input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component PHP-Bridge 1.2.3 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component PHP-Bridge 1.2.3 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component PHP-Bridge 1.2.3 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Python - Interpreter Heap Memory Corruption (PoC)
|
This is a dos exploit for multiple platform. Description: Python - Interpreter Heap Memory Corruption (PoC). Author: Debasish Mandal
|
Analyze the security implications of: Python - Interpreter Heap Memory Corruption (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: SLocate 2.6 - User-Supplied Database Heap Overflow
|
This is a local exploit for linux platform. Description: SLocate 2.6 - User-Supplied Database Heap Overflow. Author: Patrik Hornik
|
Analyze the security implications of: SLocate 2.6 - User-Supplied Database Heap Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: EncapsCMS 0.3.6 - 'config[path]' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: EncapsCMS 0.3.6 - 'config[path]' Remote File Inclusion. Author: cr4wl3r
|
Analyze the security implications of: EncapsCMS 0.3.6 - 'config[path]' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MWOpen E-Commerce - 'leggi_commenti.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: MWOpen E-Commerce - 'leggi_commenti.asp' SQL Injection. Author: KiNgOfThEwOrLd
|
Analyze the security implications of: MWOpen E-Commerce - 'leggi_commenti.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: File Hub 1.9.1 iOS - Multiple Vulnerabilities
|
This is a webapps exploit for ios platform. Description: File Hub 1.9.1 iOS - Multiple Vulnerabilities. Author: Vulnerability-Lab
|
Analyze the security implications of: File Hub 1.9.1 iOS - Multiple Vulnerabilities
|
This exploit targets ios systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: Horde IMP 2.2.x/3.2.x/4.0.x - Email Attachments HTML Injection
|
This is a remote exploit for linux platform. Description: Horde IMP 2.2.x/3.2.x/4.0.x - Email Attachments HTML Injection. Author: SEC Consult
|
Analyze the security implications of: Horde IMP 2.2.x/3.2.x/4.0.x - Email Attachments HTML Injection
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: H3C ER5100 - Authentication Bypass
|
This is a webapps exploit for asp platform. Description: H3C ER5100 - Authentication Bypass. Author: 128bit
|
Analyze the security implications of: H3C ER5100 - Authentication Bypass
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Mitel Audio and Web Conferencing - Command Injection (Metasploit)
|
This is a remote exploit for linux platform. Description: Mitel Audio and Web Conferencing - Command Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: Mitel Audio and Web Conferencing - Command Injection (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: IBM Tealeaf CX 8.8 - Remote OS Command Injection
|
This is a webapps exploit for php platform. Description: IBM Tealeaf CX 8.8 - Remote OS Command Injection. Author: drone
|
Analyze the security implications of: IBM Tealeaf CX 8.8 - Remote OS Command Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Limonade Framework - 'limonade.php' Local File Disclosure
|
This is a webapps exploit for php platform. Description: Limonade Framework - 'limonade.php' Local File Disclosure. Author: Yashar shahinzadeh
|
Analyze the security implications of: Limonade Framework - 'limonade.php' Local File Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Office^2 iPhone - '.XLS' Denial of Service
|
This is a dos exploit for hardware platform. Description: Office^2 iPhone - '.XLS' Denial of Service. Author: Matthew Bergin
|
Analyze the security implications of: Office^2 iPhone - '.XLS' Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: SilverStripe 5.3.8 - Stored Cross Site Scripting (XSS) (Authenticated)
|
This is a webapps exploit for multiple platform. Description: SilverStripe 5.3.8 - Stored Cross Site Scripting (XSS) (Authenticated). Author: James Nicoll
|
Analyze the security implications of: SilverStripe 5.3.8 - Stored Cross Site Scripting (XSS) (Authenticated)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: AJA Portal 1.2 (Windows) - Local File Inclusion
|
This is a webapps exploit for php platform. Description: AJA Portal 1.2 (Windows) - Local File Inclusion. Author: ahmadbady
|
Analyze the security implications of: AJA Portal 1.2 (Windows) - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Sun Java Virtual Machine 1.x - Slash Path Security Model Circumvention
|
This is a dos exploit for multiple platform. Description: Sun Java Virtual Machine 1.x - Slash Path Security Model Circumvention. Author: Last Stage of Delirium
|
Analyze the security implications of: Sun Java Virtual Machine 1.x - Slash Path Security Model Circumvention
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: 8 TOTOLINK Router Models - Backdoor Access / Remote Code Execution
|
This is a webapps exploit for hardware platform. Description: 8 TOTOLINK Router Models - Backdoor Access / Remote Code Execution. Author: Pierre Kim
|
Analyze the security implications of: 8 TOTOLINK Router Models - Backdoor Access / Remote Code Execution
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: WordPress Plugin Creative Contact Form - Arbitrary File Upload (Metasploit)
