input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MagpieRSS 0.72 - CDATA HTML Injection
|
This is a remote exploit for multiple platform. Description: MagpieRSS 0.72 - CDATA HTML Injection. Author: system_meltdown
|
Analyze the security implications of: MagpieRSS 0.72 - CDATA HTML Injection
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component EShop 2.5.1 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component EShop 2.5.1 - 'id' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component EShop 2.5.1 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Patient folder (THEME ASP) - SQL Injection
|
This is a webapps exploit for asp platform. Description: Patient folder (THEME ASP) - SQL Injection. Author: SA H4x0r
|
Analyze the security implications of: Patient folder (THEME ASP) - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: SpinetiX Fusion Digital Signage 3.4.8 - Database Backup Disclosure
|
This is a webapps exploit for hardware platform. Description: SpinetiX Fusion Digital Signage 3.4.8 - Database Backup Disclosure. Author: LiquidWorm
|
Analyze the security implications of: SpinetiX Fusion Digital Signage 3.4.8 - Database Backup Disclosure
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: DansGuardian Webmin Module 0.x - 'edit.cgi' Directory Traversal
|
This is a webapps exploit for cgi platform. Description: DansGuardian Webmin Module 0.x - 'edit.cgi' Directory Traversal. Author: FIST
|
Analyze the security implications of: DansGuardian Webmin Module 0.x - 'edit.cgi' Directory Traversal
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: BigACE 1.8.2 - 'upload_form.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: BigACE 1.8.2 - 'upload_form.php' Remote File Inclusion. Author: Vampire
|
Analyze the security implications of: BigACE 1.8.2 - 'upload_form.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Digitalus 1.10.0 Alpha2 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Digitalus 1.10.0 Alpha2 - Arbitrary File Upload. Author: eidelweiss
|
Analyze the security implications of: Digitalus 1.10.0 Alpha2 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IBM Net.Commerce 2.0/3.x/4.x - orderdspc.d2w order_rn Option SQL Injection
|
This is a remote exploit for multiple platform. Description: IBM Net.Commerce 2.0/3.x/4.x - orderdspc.d2w order_rn Option SQL Injection. Author: Rudi Carell
|
Analyze the security implications of: IBM Net.Commerce 2.0/3.x/4.x - orderdspc.d2w order_rn Option SQL Injection
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Netwin SurgeFTP 1.0b - Denial of Service
|
This is a dos exploit for multiple platform. Description: Netwin SurgeFTP 1.0b - Denial of Service. Author: the Strumpf Noir Society
|
Analyze the security implications of: Netwin SurgeFTP 1.0b - Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Apple Mac OSX 10.4.8 - SLP Daemon Service Registration Buffer Overflow (PoC)
|
This is a dos exploit for osx platform. Description: Apple Mac OSX 10.4.8 - SLP Daemon Service Registration Buffer Overflow (PoC). Author: MoAB
|
Analyze the security implications of: Apple Mac OSX 10.4.8 - SLP Daemon Service Registration Buffer Overflow (PoC)
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: InfraPower PPS-02-S Q213V1 - Remote Command Execution
|
This is a webapps exploit for hardware platform. Description: InfraPower PPS-02-S Q213V1 - Remote Command Execution. Author: LiquidWorm
|
Analyze the security implications of: InfraPower PPS-02-S Q213V1 - Remote Command Execution
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: CITSmart ITSM 9.1.2.22 - LDAP Injection
|
This is a webapps exploit for java platform. Description: CITSmart ITSM 9.1.2.22 - LDAP Injection. Author: skysbsb
|
Analyze the security implications of: CITSmart ITSM 9.1.2.22 - LDAP Injection
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Crux Gallery 1.32 - 'theme' Local File Inclusion
|
This is a webapps exploit for php platform. Description: Crux Gallery 1.32 - 'theme' Local File Inclusion. Author: StAkeR
|
Analyze the security implications of: Crux Gallery 1.32 - 'theme' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Socat 1.7.3.4 - Heap-Based Overflow (PoC)
|
This is a local exploit for linux platform. Description: Socat 1.7.3.4 - Heap-Based Overflow (PoC). Author: hieubl
|
Analyze the security implications of: Socat 1.7.3.4 - Heap-Based Overflow (PoC)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Max Web Portal < 1.30 - Multiple Vulnerabilities
|
This is a webapps exploit for multiple platform. Description: Max Web Portal < 1.30 - Multiple Vulnerabilities. Author: GulfTech Security
|
Analyze the security implications of: Max Web Portal < 1.30 - Multiple Vulnerabilities
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CarLine Forum Russian Board 4.2 - 'edit_msg.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: CarLine Forum Russian Board 4.2 - 'edit_msg.php' Multiple Cross-Site Scripting Vulnerabilities. Author: 1dt.w0lf
|
Analyze the security implications of: CarLine Forum Russian Board 4.2 - 'edit_msg.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HP JetDirect PJL - Query Execution (Metasploit)
|
This is a remote exploit for hardware platform. Description: HP JetDirect PJL - Query Execution (Metasploit). Author: Myo Soe
|
