input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Add An Ad Script - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Add An Ad Script - Arbitrary File Upload. Author: MR.Z
|
Analyze the security implications of: Add An Ad Script - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Moodle 3.6.3 - 'Install Plugin' Remote Command Execution (Metasploit)
|
This is a remote exploit for php platform. Description: Moodle 3.6.3 - 'Install Plugin' Remote Command Execution (Metasploit). Author: AkkuS
|
Analyze the security implications of: Moodle 3.6.3 - 'Install Plugin' Remote Command Execution (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Joaktree 1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Joaktree 1.0 - SQL Injection. Author: Don Tukulesto
|
Analyze the security implications of: Joomla! Component Joaktree 1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: SnipSnap 0.5.2 - HTTP Response Splitting
|
This is a remote exploit for multiple platform. Description: SnipSnap 0.5.2 - HTTP Response Splitting. Author: Maestro De-Seguridad
|
Analyze the security implications of: SnipSnap 0.5.2 - HTTP Response Splitting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ac4p Mobile - 'up.php?Taaa' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: ac4p Mobile - 'up.php?Taaa' Cross-Site Scripting. Author: SwEET-DeViL
|
Analyze the security implications of: ac4p Mobile - 'up.php?Taaa' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Goople 1.8.2 - 'FrontPage.php' Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Goople 1.8.2 - 'FrontPage.php' Blind SQL Injection. Author: darkjoker
|
Analyze the security implications of: Goople 1.8.2 - 'FrontPage.php' Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ben Chivers Easy Homepage Creator 1.0 - File Modification
|
This is a webapps exploit for cgi platform. Description: Ben Chivers Easy Homepage Creator 1.0 - File Modification. Author: Arek Suroboyo
|
Analyze the security implications of: Ben Chivers Easy Homepage Creator 1.0 - File Modification
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Perl 5.x - 'lc()' / 'uc()' TAINT Mode Protection Security Bypass
|
This is a remote exploit for linux platform. Description: Perl 5.x - 'lc()' / 'uc()' TAINT Mode Protection Security Bypass. Author: mmartinec
|
Analyze the security implications of: Perl 5.x - 'lc()' / 'uc()' TAINT Mode Protection Security Bypass
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Mapscrn 2.03 - Local Buffer Overflow (PoC)
|
This is a dos exploit for linux platform. Description: Mapscrn 2.03 - Local Buffer Overflow (PoC). Author: Juan Sacco
|
Analyze the security implications of: Mapscrn 2.03 - Local Buffer Overflow (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! / Mambo Component com_utchat 0.2 - Multiple Remote File Inclusions
|
This is a webapps exploit for php platform. Description: Joomla! / Mambo Component com_utchat 0.2 - Multiple Remote File Inclusions. Author: by_casper41
|
Analyze the security implications of: Joomla! / Mambo Component com_utchat 0.2 - Multiple Remote File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ircd-hybrid 8.0.5 - Denial of Service
|
This is a dos exploit for linux platform. Description: ircd-hybrid 8.0.5 - Denial of Service. Author: kingcope
|
Analyze the security implications of: ircd-hybrid 8.0.5 - Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Jaws 0.2/0.3/0.4 - 'ControlPanel.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Jaws 0.2/0.3/0.4 - 'ControlPanel.php' SQL Injection. Author: Fernando Quintero
|
Analyze the security implications of: Jaws 0.2/0.3/0.4 - 'ControlPanel.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HP Insight Diagnostics 9.4.0.4710 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: HP Insight Diagnostics 9.4.0.4710 - Local File Inclusion. Author: Markus Wulftange
|
Analyze the security implications of: HP Insight Diagnostics 9.4.0.4710 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CakePHP Framework 3.2.4 - IP Spoofing
|
This is a webapps exploit for php platform. Description: CakePHP Framework 3.2.4 - IP Spoofing. Author: Dawid Golunski
|
Analyze the security implications of: CakePHP Framework 3.2.4 - IP Spoofing
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CubeCart 3.0.4/4.3.6 - 'ProductID' SQL Injection
|
This is a webapps exploit for php platform. Description: CubeCart 3.0.4/4.3.6 - 'ProductID' SQL Injection. Author: Sangte Amtham
|
Analyze the security implications of: CubeCart 3.0.4/4.3.6 - 'ProductID' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CF Image Host 1.65 - PHP Command Injection
|
This is a webapps exploit for php platform. Description: CF Image Host 1.65 - PHP Command Injection. Author: hyp3rlinx
|
Analyze the security implications of: CF Image Host 1.65 - PHP Command Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dogfood CRM - 'spell.php' Remote Command Execution (Metasploit)
|
This is a webapps exploit for php platform. Description: Dogfood CRM - 'spell.php' Remote Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Dogfood CRM - 'spell.php' Remote Command Execution (Metasploit)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CMS NetCat 3.0/3.12 - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: CMS NetCat 3.0/3.12 - Blind SQL Injection. Author: s4avrd0w
