input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Entrepreneur B2B Script - 'pid' SQL Injection
|
This is a webapps exploit for php platform. Description: Entrepreneur B2B Script - 'pid' SQL Injection. Author: Meisam Monsef
|
Analyze the security implications of: Entrepreneur B2B Script - 'pid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile
|
This is a webapps exploit for multiple platform. Description: Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile. Author: Shahrukh Iqbal Mirza
|
Analyze the security implications of: Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component Jfeedback 1.2 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component Jfeedback 1.2 - Local File Inclusion. Author: AntiSecurity
|
Analyze the security implications of: Joomla! Component Jfeedback 1.2 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mozilla Firefox < 17.0.1 - Flash Privileged Code Injection (Metasploit)
|
This is a local exploit for multiple platform. Description: Mozilla Firefox < 17.0.1 - Flash Privileged Code Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: Mozilla Firefox < 17.0.1 - Flash Privileged Code Injection (Metasploit)
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Black Sheep Web Software Form Tools 1.5 - Multiple Remote File Inclusions
|
This is a webapps exploit for php platform. Description: Black Sheep Web Software Form Tools 1.5 - Multiple Remote File Inclusions. Author: RoMaNcYxHaCkEr
|
Analyze the security implications of: Black Sheep Web Software Form Tools 1.5 - Multiple Remote File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Havalite CMS 1.0.4 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Havalite CMS 1.0.4 - Multiple Vulnerabilities. Author: Vulnerability-Lab
|
Analyze the security implications of: Havalite CMS 1.0.4 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Avaya IP Office 11 - Password Disclosure
|
This is a webapps exploit for multiple platform. Description: Avaya IP Office 11 - Password Disclosure. Author: hyp3rlinx
|
Analyze the security implications of: Avaya IP Office 11 - Password Disclosure
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Cisco IOS 12.x/11.x - HTTP Remote Integer Overflow
|
This is a remote exploit for hardware platform. Description: Cisco IOS 12.x/11.x - HTTP Remote Integer Overflow. Author: FX
|
Analyze the security implications of: Cisco IOS 12.x/11.x - HTTP Remote Integer Overflow
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: FunkyASP Glossary 1.0 - 'Glossary.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: FunkyASP Glossary 1.0 - 'Glossary.asp' SQL Injection. Author: saps.audit
|
Analyze the security implications of: FunkyASP Glossary 1.0 - 'Glossary.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Mozilla Firefox 2.0.0.14 - JSframe Heap Corruption Denial of Service
|
This is a dos exploit for multiple platform. Description: Mozilla Firefox 2.0.0.14 - JSframe Heap Corruption Denial of Service. Author: 0x000000
|
Analyze the security implications of: Mozilla Firefox 2.0.0.14 - JSframe Heap Corruption Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Google Chrome 72.0.3626.81 - 'V8TrustedTypePolicyOptions::ToImpl' Type Confusion
|
This is a dos exploit for multiple platform. Description: Google Chrome 72.0.3626.81 - 'V8TrustedTypePolicyOptions::ToImpl' Type Confusion. Author: Google Security Research
|
Analyze the security implications of: Google Chrome 72.0.3626.81 - 'V8TrustedTypePolicyOptions::ToImpl' Type Confusion
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: The Classified Ad System 1.0 - 'main' SQL Injection
|
This is a webapps exploit for asp platform. Description: The Classified Ad System 1.0 - 'main' SQL Injection. Author: ajann
|
Analyze the security implications of: The Classified Ad System 1.0 - 'main' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: dev4u CMS (Personenseiten) - 'go_target.php' SQL Injection
|
This is a webapps exploit for php platform. Description: dev4u CMS (Personenseiten) - 'go_target.php' SQL Injection. Author: Easy Laster
|
Analyze the security implications of: dev4u CMS (Personenseiten) - 'go_target.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LongTail JW Player - 'debug' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: LongTail JW Player - 'debug' Cross-Site Scripting. Author: gainover
|
Analyze the security implications of: LongTail JW Player - 'debug' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ArangoDB Community Edition 3.4.2-1 - Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: ArangoDB Community Edition 3.4.2-1 - Cross-Site Scripting. Author: Ozer Goker
|
Analyze the security implications of: ArangoDB Community Edition 3.4.2-1 - Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Adobe Acrobat Reader DC 15.016.20045 - Invalid Font '.ttf' Memory Corruption (5)
|
This is a dos exploit for multiple platform. Description: Adobe Acrobat Reader DC 15.016.20045 - Invalid Font '.ttf' Memory Corruption (5). Author: COSIG
|
Analyze the security implications of: Adobe Acrobat Reader DC 15.016.20045 - Invalid Font '.ttf' Memory Corruption (5)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Webgate WebEye - Information Disclosure
|
This is a webapps exploit for cgi platform. Description: Webgate WebEye - Information Disclosure. Author: datapath