Analyze the security implications of: HP JetDirect PJL - Query Execution (Metasploit)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: GlassFish Enterprise Server 2.1 - Admin Console /webService/webServicesGeneral.jsf URI Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: GlassFish Enterprise Server 2.1 - Admin Console /webService/webServicesGeneral.jsf URI Cross-Site Scripting. Author: DSecRG
|
Analyze the security implications of: GlassFish Enterprise Server 2.1 - Admin Console /webService/webServicesGeneral.jsf URI Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Blender 2.34/2.35a/2.4/2.49b - '.blend' Command Injection
|
This is a remote exploit for multiple platform. Description: Blender 2.34/2.35a/2.4/2.49b - '.blend' Command Injection. Author: Core Security
|
Analyze the security implications of: Blender 2.34/2.35a/2.4/2.49b - '.blend' Command Injection
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Anserv Auction XL - 'cat' SQL Injection
|
This is a webapps exploit for php platform. Description: Anserv Auction XL - 'cat' SQL Injection. Author: K-159
|
Analyze the security implications of: Anserv Auction XL - 'cat' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Behold! Software Web Page Counter 2.7 - Denial of Service
|
This is a dos exploit for multiple platform. Description: Behold! Software Web Page Counter 2.7 - Denial of Service. Author: David Litchfield
|
Analyze the security implications of: Behold! Software Web Page Counter 2.7 - Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Aladdin Knowledge Systems eSafe Gateway 3.0 - Unicode Script-filtering Bypass
|
This is a remote exploit for multiple platform. Description: Aladdin Knowledge Systems eSafe Gateway 3.0 - Unicode Script-filtering Bypass. Author: eDvice Security Services
|
Analyze the security implications of: Aladdin Knowledge Systems eSafe Gateway 3.0 - Unicode Script-filtering Bypass
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Blog Manager - 'categoryId' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: Blog Manager - 'categoryId' Cross-Site Scripting. Author: Pouya_Server
|
Analyze the security implications of: Blog Manager - 'categoryId' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Sielco PolyEco Digital FM Transmitter 2.0.6 - Radio Data System POST Manipulation
|
This is a webapps exploit for hardware platform. Description: Sielco PolyEco Digital FM Transmitter 2.0.6 - Radio Data System POST Manipulation. Author: LiquidWorm
|
Analyze the security implications of: Sielco PolyEco Digital FM Transmitter 2.0.6 - Radio Data System POST Manipulation
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: ES File Explorer 4.1.9.7.4 - Arbitrary File Read
|
This is a remote exploit for android platform. Description: ES File Explorer 4.1.9.7.4 - Arbitrary File Read. Author: Nehal Zaman
|
Analyze the security implications of: ES File Explorer 4.1.9.7.4 - Arbitrary File Read
|
This exploit targets android systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: ChillyCMS 2.3.4.3 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: ChillyCMS 2.3.4.3 - Arbitrary File Upload. Author: John Leitch
|
Analyze the security implications of: ChillyCMS 2.3.4.3 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FusionForge 5.0 - Multiple Remote File Inclusions
|
This is a webapps exploit for php platform. Description: FusionForge 5.0 - Multiple Remote File Inclusions. Author: cr4wl3r
|
Analyze the security implications of: FusionForge 5.0 - Multiple Remote File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WikiReader 1.12 - URL Field Local Buffer Overflow
|
This is a dos exploit for multiple platform. Description: WikiReader 1.12 - URL Field Local Buffer Overflow. Author: Umesh Wanve
|
Analyze the security implications of: WikiReader 1.12 - URL Field Local Buffer Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Dropbear SSH 0.34 - Remote Code Execution
|
This is a remote exploit for linux platform. Description: Dropbear SSH 0.34 - Remote Code Execution. Author: livenn
|
Analyze the security implications of: Dropbear SSH 0.34 - Remote Code Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Mozilla Camino Web Browser 0.7/0.8 - Infinite Array Sort Denial of Service
|
This is a dos exploit for multiple platform. Description: Mozilla Camino Web Browser 0.7/0.8 - Infinite Array Sort Denial of Service. Author: Berend-Jan Wever
|
Analyze the security implications of: Mozilla Camino Web Browser 0.7/0.8 - Infinite Array Sort Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component com_bidding - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_bidding - SQL Injection. Author: N2n-Hacker
|
Analyze the security implications of: Joomla! Component com_bidding - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Connectix Boards 0.8.2 - 'template_path' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Connectix Boards 0.8.2 - 'template_path' Remote File Inclusion. Author: Houssamix
|
Analyze the security implications of: Connectix Boards 0.8.2 - 'template_path' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: jbFileManager - Directory Traversal
|
This is a webapps exploit for php platform. Description: jbFileManager - Directory Traversal. Author: HaHwul
|
Analyze the security implications of: jbFileManager - Directory Traversal
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.