libQjpeg DoIntegralUpsample Crash | This is a dos exploit for android platform. Description: Samsung Galaxy S6 - libQjpeg DoIntegralUpsample Crash. Author: Google Security Research |
Analyze the security implications of: Samsung Galaxy S6 - libQjpeg DoIntegralUpsample Crash | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: DreamAccount 3.1 - 'auth.api.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: DreamAccount 3.1 - 'auth.api.php' Remote File Inclusion. Author: CrAsh_oVeR_rIdE |
Analyze the security implications of: DreamAccount 3.1 - 'auth.api.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CJG EXPLORER PRO 3.2 - 'g_pcltar_lib_dir' Remote File Inclusion | This is a webapps exploit for php platform. Description: CJG EXPLORER PRO 3.2 - 'g_pcltar_lib_dir' Remote File Inclusion. Author: Mogatil |
Analyze the security implications of: CJG EXPLORER PRO 3.2 - 'g_pcltar_lib_dir' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Zen Load Balancer 3.10.1 - 'index.cgi' Directory Traversal | This is a webapps exploit for cgi platform. Description: Zen Load Balancer 3.10.1 - 'index.cgi' Directory Traversal. Author: Basim Alabdullah |
Analyze the security implications of: Zen Load Balancer 3.10.1 - 'index.cgi' Directory Traversal | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Visual Mining NetCharts Server - Remote Code Execution (Metasploit) | This is a remote exploit for java platform. Description: Visual Mining NetCharts Server - Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Visual Mining NetCharts Server - Remote Code Execution (Metasploit) | This exploit targets java systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Coppermine Photo Gallery 1.0 - PHP Code Injection | This is a webapps exploit for php platform. Description: Coppermine Photo Gallery 1.0 - PHP Code Injection. Author: Berend-Jan Wever |
Analyze the security implications of: Coppermine Photo Gallery 1.0 - PHP Code Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Collabtive 1.0 - 'manageuser.php' SQL Injection | This is a webapps exploit for php platform. Description: Collabtive 1.0 - 'manageuser.php' SQL Injection. Author: drone |
Analyze the security implications of: Collabtive 1.0 - 'manageuser.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: QNX RTOS 4.25/6.1 - su Password Hash Disclosure | This is a local exploit for linux platform. Description: QNX RTOS 4.25/6.1 - su Password Hash Disclosure. Author: badc0ded |
Analyze the security implications of: QNX RTOS 4.25/6.1 - su Password Hash Disclosure | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: eSyndiCat 2.2 - 'register.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: eSyndiCat 2.2 - 'register.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Fugitif |
Analyze the security implications of: eSyndiCat 2.2 - 'register.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JE Awd Song 1.8 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JE Awd Song 1.8 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component JE Awd Song 1.8 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FipsCMS 2.1 - 'print.asp' SQL Injection | This is a webapps exploit for asp platform. Description: FipsCMS 2.1 - 'print.asp' SQL Injection. Author: InjEctOr5 |
Analyze the security implications of: FipsCMS 2.1 - 'print.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Cemetry Mapping and Information System 1.0 - 'user_email' Sql Injection (Authentication Bypass) | This is a webapps exploit for php platform. Description: Cemetry Mapping and Information System 1.0 - 'user_email' Sql Injection (Authentication Bypass). Author: Marco Catalano |
Analyze the security implications of: Cemetry Mapping and Information System 1.0 - 'user_email' Sql Injection (Authentication Bypass) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.