input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GALLARIFIC PHP Photo Gallery Script - 'gallery.php' SQL Injection
|
This is a webapps exploit for php platform. Description: GALLARIFIC PHP Photo Gallery Script - 'gallery.php' SQL Injection. Author: AtT4CKxT3rR0r1ST
|
Analyze the security implications of: GALLARIFIC PHP Photo Gallery Script - 'gallery.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AlmondSoft Classifieds Pro - 'gmap.php?addr' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: AlmondSoft Classifieds Pro - 'gmap.php?addr' Cross-Site Scripting. Author: Moudi
|
Analyze the security implications of: AlmondSoft Classifieds Pro - 'gmap.php?addr' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Sam Hawker wmcdplay 1.0 beta1-2 - Local Buffer Overflow (2)
|
This is a local exploit for linux platform. Description: Sam Hawker wmcdplay 1.0 beta1-2 - Local Buffer Overflow (2). Author: Larry W. Cashdolla
|
Analyze the security implications of: Sam Hawker wmcdplay 1.0 beta1-2 - Local Buffer Overflow (2)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ATutor < 2.2.4 - 'file_manager' Remote Code Execution (Metasploit)
|
This is a webapps exploit for php platform. Description: ATutor < 2.2.4 - 'file_manager' Remote Code Execution (Metasploit). Author: AkkuS
|
Analyze the security implications of: ATutor < 2.2.4 - 'file_manager' Remote Code Execution (Metasploit)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: VMware ESX 2.x - Multiple Information Disclosure Vulnerabilities
|
This is a remote exploit for multiple platform. Description: VMware ESX 2.x - Multiple Information Disclosure Vulnerabilities. Author: Stephen de Vries
|
Analyze the security implications of: VMware ESX 2.x - Multiple Information Disclosure Vulnerabilities
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Diesel Job Site - 'job_id' Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Diesel Job Site - 'job_id' Blind SQL Injection. Author: Stack
|
Analyze the security implications of: Diesel Job Site - 'job_id' Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Oracle 8.1.7 - JSP/JSPSQL Remote File Reading
|
This is a remote exploit for jsp platform. Description: Oracle 8.1.7 - JSP/JSPSQL Remote File Reading. Author: Georgi Guninski
|
Analyze the security implications of: Oracle 8.1.7 - JSP/JSPSQL Remote File Reading
|
This exploit targets jsp systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Sun Secure Global Desktop and Oracle Global Desktop 4.61.915 - Command Injection (Shellshock)
|
This is a webapps exploit for cgi platform. Description: Sun Secure Global Desktop and Oracle Global Desktop 4.61.915 - Command Injection (Shellshock). Author: lastc0de
|
Analyze the security implications of: Sun Secure Global Desktop and Oracle Global Desktop 4.61.915 - Command Injection (Shellshock)
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Oracle 9i/10g - 'utl_file' FileSystem Access
|
This is a remote exploit for linux platform. Description: Oracle 9i/10g - 'utl_file' FileSystem Access. Author: Marco Ivaldi
|
Analyze the security implications of: Oracle 9i/10g - 'utl_file' FileSystem Access
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: FLDS 1.2a - 'redir.php' SQL Injection
|
This is a webapps exploit for php platform. Description: FLDS 1.2a - 'redir.php' SQL Injection. Author: nuclear
|
Analyze the security implications of: FLDS 1.2a - 'redir.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FireEye Appliance - Unauthorized File Disclosure
|
This is a webapps exploit for php platform. Description: FireEye Appliance - Unauthorized File Disclosure. Author: Kristian Erik Hermansen
|
Analyze the security implications of: FireEye Appliance - Unauthorized File Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: blogme 3.0 - Cross-Site Scripting / Authentication Bypass
|
This is a webapps exploit for asp platform. Description: blogme 3.0 - Cross-Site Scripting / Authentication Bypass. Author: Security Access Point
|
Analyze the security implications of: blogme 3.0 - Cross-Site Scripting / Authentication Bypass
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Job Portal 1.0 - Remote Code Execution
|
This is a webapps exploit for php platform. Description: Job Portal 1.0 - Remote Code Execution. Author: Tib3rius
|
Analyze the security implications of: Job Portal 1.0 - Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DALIM SOFTWARE ES Core 5.0 build 7184.1 - User Enumeration
|
This is a webapps exploit for jsp platform. Description: DALIM SOFTWARE ES Core 5.0 build 7184.1 - User Enumeration. Author: LiquidWorm
|
Analyze the security implications of: DALIM SOFTWARE ES Core 5.0 build 7184.1 - User Enumeration
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Joomla! Component com_sectionex - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component com_sectionex - Local File Inclusion. Author: AtT4CKxT3rR0r1ST
|
Analyze the security implications of: Joomla! Component com_sectionex - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FreeBSD 7.0-RELEASE - Telnet Daemon Privilege Escalation
|
This is a local exploit for freebsd platform. Description: FreeBSD 7.0-RELEASE - Telnet Daemon Privilege Escalation. Author: kingcope
|
Analyze the security implications of: FreeBSD 7.0-RELEASE - Telnet Daemon Privilege Escalation
|
This exploit targets freebsd systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets freebsd platform
|
What is this exploit about: PHP < 4.4.5/5.2.1 - 'shmop' SSL RSA Private-Key Disclosure
|
This is a local exploit for linux platform. Description: PHP < 4.4.5/5.2.1 - 'shmop' SSL RSA Private-Key Disclosure. Author: Stefan Esser
|
