input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Aigaion 1.3.3 - 'topic topic_id' SQL Injection
|
This is a webapps exploit for php platform. Description: Aigaion 1.3.3 - 'topic topic_id' SQL Injection. Author: CypherXero
|
Analyze the security implications of: Aigaion 1.3.3 - 'topic topic_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Subversion 1.6.6/1.6.12 - Code Execution
|
This is a remote exploit for linux platform. Description: Subversion 1.6.6/1.6.12 - Code Execution. Author: GlacierZ0ne
|
Analyze the security implications of: Subversion 1.6.6/1.6.12 - Code Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Album Streamer 2.0 iOS - Directory Traversal
|
This is a webapps exploit for ios platform. Description: Album Streamer 2.0 iOS - Directory Traversal. Author: Vulnerability-Lab
|
Analyze the security implications of: Album Streamer 2.0 iOS - Directory Traversal
|
This exploit targets ios systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: Alibaba Clone B2B Script - Admin Authentication Bypass
|
This is a webapps exploit for php platform. Description: Alibaba Clone B2B Script - Admin Authentication Bypass. Author: Meisam Monsef
|
Analyze the security implications of: Alibaba Clone B2B Script - Admin Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Karrigell 1.x/2.0/2.1 - '.KS' File Arbitrary Python Command Execution
|
This is a webapps exploit for cgi platform. Description: Karrigell 1.x/2.0/2.1 - '.KS' File Arbitrary Python Command Execution. Author: Radovan GarabÃk
|
Analyze the security implications of: Karrigell 1.x/2.0/2.1 - '.KS' File Arbitrary Python Command Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Maian Gallery 2 - Local File Download
|
This is a webapps exploit for php platform. Description: Maian Gallery 2 - Local File Download. Author: mr_me
|
Analyze the security implications of: Maian Gallery 2 - Local File Download
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Makale Scripti - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Makale Scripti - Cross-Site Scripting. Author: GeFORC3
|
Analyze the security implications of: Makale Scripti - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Maian Uploader 4.0 - 'user' SQL Injection
|
This is a webapps exploit for php platform. Description: Maian Uploader 4.0 - 'user' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Maian Uploader 4.0 - 'user' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Online Voting System Project in PHP - 'username' Persistent Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: Online Voting System Project in PHP - 'username' Persistent Cross-Site Scripting. Author: Sagar Banwa
|
Analyze the security implications of: Online Voting System Project in PHP - 'username' Persistent Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component Joomlaequipment (com_juser) 2.0.4 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Joomlaequipment (com_juser) 2.0.4 - SQL Injection. Author: Chip d3 bi0s
|
Analyze the security implications of: Joomla! Component Joomlaequipment (com_juser) 2.0.4 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DmxReady Catalog Manager 1.2 - SQL Injection
|
This is a webapps exploit for asp platform. Description: DmxReady Catalog Manager 1.2 - SQL Injection. Author: Bellatrix
|
Analyze the security implications of: DmxReady Catalog Manager 1.2 - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! / Mambo Component Referenzen - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! / Mambo Component Referenzen - 'id' SQL Injection. Author: S@BUN
|
Analyze the security implications of: Joomla! / Mambo Component Referenzen - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: SpiderMonkey - IonMonkey Compiled Code Fails to Update Inferred Property Types (Type Confusion)
|
This is a dos exploit for multiple platform. Description: SpiderMonkey - IonMonkey Compiled Code Fails to Update Inferred Property Types (Type Confusion). Author: Google Security Research
|
Analyze the security implications of: SpiderMonkey - IonMonkey Compiled Code Fails to Update Inferred Property Types (Type Confusion)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component Machine - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Joomla! Component Machine - Multiple SQL Injections. Author: the_cyber_nuxbie
|
Analyze the security implications of: Joomla! Component Machine - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BlueCMS 1.6 - 'x-forwarded-for' Header SQL Injection
|
This is a webapps exploit for php platform. Description: BlueCMS 1.6 - 'x-forwarded-for' Header SQL Injection. Author: cnryan
|
Analyze the security implications of: BlueCMS 1.6 - 'x-forwarded-for' Header SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MacKeeper - URL Handler Remote Code Execution
|
This is a remote exploit for osx platform. Description: MacKeeper - URL Handler Remote Code Execution. Author: Braden Thomas
|
Analyze the security implications of: MacKeeper - URL Handler Remote Code Execution
|
This exploit targets osx systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Microsoft Lync Server 2010 - 'ReachJoin.aspx' Remote Command Injection
|
This is a webapps exploit for asp platform. Description: Microsoft Lync Server 2010 - 'ReachJoin.aspx' Remote Command Injection. Author: Mark Lachniet
|
