input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Chris LaPointe Download Center 1.2 - 'category' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Chris LaPointe Download Center 1.2 - 'category' Cross-Site Scripting. Author: ZoRLu
|
Analyze the security implications of: Chris LaPointe Download Center 1.2 - 'category' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Magic Winmail Server 4.0 (Build 1112) - 'upload.php' Traversal Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Magic Winmail Server 4.0 (Build 1112) - 'upload.php' Traversal Arbitrary File Upload. Author: Tan Chew Keong
|
Analyze the security implications of: Magic Winmail Server 4.0 (Build 1112) - 'upload.php' Traversal Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ecomat CMS - SQL Injection
|
This is a webapps exploit for multiple platform. Description: Ecomat CMS - SQL Injection. Author: High-Tech Bridge SA
|
Analyze the security implications of: Ecomat CMS - SQL Injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: AdaptCMS 2.0.4 - 'config.php?question' SQL Injection
|
This is a webapps exploit for php platform. Description: AdaptCMS 2.0.4 - 'config.php?question' SQL Injection. Author: kallimero
|
Analyze the security implications of: AdaptCMS 2.0.4 - 'config.php?question' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CitrusDB 0.3.6 - Arbitrary Local PHP File Inclusion
|
This is a webapps exploit for php platform. Description: CitrusDB 0.3.6 - Arbitrary Local PHP File Inclusion. Author: RedTeam Pentesting
|
Analyze the security implications of: CitrusDB 0.3.6 - Arbitrary Local PHP File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Falt4 CMS RC4 - 'FCKeditor' Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Falt4 CMS RC4 - 'FCKeditor' Arbitrary File Upload. Author: Sp3shial
|
Analyze the security implications of: Falt4 CMS RC4 - 'FCKeditor' Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Free Realty 3.1-0.6 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Free Realty 3.1-0.6 - Multiple Vulnerabilities. Author: Vulnerability-Lab
|
Analyze the security implications of: Free Realty 3.1-0.6 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AraDown - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: AraDown - 'id' SQL Injection. Author: G-B
|
Analyze the security implications of: AraDown - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CMSsite 1.0 - 'cat_id' SQL Injection
|
This is a webapps exploit for php platform. Description: CMSsite 1.0 - 'cat_id' SQL Injection. Author: Majid kalantari
|
Analyze the security implications of: CMSsite 1.0 - 'cat_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: eWebquiz 8 - 'eWebQuiz.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: eWebquiz 8 - 'eWebQuiz.asp' SQL Injection. Author: ajann
|
Analyze the security implications of: eWebquiz 8 - 'eWebQuiz.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Magic Photo Storage Website - '/user/add_category.php?_config[site_path]' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Magic Photo Storage Website - '/user/add_category.php?_config[site_path]' Remote File Inclusion. Author: IbnuSina
|
Analyze the security implications of: Magic Photo Storage Website - '/user/add_category.php?_config[site_path]' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Coppermine Photo Gallery 1.4.11 - SQL Injection
|
This is a webapps exploit for php platform. Description: Coppermine Photo Gallery 1.4.11 - SQL Injection. Author: DarkFig
|
Analyze the security implications of: Coppermine Photo Gallery 1.4.11 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Adobe Flash - AVC Edge Processing Out-of-Bounds Read
|
This is a dos exploit for multiple platform. Description: Adobe Flash - AVC Edge Processing Out-of-Bounds Read. Author: Google Security Research
|
Analyze the security implications of: Adobe Flash - AVC Edge Processing Out-of-Bounds Read
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Hastymail 2.1.1 RC1 - Command Injection (Metasploit)
|
This is a webapps exploit for php platform. Description: Hastymail 2.1.1 RC1 - Command Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: Hastymail 2.1.1 RC1 - Command Injection (Metasploit)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ecartis 1.0.0/0.129 a Listar - Multiple Local Buffer Overflow Vulnerabilities (1)
|
This is a local exploit for linux platform. Description: Ecartis 1.0.0/0.129 a Listar - Multiple Local Buffer Overflow Vulnerabilities (1). Author: the itch
|
Analyze the security implications of: Ecartis 1.0.0/0.129 a Listar - Multiple Local Buffer Overflow Vulnerabilities (1)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Jamit Job Board 3.x - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Jamit Job Board 3.x - Blind SQL Injection. Author: XaDoS
|
Analyze the security implications of: Jamit Job Board 3.x - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DUclassified 4.x - 'adDetail.asp' Multiple SQL Injections
|
This is a webapps exploit for asp platform. Description: DUclassified 4.x - 'adDetail.asp' Multiple SQL Injections. Author: Soroosh Dalili
|
Analyze the security implications of: DUclassified 4.x - 'adDetail.asp' Multiple SQL Injections
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: ideacart 0.02 - Local File Inclusion / SQL Injection
|
