input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Graffiti Forums 1.0 - 'Topics.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Graffiti Forums 1.0 - 'Topics.php' SQL Injection. Author: Paisterist
|
Analyze the security implications of: Graffiti Forums 1.0 - 'Topics.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component IXXO Cart! Standalone and - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component IXXO Cart! Standalone and - SQL Injection. Author: sm0k3
|
Analyze the security implications of: Joomla! Component IXXO Cart! Standalone and - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FrontAccounting 1.12 build 31 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: FrontAccounting 1.12 build 31 - Remote File Inclusion. Author: kezzap66345
|
Analyze the security implications of: FrontAccounting 1.12 build 31 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Sun Microsystems SunScreen Firewall - Privilege Escalation
|
This is a remote exploit for multiple platform. Description: Sun Microsystems SunScreen Firewall - Privilege Escalation. Author: kingcope
|
Analyze the security implications of: Sun Microsystems SunScreen Firewall - Privilege Escalation
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Kimai 0.9.2.1306-3 - SQL Injection
|
This is a webapps exploit for php platform. Description: Kimai 0.9.2.1306-3 - SQL Injection. Author: drone
|
Analyze the security implications of: Kimai 0.9.2.1306-3 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component SVMap 1.1.1 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component SVMap 1.1.1 - Local File Inclusion. Author: Vrs-hCk
|
Analyze the security implications of: Joomla! Component SVMap 1.1.1 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel 3.3.5 - '/drivers/media/media-device.c' Local Information Disclosure
|
This is a local exploit for linux platform. Description: Linux Kernel 3.3.5 - '/drivers/media/media-device.c' Local Information Disclosure. Author: Salva Peiro
|
Analyze the security implications of: Linux Kernel 3.3.5 - '/drivers/media/media-device.c' Local Information Disclosure
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component com_idoblog - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_idoblog - SQL Injection. Author: NOCKAR1111
|
Analyze the security implications of: Joomla! Component com_idoblog - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Infor CRM 8.2.0.1136 - Multiple HTML Script Injection Vulnerabilities
|
This is a webapps exploit for ashx platform. Description: Infor CRM 8.2.0.1136 - Multiple HTML Script Injection Vulnerabilities. Author: LiquidWorm
|
Analyze the security implications of: Infor CRM 8.2.0.1136 - Multiple HTML Script Injection Vulnerabilities
|
This exploit targets ashx systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ashx platform
|
What is this exploit about: Enalean Tuleap 7.4.99.5 - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Enalean Tuleap 7.4.99.5 - Blind SQL Injection. Author: Portcullis
|
Analyze the security implications of: Enalean Tuleap 7.4.99.5 - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DZcms 3.1 - SQL Injection
|
This is a webapps exploit for php platform. Description: DZcms 3.1 - SQL Injection. Author: Glafkos Charalambous
|
Analyze the security implications of: DZcms 3.1 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Vitek - Remote Command Execution / Information Disclosure (PoC)
|
This is a remote exploit for multiple platform. Description: Vitek - Remote Command Execution / Information Disclosure (PoC). Author: bashis
|
Analyze the security implications of: Vitek - Remote Command Execution / Information Disclosure (PoC)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: AnyDesk 5.5.2 - Remote Code Execution
|
This is a remote exploit for linux platform. Description: AnyDesk 5.5.2 - Remote Code Execution. Author: scryh
|
Analyze the security implications of: AnyDesk 5.5.2 - Remote Code Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: In-link 2.3.4 - 'ADODB_DIR' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: In-link 2.3.4 - 'ADODB_DIR' Remote File Inclusion. Author: Saudi Hackrz
|
Analyze the security implications of: In-link 2.3.4 - 'ADODB_DIR' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Valentina Studio 9.0.5 Linux - 'Host' Buffer Overflow (PoC)
|
This is a dos exploit for linux platform. Description: Valentina Studio 9.0.5 Linux - 'Host' Buffer Overflow (PoC). Author: Alejandra Sánchez
|
Analyze the security implications of: Valentina Studio 9.0.5 Linux - 'Host' Buffer Overflow (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: SoftXMLCMS - Arbitrary File Upload
|
This is a webapps exploit for asp platform. Description: SoftXMLCMS - Arbitrary File Upload. Author: Alexander
|
Analyze the security implications of: SoftXMLCMS - Arbitrary File Upload
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Apple iOS Safari - 'JS .' Remote Crash
|
This is a dos exploit for hardware platform. Description: Apple iOS Safari - 'JS .' Remote Crash. Author: Yakir Wizman
|
Analyze the security implications of: Apple iOS Safari - 'JS .' Remote Crash