|
This is a remote exploit for php platform. Description: WordPress Plugin Creative Contact Form - Arbitrary File Upload (Metasploit). Author: Metasploit
|
Analyze the security implications of: WordPress Plugin Creative Contact Form - Arbitrary File Upload (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DeepSound 1.0.4 - SQL Injection
|
This is a webapps exploit for php platform. Description: DeepSound 1.0.4 - SQL Injection. Author: Mehmet EMIROGLU
|
Analyze the security implications of: DeepSound 1.0.4 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: JBrowser 1.0/2.x - 'browser.php' Directory Traversal
|
This is a webapps exploit for php platform. Description: JBrowser 1.0/2.x - 'browser.php' Directory Traversal. Author: Himeur Nourredine
|
Analyze the security implications of: JBrowser 1.0/2.x - 'browser.php' Directory Traversal
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel 2.6.10 < 2.6.31.5 - 'pipe.c' Local Privilege Escalation
|
This is a local exploit for linux platform. Description: Linux Kernel 2.6.10 < 2.6.31.5 - 'pipe.c' Local Privilege Escalation. Author: spender
|
Analyze the security implications of: Linux Kernel 2.6.10 < 2.6.31.5 - 'pipe.c' Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Jfrog Artifactory < 4.16 - Arbitrary File Upload / Remote Command Execution
|
This is a webapps exploit for linux platform. Description: Jfrog Artifactory < 4.16 - Arbitrary File Upload / Remote Command Execution. Author: Alessio Sergi
|
Analyze the security implications of: Jfrog Artifactory < 4.16 - Arbitrary File Upload / Remote Command Execution
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Command School Student Management System - '/sw/admin_media_codes_1.php?id' SQL Injection
|
This is a webapps exploit for php platform. Description: Command School Student Management System - '/sw/admin_media_codes_1.php?id' SQL Injection. Author: AtT4CKxT3rR0r1ST
|
Analyze the security implications of: Command School Student Management System - '/sw/admin_media_codes_1.php?id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Broken Access Control - on NodeBB v3.6.7
|
This is a webapps exploit for multiple platform. Description: Broken Access Control - on NodeBB v3.6.7. Author: Vibhor Sharma
|
Analyze the security implications of: Broken Access Control - on NodeBB v3.6.7
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component com_horses - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_horses - 'id' SQL Injection. Author: Kernel Security Group
|
Analyze the security implications of: Joomla! Component com_horses - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Open WebMail 1.x/2.x - Remote Command Execution Variant
|
This is a remote exploit for linux platform. Description: Open WebMail 1.x/2.x - Remote Command Execution Variant. Author: Nullbyte
|
Analyze the security implications of: Open WebMail 1.x/2.x - Remote Command Execution Variant
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: AT Computing atsar_linux 1.4 - File Manipulation
|
This is a local exploit for linux platform. Description: AT Computing atsar_linux 1.4 - File Manipulation. Author: S. Krahmer
|
Analyze the security implications of: AT Computing atsar_linux 1.4 - File Manipulation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Leed - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Leed - 'id' SQL Injection. Author: Alexandre Herzog
|
Analyze the security implications of: Leed - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: cms (id) 5.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: cms (id) 5.0 - SQL Injection. Author: spykit
|
Analyze the security implications of: cms (id) 5.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dojo Toolkit 1.4.1 - '/doh/runner.html' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for multiple platform. Description: Dojo Toolkit 1.4.1 - '/doh/runner.html' Multiple Cross-Site Scripting Vulnerabilities. Author: Adam Bixby
|
Analyze the security implications of: Dojo Toolkit 1.4.1 - '/doh/runner.html' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ClipShare 7.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: ClipShare 7.0 - SQL Injection. Author: 8bitsec
|
Analyze the security implications of: ClipShare 7.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: D-Link Routers - UPNP Buffer Overflow
|
This is a dos exploit for hardware platform. Description: D-Link Routers - UPNP Buffer Overflow. Author: Barnaby Jack
|
Analyze the security implications of: D-Link Routers - UPNP Buffer Overflow
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: WU-FTPD 2.6.2 - Remote Command Execution
|
This is a remote exploit for linux platform. Description: WU-FTPD 2.6.2 - Remote Command Execution. Author: Xpl017Elz
|
Analyze the security implications of: WU-FTPD 2.6.2 - Remote Command Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Sun Java System Web Server 6.1/7.0 - Digest Authentication Remote Buffer Overflow
|
This is a remote exploit for multiple platform. Description: Sun Java System Web Server 6.1/7.0 - Digest Authentication Remote Buffer Overflow. Author: Intevydis
|
Analyze the security implications of: Sun Java System Web Server 6.1/7.0 - Digest Authentication Remote Buffer Overflow
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.