This is a webapps exploit for php platform. Description: ideacart 0.02 - Local File Inclusion / SQL Injection. Author: nuclear
|
Analyze the security implications of: ideacart 0.02 - Local File Inclusion / SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Company's Recruitment Management System 1.0 - 'Add New user' Cross-Site Request Forgery (CSRF)
|
This is a webapps exploit for php platform. Description: Company's Recruitment Management System 1.0 - 'Add New user' Cross-Site Request Forgery (CSRF). Author: Aniket Deshmane
|
Analyze the security implications of: Company's Recruitment Management System 1.0 - 'Add New user' Cross-Site Request Forgery (CSRF)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ilient SysAid 8.5.5 - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities
|
This is a webapps exploit for jsp platform. Description: Ilient SysAid 8.5.5 - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities. Author: Julien Ahrens
|
Analyze the security implications of: Ilient SysAid 8.5.5 - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Elxis CMS 2009 - 'index.php?task' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Elxis CMS 2009 - 'index.php?task' Cross-Site Scripting. Author: Ewerson Guimaraes
|
Analyze the security implications of: Elxis CMS 2009 - 'index.php?task' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mambo Component MiniBB 1.5a - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Mambo Component MiniBB 1.5a - Remote File Inclusion. Author: Matdhule
|
Analyze the security implications of: Mambo Component MiniBB 1.5a - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Multiple Browsers - 'window.print()' Denial of Service
|
This is a dos exploit for osx platform. Description: Multiple Browsers - 'window.print()' Denial of Service. Author: Dr_IDE
|
Analyze the security implications of: Multiple Browsers - 'window.print()' Denial of Service
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: OpenWrt 10.03 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for cgi platform. Description: OpenWrt 10.03 - Multiple Cross-Site Scripting Vulnerabilities. Author: dave b
|
Analyze the security implications of: OpenWrt 10.03 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: MySQL / MariaDB / PerconaDB 5.5.x/5.6.x/5.7.x - 'mysql' System User Privilege Escalation / Race Condition
|
This is a local exploit for linux platform. Description: MySQL / MariaDB / PerconaDB 5.5.x/5.6.x/5.7.x - 'mysql' System User Privilege Escalation / Race Condition. Author: Dawid Golunski
|
Analyze the security implications of: MySQL / MariaDB / PerconaDB 5.5.x/5.6.x/5.7.x - 'mysql' System User Privilege Escalation / Race Condition
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: AddressSanitizer (ASan) - SUID Executable Privilege Escalation (Metasploit)
|
This is a local exploit for linux platform. Description: AddressSanitizer (ASan) - SUID Executable Privilege Escalation (Metasploit). Author: Metasploit
|
Analyze the security implications of: AddressSanitizer (ASan) - SUID Executable Privilege Escalation (Metasploit)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Galore Simple Shop 3.1 - 'section' SQL Injection
|
This is a webapps exploit for php platform. Description: Galore Simple Shop 3.1 - 'section' SQL Injection. Author: S@BUN
|
Analyze the security implications of: Galore Simple Shop 3.1 - 'section' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ABB Cylon Aspect 3.08.02 (escDevicesUpdate.php) - Denial of Service (DOS)
|
This is a hardware exploit for php platform. Description: ABB Cylon Aspect 3.08.02 (escDevicesUpdate.php) - Denial of Service (DOS). Author: LiquidWorm
|
Analyze the security implications of: ABB Cylon Aspect 3.08.02 (escDevicesUpdate.php) - Denial of Service (DOS)
|
This exploit targets php systems. Type: hardware. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ISC BIND 9 - TKEY (PoC)
|
This is a dos exploit for multiple platform. Description: ISC BIND 9 - TKEY (PoC). Author: Errata Security
|
Analyze the security implications of: ISC BIND 9 - TKEY (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Openfire 3.6.2 - 'group-summary.jsp' Cross-Site Scripting
|
This is a webapps exploit for jsp platform. Description: Openfire 3.6.2 - 'group-summary.jsp' Cross-Site Scripting. Author: Federico Muttis
|
Analyze the security implications of: Openfire 3.6.2 - 'group-summary.jsp' Cross-Site Scripting
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Campsite CMS - Remote Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Campsite CMS - Remote Persistent Cross-Site Scripting. Author: D4rk357
|
Analyze the security implications of: Campsite CMS - Remote Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ESMI PayPal StoreFront 1.7 - 'pages.php?idpages' SQL Injection
|
This is a webapps exploit for php platform. Description: ESMI PayPal StoreFront 1.7 - 'pages.php?idpages' SQL Injection. Author: Dcrab
|
Analyze the security implications of: ESMI PayPal StoreFront 1.7 - 'pages.php?idpages' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GnuPG 1.4/1.9 - Parse_Comment Remote Buffer Overflow
|
This is a dos exploit for linux platform. Description: GnuPG 1.4/1.9 - Parse_Comment Remote Buffer Overflow. Author: Evgeny Legerov
|
Analyze the security implications of: GnuPG 1.4/1.9 - Parse_Comment Remote Buffer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.