Analyze the security implications of: PHP < 4.4.5/5.2.1 - 'shmop' SSL RSA Private-Key Disclosure
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Easy-Clanpage 2.0 - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Easy-Clanpage 2.0 - Blind SQL Injection. Author: Easy Laster
|
Analyze the security implications of: Easy-Clanpage 2.0 - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Samba 4.5.2 - Symlink Race Permits Opening Files Outside Share Directory
|
This is a remote exploit for multiple platform. Description: Samba 4.5.2 - Symlink Race Permits Opening Files Outside Share Directory. Author: Google Security Research
|
Analyze the security implications of: Samba 4.5.2 - Symlink Race Permits Opening Files Outside Share Directory
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Ruijie Reyee Mesh Router - Remote Code Execution (RCE) (Authenticated)
|
This is a remote exploit for hardware platform. Description: Ruijie Reyee Mesh Router - Remote Code Execution (RCE) (Authenticated). Author: Minh Khoa
|
Analyze the security implications of: Ruijie Reyee Mesh Router - Remote Code Execution (RCE) (Authenticated)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: BEWARD N100 H.264 VGA IP Camera M2.1.6 - Cross-Site Request Forgery (Add Admin)
|
This is a webapps exploit for hardware platform. Description: BEWARD N100 H.264 VGA IP Camera M2.1.6 - Cross-Site Request Forgery (Add Admin). Author: LiquidWorm
|
Analyze the security implications of: BEWARD N100 H.264 VGA IP Camera M2.1.6 - Cross-Site Request Forgery (Add Admin)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Multiple Platform IPv6 Address Publication - Denial of Service
|
This is a dos exploit for multiple platform. Description: Multiple Platform IPv6 Address Publication - Denial of Service. Author: Tyler Reguly
|
Analyze the security implications of: Multiple Platform IPv6 Address Publication - Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ICProjectBidding 1.1 - SQL Injection
|
This is a webapps exploit for php platform. Description: ICProjectBidding 1.1 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: ICProjectBidding 1.1 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: aForum 1.32 - 'CommonAbsDir' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: aForum 1.32 - 'CommonAbsDir' Remote File Inclusion. Author: ThE TiGeR
|
Analyze the security implications of: aForum 1.32 - 'CommonAbsDir' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: D-Link - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: D-Link - Multiple Vulnerabilities. Author: m-1-k-3
|
Analyze the security implications of: D-Link - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Slackware Linux 3.4 - 'liloconfig-color' Temporary File
|
This is a local exploit for linux platform. Description: Slackware Linux 3.4 - 'liloconfig-color' Temporary File. Author: neonhaze
|
Analyze the security implications of: Slackware Linux 3.4 - 'liloconfig-color' Temporary File
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: OLK Web Store 2020 - Cross-Site Request Forgery
|
This is a webapps exploit for asp platform. Description: OLK Web Store 2020 - Cross-Site Request Forgery. Author: Joel Aviad Ossi
|
Analyze the security implications of: OLK Web Store 2020 - Cross-Site Request Forgery
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Family Connections CMS 2.3.2 - Persistent Cross-Site Scripting / XML Injection
|
This is a webapps exploit for php platform. Description: Family Connections CMS 2.3.2 - Persistent Cross-Site Scripting / XML Injection. Author: LiquidWorm
|
Analyze the security implications of: Family Connections CMS 2.3.2 - Persistent Cross-Site Scripting / XML Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Systrace 1.x - Local Policy Bypass
|
This is a local exploit for linux platform. Description: Systrace 1.x - Local Policy Bypass. Author: Brad
|
Analyze the security implications of: Systrace 1.x - Local Policy Bypass
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Mitsubishi Electric & INEA SmartRTU - Reflected Cross-Site Scripting (XSS)
|
This is a webapps exploit for hardware platform. Description: Mitsubishi Electric & INEA SmartRTU - Reflected Cross-Site Scripting (XSS). Author: Hamit CİBO
|
Analyze the security implications of: Mitsubishi Electric & INEA SmartRTU - Reflected Cross-Site Scripting (XSS)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Linux Kernel 2.6.x - Cloned Process 'CLONE_PARENT' Local Origin Validation
|
This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - Cloned Process 'CLONE_PARENT' Local Origin Validation. Author: Chris Evans
|
Analyze the security implications of: Linux Kernel 2.6.x - Cloned Process 'CLONE_PARENT' Local Origin Validation
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: blindblog 1.3.1 - SQL Injection / Authentication Bypass / Local File Inclusion
|
This is a webapps exploit for php platform. Description: blindblog 1.3.1 - SQL Injection / Authentication Bypass / Local File Inclusion. Author: Salvatore Fresta
|
Analyze the security implications of: blindblog 1.3.1 - SQL Injection / Authentication Bypass / Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WebKit JSC - reifyStaticProperty Needs to set the PropertyAttribute::CustomAccessor flag for CustomGetterSetter
|
This is a dos exploit for multiple platform. Description: WebKit JSC - reifyStaticProperty Needs to set the PropertyAttribute::CustomAccessor flag for CustomGetterSetter. Author: Google Security Research
|
Analyze the security implications of: WebKit JSC - reifyStaticProperty Needs to set the PropertyAttribute::CustomAccessor flag for CustomGetterSetter
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.