input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: BetaParticle Blog 6.0 - 'fldGalleryID' SQL Injection
|
This is a webapps exploit for asp platform. Description: BetaParticle Blog 6.0 - 'fldGalleryID' SQL Injection. Author: nukedx
|
Analyze the security implications of: BetaParticle Blog 6.0 - 'fldGalleryID' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Microsoft Windows NT 4.0/2000 - NTFS File Hiding
|
This is a local exploit for linux platform. Description: Microsoft Windows NT 4.0/2000 - NTFS File Hiding. Author: Hans Somers
|
Analyze the security implications of: Microsoft Windows NT 4.0/2000 - NTFS File Hiding
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: NetFlow Analyzer 5 - '/jspui/selectDevice.jsp?rtype' Cross-Site Scripting
|
This is a webapps exploit for jsp platform. Description: NetFlow Analyzer 5 - '/jspui/selectDevice.jsp?rtype' Cross-Site Scripting. Author: Lostmon
|
Analyze the security implications of: NetFlow Analyzer 5 - '/jspui/selectDevice.jsp?rtype' Cross-Site Scripting
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: ClassApps SelectSurvey.net - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: ClassApps SelectSurvey.net - Multiple SQL Injections. Author: BillV-Lists
|
Analyze the security implications of: ClassApps SelectSurvey.net - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ASUS HG100 - Denial of Service
|
This is a dos exploit for hardware platform. Description: ASUS HG100 - Denial of Service. Author: YinT Wang
|
Analyze the security implications of: ASUS HG100 - Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Accellion File Transfer - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Accellion File Transfer - Multiple Cross-Site Scripting Vulnerabilities. Author: Eric Beaulieu
|
Analyze the security implications of: Accellion File Transfer - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DevelopItEasy News And Article System 1.4 - SQL Injection
|
This is a webapps exploit for php platform. Description: DevelopItEasy News And Article System 1.4 - SQL Injection. Author: InjEctOr5
|
Analyze the security implications of: DevelopItEasy News And Article System 1.4 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CGI Script Center Auction Weaver 1.0.2 - Remote Command Execution
|
This is a remote exploit for cgi platform. Description: CGI Script Center Auction Weaver 1.0.2 - Remote Command Execution. Author: teleh0r
|
Analyze the security implications of: CGI Script Center Auction Weaver 1.0.2 - Remote Command Execution
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: D-Link DIR-615 Rev H - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: D-Link DIR-615 Rev H - Multiple Vulnerabilities. Author: m-1-k-3
|
Analyze the security implications of: D-Link DIR-615 Rev H - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joplin 1.2.6 - 'link' Cross Site Scripting
|
This is a webapps exploit for multiple platform. Description: Joplin 1.2.6 - 'link' Cross Site Scripting. Author: Philip Holbrook
|
Analyze the security implications of: Joplin 1.2.6 - 'link' Cross Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Apple macOS Kernel - Use-After-Free Due to Lack of Locking in nvidia GeForce Driver
|
This is a dos exploit for macos platform. Description: Apple macOS Kernel - Use-After-Free Due to Lack of Locking in nvidia GeForce Driver. Author: Google Security Research
|
Analyze the security implications of: Apple macOS Kernel - Use-After-Free Due to Lack of Locking in nvidia GeForce Driver
|
This exploit targets macos systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets macos platform
|
What is this exploit about: Mozilla Spidermonkey - Unboxed Objects Uninitialized Memory Access
|
This is a dos exploit for multiple platform. Description: Mozilla Spidermonkey - Unboxed Objects Uninitialized Memory Access. Author: Google Security Research
|
Analyze the security implications of: Mozilla Spidermonkey - Unboxed Objects Uninitialized Memory Access
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Airbnb Clone Script - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Airbnb Clone Script - Arbitrary File Upload. Author: Ihsan Sencan
|
Analyze the security implications of: Airbnb Clone Script - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Just William's Amazon Webstore - 'CurrentNumber' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Just William's Amazon Webstore - 'CurrentNumber' Cross-Site Scripting. Author: Lostmon
|
Analyze the security implications of: Just William's Amazon Webstore - 'CurrentNumber' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Android - Hardware Service Manager Arbitrary Service Replacement due to getpidcon
|
This is a dos exploit for android platform. Description: Android - Hardware Service Manager Arbitrary Service Replacement due to getpidcon. Author: Google Security Research
|
Analyze the security implications of: Android - Hardware Service Manager Arbitrary Service Replacement due to getpidcon
|
This exploit targets android systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: BSD/OS 2.1/3.0 / Larry Wall Perl 5.0 03 / RedHat 4.0/4.1 / SGI Freeware 1.0/2.0 SUIDPerl - Local Overflow (2)
|
This is a local exploit for multiple platform. Description: BSD/OS 2.1/3.0 / Larry Wall Perl 5.0 03 / RedHat 4.0/4.1 / SGI Freeware 1.0/2.0 SUIDPerl - Local Overflow (2). Author: Willy Tarreau
|
Analyze the security implications of: BSD/OS 2.1/3.0 / Larry Wall Perl 5.0 03 / RedHat 4.0/4.1 / SGI Freeware 1.0/2.0 SUIDPerl - Local Overflow (2)
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component com_spielothek 1.6.9 - Multiple Blind SQL Injections
|