|
Analyze the security implications of: Webgate WebEye - Information Disclosure
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: FactoSystem Weblog 0.9/1.0/1.1 - Multiple SQL Injections
|
This is a webapps exploit for asp platform. Description: FactoSystem Weblog 0.9/1.0/1.1 - Multiple SQL Injections. Author: Matthew Murphy
|
Analyze the security implications of: FactoSystem Weblog 0.9/1.0/1.1 - Multiple SQL Injections
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: X.Org xorg-server 1.1.1-48.13 - Probe for Files (PoC)
|
This is a dos exploit for multiple platform. Description: X.Org xorg-server 1.1.1-48.13 - Probe for Files (PoC). Author: vl4dZ
|
Analyze the security implications of: X.Org xorg-server 1.1.1-48.13 - Probe for Files (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: RedHat Linux 6.0/6.1/6.2 - 'pam_console' Monitor Activity After Logout
|
This is a local exploit for linux platform. Description: RedHat Linux 6.0/6.1/6.2 - 'pam_console' Monitor Activity After Logout. Author: Michal Zalewski
|
Analyze the security implications of: RedHat Linux 6.0/6.1/6.2 - 'pam_console' Monitor Activity After Logout
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Vypress Tonecast 1.3 - Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: Vypress Tonecast 1.3 - Remote Denial of Service. Author: Luigi Auriemma
|
Analyze the security implications of: Vypress Tonecast 1.3 - Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ARSC Really Simple Chat 3.3-rc2 - Cross-Site Scripting / Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: ARSC Really Simple Chat 3.3-rc2 - Cross-Site Scripting / Multiple SQL Injections. Author: High-Tech Bridge SA
|
Analyze the security implications of: ARSC Really Simple Chat 3.3-rc2 - Cross-Site Scripting / Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Pydio Cells 4.1.2 - Cross-Site Scripting (XSS) via File Download
|
This is a webapps exploit for go platform. Description: Pydio Cells 4.1.2 - Cross-Site Scripting (XSS) via File Download. Author: RedTeam Pentesting GmbH
|
Analyze the security implications of: Pydio Cells 4.1.2 - Cross-Site Scripting (XSS) via File Download
|
This exploit targets go systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets go platform
|
What is this exploit about: PXE Server 2.0 - Remote Buffer Overrun
|
This is a remote exploit for linux platform. Description: PXE Server 2.0 - Remote Buffer Overrun. Author: CrZ
|
Analyze the security implications of: PXE Server 2.0 - Remote Buffer Overrun
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: 3ware Disk Managment 1.10 - HTTP Request Denial of Service
|
This is a dos exploit for multiple platform. Description: 3ware Disk Managment 1.10 - HTTP Request Denial of Service. Author: Nathan Neulinger
|
Analyze the security implications of: 3ware Disk Managment 1.10 - HTTP Request Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: AirDrop 2.0 - Denial of Service (DoS)
|
This is a dos exploit for android platform. Description: AirDrop 2.0 - Denial of Service (DoS). Author: s4vitar
|
Analyze the security implications of: AirDrop 2.0 - Denial of Service (DoS)
|
This exploit targets android systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: ZKSoftware 'ZK5000' - Remote Information Disclosure
|
This is a remote exploit for multiple platform. Description: ZKSoftware 'ZK5000' - Remote Information Disclosure. Author: fb1h2s
|
Analyze the security implications of: ZKSoftware 'ZK5000' - Remote Information Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Electronic Engineering Tool (EE TOOL) 0.4.1 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Electronic Engineering Tool (EE TOOL) 0.4.1 - Remote File Inclusion. Author: Mehmet Ince
|
Analyze the security implications of: Electronic Engineering Tool (EE TOOL) 0.4.1 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: iNet Online Community - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: iNet Online Community - Blind SQL Injection. Author: JaMbA
|
Analyze the security implications of: iNet Online Community - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component JoltCard 1.2.1 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component JoltCard 1.2.1 - SQL Injection. Author: Valentin
|
Analyze the security implications of: Joomla! Component JoltCard 1.2.1 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Inout Music 1.0 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Inout Music 1.0 - Arbitrary File Upload. Author: SONIC
|
Analyze the security implications of: Inout Music 1.0 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GeekLog 1.x - 'error.log' Remote Command Execution
|
This is a webapps exploit for php platform. Description: GeekLog 1.x - 'error.log' Remote Command Execution. Author: rgod
|
Analyze the security implications of: GeekLog 1.x - 'error.log' Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Belkin F5D7234-4 v5 G Wireless Router - Remote Hash Exposed
|
This is a webapps exploit for hardware platform. Description: Belkin F5D7234-4 v5 G Wireless Router - Remote Hash Exposed. Author: Aodrulez
|
Analyze the security implications of: Belkin F5D7234-4 v5 G Wireless Router - Remote Hash Exposed
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.