input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: CMS from Scratch 1.1.3 - 'image.php' Directory Traversal
|
This is a webapps exploit for php platform. Description: CMS from Scratch 1.1.3 - 'image.php' Directory Traversal. Author: Stack
|
Analyze the security implications of: CMS from Scratch 1.1.3 - 'image.php' Directory Traversal
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CdomainFree 2.4 - Remote Command Execution
|
This is a remote exploit for multiple platform. Description: CdomainFree 2.4 - Remote Command Execution. Author: Salvatore Sanfilippo -antirez-
|
Analyze the security implications of: CdomainFree 2.4 - Remote Command Execution
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: BoonEx Ray 3.5 - 'sIncPath' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: BoonEx Ray 3.5 - 'sIncPath' Remote File Inclusion. Author: RoMaNcYxHaCkEr
|
Analyze the security implications of: BoonEx Ray 3.5 - 'sIncPath' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Human Resource Management System 1.0 - SQL Injection (unauthenticated)
|
This is a webapps exploit for php platform. Description: Human Resource Management System 1.0 - SQL Injection (unauthenticated). Author: Matthijs van der Vaart (eMVee)
|
Analyze the security implications of: Human Resource Management System 1.0 - SQL Injection (unauthenticated)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 11in1 CMS 1.2.1 - 'admin/tps?id' SQL Injection
|
This is a webapps exploit for php platform. Description: 11in1 CMS 1.2.1 - 'admin/tps?id' SQL Injection. Author: Chokri B.A
|
Analyze the security implications of: 11in1 CMS 1.2.1 - 'admin/tps?id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Moxa EDR-810 - Command Injection / Information Disclosure
|
This is a remote exploit for hardware platform. Description: Moxa EDR-810 - Command Injection / Information Disclosure. Author: RandoriSec
|
Analyze the security implications of: Moxa EDR-810 - Command Injection / Information Disclosure
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: OpenBSD 2.x/3.x - Local Malformed Binary Execution Denial of Service
|
This is a dos exploit for openbsd platform. Description: OpenBSD 2.x/3.x - Local Malformed Binary Execution Denial of Service. Author: Georgi Guninski
|
Analyze the security implications of: OpenBSD 2.x/3.x - Local Malformed Binary Execution Denial of Service
|
This exploit targets openbsd systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets openbsd platform
|
What is this exploit about: Joomla! Component City Portal - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component City Portal - Blind SQL Injection. Author: FL0RiX
|
Analyze the security implications of: Joomla! Component City Portal - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: iOS myDBLite 1.1.10 - Directory Traversal
|
This is a remote exploit for ios platform. Description: iOS myDBLite 1.1.10 - Directory Traversal. Author: R3d@l3rt_ Sp@2K_ Sunlight
|
Analyze the security implications of: iOS myDBLite 1.1.10 - Directory Traversal
|
This exploit targets ios systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: File Lite 3.3/3.5 PRO iOS - Multiple Vulnerabilities
|
This is a webapps exploit for ios platform. Description: File Lite 3.3/3.5 PRO iOS - Multiple Vulnerabilities. Author: Vulnerability-Lab
|
Analyze the security implications of: File Lite 3.3/3.5 PRO iOS - Multiple Vulnerabilities
|
This exploit targets ios systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: am4ss Support System 1.2 - PHP Code Injection
|
This is a webapps exploit for php platform. Description: am4ss Support System 1.2 - PHP Code Injection. Author: i-Hmx
|
Analyze the security implications of: am4ss Support System 1.2 - PHP Code Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Gitea 1.7.5 - Remote Code Execution
|
This is a webapps exploit for multiple platform. Description: Gitea 1.7.5 - Remote Code Execution. Author: 1F98D
|
Analyze the security implications of: Gitea 1.7.5 - Remote Code Execution
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Poll It CGI 2.0 - Multiple Vulnerabilities
|
This is a webapps exploit for cgi platform. Description: Poll It CGI 2.0 - Multiple Vulnerabilities. Author: keelis
|
Analyze the security implications of: Poll It CGI 2.0 - Multiple Vulnerabilities
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Man Utility 2.3.19 - Local Compression Program Privilege Escalation
|
This is a local exploit for linux platform. Description: Man Utility 2.3.19 - Local Compression Program Privilege Escalation. Author: Sebastian Krahmer
|
Analyze the security implications of: Man Utility 2.3.19 - Local Compression Program Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Composr CMS 10.0.36 - Cross Site Scripting
|
This is a webapps exploit for php platform. Description: Composr CMS 10.0.36 - Cross Site Scripting. Author: Orion Hridoy
|
Analyze the security implications of: Composr CMS 10.0.36 - Cross Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Client Management System 1.0 - 'searchdata' SQL injection
|
This is a webapps exploit for php platform. Description: Client Management System 1.0 - 'searchdata' SQL injection. Author: Serkan Sancar
|
Analyze the security implications of: Client Management System 1.0 - 'searchdata' SQL injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ajax Full Featured Calendar 2.0 - 'search' SQL Injection
|