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: NodeJS Debugger - Command Injection (Metasploit)
|
This is a remote exploit for multiple platform. Description: NodeJS Debugger - Command Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: NodeJS Debugger - Command Injection (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Satellian 1.12 - Remote Code Execution
|
This is a webapps exploit for hardware platform. Description: Satellian 1.12 - Remote Code Execution. Author: Xh4H
|
Analyze the security implications of: Satellian 1.12 - Remote Code Execution
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component com_realestatemanager 1.0 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component com_realestatemanager 1.0 - Remote File Inclusion. Author: Mehmet Ince
|
Analyze the security implications of: Joomla! Component com_realestatemanager 1.0 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Teradek Slice 7.3.15 - Cross-Site Request Forgery
|
This is a webapps exploit for hardware platform. Description: Teradek Slice 7.3.15 - Cross-Site Request Forgery. Author: LiquidWorm
|
Analyze the security implications of: Teradek Slice 7.3.15 - Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Linux Kernel 2.6.10 - File Lock Local Denial of Service
|
This is a dos exploit for linux platform. Description: Linux Kernel 2.6.10 - File Lock Local Denial of Service. Author: ChoiX
|
Analyze the security implications of: Linux Kernel 2.6.10 - File Lock Local Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: e107 Plugin BLOG Engine 2.2 - 'uid' SQL Injection
|
This is a webapps exploit for php platform. Description: e107 Plugin BLOG Engine 2.2 - 'uid' SQL Injection. Author: Virangar Security
|
Analyze the security implications of: e107 Plugin BLOG Engine 2.2 - 'uid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: rsync 2.5.1 - Remote (1)
|
This is a remote exploit for linux platform. Description: rsync 2.5.1 - Remote (1). Author: Teso
|
Analyze the security implications of: rsync 2.5.1 - Remote (1)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Hospital Management System v1.0 - Stored Cross Site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: Hospital Management System v1.0 - Stored Cross Site Scripting (XSS). Author: Sandeep Vishwakarma
|
Analyze the security implications of: Hospital Management System v1.0 - Stored Cross Site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MDBms 0.96/0.99 - Query Display Buffer Overflow
|
This is a remote exploit for linux platform. Description: MDBms 0.96/0.99 - Query Display Buffer Overflow. Author: teleh0r
|
Analyze the security implications of: MDBms 0.96/0.99 - Query Display Buffer Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Mambo - Cache_Lite Class MosConfig_absolute_path Remote File Inclusion (Metasploit)
|
This is a webapps exploit for php platform. Description: Mambo - Cache_Lite Class MosConfig_absolute_path Remote File Inclusion (Metasploit). Author: Metasploit
|
Analyze the security implications of: Mambo - Cache_Lite Class MosConfig_absolute_path Remote File Inclusion (Metasploit)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Packeteer PacketShaper 7.x - Web Interface Remote Denial of Service
|
This is a dos exploit for hardware platform. Description: Packeteer PacketShaper 7.x - Web Interface Remote Denial of Service. Author: nnposter
|
Analyze the security implications of: Packeteer PacketShaper 7.x - Web Interface Remote Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Alqatari group 1.0 < 5.0 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Alqatari group 1.0 < 5.0 - 'id' SQL Injection. Author: Red-D3v1L
|
Analyze the security implications of: Alqatari group 1.0 < 5.0 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Courier-IMAP 3.0.2-r1 - 'auth_debug()' Remote Format String
|
This is a remote exploit for bsd platform. Description: Courier-IMAP 3.0.2-r1 - 'auth_debug()' Remote Format String. Author: ktha
|
Analyze the security implications of: Courier-IMAP 3.0.2-r1 - 'auth_debug()' Remote Format String
|
This exploit targets bsd systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets bsd platform
|
What is this exploit about: Confluence Server 7.12.4 - 'OGNL injection' Remote Code Execution (RCE) (Unauthenticated)
|
This is a webapps exploit for java platform. Description: Confluence Server 7.12.4 - 'OGNL injection' Remote Code Execution (RCE) (Unauthenticated). Author: Fellipe Oliveira
|
Analyze the security implications of: Confluence Server 7.12.4 - 'OGNL injection' Remote Code Execution (RCE) (Unauthenticated)
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Hippo CMS 10.1 - Multiple Vulnerabilities
|
This is a webapps exploit for java platform. Description: Hippo CMS 10.1 - Multiple Vulnerabilities. Author: LiquidWorm
|
Analyze the security implications of: Hippo CMS 10.1 - Multiple Vulnerabilities
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: ProFTPd - 'mod_mysql' Authentication Bypass
|
This is a remote exploit for multiple platform. Description: ProFTPd - 'mod_mysql' Authentication Bypass. Author: gat3way
|
Analyze the security implications of: ProFTPd - 'mod_mysql' Authentication Bypass
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.