input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Employee Management System v1 - 'email' SQL Injection
|
This is a webapps exploit for php platform. Description: Employee Management System v1 - 'email' SQL Injection. Author: SoSPiro
|
Analyze the security implications of: Employee Management System v1 - 'email' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ABB Cylon Aspect 3.08.03 (webServerDeviceLabelUpdate.php) - File Write DoS
|
This is a hardware exploit for php platform. Description: ABB Cylon Aspect 3.08.03 (webServerDeviceLabelUpdate.php) - File Write DoS. Author: LiquidWorm
|
Analyze the security implications of: ABB Cylon Aspect 3.08.03 (webServerDeviceLabelUpdate.php) - File Write DoS
|
This exploit targets php systems. Type: hardware. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Rivettracker 1.03 - Multiple SQL Injections
|
This is a webapps exploit for multiple platform. Description: Rivettracker 1.03 - Multiple SQL Injections. Author: Ali Raheem
|
Analyze the security implications of: Rivettracker 1.03 - Multiple SQL Injections
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Conceptronic Grab'n'Go and Sitecom Storage Center - Password Disclosure
|
This is a webapps exploit for hardware platform. Description: Conceptronic Grab'n'Go and Sitecom Storage Center - Password Disclosure. Author: Mattijs van Ommeren
|
Analyze the security implications of: Conceptronic Grab'n'Go and Sitecom Storage Center - Password Disclosure
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Mambo Component Ricette 1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: Mambo Component Ricette 1.0 - SQL Injection. Author: S@BUN
|
Analyze the security implications of: Mambo Component Ricette 1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GNU Mailutils imap4d 0.6 - Remote Format String
|
This is a remote exploit for linux platform. Description: GNU Mailutils imap4d 0.6 - Remote Format String. Author: CoKi
|
Analyze the security implications of: GNU Mailutils imap4d 0.6 - Remote Format String
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: FreeBSD 4.x - Process Concealment Bypass
|
This is a local exploit for freebsd platform. Description: FreeBSD 4.x - Process Concealment Bypass. Author: anonymous
|
Analyze the security implications of: FreeBSD 4.x - Process Concealment Bypass
|
This exploit targets freebsd systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets freebsd platform
|
What is this exploit about: Mozilla Firefox - Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: Mozilla Firefox - Remote Denial of Service. Author: Jean Pascal Pereira
|
Analyze the security implications of: Mozilla Firefox - Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: JTL-Shop 2 - 'druckansicht.php' SQL Injection
|
This is a webapps exploit for php platform. Description: JTL-Shop 2 - 'druckansicht.php' SQL Injection. Author: Lo$T
|
Analyze the security implications of: JTL-Shop 2 - 'druckansicht.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Pandora FMS - Ping Authenticated Remote Code Execution (Metasploit)
|
This is a remote exploit for linux platform. Description: Pandora FMS - Ping Authenticated Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Pandora FMS - Ping Authenticated Remote Code Execution (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: MagpieRSS 0.72 - Cross-Site Scripting / HTML Injection
|
This is a webapps exploit for php platform. Description: MagpieRSS 0.72 - Cross-Site Scripting / HTML Injection. Author: Justin Klein Keane
|
Analyze the security implications of: MagpieRSS 0.72 - Cross-Site Scripting / HTML Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LinksCaffe 3.0 - 'links.php' Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: LinksCaffe 3.0 - 'links.php' Multiple SQL Injections. Author: simo64
|
Analyze the security implications of: LinksCaffe 3.0 - 'links.php' Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ClearBudget 0.6.1 - Insecure Cookie Handling / Local File Inclusion
|
This is a webapps exploit for php platform. Description: ClearBudget 0.6.1 - Insecure Cookie Handling / Local File Inclusion. Author: SirGod
|
Analyze the security implications of: ClearBudget 0.6.1 - Insecure Cookie Handling / Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Blood Bank 1.0 - 'bid' SQLi
|
This is a webapps exploit for php platform. Description: Blood Bank 1.0 - 'bid' SQLi. Author: Ersin Erenler
|
Analyze the security implications of: Blood Bank 1.0 - 'bid' SQLi
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_tour - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_tour - SQL Injection. Author: DevilZ TM
|
Analyze the security implications of: Joomla! Component com_tour - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CMS Source - Multiple Input Validation Vulnerabilities
|
This is a webapps exploit for php platform. Description: CMS Source - Multiple Input Validation Vulnerabilities. Author: High-Tech Bridge SA
|
Analyze the security implications of: CMS Source - Multiple Input Validation Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Novell NetWare 5.1/6.0 - POST Arbitrary Perl Code Execution
|
This is a remote exploit for novell platform. Description: Novell NetWare 5.1/6.0 - POST Arbitrary Perl Code Execution. Author: Dan Elder
|
Analyze the security implications of: Novell NetWare 5.1/6.0 - POST Arbitrary Perl Code Execution
|
This exploit targets novell systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets novell platform