Analyze the security implications of: Microsoft Lync Server 2010 - 'ReachJoin.aspx' Remote Command Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: AMSS++ 4.7 - Backdoor Admin Account
|
This is a webapps exploit for php platform. Description: AMSS++ 4.7 - Backdoor Admin Account. Author: indoushka
|
Analyze the security implications of: AMSS++ 4.7 - Backdoor Admin Account
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Motorola SB5101 - Hax0rware Event Reset Remote Overflow
|
This is a dos exploit for hardware platform. Description: Motorola SB5101 - Hax0rware Event Reset Remote Overflow. Author: Dillon Beresford
|
Analyze the security implications of: Motorola SB5101 - Hax0rware Event Reset Remote Overflow
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: ETicket 1.5.5 - 'Open.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: ETicket 1.5.5 - 'Open.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Jesper Jurcenoks
|
Analyze the security implications of: ETicket 1.5.5 - 'Open.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Grandstream Multiple IP Cameras - Cross-Site Request Forgery
|
This is a remote exploit for hardware platform. Description: Grandstream Multiple IP Cameras - Cross-Site Request Forgery. Author: Castillo
|
Analyze the security implications of: Grandstream Multiple IP Cameras - Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Franklin Fueling Systems TS-550 - Default Password
|
This is a remote exploit for hardware platform. Description: Franklin Fueling Systems TS-550 - Default Password. Author: Parsa Rezaie Khiabanloo
|
Analyze the security implications of: Franklin Fueling Systems TS-550 - Default Password
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: CleverDog Smart Camera DOG-2W / DOG-2W-V4 - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: CleverDog Smart Camera DOG-2W / DOG-2W-V4 - Multiple Vulnerabilities. Author: Alex Akinbi
|
Analyze the security implications of: CleverDog Smart Camera DOG-2W / DOG-2W-V4 - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: 2DayBiz Video Community Portal - 'user-profile.php' SQL Injection
|
This is a webapps exploit for php platform. Description: 2DayBiz Video Community Portal - 'user-profile.php' SQL Injection. Author: Sangteamtham
|
Analyze the security implications of: 2DayBiz Video Community Portal - 'user-profile.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Laundry Booking Management System 1.0 - 'Multiple' Stored Cross-Site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: Laundry Booking Management System 1.0 - 'Multiple' Stored Cross-Site Scripting (XSS). Author: Azumah Foresight Xorlali
|
Analyze the security implications of: Laundry Booking Management System 1.0 - 'Multiple' Stored Cross-Site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FusionPBX 4.4.3 - Remote Command Execution
|
This is a webapps exploit for php platform. Description: FusionPBX 4.4.3 - Remote Command Execution. Author: Dustin Cobb
|
Analyze the security implications of: FusionPBX 4.4.3 - Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: eXtremail 2.1.1 - DNS Parsing Bugs Remote (PoC)
|
This is a dos exploit for linux platform. Description: eXtremail 2.1.1 - DNS Parsing Bugs Remote (PoC). Author: mu-b
|
Analyze the security implications of: eXtremail 2.1.1 - DNS Parsing Bugs Remote (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Palo Alto Networks PanOS - 'root_trace' Local Privilege Escalation
|
This is a local exploit for linux platform. Description: Palo Alto Networks PanOS - 'root_trace' Local Privilege Escalation. Author: Google Security Research
|
Analyze the security implications of: Palo Alto Networks PanOS - 'root_trace' Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Easyndexer 1.0 - Cross-Site Request Forgery (Add Admin)
|
This is a webapps exploit for php platform. Description: Easyndexer 1.0 - Cross-Site Request Forgery (Add Admin). Author: Ihsan Sencan
|
Analyze the security implications of: Easyndexer 1.0 - Cross-Site Request Forgery (Add Admin)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DELTAScripts PHP Classifieds 7.5 - SQL Injection
|
This is a webapps exploit for php platform. Description: DELTAScripts PHP Classifieds 7.5 - SQL Injection. Author: ZoRLu
|
Analyze the security implications of: DELTAScripts PHP Classifieds 7.5 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ea-gBook 0.1 - Remote Command Execution / Remote File Inclusion
|
This is a webapps exploit for php platform. Description: ea-gBook 0.1 - Remote Command Execution / Remote File Inclusion. Author: bd0rk
|
Analyze the security implications of: ea-gBook 0.1 - Remote Command Execution / Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Progress Database Server 8.3b - 'prodb' Local Privilege Escalation
|
This is a local exploit for multiple platform. Description: Progress Database Server 8.3b - 'prodb' Local Privilege Escalation. Author: the itch
|
Analyze the security implications of: Progress Database Server 8.3b - 'prodb' Local Privilege Escalation
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component com_gcalendar Suite 2.1.5 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component com_gcalendar Suite 2.1.5 - Local File Inclusion. Author: jdc
|
Analyze the security implications of: Joomla! Component com_gcalendar Suite 2.1.5 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.