This is a webapps exploit for php platform. Description: Joomla! Component com_spielothek 1.6.9 - Multiple Blind SQL Injections. Author: Salvatore Fresta
|
Analyze the security implications of: Joomla! Component com_spielothek 1.6.9 - Multiple Blind SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_qcontacts 1.0.6 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_qcontacts 1.0.6 - SQL Injection. Author: Don
|
Analyze the security implications of: Joomla! Component com_qcontacts 1.0.6 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apache JackRabbit 1.4/1.5 Content Repository (JCR) - 'swr.jsp?q' Cross-Site Scripting
|
This is a webapps exploit for jsp platform. Description: Apache JackRabbit 1.4/1.5 Content Repository (JCR) - 'swr.jsp?q' Cross-Site Scripting. Author: Red Hat
|
Analyze the security implications of: Apache JackRabbit 1.4/1.5 Content Repository (JCR) - 'swr.jsp?q' Cross-Site Scripting
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Dell SonicWALL Scrutinizer 11.01 - methodDetail SQL Injection (Metasploit)
|
This is a remote exploit for multiple platform. Description: Dell SonicWALL Scrutinizer 11.01 - methodDetail SQL Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: Dell SonicWALL Scrutinizer 11.01 - methodDetail SQL Injection (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: e107 0.7.21 full - Remote File Inclusion / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: e107 0.7.21 full - Remote File Inclusion / Cross-Site Scripting. Author: indoushka
|
Analyze the security implications of: e107 0.7.21 full - Remote File Inclusion / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Adobe ColdFusion APSB13-03 - Remote Multiple Vulnerabilities (Metasploit)
|
This is a remote exploit for multiple platform. Description: Adobe ColdFusion APSB13-03 - Remote Multiple Vulnerabilities (Metasploit). Author: Metasploit
|
Analyze the security implications of: Adobe ColdFusion APSB13-03 - Remote Multiple Vulnerabilities (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: event Calendar - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: event Calendar - Multiple Vulnerabilities. Author: Janek Vind
|
Analyze the security implications of: event Calendar - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Mosets Tree 1.0 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component Mosets Tree 1.0 - Remote File Inclusion. Author: Crackers_Child
|
Analyze the security implications of: Joomla! Component Mosets Tree 1.0 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MikroTik RouterOS < 6.38.4 (MIPSBE) - 'Chimay Red' Stack Clash Remote Code Execution
|
This is a remote exploit for hardware platform. Description: MikroTik RouterOS < 6.38.4 (MIPSBE) - 'Chimay Red' Stack Clash Remote Code Execution. Author: Lorenzo Santina
|
Analyze the security implications of: MikroTik RouterOS < 6.38.4 (MIPSBE) - 'Chimay Red' Stack Clash Remote Code Execution
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: DigiAffiliate 1.4 - Cross-Site Request Forgery (Update Admin)
|
This is a webapps exploit for asp platform. Description: DigiAffiliate 1.4 - Cross-Site Request Forgery (Update Admin). Author: Ihsan Sencan
|
Analyze the security implications of: DigiAffiliate 1.4 - Cross-Site Request Forgery (Update Admin)
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Clix'N'Cash Clone 2010 - 'index.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Clix'N'Cash Clone 2010 - 'index.php' SQL Injection. Author: L0rd CrusAd3r
|
Analyze the security implications of: Clix'N'Cash Clone 2010 - 'index.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Lotus CMS Fraise 3.0 - Local File Inclusion / Remote Code Execution
|
This is a webapps exploit for php platform. Description: Lotus CMS Fraise 3.0 - Local File Inclusion / Remote Code Execution. Author: mr_me
|
Analyze the security implications of: Lotus CMS Fraise 3.0 - Local File Inclusion / Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Colloquy - Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: Colloquy - Remote Denial of Service. Author: Aph3x
|
Analyze the security implications of: Colloquy - Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ELinks Relative 0.10.6/011.1 - Path Arbitrary Code Execution
|
This is a local exploit for linux platform. Description: ELinks Relative 0.10.6/011.1 - Path Arbitrary Code Execution. Author: Arnaud Giersch
|
Analyze the security implications of: ELinks Relative 0.10.6/011.1 - Path Arbitrary Code Execution
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: AneCMS - '/registre/next' SQL Injection
|
This is a webapps exploit for php platform. Description: AneCMS - '/registre/next' SQL Injection. Author: Sweet
|
Analyze the security implications of: AneCMS - '/registre/next' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Pilot Cart 7.2 - 'Pilot.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: Pilot Cart 7.2 - 'Pilot.asp' SQL Injection. Author: laurent gaffie
|
Analyze the security implications of: Pilot Cart 7.2 - 'Pilot.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Accela Civic Platform 21.1 - 'servProvCode' Cross-Site-Scripting (XSS)
|
This is a webapps exploit for multiple platform. Description: Accela Civic Platform 21.1 - 'servProvCode' Cross-Site-Scripting (XSS). Author: Abdulazeez Alaseeri
|
Analyze the security implications of: Accela Civic Platform 21.1 - 'servProvCode' Cross-Site-Scripting (XSS)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Personal.Net Portal - Multiple Vulnerabilities
|
This is a webapps exploit for asp platform. Description: Personal.Net Portal - Multiple Vulnerabilities. Author: Abysssec
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.