input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Progress Database 9.1 - sqlcpp Local Buffer Overflow
|
This is a local exploit for multiple platform. Description: Progress Database 9.1 - sqlcpp Local Buffer Overflow. Author: kf
|
Analyze the security implications of: Progress Database 9.1 - sqlcpp Local Buffer Overflow
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: JSPWiki 2.5.139 - 'Diff.jsp' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for jsp platform. Description: JSPWiki 2.5.139 - 'Diff.jsp' Multiple Cross-Site Scripting Vulnerabilities. Author: Jason Kratzer
|
Analyze the security implications of: JSPWiki 2.5.139 - 'Diff.jsp' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Jax Guestbook 3.50 - 'Page' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Jax Guestbook 3.50 - 'Page' Cross-Site Scripting. Author: ALMOKANN3
|
Analyze the security implications of: Jax Guestbook 3.50 - 'Page' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Trend Micro Interscan Messaging Security Suite - Persistent Cross-Site Scripting / Cross-Site Request Forgery
|
This is a webapps exploit for aix platform. Description: Trend Micro Interscan Messaging Security Suite - Persistent Cross-Site Scripting / Cross-Site Request Forgery. Author: modpr0be
|
Analyze the security implications of: Trend Micro Interscan Messaging Security Suite - Persistent Cross-Site Scripting / Cross-Site Request Forgery
|
This exploit targets aix systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aix platform
|
What is this exploit about: Vim 5.x - Swap File Race Condition
|
This is a local exploit for linux platform. Description: Vim 5.x - Swap File Race Condition. Author: zen-parse
|
Analyze the security implications of: Vim 5.x - Swap File Race Condition
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Kirby CMS 3.5.3.1 - 'file' Cross-Site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: Kirby CMS 3.5.3.1 - 'file' Cross-Site Scripting (XSS). Author: Sreenath Raghunathan
|
Analyze the security implications of: Kirby CMS 3.5.3.1 - 'file' Cross-Site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BPDirectory Business Directory - Authentication Bypass
|
This is a webapps exploit for asp platform. Description: BPDirectory Business Directory - Authentication Bypass. Author: v3n0m
|
Analyze the security implications of: BPDirectory Business Directory - Authentication Bypass
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: CKEditor 5 35.4.0 - Cross-Site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: CKEditor 5 35.4.0 - Cross-Site Scripting (XSS). Author: Manish Pathak
|
Analyze the security implications of: CKEditor 5 35.4.0 - Cross-Site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: NullLogic Null HTTPd 0.5.1 - Error Page Long HTTP Request Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: NullLogic Null HTTPd 0.5.1 - Error Page Long HTTP Request Cross-Site Scripting. Author: Luigi Auriemma
|
Analyze the security implications of: NullLogic Null HTTPd 0.5.1 - Error Page Long HTTP Request Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CubeCart 3.0.x - '/admin/print_order.php?order_id' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: CubeCart 3.0.x - '/admin/print_order.php?order_id' Cross-Site Scripting. Author: HACKERS PAL
|
Analyze the security implications of: CubeCart 3.0.x - '/admin/print_order.php?order_id' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component TimeTrack 1.2.4 - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Joomla! Component TimeTrack 1.2.4 - Multiple SQL Injections. Author: Salvatore Fresta
|
Analyze the security implications of: Joomla! Component TimeTrack 1.2.4 - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Camera Life 2.6.2 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Camera Life 2.6.2 - 'id' SQL Injection. Author: nuclear
|
Analyze the security implications of: Camera Life 2.6.2 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BIND 9.x - Remote DNS Cache Poisoning
|
This is a remote exploit for multiple platform. Description: BIND 9.x - Remote DNS Cache Poisoning. Author: Marc Bevand
|
Analyze the security implications of: BIND 9.x - Remote DNS Cache Poisoning
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Man Command - -H Flag Local Buffer Overflow
|
This is a local exploit for linux platform. Description: Man Command - -H Flag Local Buffer Overflow. Author: Daniel Roethlisberger
|
Analyze the security implications of: Man Command - -H Flag Local Buffer Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: QNAP - Admin Shell via Bash Environment Variable Code Injection (Metasploit)
|
This is a remote exploit for hardware platform. Description: QNAP - Admin Shell via Bash Environment Variable Code Injection (Metasploit). Author: Patrick Pellegrino
|
Analyze the security implications of: QNAP - Admin Shell via Bash Environment Variable Code Injection (Metasploit)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Coppermine Photo Gallery - 'index.php' Script SQL Injection
|
This is a webapps exploit for php platform. Description: Coppermine Photo Gallery - 'index.php' Script SQL Injection. Author: Taurus Omar
|
Analyze the security implications of: Coppermine Photo Gallery - 'index.php' Script SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: lxml - 'clean_html' Security Bypass
|
This is a remote exploit for linux platform. Description: lxml - 'clean_html' Security Bypass. Author: Maksim Kochkin
