input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: DeluxeBB 1.0 - 'topic.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Hotfoon Dialer 4.0 - Buffer Overflow (PoC)
|
This is a dos exploit for multiple platform. Description: Hotfoon Dialer 4.0 - Buffer Overflow (PoC). Author: S G Masood
|
Analyze the security implications of: Hotfoon Dialer 4.0 - Buffer Overflow (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CSE Bookstore 1.0 - 'quantity' Persistent Cross-site Scripting
|
This is a webapps exploit for php platform. Description: CSE Bookstore 1.0 - 'quantity' Persistent Cross-site Scripting. Author: Vyshnav nk
|
Analyze the security implications of: CSE Bookstore 1.0 - 'quantity' Persistent Cross-site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: uzbl 'uzbl-core' - '@SELECTED_URI' Mouse Button Bindings Command Injection
|
This is a remote exploit for linux platform. Description: uzbl 'uzbl-core' - '@SELECTED_URI' Mouse Button Bindings Command Injection. Author: Chuzz
|
Analyze the security implications of: uzbl 'uzbl-core' - '@SELECTED_URI' Mouse Button Bindings Command Injection
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: DirectAdmin 1.34.4 - Multiple Cross-Site Request Forgerys
|
This is a webapps exploit for php platform. Description: DirectAdmin 1.34.4 - Multiple Cross-Site Request Forgerys. Author: K053
|
Analyze the security implications of: DirectAdmin 1.34.4 - Multiple Cross-Site Request Forgerys
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FireAnt 1.3 - 'index.php' Local File Inclusion
|
This is a webapps exploit for php platform. Description: FireAnt 1.3 - 'index.php' Local File Inclusion. Author: cOndemned
|
Analyze the security implications of: FireAnt 1.3 - 'index.php' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Redis - Replication Code Execution (Metasploit)
|
This is a remote exploit for linux platform. Description: Redis - Replication Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Redis - Replication Code Execution (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: PHP 4.x - DLOpen Memory Disclosure (2)
|
This is a local exploit for php platform. Description: PHP 4.x - DLOpen Memory Disclosure (2). Author: andrewg
|
Analyze the security implications of: PHP 4.x - DLOpen Memory Disclosure (2)
|
This exploit targets php systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_xball - 'team_id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_xball - 'team_id' SQL Injection. Author: CoBRa_21
|
Analyze the security implications of: Joomla! Component com_xball - 'team_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Elefant CMS - 'id' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Elefant CMS - 'id' Cross-Site Scripting. Author: PuN!Sh3r
|
Analyze the security implications of: Elefant CMS - 'id' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: M-TECH P-Synch 6.2.5 - 'nph-psa.exe?css' Remote File Inclusion
|
This is a webapps exploit for cgi platform. Description: M-TECH P-Synch 6.2.5 - 'nph-psa.exe?css' Remote File Inclusion. Author: JeiAr
|
Analyze the security implications of: M-TECH P-Synch 6.2.5 - 'nph-psa.exe?css' Remote File Inclusion
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: dotProject 2.1.9 - SQL Injection
|
This is a webapps exploit for php platform. Description: dotProject 2.1.9 - SQL Injection. Author: Metin Yunus Kandemir
|
Analyze the security implications of: dotProject 2.1.9 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FS Expedia Clone - 'hid' SQL Injection
|
This is a webapps exploit for php platform. Description: FS Expedia Clone - 'hid' SQL Injection. Author: 8bitsec
|
Analyze the security implications of: FS Expedia Clone - 'hid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: eWallet Online Payment Gateway 2 - Cross-Site Request Forgery
|
This is a webapps exploit for php platform. Description: eWallet Online Payment Gateway 2 - Cross-Site Request Forgery. Author: L0RD
|
Analyze the security implications of: eWallet Online Payment Gateway 2 - Cross-Site Request Forgery
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Hotel and Lodge Management System 1.0 - Remote Code Execution (Unauthenticated)
|
This is a webapps exploit for php platform. Description: Hotel and Lodge Management System 1.0 - Remote Code Execution (Unauthenticated). Author: Christian Vierschilling
|
Analyze the security implications of: Hotel and Lodge Management System 1.0 - Remote Code Execution (Unauthenticated)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: D-Link WBR-1310 - Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: D-Link WBR-1310 - Authentication Bypass. Author: Craig Heffner
|
Analyze the security implications of: D-Link WBR-1310 - Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Apache JackRabbit - WebDAV XML External Entity
|
This is a webapps exploit for java platform. Description: Apache JackRabbit - WebDAV XML External Entity. Author: Mikhail Egorov
|
Analyze the security implications of: Apache JackRabbit - WebDAV XML External Entity
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Entry Level Content Management System (EL CMS) - SQL Injection
|