|
What is this exploit about: Link Up Gold - Cross-Site Request Forgery (Add Admin)
|
This is a webapps exploit for php platform. Description: Link Up Gold - Cross-Site Request Forgery (Add Admin). Author: bi0
|
Analyze the security implications of: Link Up Gold - Cross-Site Request Forgery (Add Admin)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Wireshark - dissect_nbap_MACdPDU_Size SIGSEGV
|
This is a dos exploit for multiple platform. Description: Wireshark - dissect_nbap_MACdPDU_Size SIGSEGV. Author: Google Security Research
|
Analyze the security implications of: Wireshark - dissect_nbap_MACdPDU_Size SIGSEGV
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Classifieds Script - 'type' SQL Injection
|
This is a webapps exploit for php platform. Description: Classifieds Script - 'type' SQL Injection. Author: Hussin X
|
Analyze the security implications of: Classifieds Script - 'type' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: OpenSSL TLS Heartbeat Extension - 'Heartbleed' Information Leak (1)
|
This is a remote exploit for multiple platform. Description: OpenSSL TLS Heartbeat Extension - 'Heartbleed' Information Leak (1). Author: prdelka
|
Analyze the security implications of: OpenSSL TLS Heartbeat Extension - 'Heartbleed' Information Leak (1)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Academic Timetable Final Build 7.0b - Cross-Site Request Forgery (Add Admin)
|
This is a webapps exploit for php platform. Description: Academic Timetable Final Build 7.0b - Cross-Site Request Forgery (Add Admin). Author: Ihsan Sencan
|
Analyze the security implications of: Academic Timetable Final Build 7.0b - Cross-Site Request Forgery (Add Admin)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LightOpenCMS 0.1 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: LightOpenCMS 0.1 - 'id' SQL Injection. Author: Mi4night
|
Analyze the security implications of: LightOpenCMS 0.1 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component mod_jfancy - 'script.php' Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Joomla! Component mod_jfancy - 'script.php' Arbitrary File Upload. Author: Sammy FORGIT
|
Analyze the security implications of: Joomla! Component mod_jfancy - 'script.php' Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: TualBLOG 1.0 - 'icerikno' SQL Injection
|
This is a webapps exploit for asp platform. Description: TualBLOG 1.0 - 'icerikno' SQL Injection. Author: RMx
|
Analyze the security implications of: TualBLOG 1.0 - 'icerikno' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: ManageEngine EventLog Analyzer 10.0 - Information Disclosure
|
This is a webapps exploit for java platform. Description: ManageEngine EventLog Analyzer 10.0 - Information Disclosure. Author: Scott Goodwin
|
Analyze the security implications of: ManageEngine EventLog Analyzer 10.0 - Information Disclosure
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Cyclades Serial Console Server 3.3.0 - Local Privilege Escalation
|
This is a local exploit for hardware platform. Description: Cyclades Serial Console Server 3.3.0 - Local Privilege Escalation. Author: ibby
|
Analyze the security implications of: Cyclades Serial Console Server 3.3.0 - Local Privilege Escalation
|
This exploit targets hardware systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: QuickTime Streaming Server - 'parse_xml.cgi' Remote Execution (Metasploit)
|
This is a webapps exploit for cgi platform. Description: QuickTime Streaming Server - 'parse_xml.cgi' Remote Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: QuickTime Streaming Server - 'parse_xml.cgi' Remote Execution (Metasploit)
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: IBM HTTP Server 1.3.x - Source Code Disclosure
|
This is a remote exploit for multiple platform. Description: IBM HTTP Server 1.3.x - Source Code Disclosure. Author: Felix Huber
|
Analyze the security implications of: IBM HTTP Server 1.3.x - Source Code Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: RedHat 8/9 - Directory Server Crafted Search Pattern Denial of Service
|
This is a dos exploit for linux platform. Description: RedHat 8/9 - Directory Server Crafted Search Pattern Denial of Service. Author: Ulf Weltman
|
Analyze the security implications of: RedHat 8/9 - Directory Server Crafted Search Pattern Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ColdFusion 8.0.1 - Arbitrary File Upload / Execution (Metasploit)
|
This is a webapps exploit for cfm platform. Description: ColdFusion 8.0.1 - Arbitrary File Upload / Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: ColdFusion 8.0.1 - Arbitrary File Upload / Execution (Metasploit)
|
This exploit targets cfm systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cfm platform
|
What is this exploit about: Joomla! Component DentroVideo 1.2 - 'upload.php' Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Joomla! Component DentroVideo 1.2 - 'upload.php' Arbitrary File Upload. Author: Sammy FORGIT
|
Analyze the security implications of: Joomla! Component DentroVideo 1.2 - 'upload.php' Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GR Note 0.94 Beta - (Authentication Bypass) Remote Database Backup
|
This is a webapps exploit for asp platform. Description: GR Note 0.94 Beta - (Authentication Bypass) Remote Database Backup. Author: JosS
|
Analyze the security implications of: GR Note 0.94 Beta - (Authentication Bypass) Remote Database Backup
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.