|
Analyze the security implications of: lxml - 'clean_html' Security Bypass
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ManageEngine EventLog Analyzer < 10.6 build 10060 - SQL Execution
|
This is a webapps exploit for multiple platform. Description: ManageEngine EventLog Analyzer < 10.6 build 10060 - SQL Execution. Author: xistence
|
Analyze the security implications of: ManageEngine EventLog Analyzer < 10.6 build 10060 - SQL Execution
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ZPanel 10.0.0.2 htpasswd Module - 'Username' Command Execution (Metasploit)
|
This is a remote exploit for linux platform. Description: ZPanel 10.0.0.2 htpasswd Module - 'Username' Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: ZPanel 10.0.0.2 htpasswd Module - 'Username' Command Execution (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Dell SonicWALL Secure Mobile Access SMA 8.1 - Cross-Site Scripting / Cross-Site Request Forgery
|
This is a webapps exploit for hardware platform. Description: Dell SonicWALL Secure Mobile Access SMA 8.1 - Cross-Site Scripting / Cross-Site Request Forgery. Author: LiquidWorm
|
Analyze the security implications of: Dell SonicWALL Secure Mobile Access SMA 8.1 - Cross-Site Scripting / Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: e-ticketing - SQL Injection
|
This is a webapps exploit for php platform. Description: e-ticketing - SQL Injection. Author: Mark Stanislav
|
Analyze the security implications of: e-ticketing - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mailist 3.0 - Insecure Backup / Local File Inclusion
|
This is a webapps exploit for php platform. Description: Mailist 3.0 - Insecure Backup / Local File Inclusion. Author: SirGod
|
Analyze the security implications of: Mailist 3.0 - Insecure Backup / Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mantis Bug Tracker 0.15.x/0.16/0.17.x - JPGraph Remote File Inclusion Command Execution
|
This is a webapps exploit for php platform. Description: Mantis Bug Tracker 0.15.x/0.16/0.17.x - JPGraph Remote File Inclusion Command Execution. Author: Joao Gouveia
|
Analyze the security implications of: Mantis Bug Tracker 0.15.x/0.16/0.17.x - JPGraph Remote File Inclusion Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Automatic-Systems SOC FL9600 FastLine - The device contains hardcoded login and password for super admin
|
This is a webapps exploit for php platform. Description: Automatic-Systems SOC FL9600 FastLine - The device contains hardcoded login and password for super admin. Author: Marcin Kozlowski
|
Analyze the security implications of: Automatic-Systems SOC FL9600 FastLine - The device contains hardcoded login and password for super admin
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FaScript FaPersian Petition - SQL Injection
|
This is a webapps exploit for php platform. Description: FaScript FaPersian Petition - SQL Injection. Author: Khashayar Fereidani
|
Analyze the security implications of: FaScript FaPersian Petition - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Spider Calendar 3.2.6 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Spider Calendar 3.2.6 - SQL Injection. Author: Claudio Viviani
|
Analyze the security implications of: Joomla! Component Spider Calendar 3.2.6 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: TwonkyMedia Server 7.0.11-8.5 - Persistent Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: TwonkyMedia Server 7.0.11-8.5 - Persistent Cross-Site Scripting. Author: Sven Fassbender
|
Analyze the security implications of: TwonkyMedia Server 7.0.11-8.5 - Persistent Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Deonixscripts Templates Management 1.3 - SQL Injection
|
This is a webapps exploit for php platform. Description: Deonixscripts Templates Management 1.3 - SQL Injection. Author: d3b4g
|
Analyze the security implications of: Deonixscripts Templates Management 1.3 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! 1.6 - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Joomla! 1.6 - Multiple SQL Injections. Author: Aung Khant
|
Analyze the security implications of: Joomla! 1.6 - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: E-Xoopport 3.1 - 'display.php?katid' SQL Injection
|
This is a webapps exploit for php platform. Description: E-Xoopport 3.1 - 'display.php?katid' SQL Injection. Author: Vis Intelligendi
|
Analyze the security implications of: E-Xoopport 3.1 - 'display.php?katid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: JFFNms 0.8.3 - 'admin/adm/test.php' PHP Information Disclosure
|
This is a webapps exploit for php platform. Description: JFFNms 0.8.3 - 'admin/adm/test.php' PHP Information Disclosure. Author: Tim Brown
|
Analyze the security implications of: JFFNms 0.8.3 - 'admin/adm/test.php' PHP Information Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LemonLDAP:NG 0.9.3.1 - User Enumeration / Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: LemonLDAP:NG 0.9.3.1 - User Enumeration / Cross-Site Scripting. Author: clément Oudot
|
Analyze the security implications of: LemonLDAP:NG 0.9.3.1 - User Enumeration / Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Belkin N150 Wireless Router F9K1009 v1 - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: Belkin N150 Wireless Router F9K1009 v1 - Multiple Vulnerabilities. Author: Rahul Pratap Singh
|
Analyze the security implications of: Belkin N150 Wireless Router F9K1009 v1 - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.