This is a webapps exploit for php platform. Description: Entry Level Content Management System (EL CMS) - SQL Injection. Author: vir0e5
|
Analyze the security implications of: Entry Level Content Management System (EL CMS) - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ISC BIND 8 - Remote Cache Poisoning (2)
|
This is a remote exploit for linux platform. Description: ISC BIND 8 - Remote Cache Poisoning (2). Author: Amit Klein
|
Analyze the security implications of: ISC BIND 8 - Remote Cache Poisoning (2)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: barbo91 uploads - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: barbo91 uploads - Arbitrary File Upload. Author: indoushka
|
Analyze the security implications of: barbo91 uploads - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Achievo 1.x - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities
|
This is a webapps exploit for php platform. Description: Achievo 1.x - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities. Author: Ryan Dewhurst
|
Analyze the security implications of: Achievo 1.x - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AngelineCMS 0.8.1 - 'installpath' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: AngelineCMS 0.8.1 - 'installpath' Remote File Inclusion. Author: K-159
|
Analyze the security implications of: AngelineCMS 0.8.1 - 'installpath' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Komento 1.0.0 - 'sid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Komento 1.0.0 - 'sid' SQL Injection. Author: c4uR
|
Analyze the security implications of: Joomla! Component Komento 1.0.0 - 'sid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Free Real Estate Contact Form 1.09 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Free Real Estate Contact Form 1.09 - Local File Inclusion. Author: Pouya Daneshmand
|
Analyze the security implications of: Free Real Estate Contact Form 1.09 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mambo Module MOStlyCE 2.4 Image Manager Utility - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Mambo Module MOStlyCE 2.4 Image Manager Utility - Arbitrary File Upload. Author: AmnPardaz
|
Analyze the security implications of: Mambo Module MOStlyCE 2.4 Image Manager Utility - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WebKit - 'WebCore::Style::TreeResolver::styleForElement' Use-After-Free
|
This is a dos exploit for multiple platform. Description: WebKit - 'WebCore::Style::TreeResolver::styleForElement' Use-After-Free. Author: Google Security Research
|
Analyze the security implications of: WebKit - 'WebCore::Style::TreeResolver::styleForElement' Use-After-Free
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Extcalendar 2 - 'profile.php' Remote User Pass Change
|
This is a webapps exploit for php platform. Description: Extcalendar 2 - 'profile.php' Remote User Pass Change. Author: ajann
|
Analyze the security implications of: Extcalendar 2 - 'profile.php' Remote User Pass Change
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Crysis 1.21 - 'keyexchange' Packet Information Disclosure
|
This is a remote exploit for multiple platform. Description: Crysis 1.21 - 'keyexchange' Packet Information Disclosure. Author: Luigi Auriemma
|
Analyze the security implications of: Crysis 1.21 - 'keyexchange' Packet Information Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: FlexCMS 3.2.1 - Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: FlexCMS 3.2.1 - Persistent Cross-Site Scripting. Author: storm
|
Analyze the security implications of: FlexCMS 3.2.1 - Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! com_fabrik 3.9.11 - Directory Traversal
|
This is a webapps exploit for php platform. Description: Joomla! com_fabrik 3.9.11 - Directory Traversal. Author: qw3rTyTy
|
Analyze the security implications of: Joomla! com_fabrik 3.9.11 - Directory Traversal
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ProFTPd 1.3.5 - 'mod_copy' Command Execution (Metasploit)
|
This is a remote exploit for linux platform. Description: ProFTPd 1.3.5 - 'mod_copy' Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: ProFTPd 1.3.5 - 'mod_copy' Command Execution (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Icon Time Systems RTC-1000 Firmware 2.5.7458 - Cross-Site Scripting
|
This is a webapps exploit for hardware platform. Description: Icon Time Systems RTC-1000 Firmware 2.5.7458 - Cross-Site Scripting. Author: Keith Thome
|
Analyze the security implications of: Icon Time Systems RTC-1000 Firmware 2.5.7458 - Cross-Site Scripting
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Keld PHP-MySQL News Script 0.7.1 - 'login.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Keld PHP-MySQL News Script 0.7.1 - 'login.php' SQL Injection. Author: crimsoN_Loyd9
|
Analyze the security implications of: Keld PHP-MySQL News Script 0.7.1 - 'login.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: VGM Forbin - 'article.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: VGM Forbin - 'article.asp' SQL Injection. Author: Th3 RDX
|
Analyze the security implications of: VGM Forbin - 'article.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.