This is a webapps exploit for php platform. Description: Ajax Full Featured Calendar 2.0 - 'search' SQL Injection. Author: AkkuS
|
Analyze the security implications of: Ajax Full Featured Calendar 2.0 - 'search' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LAMS < 3.1 - Cross-Site Scripting
|
This is a webapps exploit for java platform. Description: LAMS < 3.1 - Cross-Site Scripting. Author: Nikola Kojic
|
Analyze the security implications of: LAMS < 3.1 - Cross-Site Scripting
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: CubeCart 3.0.20 - '/admin/login.php?goto' Arbitrary Site Redirect
|
This is a webapps exploit for php platform. Description: CubeCart 3.0.20 - '/admin/login.php?goto' Arbitrary Site Redirect. Author: Aung Khant
|
Analyze the security implications of: CubeCart 3.0.20 - '/admin/login.php?goto' Arbitrary Site Redirect
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FreeRadius 0.x/1.1.x - Tag Field Heap Corruption
|
This is a dos exploit for linux platform. Description: FreeRadius 0.x/1.1.x - Tag Field Heap Corruption. Author: Evgeny Legerov
|
Analyze the security implications of: FreeRadius 0.x/1.1.x - Tag Field Heap Corruption
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Mythic Entertainment Dark Age of Camelot 1.6x - Encryption Key Signing
|
This is a remote exploit for multiple platform. Description: Mythic Entertainment Dark Age of Camelot 1.6x - Encryption Key Signing. Author: Todd Chapman
|
Analyze the security implications of: Mythic Entertainment Dark Age of Camelot 1.6x - Encryption Key Signing
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: GAzie 5.10 - 'Login' Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: GAzie 5.10 - 'Login' Multiple Vulnerabilities. Author: LiquidWorm
|
Analyze the security implications of: GAzie 5.10 - 'Login' Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Adobe Acrobat Reader DC 15.016.20045 - Invalid Font '.ttf' Memory Corruption (1)
|
This is a dos exploit for multiple platform. Description: Adobe Acrobat Reader DC 15.016.20045 - Invalid Font '.ttf' Memory Corruption (1). Author: COSIG
|
Analyze the security implications of: Adobe Acrobat Reader DC 15.016.20045 - Invalid Font '.ttf' Memory Corruption (1)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Early Impact ProductCart 2.6/2.7 - 'viewPrd.asp?idcategory' SQL Injection
|
This is a webapps exploit for asp platform. Description: Early Impact ProductCart 2.6/2.7 - 'viewPrd.asp?idcategory' SQL Injection. Author: Dedi Dwianto
|
Analyze the security implications of: Early Impact ProductCart 2.6/2.7 - 'viewPrd.asp?idcategory' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Fritz!Box - Remote Command Execution
|
This is a webapps exploit for hardware platform. Description: Fritz!Box - Remote Command Execution. Author: 0x4148
|
Analyze the security implications of: Fritz!Box - Remote Command Execution
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Karaf v4.4.3 Console - RCE
|
This is a webapps exploit for java platform. Description: Karaf v4.4.3 Console - RCE. Author: Andrzej Olchawa_ Milenko Starcik
|
Analyze the security implications of: Karaf v4.4.3 Console - RCE
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: KeystoneJS 4.0.0-beta.5 - CSV Excel Macro Injection
|
This is a webapps exploit for nodejs platform. Description: KeystoneJS 4.0.0-beta.5 - CSV Excel Macro Injection. Author: Ishaq Mohammed
|
Analyze the security implications of: KeystoneJS 4.0.0-beta.5 - CSV Excel Macro Injection
|
This exploit targets nodejs systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets nodejs platform
|
What is this exploit about: Axis Network Camera 2.x And Video Server 1-3 - HTTP Authentication Bypass
|
This is a webapps exploit for cgi platform. Description: Axis Network Camera 2.x And Video Server 1-3 - HTTP Authentication Bypass. Author: bashis
|
Analyze the security implications of: Axis Network Camera 2.x And Video Server 1-3 - HTTP Authentication Bypass
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Oracle 8 - File Access
|
This is a local exploit for linux platform. Description: Oracle 8 - File Access. Author: Kevin Wenchel
|
Analyze the security implications of: Oracle 8 - File Access
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Openfire 3.6.2 - 'log.jsp' Cross-Site Scripting
|
This is a webapps exploit for jsp platform. Description: Openfire 3.6.2 - 'log.jsp' Cross-Site Scripting. Author: Federico Muttis
|
Analyze the security implications of: Openfire 3.6.2 - 'log.jsp' Cross-Site Scripting
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Joomla! Component com_pccookbook - 'user_id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_pccookbook - 'user_id' SQL Injection. Author: S@BUN
|
Analyze the security implications of: Joomla! Component com_pccookbook - 'user_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ClipShare - 'UID' SQL Injection
|
This is a webapps exploit for php platform. Description: ClipShare - 'UID' SQL Injection. Author: Krit
|
Analyze the security implications of: ClipShare - 'UID' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Grandstream GXV-3000 Phone - Remote Denial of Service
|
This is a dos exploit for hardware platform. Description: Grandstream GXV-3000 Phone - Remote Denial of Service. Author: MADYNES
|
Analyze the security implications of: Grandstream GXV-3000 Phone - Remote Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.