|
Analyze the security implications of: CMS NetCat 3.0/3.12 - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Elber ESE DVB-S/S2 Satellite Receiver 1.5.x - Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: Elber ESE DVB-S/S2 Satellite Receiver 1.5.x - Authentication Bypass. Author: LiquidWorm
|
Analyze the security implications of: Elber ESE DVB-S/S2 Satellite Receiver 1.5.x - Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Buddy Zone 1.5 - 'view_sub_cat.php?cat_id' SQL Injection
|
This is a webapps exploit for php platform. Description: Buddy Zone 1.5 - 'view_sub_cat.php?cat_id' SQL Injection. Author: t0pP8uZz
|
Analyze the security implications of: Buddy Zone 1.5 - 'view_sub_cat.php?cat_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ad Manager Pro 4 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Ad Manager Pro 4 - Local File Inclusion. Author: CorryL
|
Analyze the security implications of: Ad Manager Pro 4 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WordPress Plugin Asset-Manager - Arbitrary '.PHP' File Upload (Metasploit)
|
This is a remote exploit for php platform. Description: WordPress Plugin Asset-Manager - Arbitrary '.PHP' File Upload (Metasploit). Author: Metasploit
|
Analyze the security implications of: WordPress Plugin Asset-Manager - Arbitrary '.PHP' File Upload (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Bux.to Clone Script - Insecure Cookie Handling
|
This is a webapps exploit for php platform. Description: Bux.to Clone Script - Insecure Cookie Handling. Author: SirGod
|
Analyze the security implications of: Bux.to Clone Script - Insecure Cookie Handling
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Microsoft IIS 4.0 / Microsoft JET 3.5/3.5.1 Database Engine - VBA
|
This is a dos exploit for multiple platform. Description: Microsoft IIS 4.0 / Microsoft JET 3.5/3.5.1 Database Engine - VBA. Author: J. Abreu Junior
|
Analyze the security implications of: Microsoft IIS 4.0 / Microsoft JET 3.5/3.5.1 Database Engine - VBA
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ASPBB 0.5.2 - 'Perform_search.asp' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: ASPBB 0.5.2 - 'Perform_search.asp' Cross-Site Scripting. Author: Mustafa Can Bjorn
|
Analyze the security implications of: ASPBB 0.5.2 - 'Perform_search.asp' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: AShop Deluxe 4.5 - 'basket.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: AShop Deluxe 4.5 - 'basket.php' Cross-Site Scripting. Author: Hackers Center Security
|
Analyze the security implications of: AShop Deluxe 4.5 - 'basket.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linksys Web Camera Software 2.10 - 'Next_file' File Disclosure
|
This is a webapps exploit for cgi platform. Description: Linksys Web Camera Software 2.10 - 'Next_file' File Disclosure. Author: John Doe
|
Analyze the security implications of: Linksys Web Camera Software 2.10 - 'Next_file' File Disclosure
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Blank'N'Berg 0.2 - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Blank'N'Berg 0.2 - Cross-Site Scripting. Author: Amine ABOUD
|
Analyze the security implications of: Blank'N'Berg 0.2 - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Horde 1.2.x/2.1.3 and Imp 2.2.x/3.1.2 - File Disclosure
|
This is a remote exploit for linux platform. Description: Horde 1.2.x/2.1.3 and Imp 2.2.x/3.1.2 - File Disclosure. Author: Caldera Open Linux
|
Analyze the security implications of: Horde 1.2.x/2.1.3 and Imp 2.2.x/3.1.2 - File Disclosure
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: GuppY 4.5 - 'editorTypetool.php?meskin' Traversal Arbitrary File Access
|
This is a webapps exploit for php platform. Description: GuppY 4.5 - 'editorTypetool.php?meskin' Traversal Arbitrary File Access. Author: retrogod@aliceposta.it
|
Analyze the security implications of: GuppY 4.5 - 'editorTypetool.php?meskin' Traversal Arbitrary File Access
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_colorlab 1.0 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component com_colorlab 1.0 - Remote File Inclusion. Author: Mehmet Ince
|
Analyze the security implications of: Joomla! Component com_colorlab 1.0 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IWebNegar - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: IWebNegar - Multiple SQL Injections. Author: Shervin Khaleghjou
|
Analyze the security implications of: IWebNegar - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IPConfigure Orchid VMS 2.0.5 - Directory Traversal / Information Disclosure (Metasploit)
|
This is a webapps exploit for multiple platform. Description: IPConfigure Orchid VMS 2.0.5 - Directory Traversal / Information Disclosure (Metasploit). Author: Nettitude
|
Analyze the security implications of: IPConfigure Orchid VMS 2.0.5 - Directory Traversal / Information Disclosure (Metasploit)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.